• Barajar
    Activar
    Desactivar
  • Alphabetizar
    Activar
    Desactivar
  • Frente Primero
    Activar
    Desactivar
  • Ambos lados
    Activar
    Desactivar
  • Leer
    Activar
    Desactivar
Leyendo...
Frente

Cómo estudiar sus tarjetas

Teclas de Derecha/Izquierda: Navegar entre tarjetas.tecla derechatecla izquierda

Teclas Arriba/Abajo: Colvea la carta entre frente y dorso.tecla abajotecla arriba

Tecla H: Muestra pista (3er lado).tecla h

Tecla N: Lea el texto en voz.tecla n

image

Boton play

image

Boton play

image

Progreso

1/47

Click para voltear

47 Cartas en este set

  • Frente
  • Atrás
1.4.2 Instance Discovery
Guardium, with auto-discovery enabled, gives you the ability to use the power of S-TAP
to discover running instances on that server, including the information that you need to
automatically populate the inspection engine definitions.
To enable instance discovery, use the following flags during S-TAP installation:
• Noninteractive install flag: -use-discovery
• GIM installation: set STAP_USE_DISCOVERY to 1
When installation is completed, S-TAP will be configured with Inspection Engines for all
running databases.
1.4.4 Classification process performance
Classification processes are handled with sampling routines and timeout parameters that
ensure minimal performance impact on database servers.
When the classifier runs, you have the option of specifying how it samples records. The
default behavior takes a random sampling of rows using an appropriate statement for the
database platform in question.
However, random sampling may run incur a slight performance penalty when compared
to sequential sampling. For both random and sequential sampling, the default sample
size is 2000 rows or the total number of available rows, whichever is fewer. Larger or
smaller sample sizes may be specified.
1.5.1.1 S-TAP Terminate Action
will terminate a database connection (a session) and
prevent additional requests on that session. This action is available in S-TAP, regardless
of whether S-GATE is used or not.
1.5.1.2 S-GATE Actions
S-GATE provides database protection via S-TAP for both network and local connections.
When S-GATE is available, all database connections (sessions) are evaluated and
tagged to be monitored in one of the following S-GATE modes:
• Attached (S-GATE is "on") – S-TAP is in firewalling mode for that session, it
holds the database requests and waits for a verdict on each request before
releasing its responses.
Detached (S-GATE is "off") - S-TAP is in normal monitoring mode for that
session, it passes requests to the database server without any delay
S-GATE Policy
Rule Actions:
Attached: when a certain criteria is met that raises the need to
closely watch (and if needed block) the traffic on that session
Detach: for use on sessions that are considered as "safe" or
sessions that cannot tolerate any latency
TERMINATE:has effect only when the session is attached. It drops
the reply of the firewalled request, which will terminate the session on some
databases.
*note: S-GATE/ S-TAP termination does not work on a client IP group whose
members have wild-card characters
1.6.1 How outlier detection works
includes an advanced Machine Learning
algorithm to aid in the early detection of possible attacks during operation.
2.4.2 Stopping S-TAP processes
Depending on Version and O/S there are different methods to stop an S-TAP process.
For instance on a 64 bit RHEL 6 Server an administrator may issue this command as
user root :
stop utap
2.5.1 Collector / Aggregator ratios
We recommend starting with a ratio of eight collectors to one aggregator
2.5.2 Determining if additional Aggregators are needed.
The amount of traffic that is logged and sent from the collectors to the
aggregators and the retention needs of the aggregators determine whether you
need more aggregators.
2.6.1 This Guardium SIEM (Security Incident Event Manager) integration can be done in one of
the following ways:
• Syslog forwarding (the most common method for alerts and events)
• Using the CLI command, store remotelog, to specify the Syslog forwarding to
facility/priority, and host (destination).
• Using Guardium templates for ArcSight, Envision, and QRadar
• SCP/FTP (CSV or CEF Files sent to an external repository and the SIEM system
must upload and parse from this external repository.)
2.6.2 Which syslog template should be used for ArcSight integration?
CEF is only used for ArcSight. The other SIEM products have a different format and do
not use CEF.
2.1.3 What are the minimum system requirements for a IBM Security Guardium v10.1.2 collector?
los mismos de siempre
3.4.9 S-TAP Deployment through an already installed GIM Agent with GuardAPI commands
• grdapi gim_assign_latest_bundle_or_module_to_client
• grdapi gim_update_client_params
Updates a single module parameters in a specific client. The command can be executed
multiple times based on number of parameters changed
• grdapi gim_schedule_install
3.5.1 Using GuardAPI commands to define a new datasource
• Access_policy
• Application User translation
• AuditDatabase
• AuditTask
• ChangeAuditSystem
• Classifier
• CustomDomain
• DatabaseAnalyzer
• MonitorValues
• SecurityAssessment
• Stap_Verification
create_datasource command is used to define a new datasource. application which identifies the application for which the datasource is
being defined. It must be one of the following:....
you need to
use SecurityAssessment parameter
3.5.2 Limited CLI commands during maintenance of internal database
support reset-password root
restart mysql
restart stopped_services
restart system
restore pre-patch-backup
restore system
3.5.3 System Backup
System backup supports the following methods:
• SCP - defined by default and accessible via CLI and the GUI
• FTP - defined by default and accessible via CLI and the GUI
• Centera - can be added to the GUI by logging into CLI and running the following
command, store storage centera backup on
• TSM - can be added by logging into CLI and running the following command,
store storage tsm backup on
• AMAZON S3 - is defined by default and accessible via CLI and GUI. It is
accessible from CLI as long as it is defined in the GUI.
• Softlayer - Softlayer cloud backup
• Cleversafe - CleverSafe Functionality: Storing backups in a similar fashion to
Amazon S3. Will draw a list of available buckets for you directly to the GUI. The
first listed name is the name of the bucket you saved to the DataBase. Note: You
cannot make new buckets nor delete any buckets (from the Guardium UI/CLI)
3.5.4 New certificates
To obtain a new certificate, generate a certificate signed request (CSR) and contact a
third-party certificate authority (CA) such as VeriSign or Entrust. Guardium does not
provide CA services and will not ship systems with different certificates than the ones that
are installed by default. The certificate format must be in PEM and include BEGIN and
END delimiters. The certificate can either be pasted from the console or imported through
one of the standard import protocols.
• create csr alias - This command creates a certificate request with an alias.
• create csr gui - This command creates a certificate request for the tomcat.
• create csr sniffer - This command creates a certificate request for the sniffer.
3.5.4-2 To install a new certificate through the command line interface, use one of the following
commands:
• store certificate gim - This command stores GIM certificates in the keystore.
• store certificate gui - This command stores tomcat certificates in the keystore.
• store certificate keystore - This command asks for a one-word alias to uniquely
identify the certificate and store it in the keystore.
• store certificate mysql - This command stores mysql client and server
certificates.
• store certificate stap - This command stores S-TAP certificates.
• store certificate sniffer - This command stores sniffer certificates
4.1.1.3.5 Unit utilization timecharts
Unit utilization timecharts allow the observation of trends in unit utilization data
over time. Unit utilization timecharts can be configured to show multiple unit
utilization metrics for a single Guardium system or to show a single unit utilization
metric for multiple Guardium systems.
Unit utilization timecharts are structured based on the following criteria:
• The x-axis represents the period start time
• When multiple metrics are being charted and the values for the metrics
are in the same range, one y-axis is drawn. For example, both MySQL
disk usage and /var disk usage are expressed as percentages and are
drawn with the same y-axis.
• When multiple metrics are being charted and the values of the metrics
are not similar, two y-axes are drawn. For example, MySQL disk usage
is expressed as a percentage and flat log requests is expressed as an
integer, so two y-axes are drawn: one displaying percentages and one
displaying integers.
• If the value of a metric falls outside the range of a y-axis, that value is
displayed at the bottom of the chart. This behavior accommodates
scenarios where different metrics are expressed with similar units but
significantly different values: for example, integers in the range of
thousands versus millions.
4.1.1.4 Deployment health table
It summarizes the overall following health information
about all connected aggregators and collectors along these dimensions:
• Overall
• Connectivity
• Unit utilization
• Aggregation
The
view is available at Manage > System View > Deployment Health Table
4.1.2 Services Status panel
Open the Services Status panel by clicking Setup > Tools & Views > Services Status.
Each service displays one of the following icons:
• Service is running/scheduled: paloma verde
• Service is paused: equis roja
• Service is off: equis gris
4.1.5.2.1 Purging data from the filesystem
If the DB size is fine - but the filesystem ( /var ) is full then consider that some system
files may be left on the system. For example:
• If daily exports or archives are failing a temporary file may be left in the
system for each day
• Some old large patch files may be left in the /var/log/guard/patches directory
You may need to work with IBM Technical Support (via a PMR) to carefully check
for large files and consider ones for deletion
The following cli commands can be used to identify large files (larger than 10MB
older than 0 days )
show filesystem usage
support show large_files 10 0
consider the ones listed at the end (the largest ones)
4.1.5.3.1 Resolving Analyzer Queue Overflow
If the analyzer queue is overflowing it means the traffic is coming into the
appliance faster than the analyzer can process it. Improvements in the latest
sniffer patches will help, but reducing the amount of traffic to the collector is often
the best solution, for example by:
Using Ignore S-TAP Session action on more traffic in the policy
• Moving S-TAPs to a less loaded collector
• Load balancing traffic between more than one collector
• Adding more collectors to the environment
4.2.1.1 Understanding archive and purge
Data Archive and Results Archive can be found by clicking Manage > Data Management
• Data Archive backs up the data that has been captured by the Guardium system,
for a time period. When configuring Data Archive, a purge operation can also be
configured.
• Results Archive backs up audit tasks results (reports, assessment tests, entity
audit trail, privacy sets, and classification processes) as well as the view and
sign-off trails and the accommodated comments from workflow processes.
4.2.2 Managing data on an aggregator: exporting and importing
The export, archive, and purge functions can work
on the same data, but not the same date ranges. For example, you may want to export and
archive all information older than one day and purge all information older than one month, thereby
always leaving one month of data on the sending unit
Note: When setting the schedule of import on an aggregator, it should be planned to run after
export is completed on all collectors.
CAS data is also aggregated and archived.
Note: The alert for no traffic is inactive for aggregator servers
4.2.2.1 Exporting Data
--Function-Compress the data of a single day (midnight to midnight, typically -
yesterday) into an encrypted file and send it to the aggregator (or to an
external repository on Archive).
--Schedule-Executed on a daily basis.
Starts immediately after midnight (00:10) to include full day’s data.
Assumed to take up to 2 hours to complete (Average – dependent on amount
of data)
-High Level
Process--Create a temporary database.
Load the relevant data (last day’s activity) to the tmp db.
Update auto-increment IDs in tmp db to ensure uniqueness.
Create an encrypted compressed export file of the tmp database.
Copy the export file to the aggregator (or to an external repository on
Archive)
4.2.2.2 Importing Data
--Function:Import and merge the imported data into the internal databases of the
Aggregator.
--Schedule:Executed on a daily basis.
Starts at 02:00 (or after export has ended).
Assumed to take up to 3 hours to complete
--High Level Process (for each purged day):Construct the delete command for each purged table (tables and the purge
conditions defined in AGG_TABLES).
Execute the delete commands for each of the tables
4.2.2.3 Archiving and Purging
--Purge Function:Delete old records from appliance (typically - older than 60 days) to free up
space and speed up access operation to the internal database.
Purging is based on dates (deleting whole days’ worth of data), but will not
delete records that are still “in use” (for example: open sessions)
--Schedule:The default purge activity is scheduled every day at 5:00 AM.
Collectors, after the export/archive.
Aggregator, after the import.
Assumed to take up to 2 hours to complete
--High Level Process (for each purged day): Purge configuration is used by both Data Archive and Data Export.
Use the Purge data older than field to specify a starting day for the purge
operation as a number of days, weeks, or months prior to the current day,
which is day zero
--Default purging: The default value for purge is 60 days
The default purge activity is scheduled every day at 5:00 AM.
For a new install a default purge schedule will be installed that is based on the
default value and activity
4.2.2.4 Orphan cleanup on aggregators
For example: The user restores data and wants to keep this data for 7 days. This means
the expiration date of this data will be in 7 days from today and this data will be available
for orphan cleanup after 7 days.
If the expiration date is changed (set to keep the data for shorter/longer period - it won't
affect the date this data is available for orphan cleanup. Customer should pay attention
for this especially if they change the expiration period to be longer - in order not to lose
data), then the rest of the data on the machine will be available for orphan cleanup as
first designed.
4.2.2.5 Verify Archiving and Purging Process
1. Click Reports > Guardium Operational Reports > Aggregation/Archive Log to
open the Aggregation/Archive Log.
2. Check to ensure that each Archive/Purge operation has a status of Succeeded.
4.2.2.6 Reporting on Aggregation and Archiving Activity
1. Navigate to Manage > Reports > Data Management > Aggregation/Archive Log
to open the Aggregation/Archive Log.
2. Define a query and build a report.
4.2.2.7 Restoring
As described previously, archives are written to a SCP or FTP host, or to a Centera or
TSM storage system. To restore archives, you must copy the appropriate file(s) back to
the Guardium system on which the data is to be restored.
1. Click Manage > Data Management > Data Restore to open Data Restore.
2. Enter a date in the From box, to specify the earliest date for which you want data.
3. Enter a date in the To box, to specify the latest date for which you want data.
4. In the Host Name box, optionally enter the name of the Guardium appliance from
which the archive originated.
5. Click Search.
6. In the Search Results panel, mark the Select box for each archive you want to
restore.
7. In the Don't purge restored data for at least box, enter the number of days that
you want to retain the restored data on the appliance.
8. Click Restore.
9. Click Done when you are finished
4.2.3 Using restore from a backup for migrating
1. Using an SSH client, log in to the Guardium system as the CLI user.
2. If the backup files are on a remote system, import the files by entering the following
command: import file
You will be prompted to information for the system that contains the backup files and the
location of the files.The import process copies the backup data files to the /var/dump
directory.
3. Begin the restore process by entering the following command: restore db-from-prevversion.
When you receive prompts to "Update portal layout (panes and menus structure) to the
new default ...", note the following options:
o Answering y (yes) will result in all customized reports and panes being
compressed into one pane with the name of "9.* Custom Reports."
o Answering n (no) will result in all panes being restored to what they were in the
prior release.
4.2.3-1 After running the restore db-from-prev-version command, note the following requirements
• Reinstall the accelerators.
• Reload the MS SQL Server and Oracle .jar file for open sources.
• If a DPS file is in a waiting state from a previous Guardium version when the restore
process is performed, the DPS file will no longer be available. Upload the DPS file again
before performing the DPS import function for v9.5.
• Company logos uploaded before the restore process must be reloaded after the process
is complete. To reload a customer logo, use the Global Profile page.
4.3.3.3 Import users from LDAP
You can import Guardium user definitions from an LDAP server by configuring an import
operation to obtain the appropriate set of users.
You can run the import operation on demand, or schedule it to run on a periodic basis.
You can elect to have only new users imported, or you can have existing user definitions
replaced. In either case, LDAP groups can be imported as Guardium roles.
When importing LDAP users:
• The Guardium admin user definition will not be changed in any way.
• Existing users will not be deleted (in other words, the entire set of users is not
replaced by the set imported from LDAP).
• Guardium passwords will not be changed.
• New users being added to Guardium:
o Will be marked inactive by default
o Will have blank passwords
o Will be assigned the user role
4.4.5.1 Patch is stuck at “preparing to install” status
To resolve the problem,
a. Run "delete scheduled-patch" to remove the problematic patch installation. Then
upload and install the patch again. If it doesn't resolve the issue, proceed to the
next step.
b. Run "support must_gather patch_install_issues". Extract the must gather file
(patch_install.YYYYMMDD.tgz) and check the inittab file to see if "pins" section is
remarked with #. If yes, open a PMR and provide the information to IBM technical
support. IBM technical support will remove the # and install the patch again.
4.4.5.2 Installing a new Guardium patch does not complete
If you cannot complete the installation of a new Guardium patch, stop the interfering
process and reinstall the patch.
• Resolving the problem
o To install the new Guardium patch, stop any processes from interfering
with the installation.
o Delete the patch that is stuck by using the command delete scheduledpatch.
o Restart the system by using the command restart system.
o After the system restarts, stop the GUI and inspection core by using the
commands stop gui and stop inspection-core.
o Reinstall the patch and restart the GUI and inspection core by using the
commands restart gui and start inspection-core.
4.4.5.3 Patch is successfully installed on central manager, but cannot be pushed to
managed units.
Verify that
TCP port 3306 is open bidirectional
5.4.1 Exporting Outlier Detection results
You must ensure that quick search is enabled. Search is enabled by default on new
installations of 64-bit systems, or you can use the command grdapi enable_quick_search.
You can also review outliers in the Analytic Outliers List report
5.4.6 What is a report Domain
A domain provides a view of the data that Guardium stores. Each domain contains one or
more entities. An entity is a set of related attributes, and an attribute is basically a field
value.
5.5.1 Generating reports to narrow down violations
Log the policy violation only. We refer to the fact that the rule was triggered as
a policy violation. Except for the Allow action, a policy violation is logged each time a rule
is triggered (unless that action suppresses logging)
5.5.4 Why do some DB User Name appear to have ‘?’ in the output
The most likely cause is that Guardium missed
some of the login packets while monitoring the database due to high traffic on the
collector.
5.6.4 Stopping an audit process
Stopping an audit process can be performed only if the audit tasks have not been run or
are running. Stopping an audit process will not execute any more tasks that have not
started. Stopping an audit process does not deliver partial results. The audit process
stops and a stopped error message is the result.
Stop an audit process by using invoking GuardAPI (place the cursor on any line and
double-click for a drill-down) from Comply > Tools and Views > Audit Process Log report.
Alternatively they can be stopped bu clicking “Actions” in the top right corner,
stop_audit_process then pick the specific audit.
5.7.1 Configuring VA Test Exception to exclude a specific group from an assessment
Use a test exception to exclude specific members of a group from a security assessment.
This is useful if you do not want to or are not
authorized to change group settings.
6.6.1 Use the different tools available in guardium to collect Collect Guardium troubleshooting
information for technical assistance.
6.6.1 Use the different tools available in guardium to collect Collect Guardium troubleshooting
information for technical assistance.
6.6.1.1 Apply the functionality to generate specific information about the status of any
guardium system through the Central Manager GUI or also through the CLI, so that it can
be sent to IBM Support whenever a Problem Management Report (PMR) is registered.
6.6.1.1 Apply the functionality to generate specific information about the status of any
guardium system through the Central Manager GUI or also through the CLI, so that it can
be sent to IBM Support whenever a Problem Management Report (PMR) is registered.
6.6.1.2 Choose the command to be sent to the S-TAP agent from the GUI and obtain
diagnostic information from S-TAP
6.6.1.2 Choose the command to be sent to the S-TAP agent from the GUI and obtain
diagnostic information from S-TAP