- Barajar
ActivarDesactivar
- Alphabetizar
ActivarDesactivar
- Frente Primero
ActivarDesactivar
- Ambos lados
ActivarDesactivar
- Leer
ActivarDesactivar
Leyendo...
Cómo estudiar sus tarjetas
Teclas de Derecha/Izquierda: Navegar entre tarjetas.tecla derechatecla izquierda
Teclas Arriba/Abajo: Colvea la carta entre frente y dorso.tecla abajotecla arriba
Tecla H: Muestra pista (3er lado).tecla h
Tecla N: Lea el texto en voz.tecla n
Boton play
Boton play
47 Cartas en este set
- Frente
- Atrás
1.4.2 Instance Discovery
Guardium, with auto-discovery enabled, gives you the ability to use the power of S-TAP to discover running instances on that server, including the information that you need to automatically populate the inspection engine definitions. |
To enable instance discovery, use the following flags during S-TAP installation:
• Noninteractive install flag: -use-discovery • GIM installation: set STAP_USE_DISCOVERY to 1 When installation is completed, S-TAP will be configured with Inspection Engines for all running databases. |
1.4.4 Classification process performance
Classification processes are handled with sampling routines and timeout parameters that ensure minimal performance impact on database servers. When the classifier runs, you have the option of specifying how it samples records. The default behavior takes a random sampling of rows using an appropriate statement for the database platform in question. |
However, random sampling may run incur a slight performance penalty when compared
to sequential sampling. For both random and sequential sampling, the default sample size is 2000 rows or the total number of available rows, whichever is fewer. Larger or smaller sample sizes may be specified. |
1.5.1.1 S-TAP Terminate Action
|
will terminate a database connection (a session) and
prevent additional requests on that session. This action is available in S-TAP, regardless of whether S-GATE is used or not. |
1.5.1.2 S-GATE Actions
S-GATE provides database protection via S-TAP for both network and local connections. When S-GATE is available, all database connections (sessions) are evaluated and tagged to be monitored in one of the following S-GATE modes: |
• Attached (S-GATE is "on") – S-TAP is in firewalling mode for that session, it
holds the database requests and waits for a verdict on each request before releasing its responses. Detached (S-GATE is "off") - S-TAP is in normal monitoring mode for that session, it passes requests to the database server without any delay |
S-GATE Policy
Rule Actions: |
Attached: when a certain criteria is met that raises the need to
closely watch (and if needed block) the traffic on that session Detach: for use on sessions that are considered as "safe" or sessions that cannot tolerate any latency TERMINATE:has effect only when the session is attached. It drops the reply of the firewalled request, which will terminate the session on some databases. *note: S-GATE/ S-TAP termination does not work on a client IP group whose members have wild-card characters |
1.6.1 How outlier detection works
|
includes an advanced Machine Learning
algorithm to aid in the early detection of possible attacks during operation. |
2.4.2 Stopping S-TAP processes
Depending on Version and O/S there are different methods to stop an S-TAP process. For instance on a 64 bit RHEL 6 Server an administrator may issue this command as user root : |
stop utap
|
2.5.1 Collector / Aggregator ratios
|
We recommend starting with a ratio of eight collectors to one aggregator
|
2.5.2 Determining if additional Aggregators are needed.
|
The amount of traffic that is logged and sent from the collectors to the
aggregators and the retention needs of the aggregators determine whether you need more aggregators. |
2.6.1 This Guardium SIEM (Security Incident Event Manager) integration can be done in one of
the following ways: |
• Syslog forwarding (the most common method for alerts and events)
• Using the CLI command, store remotelog, to specify the Syslog forwarding to facility/priority, and host (destination). • Using Guardium templates for ArcSight, Envision, and QRadar • SCP/FTP (CSV or CEF Files sent to an external repository and the SIEM system must upload and parse from this external repository.) |
2.6.2 Which syslog template should be used for ArcSight integration?
|
CEF is only used for ArcSight. The other SIEM products have a different format and do
not use CEF. |
2.1.3 What are the minimum system requirements for a IBM Security Guardium v10.1.2 collector?
|
los mismos de siempre
|
3.4.9 S-TAP Deployment through an already installed GIM Agent with GuardAPI commands
|
• grdapi gim_assign_latest_bundle_or_module_to_client
• grdapi gim_update_client_params Updates a single module parameters in a specific client. The command can be executed multiple times based on number of parameters changed • grdapi gim_schedule_install |
3.5.1 Using GuardAPI commands to define a new datasource
• Access_policy • Application User translation • AuditDatabase • AuditTask • ChangeAuditSystem • Classifier • CustomDomain • DatabaseAnalyzer • MonitorValues • SecurityAssessment • Stap_Verification |
create_datasource command is used to define a new datasource. application which identifies the application for which the datasource is
being defined. It must be one of the following:.... you need to use SecurityAssessment parameter |
3.5.2 Limited CLI commands during maintenance of internal database
|
support reset-password root
restart mysql restart stopped_services restart system restore pre-patch-backup restore system |
3.5.3 System Backup
System backup supports the following methods: |
• SCP - defined by default and accessible via CLI and the GUI
• FTP - defined by default and accessible via CLI and the GUI • Centera - can be added to the GUI by logging into CLI and running the following command, store storage centera backup on • TSM - can be added by logging into CLI and running the following command, store storage tsm backup on • AMAZON S3 - is defined by default and accessible via CLI and GUI. It is accessible from CLI as long as it is defined in the GUI. • Softlayer - Softlayer cloud backup • Cleversafe - CleverSafe Functionality: Storing backups in a similar fashion to Amazon S3. Will draw a list of available buckets for you directly to the GUI. The first listed name is the name of the bucket you saved to the DataBase. Note: You cannot make new buckets nor delete any buckets (from the Guardium UI/CLI) |
3.5.4 New certificates
To obtain a new certificate, generate a certificate signed request (CSR) and contact a third-party certificate authority (CA) such as VeriSign or Entrust. Guardium does not provide CA services and will not ship systems with different certificates than the ones that are installed by default. The certificate format must be in PEM and include BEGIN and END delimiters. The certificate can either be pasted from the console or imported through one of the standard import protocols. |
• create csr alias - This command creates a certificate request with an alias.
• create csr gui - This command creates a certificate request for the tomcat. • create csr sniffer - This command creates a certificate request for the sniffer. |
3.5.4-2 To install a new certificate through the command line interface, use one of the following
commands: |
• store certificate gim - This command stores GIM certificates in the keystore.
• store certificate gui - This command stores tomcat certificates in the keystore. • store certificate keystore - This command asks for a one-word alias to uniquely identify the certificate and store it in the keystore. • store certificate mysql - This command stores mysql client and server certificates. • store certificate stap - This command stores S-TAP certificates. • store certificate sniffer - This command stores sniffer certificates |
4.1.1.3.5 Unit utilization timecharts
Unit utilization timecharts allow the observation of trends in unit utilization data over time. Unit utilization timecharts can be configured to show multiple unit utilization metrics for a single Guardium system or to show a single unit utilization metric for multiple Guardium systems. Unit utilization timecharts are structured based on the following criteria: |
• The x-axis represents the period start time
• When multiple metrics are being charted and the values for the metrics are in the same range, one y-axis is drawn. For example, both MySQL disk usage and /var disk usage are expressed as percentages and are drawn with the same y-axis. • When multiple metrics are being charted and the values of the metrics are not similar, two y-axes are drawn. For example, MySQL disk usage is expressed as a percentage and flat log requests is expressed as an integer, so two y-axes are drawn: one displaying percentages and one displaying integers. • If the value of a metric falls outside the range of a y-axis, that value is displayed at the bottom of the chart. This behavior accommodates scenarios where different metrics are expressed with similar units but significantly different values: for example, integers in the range of thousands versus millions. |
4.1.1.4 Deployment health table
It summarizes the overall following health information about all connected aggregators and collectors along these dimensions: |
• Overall
• Connectivity • Unit utilization • Aggregation The view is available at Manage > System View > Deployment Health Table |
4.1.2 Services Status panel
Open the Services Status panel by clicking Setup > Tools & Views > Services Status. Each service displays one of the following icons: |
• Service is running/scheduled: paloma verde
• Service is paused: equis roja • Service is off: equis gris |
4.1.5.2.1 Purging data from the filesystem
If the DB size is fine - but the filesystem ( /var ) is full then consider that some system files may be left on the system. For example: |
• If daily exports or archives are failing a temporary file may be left in the
system for each day • Some old large patch files may be left in the /var/log/guard/patches directory You may need to work with IBM Technical Support (via a PMR) to carefully check for large files and consider ones for deletion The following cli commands can be used to identify large files (larger than 10MB older than 0 days ) show filesystem usage support show large_files 10 0 consider the ones listed at the end (the largest ones) |
4.1.5.3.1 Resolving Analyzer Queue Overflow
If the analyzer queue is overflowing it means the traffic is coming into the appliance faster than the analyzer can process it. Improvements in the latest sniffer patches will help, but reducing the amount of traffic to the collector is often the best solution, for example by: |
Using Ignore S-TAP Session action on more traffic in the policy
• Moving S-TAPs to a less loaded collector • Load balancing traffic between more than one collector • Adding more collectors to the environment |
4.2.1.1 Understanding archive and purge
|
Data Archive and Results Archive can be found by clicking Manage > Data Management
• Data Archive backs up the data that has been captured by the Guardium system, for a time period. When configuring Data Archive, a purge operation can also be configured. • Results Archive backs up audit tasks results (reports, assessment tests, entity audit trail, privacy sets, and classification processes) as well as the view and sign-off trails and the accommodated comments from workflow processes. |
4.2.2 Managing data on an aggregator: exporting and importing
|
The export, archive, and purge functions can work
on the same data, but not the same date ranges. For example, you may want to export and archive all information older than one day and purge all information older than one month, thereby always leaving one month of data on the sending unit Note: When setting the schedule of import on an aggregator, it should be planned to run after export is completed on all collectors. CAS data is also aggregated and archived. Note: The alert for no traffic is inactive for aggregator servers |
4.2.2.1 Exporting Data
|
--Function-Compress the data of a single day (midnight to midnight, typically -
yesterday) into an encrypted file and send it to the aggregator (or to an external repository on Archive). --Schedule-Executed on a daily basis. Starts immediately after midnight (00:10) to include full day’s data. Assumed to take up to 2 hours to complete (Average – dependent on amount of data) -High Level Process--Create a temporary database. Load the relevant data (last day’s activity) to the tmp db. Update auto-increment IDs in tmp db to ensure uniqueness. Create an encrypted compressed export file of the tmp database. Copy the export file to the aggregator (or to an external repository on Archive) |
4.2.2.2 Importing Data
|
--Function:Import and merge the imported data into the internal databases of the
Aggregator. --Schedule:Executed on a daily basis. Starts at 02:00 (or after export has ended). Assumed to take up to 3 hours to complete --High Level Process (for each purged day):Construct the delete command for each purged table (tables and the purge conditions defined in AGG_TABLES). Execute the delete commands for each of the tables |
4.2.2.3 Archiving and Purging
|
--Purge Function:Delete old records from appliance (typically - older than 60 days) to free up
space and speed up access operation to the internal database. Purging is based on dates (deleting whole days’ worth of data), but will not delete records that are still “in use” (for example: open sessions) --Schedule:The default purge activity is scheduled every day at 5:00 AM. Collectors, after the export/archive. Aggregator, after the import. Assumed to take up to 2 hours to complete --High Level Process (for each purged day): Purge configuration is used by both Data Archive and Data Export. Use the Purge data older than field to specify a starting day for the purge operation as a number of days, weeks, or months prior to the current day, which is day zero --Default purging: The default value for purge is 60 days The default purge activity is scheduled every day at 5:00 AM. For a new install a default purge schedule will be installed that is based on the default value and activity |
4.2.2.4 Orphan cleanup on aggregators
For example: The user restores data and wants to keep this data for 7 days. This means the expiration date of this data will be in 7 days from today and this data will be available for orphan cleanup after 7 days. |
If the expiration date is changed (set to keep the data for shorter/longer period - it won't
affect the date this data is available for orphan cleanup. Customer should pay attention for this especially if they change the expiration period to be longer - in order not to lose data), then the rest of the data on the machine will be available for orphan cleanup as first designed. |
4.2.2.5 Verify Archiving and Purging Process
|
1. Click Reports > Guardium Operational Reports > Aggregation/Archive Log to
open the Aggregation/Archive Log. 2. Check to ensure that each Archive/Purge operation has a status of Succeeded. |
4.2.2.6 Reporting on Aggregation and Archiving Activity
|
1. Navigate to Manage > Reports > Data Management > Aggregation/Archive Log
to open the Aggregation/Archive Log. 2. Define a query and build a report. |
4.2.2.7 Restoring
As described previously, archives are written to a SCP or FTP host, or to a Centera or TSM storage system. To restore archives, you must copy the appropriate file(s) back to the Guardium system on which the data is to be restored. |
1. Click Manage > Data Management > Data Restore to open Data Restore.
2. Enter a date in the From box, to specify the earliest date for which you want data. 3. Enter a date in the To box, to specify the latest date for which you want data. 4. In the Host Name box, optionally enter the name of the Guardium appliance from which the archive originated. 5. Click Search. 6. In the Search Results panel, mark the Select box for each archive you want to restore. 7. In the Don't purge restored data for at least box, enter the number of days that you want to retain the restored data on the appliance. 8. Click Restore. 9. Click Done when you are finished |
4.2.3 Using restore from a backup for migrating
|
1. Using an SSH client, log in to the Guardium system as the CLI user.
2. If the backup files are on a remote system, import the files by entering the following command: import file You will be prompted to information for the system that contains the backup files and the location of the files.The import process copies the backup data files to the /var/dump directory. 3. Begin the restore process by entering the following command: restore db-from-prevversion. When you receive prompts to "Update portal layout (panes and menus structure) to the new default ...", note the following options: o Answering y (yes) will result in all customized reports and panes being compressed into one pane with the name of "9.* Custom Reports." o Answering n (no) will result in all panes being restored to what they were in the prior release. |
4.2.3-1 After running the restore db-from-prev-version command, note the following requirements
|
• Reinstall the accelerators.
• Reload the MS SQL Server and Oracle .jar file for open sources. • If a DPS file is in a waiting state from a previous Guardium version when the restore process is performed, the DPS file will no longer be available. Upload the DPS file again before performing the DPS import function for v9.5. • Company logos uploaded before the restore process must be reloaded after the process is complete. To reload a customer logo, use the Global Profile page. |
4.3.3.3 Import users from LDAP
You can import Guardium user definitions from an LDAP server by configuring an import operation to obtain the appropriate set of users. You can run the import operation on demand, or schedule it to run on a periodic basis. You can elect to have only new users imported, or you can have existing user definitions replaced. In either case, LDAP groups can be imported as Guardium roles. |
When importing LDAP users:
• The Guardium admin user definition will not be changed in any way. • Existing users will not be deleted (in other words, the entire set of users is not replaced by the set imported from LDAP). • Guardium passwords will not be changed. • New users being added to Guardium: o Will be marked inactive by default o Will have blank passwords o Will be assigned the user role |
4.4.5.1 Patch is stuck at “preparing to install” status
|
To resolve the problem,
a. Run "delete scheduled-patch" to remove the problematic patch installation. Then upload and install the patch again. If it doesn't resolve the issue, proceed to the next step. b. Run "support must_gather patch_install_issues". Extract the must gather file (patch_install.YYYYMMDD.tgz) and check the inittab file to see if "pins" section is remarked with #. If yes, open a PMR and provide the information to IBM technical support. IBM technical support will remove the # and install the patch again. |
4.4.5.2 Installing a new Guardium patch does not complete
If you cannot complete the installation of a new Guardium patch, stop the interfering process and reinstall the patch. |
• Resolving the problem
o To install the new Guardium patch, stop any processes from interfering with the installation. o Delete the patch that is stuck by using the command delete scheduledpatch. o Restart the system by using the command restart system. o After the system restarts, stop the GUI and inspection core by using the commands stop gui and stop inspection-core. o Reinstall the patch and restart the GUI and inspection core by using the commands restart gui and start inspection-core. |
4.4.5.3 Patch is successfully installed on central manager, but cannot be pushed to
managed units. |
Verify that
TCP port 3306 is open bidirectional |
5.4.1 Exporting Outlier Detection results
|
You must ensure that quick search is enabled. Search is enabled by default on new
installations of 64-bit systems, or you can use the command grdapi enable_quick_search. You can also review outliers in the Analytic Outliers List report |
5.4.6 What is a report Domain
|
A domain provides a view of the data that Guardium stores. Each domain contains one or
more entities. An entity is a set of related attributes, and an attribute is basically a field value. |
5.5.1 Generating reports to narrow down violations
|
Log the policy violation only. We refer to the fact that the rule was triggered as
a policy violation. Except for the Allow action, a policy violation is logged each time a rule is triggered (unless that action suppresses logging) |
5.5.4 Why do some DB User Name appear to have ‘?’ in the output
|
The most likely cause is that Guardium missed
some of the login packets while monitoring the database due to high traffic on the collector. |
5.6.4 Stopping an audit process
Stopping an audit process can be performed only if the audit tasks have not been run or are running. Stopping an audit process will not execute any more tasks that have not started. Stopping an audit process does not deliver partial results. The audit process stops and a stopped error message is the result. |
Stop an audit process by using invoking GuardAPI (place the cursor on any line and
double-click for a drill-down) from Comply > Tools and Views > Audit Process Log report. Alternatively they can be stopped bu clicking “Actions” in the top right corner, stop_audit_process then pick the specific audit. |
5.7.1 Configuring VA Test Exception to exclude a specific group from an assessment
|
Use a test exception to exclude specific members of a group from a security assessment.
This is useful if you do not want to or are not authorized to change group settings. |
6.6.1 Use the different tools available in guardium to collect Collect Guardium troubleshooting
information for technical assistance. |
6.6.1 Use the different tools available in guardium to collect Collect Guardium troubleshooting
information for technical assistance. |
6.6.1.1 Apply the functionality to generate specific information about the status of any
guardium system through the Central Manager GUI or also through the CLI, so that it can be sent to IBM Support whenever a Problem Management Report (PMR) is registered. |
6.6.1.1 Apply the functionality to generate specific information about the status of any
guardium system through the Central Manager GUI or also through the CLI, so that it can be sent to IBM Support whenever a Problem Management Report (PMR) is registered. |
6.6.1.2 Choose the command to be sent to the S-TAP agent from the GUI and obtain
diagnostic information from S-TAP |
6.6.1.2 Choose the command to be sent to the S-TAP agent from the GUI and obtain
diagnostic information from S-TAP |