SlideShare una empresa de Scribd logo
1 de 37
Descargar para leer sin conexión
Utilizing Novell Sentinel      ®
                                   ™



Advisor and Attack vulnerability


Tom Burt
GTS-Backline Engineer Novell
Novell/tburt@novell.com
Presentation Goals

    •   Present the benefits of Advisor
    •   Explain Advisor and its related components
    •   Discuss installation and maintenance of Advisor




2   © Novell, Inc. All rights reserved.
Agenda

    •   Advisor Overview
    •   Exploit Detection Overview
    •   Background/History Advisor v3 vs. v4
    •   Installation and Maintenance




3   © Novell, Inc. All rights reserved.
Advisor Overview
Terminology

    •   Advisor-The Novell optional add on subscription to
                                          ®



        provide attack and remediation information
    •   Attack-An event that indicates malicious or rogue
        software and or devices
    •   Vulnerability-An opening or weakness in a network
        allowing the potential for an attack
    •   Vulnerability Scanners-The process of detecting the
        strength of protection on a network.
    •   IPS/IDS collectors-Sentinel device collectors that
                                              ™


        gather data from IDS devices
    •   Vulnerability collectors-Sentinel device collectors that
        gather data from vulnerability scanners
5   © Novell, Inc. All rights reserved.
Collector links

    •   IPS, IDS and Vulnerability scan collectors are available
        at the following URL;
        http://support.novell.com/products/sentinel/secure/senti
        nel61.html




6   © Novell, Inc. All rights reserved.
Overview

    •   Powered by Security Nexus
    •   Acts as an early warning service to identify attacks and
        vulnerabilities.
         –   Provides Normalized Attack and remediation information
    •   Optional add on subscription service
         –   Initial download feed is free but additional downloads require a
             license
              >   Entitlement is linked to your Customer authentication credentials




7   © Novell, Inc. All rights reserved.
Overview

    •   Early warning service
         –   Normalization of attack data
         –   Correlation on real time data
         –   Incident Tracking
    •   Updates
         –   Updated on a regular configurable basis
         –   Advisor feeds/Downloads
              >   CVE's
              >   Bugtraq
              >   IDS
              >   ISS
              >   etc....

8   © Novell, Inc. All rights reserved.
Exploit Detection Overview
Exploit detection

     •   Exploit detection: Enables you to quickly identify and/or
         send out notifications in the event an attack is
         attempting to exploit a vulnerability in your system




10   © Novell, Inc. All rights reserved.
Requirements

     •   Requires that both the Vulnerability scanner and IDS
         system reports the vulnerabilities and attacks against
         the same systems.
     •   In Sentinel, systems are identified by IP Address and
         MSSP Customer Name
     •   The Vulnerability and IDS system must be supported by
         the Advisor service
     •   The reported attacks and vulnerabilities must be known
         to the Advisor service and Exploit Detection
          –   Most Novell collectors support the Attack and exploit detection
              data


11   © Novell, Inc. All rights reserved.
Requirements cont....

     •   The Vulnerability and IDS collectors must populate all 4
         of these fields
          –   DeviceName (RV31)
          –   DIP (Destination or TargetIP)
          –   DeviceAttackName (RT1)
          –   MSSP Customer Name (RV39)
               >   Managed Security Service Provider

     •   All Novell shipped collectors populate these values by
                                   ®



         default




12   © Novell, Inc. All rights reserved.
Exploit Detection

     •   When running supported IDS and Vulnerability
         collectors, events from the devices are scanned for
         potential attacks and vulnerabilities
          –   The mapping service maps the Product Name and MSSP
              Customer Name to the Advisor name and MSSP Customer
              Name
          –   If the events match successfully, the exploit information is
              updated in the exploitdetection.csv file
               >   $ESEC_HOME/data/map_data/exploitdetection.csv
                     »   IP, Device & Attack names, MSSP Customer name

          –   The mapping service populates the vulnerability event field
               >   Used to evaluate whether the incoming event exploits a vulnerability
                     »   If the value is 1, the destination device IS exploited
                     »   If the value is 0, the destination device is NOT exploited
13   © Novell, Inc. All rights reserved.
Brief History
History
 Advisor v3                                Advisor v4
 XML Files                                 CSV

 Database Space GB                         Database Space MB

 Disk Space GB                             Disk Space MB

 Feed Process Time - Hours                 Feed Process Time - Minutes

 Failed Feed Recovery - Hours              Failed Feed Recovery - Minutes

 Failed Process required database
                                           MD5sum
 cleanup

 Configured at Install only                Can be configured at any time

 Log files for failure                     Internal Events
15   © Novell, Inc. All rights reserved.
History

     •   Supported Systems
          –   IDS
          –   IPS
          –   Vulnerability




16   © Novell, Inc. All rights reserved.
Installation/Maintenance
Installation

     •   Requirements
          –   The Advisor service and Exploit Detection rely on mappings
              between attacks on assets and vulnerabilities of devices. As
              such it requires the following data to work with Advisor
               >   Vulnerability scan data
                     »   Sentinel supports multiple Vulnerability scanners
               >   Advisor map data
                     »   Contains data about known threats, attacks, and vulnerabilities
                     »   Service gathers information from multiple vulnerability and IDS vendors
                     »   Creates mappings from abstract Vuln and attack data
                     »   Security Nexus provides the advisor feed data
               >   Real Time attack data
                     »   The real time attacks that are detected as events are loaded into the Sentinel
                         database from IDS collectors

18   © Novell, Inc. All rights reserved.
Installation

     •   Installation media
          –   SP2 Full installer
          –   SP2 Patch installer
     •   Initial load data
          –   Advisor v4 feed files are included with Novell Sentinel     ®
                                                                                   ™



               >   $ESEC_HOME/data/updates/advisor
          –   After initial load, updates are performed on scheduled basis
               >   Advisor license/subscription is required for updates
               >   Feed location;
                   https://secure-www.novell.com/sentinel/download/advisor/feed/




19   © Novell, Inc. All rights reserved.
Usage/Maintenance

     •   Advisor User Interface
     •   Novell Sentinel Control Center
                         ®
                                           ™



          –   Must have Advisor Interface permissions
          –   Advisor Tab
               >   Status information
          –   Admin Tab
               >   Manual process of files in specified location
               >   Download Manager
                     »   Initialize download
                     »   Edit configuration preferences
               >   Preview Threat Map



20   © Novell, Inc. All rights reserved.
Usage/Maintenance




21   © Novell, Inc. All rights reserved.
Usage/Maintenance




22   © Novell, Inc. All rights reserved.
Usage/Maintenance




23   © Novell, Inc. All rights reserved.
Maintenance

     •   Advisor data feed source is updated on a regular basis
          –   Updating your database with current data feeds
               >   Automatic scheduling of updates
               >   Manual update

     •   Scripts
          –   Novell Sentinel 6.1SP2 & RD
                            ®
                                           ™



               >   $ESEC_HOME/bin/advisor.sh

     •   Configuration
          –   advisor_client.xml




24   © Novell, Inc. All rights reserved.
Maintenance

     •   Logging
          –   As of v4 all logging is done to das_query logs
          –   Configuration for additional logging should be made to the
              das_query_log.prop in the $ESEC_HOME/config directory
          –   Logs status of download and checking for feed notifcations
     •   Example;
         Fri Mar 05 05:05:21 MST 2010|INFO|Thread-148570|
         esecurity.ccs.comp.downloadfeed.
         Downloader.download Downloaded file:
         advnxsfeed.51.zip.md5 to local directory /opt/novell/se
         ntinel6/data/updates/advisor

25   © Novell, Inc. All rights reserved.
Manual update

     •   A manual download of the advisor feeds can be done
         as needed
          –   Login to the Novell Advisor feed download site using your
              eLogin username and password that is associated with the
              Advisor license
          –   Download any advisor feed files you need making sure to
              include both the .zip and .md5 files.
          –   Copy the files to the directory on the Sentinel server you have
              specified in the configuration
               >   Default location is $ESEC_HOME/data/updates/advisor
          –   In the Admin Tab → Advisor → Process Now



26   © Novell, Inc. All rights reserved.
Manual Update




27   © Novell, Inc. All rights reserved.
Manual Update




28   © Novell, Inc. All rights reserved.
Automatic Update




29   © Novell, Inc. All rights reserved.
Maintenance

     •   Advisor notifications
          –   Errors
               >   Errors in downloading feeds or data loading
          –   Success/failure on updates
               >   Success or failure messages on advisor feed updates
          –   Notifications
               >   Correlation rules
                     »   Actions such as send email




30   © Novell, Inc. All rights reserved.
Maintenance

     •   Exploit Detection Data Generation
          –   By default scheduled to run every 30 minutes
               >   Configurable in $ESEC_HOME/config/das_query.xml
               >   Object component, <obj-component id="ExploitDetectDataGenerator">
               >   Property, <property name="minRegenerateInterval">1800000</property>

     •   Scheduled Updates
          –   Direct Download
               >   6 hour, 12 hour, Daily, Weekly, Monthly
                     »   The time of the download is based off the first successful download
                          ~   Success at 10:30am results in 4:30pm for 6 hours configuration




31   © Novell, Inc. All rights reserved.
Usage

     •   View advisor data in SCC, Sentinel Control Center
                                                       ™



          –   Right click an event → analyze → Advisor data
          –   Only available after initial data load
          –   Analyze is only available if event data is from a Supported IDS
              Device
          –   Regular updates are necessary to ensure accuracy of data




32   © Novell, Inc. All rights reserved.
Demonstration
Demonstration

     •   Demonstration details
          –   Advisor download
          –   Advisor Processing
          –   Vulnerability scanning with test data
          –   Basic IDS Collector with Sample data
          –   Exploit detection
          –   Analyze Data




34   © Novell, Inc. All rights reserved.
Q&A
Unpublished Work of Novell, Inc. All Rights Reserved.
This work is an unpublished work and contains confidential, proprietary, and trade secret information of Novell, Inc.
Access to this work is restricted to Novell employees who have a need to know to perform tasks within the scope
of their assignments. No part of this work may be practiced, performed, copied, distributed, revised, modified,
translated, abridged, condensed, expanded, collected, or adapted without the prior written consent of Novell, Inc.
Any use or exploitation of this work without authorization could subject the perpetrator to criminal and civil liability.


General Disclaimer
This document is not to be construed as a promise by any participating company to develop, deliver, or market a
product. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in
making purchasing decisions. Novell, Inc. makes no representations or warranties with respect to the contents
of this document, and specifically disclaims any express or implied warranties of merchantability or fitness for any
particular purpose. The development, release, and timing of features or functionality described for Novell products
remains at the sole discretion of Novell. Further, Novell, Inc. reserves the right to revise this document and to
make changes to its content, at any time, without obligation to notify any person or entity of such revisions or
changes. All Novell marks referenced in this presentation are trademarks or registered trademarks of Novell, Inc.
in the United States and other countries. All third-party trademarks are the property of their respective owners.

Más contenido relacionado

La actualidad más candente

OSSJP/ALS19: The Road to Safety Certification: How the Xen Project is Making...
 OSSJP/ALS19: The Road to Safety Certification: How the Xen Project is Making... OSSJP/ALS19: The Road to Safety Certification: How the Xen Project is Making...
OSSJP/ALS19: The Road to Safety Certification: How the Xen Project is Making...The Linux Foundation
 
Securing your Cloud with Xen - SUSECon 2013
Securing your Cloud with Xen - SUSECon 2013Securing your Cloud with Xen - SUSECon 2013
Securing your Cloud with Xen - SUSECon 2013The Linux Foundation
 
Dell EMC validates your virtualized Genetec video management system before it...
Dell EMC validates your virtualized Genetec video management system before it...Dell EMC validates your virtualized Genetec video management system before it...
Dell EMC validates your virtualized Genetec video management system before it...Principled Technologies
 
System Hardening Recommendations_FINAL
System Hardening Recommendations_FINALSystem Hardening Recommendations_FINAL
System Hardening Recommendations_FINALMartin Evans
 
XPDDS19 Keynote: Xen Project Weather Report 2019 - Lars Kurth, Director of Op...
XPDDS19 Keynote: Xen Project Weather Report 2019 - Lars Kurth, Director of Op...XPDDS19 Keynote: Xen Project Weather Report 2019 - Lars Kurth, Director of Op...
XPDDS19 Keynote: Xen Project Weather Report 2019 - Lars Kurth, Director of Op...The Linux Foundation
 
VMware App Volumes Troubleshooting
VMware App Volumes TroubleshootingVMware App Volumes Troubleshooting
VMware App Volumes TroubleshootingDenis Gundarev
 
Havex Deep Dive (English)
Havex Deep Dive (English)Havex Deep Dive (English)
Havex Deep Dive (English)Digital Bond
 
OSSEU17: How Open Source Project Xen Puts Security Software Vendors Ahead of ...
OSSEU17: How Open Source Project Xen Puts Security Software Vendors Ahead of ...OSSEU17: How Open Source Project Xen Puts Security Software Vendors Ahead of ...
OSSEU17: How Open Source Project Xen Puts Security Software Vendors Ahead of ...The Linux Foundation
 
XPDDS19 Keynote: Unikraft Weather Report
XPDDS19 Keynote:  Unikraft Weather ReportXPDDS19 Keynote:  Unikraft Weather Report
XPDDS19 Keynote: Unikraft Weather ReportThe Linux Foundation
 
Unikraft Landing Page Master Slides
Unikraft Landing Page Master SlidesUnikraft Landing Page Master Slides
Unikraft Landing Page Master SlidesThe Linux Foundation
 
Yes, you can be pci compliant using a public iaas cloud a case study by phi...
Yes, you can be pci compliant using a public iaas cloud   a case study by phi...Yes, you can be pci compliant using a public iaas cloud   a case study by phi...
Yes, you can be pci compliant using a public iaas cloud a case study by phi...Khazret Sapenov
 
Andy Davis' Black Hat USA Presentation Revealing embedded fingerprints
Andy Davis' Black Hat USA Presentation Revealing embedded fingerprintsAndy Davis' Black Hat USA Presentation Revealing embedded fingerprints
Andy Davis' Black Hat USA Presentation Revealing embedded fingerprintsNCC Group
 
Dell EMC validates your Genetec video management system before it reaches you...
Dell EMC validates your Genetec video management system before it reaches you...Dell EMC validates your Genetec video management system before it reaches you...
Dell EMC validates your Genetec video management system before it reaches you...Principled Technologies
 
Long-term Maintenance Model of Embedded Industrial Linux Distribution
Long-term Maintenance Model of Embedded Industrial Linux DistributionLong-term Maintenance Model of Embedded Industrial Linux Distribution
Long-term Maintenance Model of Embedded Industrial Linux DistributionSZ Lin
 
Virtual SAN 6.2, hyper-converged infrastructure software
Virtual SAN 6.2, hyper-converged infrastructure softwareVirtual SAN 6.2, hyper-converged infrastructure software
Virtual SAN 6.2, hyper-converged infrastructure softwareDuncan Epping
 
Jonathan Frappier – Challenge 2 Design Solution
Jonathan Frappier – Challenge 2 Design SolutionJonathan Frappier – Challenge 2 Design Solution
Jonathan Frappier – Challenge 2 Design Solutiontovmug
 
Operational Visibiliy and Analytics - BU Seminar
Operational Visibiliy and Analytics - BU SeminarOperational Visibiliy and Analytics - BU Seminar
Operational Visibiliy and Analytics - BU SeminarCanturk Isci
 
Effective Linux Migration Processes
Effective Linux Migration ProcessesEffective Linux Migration Processes
Effective Linux Migration Processessheilamia
 

La actualidad más candente (20)

OSSJP/ALS19: The Road to Safety Certification: How the Xen Project is Making...
 OSSJP/ALS19: The Road to Safety Certification: How the Xen Project is Making... OSSJP/ALS19: The Road to Safety Certification: How the Xen Project is Making...
OSSJP/ALS19: The Road to Safety Certification: How the Xen Project is Making...
 
Securing your Cloud with Xen - SUSECon 2013
Securing your Cloud with Xen - SUSECon 2013Securing your Cloud with Xen - SUSECon 2013
Securing your Cloud with Xen - SUSECon 2013
 
Dell EMC validates your virtualized Genetec video management system before it...
Dell EMC validates your virtualized Genetec video management system before it...Dell EMC validates your virtualized Genetec video management system before it...
Dell EMC validates your virtualized Genetec video management system before it...
 
System Hardening Recommendations_FINAL
System Hardening Recommendations_FINALSystem Hardening Recommendations_FINAL
System Hardening Recommendations_FINAL
 
XPDDS19 Keynote: Xen Project Weather Report 2019 - Lars Kurth, Director of Op...
XPDDS19 Keynote: Xen Project Weather Report 2019 - Lars Kurth, Director of Op...XPDDS19 Keynote: Xen Project Weather Report 2019 - Lars Kurth, Director of Op...
XPDDS19 Keynote: Xen Project Weather Report 2019 - Lars Kurth, Director of Op...
 
VMware App Volumes Troubleshooting
VMware App Volumes TroubleshootingVMware App Volumes Troubleshooting
VMware App Volumes Troubleshooting
 
Havex Deep Dive (English)
Havex Deep Dive (English)Havex Deep Dive (English)
Havex Deep Dive (English)
 
OSSEU17: How Open Source Project Xen Puts Security Software Vendors Ahead of ...
OSSEU17: How Open Source Project Xen Puts Security Software Vendors Ahead of ...OSSEU17: How Open Source Project Xen Puts Security Software Vendors Ahead of ...
OSSEU17: How Open Source Project Xen Puts Security Software Vendors Ahead of ...
 
OSSNA18: Xen Beginners Training
OSSNA18: Xen Beginners Training OSSNA18: Xen Beginners Training
OSSNA18: Xen Beginners Training
 
XPDDS19 Keynote: Unikraft Weather Report
XPDDS19 Keynote:  Unikraft Weather ReportXPDDS19 Keynote:  Unikraft Weather Report
XPDDS19 Keynote: Unikraft Weather Report
 
Unikraft Landing Page Master Slides
Unikraft Landing Page Master SlidesUnikraft Landing Page Master Slides
Unikraft Landing Page Master Slides
 
Yes, you can be pci compliant using a public iaas cloud a case study by phi...
Yes, you can be pci compliant using a public iaas cloud   a case study by phi...Yes, you can be pci compliant using a public iaas cloud   a case study by phi...
Yes, you can be pci compliant using a public iaas cloud a case study by phi...
 
Andy Davis' Black Hat USA Presentation Revealing embedded fingerprints
Andy Davis' Black Hat USA Presentation Revealing embedded fingerprintsAndy Davis' Black Hat USA Presentation Revealing embedded fingerprints
Andy Davis' Black Hat USA Presentation Revealing embedded fingerprints
 
Dell EMC validates your Genetec video management system before it reaches you...
Dell EMC validates your Genetec video management system before it reaches you...Dell EMC validates your Genetec video management system before it reaches you...
Dell EMC validates your Genetec video management system before it reaches you...
 
Long-term Maintenance Model of Embedded Industrial Linux Distribution
Long-term Maintenance Model of Embedded Industrial Linux DistributionLong-term Maintenance Model of Embedded Industrial Linux Distribution
Long-term Maintenance Model of Embedded Industrial Linux Distribution
 
Virtual SAN 6.2, hyper-converged infrastructure software
Virtual SAN 6.2, hyper-converged infrastructure softwareVirtual SAN 6.2, hyper-converged infrastructure software
Virtual SAN 6.2, hyper-converged infrastructure software
 
Jonathan Frappier – Challenge 2 Design Solution
Jonathan Frappier – Challenge 2 Design SolutionJonathan Frappier – Challenge 2 Design Solution
Jonathan Frappier – Challenge 2 Design Solution
 
Operational Visibiliy and Analytics - BU Seminar
Operational Visibiliy and Analytics - BU SeminarOperational Visibiliy and Analytics - BU Seminar
Operational Visibiliy and Analytics - BU Seminar
 
Effective Linux Migration Processes
Effective Linux Migration ProcessesEffective Linux Migration Processes
Effective Linux Migration Processes
 
Dude where's my droid
Dude where's my droidDude where's my droid
Dude where's my droid
 

Similar a Utilizing Novell Sentinel Advisor and Attack Vulnerability

Introduction to Crystal and Jasper Reports for Novell Sentinel 6.1
Introduction to Crystal and Jasper Reports for Novell Sentinel 6.1Introduction to Crystal and Jasper Reports for Novell Sentinel 6.1
Introduction to Crystal and Jasper Reports for Novell Sentinel 6.1Novell
 
Introduction to Crystal and Jasper Reports for Novell Sentinel 6.1
Introduction to Crystal and Jasper Reports for Novell Sentinel 6.1Introduction to Crystal and Jasper Reports for Novell Sentinel 6.1
Introduction to Crystal and Jasper Reports for Novell Sentinel 6.1Novell
 
Using Novell Sentinel Log Manager to Monitor Novell Applications
Using Novell Sentinel Log Manager to Monitor Novell ApplicationsUsing Novell Sentinel Log Manager to Monitor Novell Applications
Using Novell Sentinel Log Manager to Monitor Novell ApplicationsNovell
 
Best Practices for IT Asset Management Using Novell ZENworks
Best Practices for IT Asset Management Using Novell ZENworksBest Practices for IT Asset Management Using Novell ZENworks
Best Practices for IT Asset Management Using Novell ZENworksNovell
 
Best Practices for Configuring Your OSSIM Installation
Best Practices for Configuring Your OSSIM InstallationBest Practices for Configuring Your OSSIM Installation
Best Practices for Configuring Your OSSIM InstallationAlienVault
 
How to Normalize Threat Intelligence Data from Multiple Sources - Tech Talk T...
How to Normalize Threat Intelligence Data from Multiple Sources - Tech Talk T...How to Normalize Threat Intelligence Data from Multiple Sources - Tech Talk T...
How to Normalize Threat Intelligence Data from Multiple Sources - Tech Talk T...AlienVault
 
OSMC 2010 | Insides SUSE Linux by Joachim Werner
OSMC 2010 | Insides SUSE Linux by Joachim WernerOSMC 2010 | Insides SUSE Linux by Joachim Werner
OSMC 2010 | Insides SUSE Linux by Joachim WernerNETWAYS
 
IBM i Security Best Practices
IBM i Security Best PracticesIBM i Security Best Practices
IBM i Security Best PracticesPrecisely
 
Demo of security tool nessus - Network vulnerablity scanner
Demo of security tool nessus - Network vulnerablity scannerDemo of security tool nessus - Network vulnerablity scanner
Demo of security tool nessus - Network vulnerablity scannerAjit Dadresa
 
Migrate from Red Hat to SUSE Linux Enterprise Server
Migrate from Red Hat to SUSE Linux Enterprise ServerMigrate from Red Hat to SUSE Linux Enterprise Server
Migrate from Red Hat to SUSE Linux Enterprise ServerNovell
 
Watering Hole Attacks: Detect End-User Compromise Before the Damage is Done
Watering Hole Attacks: Detect End-User Compromise Before the Damage is DoneWatering Hole Attacks: Detect End-User Compromise Before the Damage is Done
Watering Hole Attacks: Detect End-User Compromise Before the Damage is DoneAlienVault
 
Tips, Tricks and Cool Solutions for Novell ZENworks Configuration Management
Tips, Tricks and Cool Solutions for Novell ZENworks Configuration ManagementTips, Tricks and Cool Solutions for Novell ZENworks Configuration Management
Tips, Tricks and Cool Solutions for Novell ZENworks Configuration ManagementNovell
 
VMworld 2013: Introducing NSX Service Composer: The New Consumption Model for...
VMworld 2013: Introducing NSX Service Composer: The New Consumption Model for...VMworld 2013: Introducing NSX Service Composer: The New Consumption Model for...
VMworld 2013: Introducing NSX Service Composer: The New Consumption Model for...VMworld
 
Novell ZENworks Patch Management Best Practices
Novell ZENworks Patch Management Best PracticesNovell ZENworks Patch Management Best Practices
Novell ZENworks Patch Management Best PracticesNovell
 
Developing for Industrial IoT with Linux OS on DragonBoard™ 410c: Session 4
Developing for Industrial IoT with Linux OS on DragonBoard™ 410c: Session 4Developing for Industrial IoT with Linux OS on DragonBoard™ 410c: Session 4
Developing for Industrial IoT with Linux OS on DragonBoard™ 410c: Session 4Qualcomm Developer Network
 
Rapid Deployment of Novell ZENworks Configuration Management
Rapid Deployment of Novell ZENworks Configuration ManagementRapid Deployment of Novell ZENworks Configuration Management
Rapid Deployment of Novell ZENworks Configuration ManagementNovell
 
Developers Focus on Security-Minded Tooling - Quintis Venter
Developers Focus on Security-Minded Tooling - Quintis Venter �Developers Focus on Security-Minded Tooling - Quintis Venter �
Developers Focus on Security-Minded Tooling - Quintis Venter Thoughtworks
 
Application Repackaging Best Practices for Novell ZENworks 10 Configuration M...
Application Repackaging Best Practices for Novell ZENworks 10 Configuration M...Application Repackaging Best Practices for Novell ZENworks 10 Configuration M...
Application Repackaging Best Practices for Novell ZENworks 10 Configuration M...Novell
 
Upgrading from NetWare to Novell Open Enterprise Server on Linux: The Novell ...
Upgrading from NetWare to Novell Open Enterprise Server on Linux: The Novell ...Upgrading from NetWare to Novell Open Enterprise Server on Linux: The Novell ...
Upgrading from NetWare to Novell Open Enterprise Server on Linux: The Novell ...Novell
 

Similar a Utilizing Novell Sentinel Advisor and Attack Vulnerability (20)

Introduction to Crystal and Jasper Reports for Novell Sentinel 6.1
Introduction to Crystal and Jasper Reports for Novell Sentinel 6.1Introduction to Crystal and Jasper Reports for Novell Sentinel 6.1
Introduction to Crystal and Jasper Reports for Novell Sentinel 6.1
 
Introduction to Crystal and Jasper Reports for Novell Sentinel 6.1
Introduction to Crystal and Jasper Reports for Novell Sentinel 6.1Introduction to Crystal and Jasper Reports for Novell Sentinel 6.1
Introduction to Crystal and Jasper Reports for Novell Sentinel 6.1
 
Using Novell Sentinel Log Manager to Monitor Novell Applications
Using Novell Sentinel Log Manager to Monitor Novell ApplicationsUsing Novell Sentinel Log Manager to Monitor Novell Applications
Using Novell Sentinel Log Manager to Monitor Novell Applications
 
Abdulkarim 1 and 2
Abdulkarim 1 and 2Abdulkarim 1 and 2
Abdulkarim 1 and 2
 
Best Practices for IT Asset Management Using Novell ZENworks
Best Practices for IT Asset Management Using Novell ZENworksBest Practices for IT Asset Management Using Novell ZENworks
Best Practices for IT Asset Management Using Novell ZENworks
 
Best Practices for Configuring Your OSSIM Installation
Best Practices for Configuring Your OSSIM InstallationBest Practices for Configuring Your OSSIM Installation
Best Practices for Configuring Your OSSIM Installation
 
How to Normalize Threat Intelligence Data from Multiple Sources - Tech Talk T...
How to Normalize Threat Intelligence Data from Multiple Sources - Tech Talk T...How to Normalize Threat Intelligence Data from Multiple Sources - Tech Talk T...
How to Normalize Threat Intelligence Data from Multiple Sources - Tech Talk T...
 
OSMC 2010 | Insides SUSE Linux by Joachim Werner
OSMC 2010 | Insides SUSE Linux by Joachim WernerOSMC 2010 | Insides SUSE Linux by Joachim Werner
OSMC 2010 | Insides SUSE Linux by Joachim Werner
 
IBM i Security Best Practices
IBM i Security Best PracticesIBM i Security Best Practices
IBM i Security Best Practices
 
Demo of security tool nessus - Network vulnerablity scanner
Demo of security tool nessus - Network vulnerablity scannerDemo of security tool nessus - Network vulnerablity scanner
Demo of security tool nessus - Network vulnerablity scanner
 
Migrate from Red Hat to SUSE Linux Enterprise Server
Migrate from Red Hat to SUSE Linux Enterprise ServerMigrate from Red Hat to SUSE Linux Enterprise Server
Migrate from Red Hat to SUSE Linux Enterprise Server
 
Watering Hole Attacks: Detect End-User Compromise Before the Damage is Done
Watering Hole Attacks: Detect End-User Compromise Before the Damage is DoneWatering Hole Attacks: Detect End-User Compromise Before the Damage is Done
Watering Hole Attacks: Detect End-User Compromise Before the Damage is Done
 
Tips, Tricks and Cool Solutions for Novell ZENworks Configuration Management
Tips, Tricks and Cool Solutions for Novell ZENworks Configuration ManagementTips, Tricks and Cool Solutions for Novell ZENworks Configuration Management
Tips, Tricks and Cool Solutions for Novell ZENworks Configuration Management
 
VMworld 2013: Introducing NSX Service Composer: The New Consumption Model for...
VMworld 2013: Introducing NSX Service Composer: The New Consumption Model for...VMworld 2013: Introducing NSX Service Composer: The New Consumption Model for...
VMworld 2013: Introducing NSX Service Composer: The New Consumption Model for...
 
Novell ZENworks Patch Management Best Practices
Novell ZENworks Patch Management Best PracticesNovell ZENworks Patch Management Best Practices
Novell ZENworks Patch Management Best Practices
 
Developing for Industrial IoT with Linux OS on DragonBoard™ 410c: Session 4
Developing for Industrial IoT with Linux OS on DragonBoard™ 410c: Session 4Developing for Industrial IoT with Linux OS on DragonBoard™ 410c: Session 4
Developing for Industrial IoT with Linux OS on DragonBoard™ 410c: Session 4
 
Rapid Deployment of Novell ZENworks Configuration Management
Rapid Deployment of Novell ZENworks Configuration ManagementRapid Deployment of Novell ZENworks Configuration Management
Rapid Deployment of Novell ZENworks Configuration Management
 
Developers Focus on Security-Minded Tooling - Quintis Venter
Developers Focus on Security-Minded Tooling - Quintis Venter �Developers Focus on Security-Minded Tooling - Quintis Venter �
Developers Focus on Security-Minded Tooling - Quintis Venter
 
Application Repackaging Best Practices for Novell ZENworks 10 Configuration M...
Application Repackaging Best Practices for Novell ZENworks 10 Configuration M...Application Repackaging Best Practices for Novell ZENworks 10 Configuration M...
Application Repackaging Best Practices for Novell ZENworks 10 Configuration M...
 
Upgrading from NetWare to Novell Open Enterprise Server on Linux: The Novell ...
Upgrading from NetWare to Novell Open Enterprise Server on Linux: The Novell ...Upgrading from NetWare to Novell Open Enterprise Server on Linux: The Novell ...
Upgrading from NetWare to Novell Open Enterprise Server on Linux: The Novell ...
 

Más de Novell

Filr white paper
Filr white paperFilr white paper
Filr white paperNovell
 
Social media class 4 v2
Social media class 4 v2Social media class 4 v2
Social media class 4 v2Novell
 
Social media class 3
Social media class 3Social media class 3
Social media class 3Novell
 
Social media class 2
Social media class 2Social media class 2
Social media class 2Novell
 
Social media class 1
Social media class 1Social media class 1
Social media class 1Novell
 
Social media class 2 v2
Social media class 2 v2Social media class 2 v2
Social media class 2 v2Novell
 
LinkedIn training presentation
LinkedIn training presentationLinkedIn training presentation
LinkedIn training presentationNovell
 
Twitter training presentation
Twitter training presentationTwitter training presentation
Twitter training presentationNovell
 
Getting started with social media
Getting started with social mediaGetting started with social media
Getting started with social mediaNovell
 
Strategies for sharing and commenting in social media
Strategies for sharing and commenting in social mediaStrategies for sharing and commenting in social media
Strategies for sharing and commenting in social mediaNovell
 
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECHInformation Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECHNovell
 
Workload iq final
Workload iq   finalWorkload iq   final
Workload iq finalNovell
 
The Identity-infused Enterprise
The Identity-infused EnterpriseThe Identity-infused Enterprise
The Identity-infused EnterpriseNovell
 
Shining the Enterprise Light on Shades of Social
Shining the Enterprise Light on Shades of SocialShining the Enterprise Light on Shades of Social
Shining the Enterprise Light on Shades of SocialNovell
 
Accelerate to the Cloud
Accelerate to the CloudAccelerate to the Cloud
Accelerate to the CloudNovell
 
The New Business Value of Today’s Collaboration Trends
The New Business Value of Today’s Collaboration TrendsThe New Business Value of Today’s Collaboration Trends
The New Business Value of Today’s Collaboration TrendsNovell
 
Preventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log ManagementPreventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log ManagementNovell
 
Iaas for a demanding business
Iaas for a demanding businessIaas for a demanding business
Iaas for a demanding businessNovell
 
Workload IQ: A Differentiated Approach
Workload IQ: A Differentiated ApproachWorkload IQ: A Differentiated Approach
Workload IQ: A Differentiated ApproachNovell
 
Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...
Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...
Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...Novell
 

Más de Novell (20)

Filr white paper
Filr white paperFilr white paper
Filr white paper
 
Social media class 4 v2
Social media class 4 v2Social media class 4 v2
Social media class 4 v2
 
Social media class 3
Social media class 3Social media class 3
Social media class 3
 
Social media class 2
Social media class 2Social media class 2
Social media class 2
 
Social media class 1
Social media class 1Social media class 1
Social media class 1
 
Social media class 2 v2
Social media class 2 v2Social media class 2 v2
Social media class 2 v2
 
LinkedIn training presentation
LinkedIn training presentationLinkedIn training presentation
LinkedIn training presentation
 
Twitter training presentation
Twitter training presentationTwitter training presentation
Twitter training presentation
 
Getting started with social media
Getting started with social mediaGetting started with social media
Getting started with social media
 
Strategies for sharing and commenting in social media
Strategies for sharing and commenting in social mediaStrategies for sharing and commenting in social media
Strategies for sharing and commenting in social media
 
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECHInformation Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECH
 
Workload iq final
Workload iq   finalWorkload iq   final
Workload iq final
 
The Identity-infused Enterprise
The Identity-infused EnterpriseThe Identity-infused Enterprise
The Identity-infused Enterprise
 
Shining the Enterprise Light on Shades of Social
Shining the Enterprise Light on Shades of SocialShining the Enterprise Light on Shades of Social
Shining the Enterprise Light on Shades of Social
 
Accelerate to the Cloud
Accelerate to the CloudAccelerate to the Cloud
Accelerate to the Cloud
 
The New Business Value of Today’s Collaboration Trends
The New Business Value of Today’s Collaboration TrendsThe New Business Value of Today’s Collaboration Trends
The New Business Value of Today’s Collaboration Trends
 
Preventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log ManagementPreventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log Management
 
Iaas for a demanding business
Iaas for a demanding businessIaas for a demanding business
Iaas for a demanding business
 
Workload IQ: A Differentiated Approach
Workload IQ: A Differentiated ApproachWorkload IQ: A Differentiated Approach
Workload IQ: A Differentiated Approach
 
Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...
Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...
Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...
 

Utilizing Novell Sentinel Advisor and Attack Vulnerability

  • 1. Utilizing Novell Sentinel ® ™ Advisor and Attack vulnerability Tom Burt GTS-Backline Engineer Novell Novell/tburt@novell.com
  • 2. Presentation Goals • Present the benefits of Advisor • Explain Advisor and its related components • Discuss installation and maintenance of Advisor 2 © Novell, Inc. All rights reserved.
  • 3. Agenda • Advisor Overview • Exploit Detection Overview • Background/History Advisor v3 vs. v4 • Installation and Maintenance 3 © Novell, Inc. All rights reserved.
  • 5. Terminology • Advisor-The Novell optional add on subscription to ® provide attack and remediation information • Attack-An event that indicates malicious or rogue software and or devices • Vulnerability-An opening or weakness in a network allowing the potential for an attack • Vulnerability Scanners-The process of detecting the strength of protection on a network. • IPS/IDS collectors-Sentinel device collectors that ™ gather data from IDS devices • Vulnerability collectors-Sentinel device collectors that gather data from vulnerability scanners 5 © Novell, Inc. All rights reserved.
  • 6. Collector links • IPS, IDS and Vulnerability scan collectors are available at the following URL; http://support.novell.com/products/sentinel/secure/senti nel61.html 6 © Novell, Inc. All rights reserved.
  • 7. Overview • Powered by Security Nexus • Acts as an early warning service to identify attacks and vulnerabilities. – Provides Normalized Attack and remediation information • Optional add on subscription service – Initial download feed is free but additional downloads require a license > Entitlement is linked to your Customer authentication credentials 7 © Novell, Inc. All rights reserved.
  • 8. Overview • Early warning service – Normalization of attack data – Correlation on real time data – Incident Tracking • Updates – Updated on a regular configurable basis – Advisor feeds/Downloads > CVE's > Bugtraq > IDS > ISS > etc.... 8 © Novell, Inc. All rights reserved.
  • 10. Exploit detection • Exploit detection: Enables you to quickly identify and/or send out notifications in the event an attack is attempting to exploit a vulnerability in your system 10 © Novell, Inc. All rights reserved.
  • 11. Requirements • Requires that both the Vulnerability scanner and IDS system reports the vulnerabilities and attacks against the same systems. • In Sentinel, systems are identified by IP Address and MSSP Customer Name • The Vulnerability and IDS system must be supported by the Advisor service • The reported attacks and vulnerabilities must be known to the Advisor service and Exploit Detection – Most Novell collectors support the Attack and exploit detection data 11 © Novell, Inc. All rights reserved.
  • 12. Requirements cont.... • The Vulnerability and IDS collectors must populate all 4 of these fields – DeviceName (RV31) – DIP (Destination or TargetIP) – DeviceAttackName (RT1) – MSSP Customer Name (RV39) > Managed Security Service Provider • All Novell shipped collectors populate these values by ® default 12 © Novell, Inc. All rights reserved.
  • 13. Exploit Detection • When running supported IDS and Vulnerability collectors, events from the devices are scanned for potential attacks and vulnerabilities – The mapping service maps the Product Name and MSSP Customer Name to the Advisor name and MSSP Customer Name – If the events match successfully, the exploit information is updated in the exploitdetection.csv file > $ESEC_HOME/data/map_data/exploitdetection.csv » IP, Device & Attack names, MSSP Customer name – The mapping service populates the vulnerability event field > Used to evaluate whether the incoming event exploits a vulnerability » If the value is 1, the destination device IS exploited » If the value is 0, the destination device is NOT exploited 13 © Novell, Inc. All rights reserved.
  • 15. History Advisor v3 Advisor v4 XML Files CSV Database Space GB Database Space MB Disk Space GB Disk Space MB Feed Process Time - Hours Feed Process Time - Minutes Failed Feed Recovery - Hours Failed Feed Recovery - Minutes Failed Process required database MD5sum cleanup Configured at Install only Can be configured at any time Log files for failure Internal Events 15 © Novell, Inc. All rights reserved.
  • 16. History • Supported Systems – IDS – IPS – Vulnerability 16 © Novell, Inc. All rights reserved.
  • 18. Installation • Requirements – The Advisor service and Exploit Detection rely on mappings between attacks on assets and vulnerabilities of devices. As such it requires the following data to work with Advisor > Vulnerability scan data » Sentinel supports multiple Vulnerability scanners > Advisor map data » Contains data about known threats, attacks, and vulnerabilities » Service gathers information from multiple vulnerability and IDS vendors » Creates mappings from abstract Vuln and attack data » Security Nexus provides the advisor feed data > Real Time attack data » The real time attacks that are detected as events are loaded into the Sentinel database from IDS collectors 18 © Novell, Inc. All rights reserved.
  • 19. Installation • Installation media – SP2 Full installer – SP2 Patch installer • Initial load data – Advisor v4 feed files are included with Novell Sentinel ® ™ > $ESEC_HOME/data/updates/advisor – After initial load, updates are performed on scheduled basis > Advisor license/subscription is required for updates > Feed location; https://secure-www.novell.com/sentinel/download/advisor/feed/ 19 © Novell, Inc. All rights reserved.
  • 20. Usage/Maintenance • Advisor User Interface • Novell Sentinel Control Center ® ™ – Must have Advisor Interface permissions – Advisor Tab > Status information – Admin Tab > Manual process of files in specified location > Download Manager » Initialize download » Edit configuration preferences > Preview Threat Map 20 © Novell, Inc. All rights reserved.
  • 21. Usage/Maintenance 21 © Novell, Inc. All rights reserved.
  • 22. Usage/Maintenance 22 © Novell, Inc. All rights reserved.
  • 23. Usage/Maintenance 23 © Novell, Inc. All rights reserved.
  • 24. Maintenance • Advisor data feed source is updated on a regular basis – Updating your database with current data feeds > Automatic scheduling of updates > Manual update • Scripts – Novell Sentinel 6.1SP2 & RD ® ™ > $ESEC_HOME/bin/advisor.sh • Configuration – advisor_client.xml 24 © Novell, Inc. All rights reserved.
  • 25. Maintenance • Logging – As of v4 all logging is done to das_query logs – Configuration for additional logging should be made to the das_query_log.prop in the $ESEC_HOME/config directory – Logs status of download and checking for feed notifcations • Example; Fri Mar 05 05:05:21 MST 2010|INFO|Thread-148570| esecurity.ccs.comp.downloadfeed. Downloader.download Downloaded file: advnxsfeed.51.zip.md5 to local directory /opt/novell/se ntinel6/data/updates/advisor 25 © Novell, Inc. All rights reserved.
  • 26. Manual update • A manual download of the advisor feeds can be done as needed – Login to the Novell Advisor feed download site using your eLogin username and password that is associated with the Advisor license – Download any advisor feed files you need making sure to include both the .zip and .md5 files. – Copy the files to the directory on the Sentinel server you have specified in the configuration > Default location is $ESEC_HOME/data/updates/advisor – In the Admin Tab → Advisor → Process Now 26 © Novell, Inc. All rights reserved.
  • 27. Manual Update 27 © Novell, Inc. All rights reserved.
  • 28. Manual Update 28 © Novell, Inc. All rights reserved.
  • 29. Automatic Update 29 © Novell, Inc. All rights reserved.
  • 30. Maintenance • Advisor notifications – Errors > Errors in downloading feeds or data loading – Success/failure on updates > Success or failure messages on advisor feed updates – Notifications > Correlation rules » Actions such as send email 30 © Novell, Inc. All rights reserved.
  • 31. Maintenance • Exploit Detection Data Generation – By default scheduled to run every 30 minutes > Configurable in $ESEC_HOME/config/das_query.xml > Object component, <obj-component id="ExploitDetectDataGenerator"> > Property, <property name="minRegenerateInterval">1800000</property> • Scheduled Updates – Direct Download > 6 hour, 12 hour, Daily, Weekly, Monthly » The time of the download is based off the first successful download ~ Success at 10:30am results in 4:30pm for 6 hours configuration 31 © Novell, Inc. All rights reserved.
  • 32. Usage • View advisor data in SCC, Sentinel Control Center ™ – Right click an event → analyze → Advisor data – Only available after initial data load – Analyze is only available if event data is from a Supported IDS Device – Regular updates are necessary to ensure accuracy of data 32 © Novell, Inc. All rights reserved.
  • 34. Demonstration • Demonstration details – Advisor download – Advisor Processing – Vulnerability scanning with test data – Basic IDS Collector with Sample data – Exploit detection – Analyze Data 34 © Novell, Inc. All rights reserved.
  • 35. Q&A
  • 36.
  • 37. Unpublished Work of Novell, Inc. All Rights Reserved. This work is an unpublished work and contains confidential, proprietary, and trade secret information of Novell, Inc. Access to this work is restricted to Novell employees who have a need to know to perform tasks within the scope of their assignments. No part of this work may be practiced, performed, copied, distributed, revised, modified, translated, abridged, condensed, expanded, collected, or adapted without the prior written consent of Novell, Inc. Any use or exploitation of this work without authorization could subject the perpetrator to criminal and civil liability. General Disclaimer This document is not to be construed as a promise by any participating company to develop, deliver, or market a product. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. Novell, Inc. makes no representations or warranties with respect to the contents of this document, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. The development, release, and timing of features or functionality described for Novell products remains at the sole discretion of Novell. Further, Novell, Inc. reserves the right to revise this document and to make changes to its content, at any time, without obligation to notify any person or entity of such revisions or changes. All Novell marks referenced in this presentation are trademarks or registered trademarks of Novell, Inc. in the United States and other countries. All third-party trademarks are the property of their respective owners.