INETSEC
INETSEC
INETSEC
Preface
Microsoft, Windows, Windows Server, Windows Vista, Internet Explorer, and SQL Server are
either registered trademarks or trademarks of Microsoft Corporation in the United States and/or
other countries.
Red Hat is a registered trademark of Red Hat, Inc. www.redhat.com in the U.S. and other
countries.
Linux is the registered trademark of Linus Torvalds in the U.S. and other countries.
Adobe, Reader, Adobe AIR and AIR are trademarks or registered trademarks of Adobe Systems
Incorporated in the United States and/or other countries.
Mac and Mac OS are trademarks of Apple Inc.
Intel, Pentium, and Xeon are trademarks or registered trademarks of Intel Corporation.
Other company names and product names are the trademarks or registered trademarks of the
respective companies.
Trademark symbols (®, TM) may not be given to all the applicable names such as company
names, system names and product names described in this document.
The screen examples in this document are created according to Microsoft Corporation
guidelines.
Adobe® AIR®. Copyright © 2007-2010. Adobe Systems Incorporated. All Rights Reserved.
© PFU LIMITED 2013 - 2014
i
Preface
Purpose of Document
This document describes iNetSec Smart Finder.
ii
Preface
Abbreviations
The following shows the abbreviations of operating system names used in this document:
Operating System Name Abbreviations
*: The following descriptions are applied to determine the operating system type:
Operating system used in a 32-bit environment: 32-bit Edition
Operating system used in a 64-bit environment: 64-bit Edition
iii
Preface
Description Rules
Italic Type
Italic type indicates a variable value.
Example:
http://<Sensor IP address>/index.html
"YYYY" represents the year in 4 digits. "MM" represents the month (01 to 12) in 2 digits. If "M"
is described, the month of 1 to 12 is indicated. "DD" represents the day (01 to 31) in 2 digits. If
"D" is described, the day of 1 to 31 is indicated.
"hh" represents the hour (00 to 24). "mm" represents the minute (00 to 59). "ss" represents
the second (00 to 59). "tt" represents AM or PM when the 12-hour clock is used.
±hh:mm indicates the time difference from UTC.
[-h On|Off]
The default response is Off.
On: Import with an item name in the first line.
Off: Import with no item name in the first line.
iv
Contents
Contents
Preface ......................................................................................................................... i
v
Contents
vi
Contents
vii
Contents
viii
Contents
ix
Contents
x
Contents
xi
Chapter 1 Overview
Chapter 1
Overview
1
Chapter 1 Overview
The following example shows a typical system configured with iNetSec Smart Finder.
Management Window
System ad
Syste administrator
st at
Monitors
iNetSec Smart Finder
Manager Manages
Manages information of Manager.
Op
tim
ize iNetSec Smart Finder
Chart
Gra
sp
Administrator
Blocking Notification
(New Device)
Network user
Non-registered device
Registration Form Window appears along
with blocking notification from the network.
2
Chapter 1 Overview
Attention
iNetSec Smart Finder does not support IPv6.
iNetSec Smart Finder can manage a network with a subnet mask between 8 bits
(255.0.0.0) and 30 bits (255.255.255.252).
3
Chapter 1 Overview
Management of Devices
iNetSec Smart Finder automatically detects devices and classifies the types of devices
connected to the network (such as Windows PCs, Mac, mobile devices, or printers).
The information of detected devices is centrally managed in the Device List, and can be
exported to a CSV file. It is also possible to import information on a device via a file in CSV
format.
Devices that are not connected to the network for a given period of time are automatically
deleted from the Device List.
Attention
The automatic classification of device types may not be performed for some devices
and network connection types. You can set the device type manually for devices that
are not automatically classified.
4
Chapter 1 Overview
Hint
For devices such as routers, enabling the SNMP agent function using the device
settings may improve the accuracy of classification.
iNetSec Smart Finder verifies the device types of classified devices once a week. If
iNetSec Smart Finder fails to classify the device type after verification, the device type
will not be changed.
5
Chapter 1 Overview
A device that is detected with malware is blocked from network access in order to prevent
malware from spreading or to avoid information being leaked.
Malware Detection based on behavior of the devices can be disabled per single device or
can be setup to only monitor and not block a device. These settings also can be specified
for each IP segment.
6
Chapter 1 Overview
7
Chapter 2 System Requirements
Chapter 2
System Requirements
This chapter describes the system requirements for iNetSec Smart Finder.
8
Chapter 2 System Requirements
Hint
Any operating system shown above are also supported when running on VMWare
vSphere or on Hyper-V that officially supports the operating system.
Attention
For Windows Server 2008, Windows Server 2008 R2, Windows Server 2012, and
Windows Server 2012 R2, Server Core is not supported.
The Manager cannot be installed in a domain controller.
CPU
Minimum: 2GHz or faster
Recommended: 4 or more cores, 2GHz or faster
Memory
1GB or higher recommended
(4GB or more as an entire system)
Required software
Any of the following IIS versions depending on the operating system
It is required to install IIS Web server in advance. For details about IIS settings, refer to
"3.2.1 Verifying System Requirements".
IIS 7.0 (Windows Server 2008)
IIS 7.5 (Windows Server 2008 R2)
IIS 8.0 (Windows Server 2012)
IIS 8.5 (Windows Server 2012 R2)
9
Chapter 2 System Requirements
Hint
.NET Framework is included in the iNetSec Smart Finder Manager installation DVD.
Conflicting software
Microsoft SQL Server 2005 SP2 or earlier
CPU
Intel Pentium 4 2GHz or higher recommended
Memory
1GB or higher recommended
Hint
User directory refers to the user profile directory in the installation drive. If the user
name is "user1" and the installation drive is C drive, the user profile directory in
Windows 7 is "C:\Users\user1".
10
Chapter 2 System Requirements
Required software
Adobe® Reader® 9.0 or later
Adobe® AIR® 3.2 or later runtime
Hint
Display the Management window on a screen with a resolution of 1024x768 or higher. If
the web browser window size is reduced, proper display may not be obtained.
11
Chapter 2 System Requirements
Hint
Display the Sensor Basic window on a screen with a resolution of 1024 x 768 or higher. If
the web browser window size is reduced, proper display may not be obtained.
2.3.4 Licenses
You must purchase the right license based on the required number of segments. iNetSec Smart
Finder does not manage segments that are not covered by the purchased license. The following
features are not available for the unlicensed segments.
12
Chapter 3 Introduction
Chapter 3
Introduction
This chapter is an introduction of the Manager and the Sensors and describes the initial creation
of whitelists.
13
Chapter 3 Introduction
"3.7 Changing Segments to Blocking Mode" (*3)
"3.8 Operation Mode Settings of Application Monitoring and Behavioral IPS (*4)
(Malware Detection)"
To operation
: Required operation
: Operation performed as
required
14
Chapter 3 Introduction
15
Chapter 3 Introduction
16
Chapter 3 Introduction
*1: Can be modified during the Manager installation. Configuration for the Sensor is also required.
*2: Can be modified during the Manager installation.
Depending on the Manager's firewall settings, the port numbers of the devices that the Manager
communicates with may be limited. The Manager must communicate with other devices. To
ensure communication, port number configuration on the firewall settings may be required.
Table 3.2 Communication Receiver and Port Number for the Manager
Communication
Communication Receiver Port
Number Protocol Remarks
Receiver
(Default)
Hint
Refer to "C.2 List of the Ports used by iNetSec Smart Finder" for the Manager and the
Sensor receiving port list.
17
Chapter 3 Introduction
Attention
Installing the Manager requires Windows administrator privileges.
The Manager cannot be installed in the following folders:
Shared folders on the network
Compressed folders
Encrypted folders
Folders on a file system other than NTFS
The Manager cannot be installed over a previous version. If the Manager is already
installed, uninstall it and then install a new version of the Manager.
If [HTTPS] is selected for [Configure to communication] in Manager installation, a self-
signed certificate is imported. An authorized certificate is required and must be imported
in accordance with the customer's environment.
[Procedure]
1. For installation, insert the Manager DVD.
Attention
When using a remote desktop, the Manager cannot be installed with a UNC path.
D:\setup.exe
18
Chapter 3 Introduction
3. Click [Next].
4. Select [I accept the terms in the License Agreement] and click [Next].
19
Chapter 3 Introduction
5. Click [Next].
6. To enable encrypted communication between the Manager and the Sensor, click [Detail].
If the encrypted communication is not required, click [Next].
20
Chapter 3 Introduction
The window for setting communication between the Manager and the Sensor appears.
When [Next] is clicked, the communication setting window appears.
21
Chapter 3 Introduction
9. Configure the Manager and the Sensor settings as shown below and click [Next].
Port number used for communication between the Manager and the Sensor.
To enable encrypted communication between the Manager and the Sensor.
Port number used for encrypted communication.
Hint
The protocol and port number used for the Management window can be modified after
installation. For details about how to change the protocol, refer to "B.2 Changing the
Communications Protocol for the Windows". For details about how to change the port
number, refer to "B.1 Changing a Window Port Number".
22
Chapter 3 Introduction
23
Chapter 3 Introduction
The following describes the user role type and available functions.
System The following operations are available for all Segment Groups:
Administrator Connected device management
Application monitoring
Sensor management
User management
Segment group management
Event Information view
System Configuration
"admin" is registered as default. Up to 50 accounts including "admin" can be set for this
user role.
Group The following operations are available for specific Segment Groups:
Administrator Connected device management
Application monitoring
Sensor management
Event Information view
System configuration
Up to 10 accounts of Group Administrator and Read-only users can be set per Segment
Group.
Read-only Browsing is available for specific Segment Groups. Operations such as device registration
and approval processing are not available. Setting the user information is available.
Connected device management
Application monitoring
Sensor management
Event Information view
System configuration
Up to 10 accounts of Group Administrator and Read-only users can be set per Segment
Group.
24
Chapter 3 Introduction
For both configurations, you can configure one or two Sensor ports as Monitor Ports. A Monitor
Port is an optional port to monitor network communication. This port enables iNetSec Smart
Finder to enhance device classification capability. This port is required in order to use the
Application Monitoring feature and the Behavioral IPS (Malware Detection) feature. A Monitor
Port connects to a mirror port on a network switch or a monitor port on a network tap. Although
up to 2 ports can be Monitor Ports for a network tap without aggregation feature, The Sensor can
only connect to one network switch or one network tap.
Attention
Do not install multiple Sensors in one IP segment.
To use the Sensors shown below, initialize the Sensor in advance or erase the data in the
Sensor.
The Sensor deleted from the Sensor list on the Sensors window
The Sensor connected to a different Manager
Refer to "5.4 Initializing the Sensor" or "5.7 Erasing Data from the Sensors".
iNetSec Smart Finder cannot manage an environment where multiple IP segments are set
for a single VLAN ID (where one VLAN is divided by the secondary IP). If this is the case,
set the VLAN ID for each segment on the switch side. In the Sensor Basic Setting window
for tagged VLAN configuration, specify the VLAN ID that was set on the switch side for the
LAN 2 port of each IP segment. For details about the Sensor Basic Setting window, refer
to "5.5.2 Tagged VLAN Configuration".
25
Chapter 3 Introduction
[Procedure]
1. Prepare a computer to be used for the basic settings for the Sensor (referred to as "setting
PC" hereinafter). The setting PC requires a web browser. Refer to "2.3.3 Computer to
Configure Sensor Settings".
2. Specify the IP address of the setting PC to enable connection to the Sensor via the
network.
Example: 192.168.0.254
IP address of the setting PC Specify an IP address of the network to which the Sensor belongs.
The default IP address of the Sensor is set to 192.168.0.253.
http://192.168.0.253:81/
To log in to the Sensor for which the basic settings are already configured, access the
following URL from the web browser on a computer accessible to the Sensor via the
network:
http://<Sensor IP address>:81/
26
Chapter 3 Introduction
5. Enter the System Administrator ID "admin", password "sysadmin" and click [Login].
Attention
If the Sensor is communicating with the Manager, use the login password of "admin"
specified by the Manager. To change the password, refer to "4.8.2 User Specific
Settings".
When login to the Sensor is completed, the Sensor Basic window appears.
[Procedure]
1. According to the Sensor installation type, perform the following operations in the Sensor
Basic Setting window:
For a 3 port configuration
The window for a 3 port configuration appears by default.
For a tagged VLAN Setting
Click [Switch to tagged VLAN configuration].
2. Configure the network information and click [Apply].
3. Once the Sensor basic settings are set, disconnect the network cable from the Sensor
and stop the Sensor. Refer to "5.3 Stopping the Sensor".
27
Chapter 3 Introduction
Attention
Do not stop the Sensor until application of the settings in the Sensor Basic Setting
window is completed.
The Sensor operation status can be identified from the LED status. Refer to "5.1
Components of the Sensor".
Hint
If a gateway does not exist in the network configuration, set the Gateway IP address
using an IP address in the same IP segment such as the IP address of Manager
Computer.
If you cannot configure the Sensor settings due to an incorrect IP address or a
forgotten IP address, initialize the Sensor. Refer to "5.4 Initializing the Sensor".
After you connect the Sensor to the network, press the Power button to start the Sensor.
Hint
The SENSOR LED on the front panel of the Sensor is off after the Sensor starts.
When the Sensor is able to communicate with the Manager, the SENSOR LED turns
green.
28
Chapter 3 Introduction
Attention
For the monitoring and controlling of two IP segments via a Monitor Port, the IP
segments should be connected to the same network switch enabling the Monitor Port
to connect to a single monitoring point.
[Procedure]
1. Confirm that the SENSOR LED is green.
2. Log in to the Manager from your web browser.
3. Select the [Sensors] tab.
4. Confirm that the information of the installed Sensor appears and the operation status is
"Normal".
5. Select the [Segment List] tab and display the segment list.
6. Confirm that all IP segments to which the Sensor connected appear in the segment list
with the following status:
Operation Mode: "Monitoring Mode"
Notification: "Do No Notify"
Segment Group Name: "default"
29
Chapter 3 Introduction
Attention
It takes approximately 10 minutes until the installed Sensor's information appears in the
Sensor window.
If the installed Sensor's information is not displayed in the Sensor window and the
SENSOR LED is amber, confirm the network environment between the Manager and the
Sensor. If no problems are found in the network status, restart the Sensor.
Hint
Sensor to Sensor Status Monitoring is performed between the Sensors within a Segment
Group.
30
Chapter 3 Introduction
The device information collected by the Sensor has an "approval status" that indicates if the
device has been approved for connections to the network as shown below.
Detected
The Sensor detects a new device. No approval status has been assigned yet.
Approved
The device is approved for network access by the system or the Group Administrator.
Rejected
The device is not approved for network access by the system or Group Administrator.
[Procedure]
1. Install the Sensor to cover each IP segment.
Each Sensor detects the devices connected to the corresponding IP segments and
notifies the Manager. Until all the managed devices are connected to the network,
information is not collected by the Manager.
Hint
The Sensors send ARP requests with one-second intervals to all IP addresses in
an IP segment at 12:00 a.m. every day. The Sensor detects devices such as
printers and web cameras that do not send ARP requests on their own. This
function is enabled only if the netmask of the IP segment is 16 bit (255.255.0.0) or
greater.
31
Chapter 3 Introduction
Hint
An approved device type can be specified in [Enable following setting as policy] in the
System Configuration window. Refer to "4.8.3.3 Block/Approve Devices".
For the following devices, the approval status and the Application Monitoring mode
are automatically set to [Approved] and [Monitor Only] respectively.
Manager Computer
Gateway set for the Sensor
External Registration Form Server
Exception Server
In the default settings, the approval status, the Application Monitoring mode and the
Behavioral IPS (Malware Detection) mode for each device type are as follows:
Approval Application Behavioral IPS
Device Type
Status Monitoring (Malware Detection)
Attention
While creating whitelists, set the approval status of switches, routers, wireless access
points and authentication switches to "Approved". If the Sensor is switched to blocking
mode while the above-mentioned devices are in a different status, the following
problems may occur.
Connection (such as telnet) to the device is blocked.
Monitoring of the device results in an error.
The redirection process of the authentication switch operates improperly on the
authenticated network.
3. The Sensor installed in each IP segment controls the network connection of each device
by changing the approval status as shown below.
Approval Status Sensor Operation
Approved The device is approved to access the IP segment in the Segment Group.
Rejected The device is blocked from accessing the IP segment in the segment group.
The information can be exported to a CSV file. Refer to "4.2.5 Importing Device
Information from a File" and "4.2.6 Exporting Device Information to a File".
32
Chapter 3 Introduction
To approve the blocked devices, registration for network access must be submitted. Refer to "4.9
Registration Form Window".
Attention
Create whitelists to use Segment Groups after they are created and configured.
Hint
No Registration is required for newly detected devices in the following conditions. These
devices are automatically approved.
Devices with [Enable following setting as policy] selected.
Refer to "4.8.3.3 Block/Approve Devices".
Devices with "Role".
Refer to "Table 4.4 Device Information Window and Device Registration Window
Items".
33
Chapter 3 Introduction
Application Monitoring and Behavioral IPS (Malware Detection) can be set in the three following
operation modes:
Disabled
iNetSec Smart Finder does not monitor or control application usage or malware behavior
on the network.
Monitor Only
iNetSec Smart Finder monitors application usage or malware behavior on the network,
but does not block devices even if prohibited applications are used or malware behavior is
detected.
Monitor & Block
iNetSec Smart Finder monitors application usage or malware behavior on the network
and blocks devices if prohibited applications are used or malware behavior is detected.
You can determine the operation mode of Application Monitoring and Behavioral IPS (Malware
Detection) per IP segment. This process would help gradually introducing each feature per
Segment Group. For setting the operation mode for an IP segment, refer to "4.4.1.2 Segment
List Tab".
Attention
To enable Application Monitoring or Behavioral IPS (Malware Detection), you need to
configure a Monitor Port. For the configuration of a Monitor Port, refer to "3.4 Sensor
Installation" and "5.5 Sensor Basic Settings Window".
In Behavioral IPS (Malware Detection), malware behavior is monitored separately for the
communications to the external network and for the communications within the internal
network. Therefore, to enable this feature, you need to set the network configuration in
iNetSec Smart Finder. For the network configuration settings, refer to "4.8.3.8 Network
Definition".
You can also apply an operation mode per device, which enables you to exclude some devices
from Application Monitoring or Behavioral IPS (Malware Detection). The actual operation mode
of Application Monitoring feature or Behavioral IPS (Malware Detection) feature is determined by
the combination of modes of devices and IP segments that the device connects to as follows.
For details on the operation mode settings, refer to "4.2.3 Selecting and Operating Devices",
"4.2.4 Device Information Updating and Registering" and "4.9 Registration Form Window".
34
Chapter 3 Introduction
Hint
For Application Monitoring, the following types of communications are not monitored nor
blocked.
Communications with applications running on the Manager Computer
Communication between a blocked device and the Exception Servers
Application access from any IP segment that the Sensors does not manage
Behavioral IPS (Malware Detection) does not monitor or block communication between
the Manager and the Sensor.
35
Chapter 4 The Manager Operations
Chapter 4
The Manager Operations
36
Chapter 4 The Manager Operations
4.1.1 Login
To display the Login window, type the following URL in the Web browser:
For HTTP:
For HTTPS:
Hint
Specify the port number indicated when installing Manger (default: 8109).
The user name "admin" and the Password "sysadmin" are installed as the default
credential.
To log in to the Manager, enter a user name and password, and click [Login].
37
Chapter 4 The Manager Operations
Attention
You can log in to the Manager simultaneously from multiple computers and use various
Management windows. However, if the same setting is modified from multiple computers,
the most recent setting is valid.
If no operation is performed after login for 30 minutes or longer, a session timeout occurs.
To start multiple Management windows, open a web browser window for each new
window. If a single web browser is used to display multiple Management windows, the
windows might not work correctly.
(3)
(1)
(2)
38
Chapter 4 The Manager Operations
(1) Menu Clicking one of the following menus displays a window that corresponds to the menu
in the main display area.
(2) Main display
area [Devices] Menu
The Devices window appears.
[Applications] Menu
The Applications window appears.
[Sensors] Menu
The Sensors window appears.
[Users] Menu
The Users window appears.
[Segment Groups] Menu
The Segment Groups window appears.
[Events] Menu
The Event Viewer window appears.
[System] Menu
The System Configuration window appears.
(3) This User's Guide appears in a new window. The window opens with the page
describing the window currently shown in the main display area.
Logout Logs out from the Manager and gives to the Login window.
User Name Displays the user name currently logged in to the Manager. In the above example,
"admin" is shown.
Attention
Make sure that you enable JavaScript in your web browser settings.
Do not use the web browser's [Back] and [Forward] buttons.
4.1.3 Logout
To log out from the Manager, click [Logout] in the Management window.
39
Chapter 4 The Manager Operations
Status tab To filter the Device List by device status, select one of the following tabs.
[Detected/ [Detected/Requested] tab
Requested] tab Displays devices with a "Detected" or "Requested" status. Device that is
[Approved] tab blocked from the network because of malware detection is also displayed if the
[Rejected] tab approval status is one of these statuses.
[Missing/Disposed] [Approved] tab
tab
[All] tab Displays devices with an "Approved" status. Device that is blocked from the
network because of malware detection is also displayed if the approval status
is one of these statuses.
[Rejected] tab
Displays devices with a "Rejected" status. Device that is blocked from the
network because of malware detection is also displayed if the approval status
is "Rejected".
[Missing/Disposed] tab
Displays devices not connected for a long period of time. Refer to "4.8.3.3
Block/Approve Devices".
[All] tab
Displays all devices.
40
Chapter 4 The Manager Operations
Filtering To filter the Device List, specify the following conditions. Refer to "4.2.2.1 Filtering
Device Information".
Approval Status
Application Monitoring
Behavioral IPS (Malware Detection)
Segment Group Name
Segment
MAC Address
Note
Sensor Name
NetBIOS name
IP Address/Host Name
Show devices with Validity Period
Click the "Filtering" title bar to show/hide the filtering conditions. or
appears on the title bar on the right side.
Filtering Displays the filtered results in the Device List.
Device List Up to 100 items can be displayed in the list. Refer to "4.2.2 Displaying Device
Information".
Registered Displays the number of devices, including devices with the same MAC address in
Devices "X/Y" format. X is the number of registered devices after filtering, and Y is the total
number of registered devices.
Detected Devices Displays the number of all detected devices, excluding devices with the same MAC
address in "X/Y" format. X is the number of detected devices after filtering, and Y is
the total number of detected devices.
Displays the Device Registration window. Refer to "4.2.4 Device Information
Updating and Registering".
Displays the Export window. Refer to "4.2.6 Exporting Device Information to a File".
Displays the Import window. Refer to "4.2.5 Importing Device Information from a
File".
Displays the Choose Display Columns window. In the Choose Displayed Columns
window, you can select the items to be shown in the Device List. Refer to "4.2.2.3
Displaying Selected Items in Network Device Lists".
Select whether to display the local time or the time according to the time zone in
the Device List.
Approve Sets the status of the selected device to "Approved" Refer to "4.2.3 Selecting
and "Individual Policy". and Operating Devices".
Reject Sets the status of the selected device to "Rejected"
and "Individual Policy".
Change Device Setting Sets the Application Monitoring and Behavioral IPS
(Malware Detection) modes, and clear the malware-
detected status.
Delete Deletes the device information.
41
Chapter 4 The Manager Operations
42
Chapter 4 The Manager Operations
Note
Specify 256 or less letters to filter the information by partial matching. Search targets are
"Note 1", "Note 2", and "Note 3".
Sensor Name
Specify 32 or less letters to filter the information by partial matching.
NetBIOS
Specify 16 or less letters to filter the information by partial matching.
IP Address/Host Name
Specify letters to filter the IP addresses or device host name by partial matching.
Show devices with Validity Period
Specify whether to include devices with Validity Period Approval.
Selecting the checkbox displays all of the devices, including devices without Validity
Period Approval. Clearing the checkbox filters devices without Validity Period Approval.
43
Chapter 4 The Manager Operations
[Detected]
[Not Detected]
Device Type
Devices are automatically classified by the Sensors or set manually. If the device type
cannot be determined or the Sensor cannot communicate with the device, "Detecting"
appears for up to 24 hours since when the Sensor had first detected a connection. As
soon as the device type is determined, the status will change. Note that the status
becomes "Unclassified" if the device type cannot be determined after 24 hours.
Note 1 - 3
The notes of the devices.
44
Chapter 4 The Manager Operations
Detected/Requested Date
The requested or detected date and time in "MM/dd/yyyy hh:mm tt" or "MM/dd/yyyy
hh:mm tt ± hh:mm" format. If the status is "Requested", this is the requested date. If the
status is "Detected", this is the detected date. When multiple registration forms are
submitted for the same device, the shown requested date will be the date when the initial
registration form was submitted.
Last Detected
The date when the Sensor last detected connection from that device, displayed in "MM/
dd/yyyy hh:mm tt" or "MM/dd/yyyy hh:mm tt ± hh:mm" format. For devices registered by
importing the device information, the symbol "-" is initially displayed. Upon detection by
the Sensor, the detected date is displayed.
Segment Name
The segment name where a connection from that device was last detected.
Segment Group Name
The Segment Group name where the device was detected.
Host Name
The host name of the device. If it cannot be obtained, one of the following is displayed:
NetBIOS name obtained by the Manager
Device IP address
If a change in the device IP address is detected by the Sensor, the host name is updated.
NetBIOS Name
The NetBIOS name of the device.
Role
The iNetSec Smart Finder's role in networks. One of the following is displayed:
Manager
Gateway
Registration Form Server
Exception Server
(No role)
For a device with any role other than "-", approval status, Application Monitoring mode
and Behavioral IPS (Malware Detection) mode are automatically set to "Approved",
"Monitor Only" and "Monitor & Block" respectively.
Details
The details of the Device Type classified by the Sensor. [Details] is left blank when it
cannot be classified.
Model
The device model classified by the Sensor. [Model] is left blank when it cannot be
classified.
OS Type
The OS for the device classified by the Sensor. [OS Type] is left blank when it cannot be
classified.
Vendor
The device vendor classified by the Sensor. [Vendor] is left blank if it cannot be classified.
Average Power Consumption
The defined value determines the total power consumption. This value can be specified
for each device. This value is used to calculate power consumption in Chart.
45
Chapter 4 The Manager Operations
Change of IP Address
This indicates whether to report an event when the IP address of a device changes.
Authorized IP Address
Set when blocking or reporting events using an IP address other than the one assigned.
Registered Date
The date and time when a registration form is submitted in the Blocking window (New
Device) or in the Registration Form window on the Manager.
Detected Date
The date and time when the initial device connection was detected by the Sensor in "MM/
dd/yyyy hh:mm tt" or "MM/dd/yyyy hh:mm tt ± hh:mm" format. If the device is registered to
the Manager in the Device Registration window by importing the device information, the
date and time when it was imported to the Manager is set as detected date.
Approved Date
The date and time when the approval status of the device is set to "Approved" or
"Rejected" in "MM/dd/yyyy hh:mm tt" or "MM/dd/yyyy hh:mm tt ± hh:mm" format. If the
approval status is not "Approved" or "Rejected", "-" is displayed. If the approval status is
set by the importing device information, the approved date is set to the import date and
time.
Start Date of Validity Period
If validity period approval is set, the start date of the term is displayed.
Expiration Date
If validity period approval is set, the end date of the term is displayed.
Device Type Update
Shows if the default values of [Device Type], [Details], [Model], [OS Type], [Vendor], and
[Average Power Consumption] are automatically updated.
Sensor Name
The name of the Sensor by which the network device was last detected.
Registration items 1 - 5
The registration information entered by the user in the Blocking window (New Device) for
the Registration Form window for the Manager, to connect devices to a network.
Hint
When a network device is registered with multiple Segment Groups, it is displayed for
each of the Segment Groups.
46
Chapter 4 The Manager Operations
To display the Choose Items to Display as Columns window, click in the Devices window.
In the Choose Items to Display as Columns window, select the items to display in the Device
List.
The selected items are saved for each user, and [Device List] is displayed as saved for the next
time the same user logs in again.
The following describes the items in the Choose Items to Display as Columns window.
Displayed items: A list of items that can be displayed in the Device List.
Items are displayed from the left side of the Device List in the same order.
Up to 11 items can be added.
Moves the selected item up one position.
button
47
Chapter 4 The Manager Operations
48
Chapter 4 The Manager Operations
Checkboxes will be cleared when a filtering operation is performed or when the Device List page
changes.
49
Chapter 4 The Manager Operations
50
Chapter 4 The Manager Operations
51
Chapter 4 The Manager Operations
Table 4.4 Device Information Window and Device Registration Window Items
Setting Items Device Information Window Items Device Registration Window Items
Device Information
Segment The name of the Segment Group -
Group assigned to the device is displayed in a
drop-down list. Select a Segment Group
name to display the device information
for that Segment Group.
IP Address The IP address of the network device. -
Host Name The host name of the network device. -
MAC Address The MAC address of the device. Enter the MAC address for the device for
registration.
Use colons and hyphens as delimiters for
the MAC address, or do not use
delimiters for the MAC address.
[Browse] - If the address entered for the MAC
address already exists, " Device
Information Window" appears in a new
window.
MAC Vendor The vendor name for the device. -
Device Type Select "Device Type" from the pull-down menu.
Role "Role" is displayed. -
Details Specify the details (up to 64 letters).
Model Specify a product name (up to 64 letters).
OS Type Specify the OS type with 64 or less letters.
Vendor Specify a vendor in 64 or less letters.
Device Type Set whether to overwrite device type information (Device Type, Details, Model, OS
Update Type, Vendor, and Average Power Consumption) with automatically identified values.
Select either "Yes" or "No". To manually set the device type and prevent the set value
from being overwritten, specify "No".
Average Power Set the average power consumption of the device in watts.
Consumption You can specify a number within the range of 0 to 65535.
Approval Select either [Approved] or [Rejected].
Status Select the [Individual Policy] checkbox when you do not want the approval status to
be changed based on [Preassigned Policy].
Application Set the Application Monitoring mode for the device. [Disabled], [Monitor Only], and
Monitoring [Monitor & Block] are available.
Select the [Individual Policy] checkbox when you do not want the Application
Monitoring mode to be changed based on [Preassigned Policy].
Behavioral Set a Behavioral IPS (Malware Detection) mode for the device. [Disabled], [Monitor
IPS (Malware Only], and [Monitor & Block] are available.
Detection) Select the [Individual Policy] checkbox when you do not want the Behavioral IPS
(Malware Detection) mode status to be changed based on [Preassigned Policy].
52
Chapter 4 The Manager Operations
Setting Items Device Information Window Items Device Registration Window Items
Registration Information
Registered Displays the registered date. -
Date
(Item 1) - (Item The information on the registration form can be set with 64 letters or less.
5) Item names from 1 to 5 are defined in the System Configuration window. Refer to
"4.8.3.3 Block/Approve Devices".
Last Detected
Last Detected Displays the last detected date. -
Segment Displays the segment where the network -
Name connection was last detected.
Segment Group - To assign a Segment Group that a device
Assignment belongs to, select the checkbox of the
target Segment Group.
[OK] Applies the settings and closes the window.
[Cancel] Closes the window without applying the settings.
53
Chapter 4 The Manager Operations
[Procedure]
2. Click [Browse].
The [Select File] dialog box appears.
3. Select a file with the device information to import and click [OK].
When the device defined in the import file does not exist in the device information of
the Manager, the device is added as a new device. When the Mac address and
Segment Group name of the device match the Manager's device information, the
Manager's device information is updated with the details defined in the file.
Refer to "A.1 Device Information File Format".
Hint
If a format error occurs in the Device Information File while importing, an error message
appears and the system returns to original status prior to importing. Verify the Device
Information file and try the import again.
54
Chapter 4 The Manager Operations
[Procedure]
2. Click [OK].
To aggregate the same device by MAC addresses for export, select "MAC Address
Aggregation". If "MAC Address Aggregation" is selected and the same device exists in
multiple Segment Groups, only the Segment Group information with the latest value for
[Last Detected] is exported.
The Download File dialog box appears.
3. In the Download File dialog box, specify a folder and a file to be exported. The default file
name is deviceList_<MMDDYYYY>.csv, and MMDDYYYY is the export date.
All device information matching the filtering conditions is sorted as designated.
Refer to "A.1 Device Information File Format".
55
Chapter 4 The Manager Operations
56
Chapter 4 The Manager Operations
Delete Deletes the Sensor information. Refer to "4.4.2.3 Deleting Sensor Information".
57
Chapter 4 The Manager Operations
Change Segment Setting To set Operation Mode, Application Monitoring, Behavioral IPS (Malware
Detection), Event Notifiation, and License for the selected segments, click the
[Change Segment Setting] button to display the Change Segment Setting
window. For details about the Change Segment Setting window, refer to "4.4.3.7
Changing Segment Settings".
58
Chapter 4 The Manager Operations
Sensor Information
Displays whether the settings made for each Sensor in the Sensors window (such as
change of the operation mode) are applied to the Sensor.
System Information
Displays whether the settings made in the System Configuration window (such as e-
mail notification) are applied to the Sensor.
Version
Firmware
The firmware version applied to the Sensor.
Device Dictionary
The Device Dictionary version applied to the Sensor.
Application dictionary
The Application Dictionary version applied to the Sensor.
Operation Status
Displays one of the following as the operation status of the Sensor:
Normal
The Sensor is operating properly.
Abnormal
The Manager cannot monitor the Sensor, or the results of mutual monitoring of the
Sensors cannot be transmitted.
Attention
If you set the system time of the Manager Computer forward, the operation status
of the Sensor might temporarily display as "Abnormal".
59
Chapter 4 The Manager Operations
Sensor Information
Sensor Name Up to 32 letters can be set. The default value is the MAC address of LAN 0 of
the Sensor.
MAC Address Displays the MAC address of LAN 0 of the Sensor.
Device Dictionary Displays a version of the Device Dictionary that is applied to the Sensor.
Application Dictionary Displays a version of the Application Dictionary that is applied to the Sensor.
60
Chapter 4 The Manager Operations
Operation Status Displays the operation status of the Sensor. This is either "Normal" or
"Abnormal".
Operation Confirmed Displays the latest date and time when the Manager checked the operation
status of the Sensor.
Time zone Specify a Time zone where the Sensor is located.
Automatically Select the checkbox if the time zone uses Daylight Saving Time.
adjust time for
Daylight Saving
Time
[OK] Applies the settings and closes the window.
[Cancel] Closes the window without applying the settings.
Attention
When you click [OK], all the spaces before and after are removed from the specified
Sensor name.
Checkboxes will be cleared when a filtering operation is performed or when the Sensor list page
changes.
61
Chapter 4 The Manager Operations
[Procedure]
62
Chapter 4 The Manager Operations
Disabled
Application Monitoring is disabled. This is the default action when a monitoring port is
configured on the Sensor.
Monitor Only
Application Monitoring is enabled in Monitor Only mode.
Monitor & Block
Application Monitoring is enabled in Monitor & Block mode.
No Monitor Port
A Monitoring Port is not configured on the Sensor and Application Monitoring cannot
be enabled.
Behavioral IPS (Malware Detection)
One of the following items is displayed, according to the Behavioral IPS (Malware
Detection) mode:
Disabled
Behavioral IPS (Malware Detection) is disabled. This is the default action when a
Monitor Port is configured on the Sensor.
Monitor Only
Behavioral IPS (Malware Detection) is enabled in [Monitor Only] mode.
Monitor & Block
Behavioral IPS (Malware Detection) is enabled in [Monitor & Block] mode.
No Monitor Port
A Monitor Port is not configured on the Sensor and Behavioral IPS (Malware
Detection) cannot be enabled.
Event Notification
One of the following items, according to the event notification setting.
"Notify"
Event notification is enabled.
"Do Not Notify"
Event notification is disabled.
License
"Granted"
The segment license is granted for the segment.
"-"
The segment license is not granted for the segment.
63
Chapter 4 The Manager Operations
*: For devices newly detected by the Sensor, the approval status is set to "Detected".
Hint
If the operation mode is changed, the operation mode in the Segment list is also changed,
and [Configuration Download (Sensor Information)] changes to "Incomplete". Within 10
minutes after the operation mode change, the new setting is applied to the Sensor, and
[Configuration Download (Sensor Information)] changes back to "Complete".
Hint
The actual Application Monitoring mode is determined by the combination of the
Application Monitoring modes of the device that uses the application and the IP segment
that the device connects to. Refer to "3.8 Operation Mode Settings of Application
Monitoring and Behavioral IPS (Malware Detection)".
When you use more than one prohibited application, multiple notifications of the
Prohibited Application Detection event may be sent.
Changing Monitoring Mode to Blocking Mode does not block the applications detected in
Monitoring Mode. The application that is already connected before you change Monitoring
Mode to Blocking Mode will be detected and blocked at the next connection.
Hint
The actual operation mode of the Behavioral IPS (Malware Detection) feature is
determined by the combination of the mode of Behavioral IPS (Malware Detection) for the
device and IP segment that the device connects to. For details, refer to "3.8 Operation
Mode Settings of Application Monitoring and Behavioral IPS (Malware Detection)".
64
Chapter 4 The Manager Operations
Segment Information
Segment Name Up to 32 letters can be set. The default value is the network address.
IP Address Displays the IP address set to the Sensor.
Subnet Mask Displays the subnet mask set to the Sensor.
Default Gateway Displays the IP address of the default gateway set to the Sensor.
65
Chapter 4 The Manager Operations
Application Monitoring Displays the Application Monitoring mode of the segment. Displays either
[Disabled], [Monitor Only], [Monitor & Block], or [No Monitor Port].
Behavioral IPS Displays the Behavioral IPS (Malware Detection) mode of the segment. One of
(Malware Detection) the following is displayed:
Disabled
Monitor Only
Monitor & Block
No Monitor Port
Event Notification Displays the event notification setting.
Displays either [Notify] or [Do Not Notify].
License Displays if the segment license is granted to the IP segment.
Displays either [Grant] or [Revoke].
Block Devices using IP Displays if a device with an IP address that is outside the range of the segment
Addresses out of IP is blocked when it is connected to the segment.
Segments. Either "Yes" or "No" is indicated.
OK Applies the settings and closes the window.
Cancel Closes the window without applying the settings.
Attention
When you click [OK], all the spaces before and after are removed from the specified
segment name before the segment information is updated with the name.
66
Chapter 4 The Manager Operations
67
Chapter 4 The Manager Operations
License To change the license for the segment selected in the [Segment List] tab, select the
[Change] checkbox and then select any of the following options:
Grant
Grants license to the selected segments.
Revoke
Revokes license from the selected segments.
For details, refer to "4.4.3.5 Segment License".
OK Applies the settings and closes the window.
Cancel Closes the window without applying the settings.
68
Chapter 4 The Manager Operations
69
Chapter 4 The Manager Operations
Click in the User List. The User Information window appears. Set the required
information, and then click [OK].
Updating User information
Click a specific user name displayed in the User List. The User Information window
appears.
Enter the user information to update the user information, and then click [OK]. The
following example of the user registration window describes the setting items. Setting
items in the User Information window are the same as in the user registration window.
70
Chapter 4 The Manager Operations
71
Chapter 4 The Manager Operations
User information
User Name Use 20 or less alphanumeric letters and symbols "-", "_", "." and "@" to specify a
user name for logging in to the Management window. This entry cannot be
omitted.
Upper-case letters are converted and displayed as lower-case letters. When the
user logs in to the Management window, entries are case-insensitive. This
information cannot be entered in the User Information window.
Password/Re-enter Use between 8 and 32 alphanumeric letters and symbols (printable ASCII
Password characters) to specify a password for logging in to the Management window.
This entry cannot be omitted.
User Role Select the role from [System Administrator], [Group Administrator], or [Read-
only].
E-mail Address Use 253 or less letters to specify an e-mail address to which events are reported
from the Manager or the Sensor. If you specify multiple e-mail addresses, you
can use up to 512 letters in total.
To specify multiple e-mail addresses, delimit them with a comma (,). Available
letters are alphanumeric letters and the following symbols:
!#$%&'*+-/=?^_`{|}~@.
E-mail Notification Select this checkbox to send e-mail to report events that occur to the Manager
and the Sensors. Selected events are reported.
Even when this setting is enabled, e-mail is not sent if the event notification
mode of the Sensor is [Do Not Notify].
Device Events/ Select events that need to be reported to the target e-mail address. Refer to
Application "11.4 Messages Reported by E-mail".
Events/
Behavioral
Malware Events/
System Events
Note Specify information about the user with 256 or less letters.
Device Information for Select the items to add to the CSV file column when exporting device
export information.
Append Agent Installation
Append Authorized IP Address
Event Viewer Time Specify a local time zone for the region. The time for the specified time zone is
displayed.
Automatically Select the checkbox if the selected time zone uses Daylight Saving Time.
adjust time for
Daylight Saving
Time
Segment Group Assignment
Filtering You can filter Segment Groups based on the conditions shown below. When
multiple filtering items are specified, the items are related by the AND condition.
Segment Group Name
Specify 32 or less letters to filter the information by partial matching.
Remarks
Specify 256 or less letters to filter the information by partial matching.
[Filtering] Filtered results are displayed in [Segment Group List].
72
Chapter 4 The Manager Operations
Segment Group List Segment groups and remarks matching the filtering conditions are listed. By
default, all the Segment Groups registered to the Manager are displayed.
Select a Segment Group assigned to the user.
Up to 10 users (accounts) can be assigned to a single Segment Group.
[OK] Applies the settings and closes the window.
[Cancel] Closes the window without applying the settings.
Hint
The [System Administrator] role can be assigned to up to 50 users (accounts).
Checkboxes will be cleared when a filtering operation is performed or when the User List page
changes.
73
Chapter 4 The Manager Operations
Delete Deletes the selected Segment Groups. Refer to "4.6.3 Deleting Segment Groups".
74
Chapter 4 The Manager Operations
The following describes the display format and setting details of the Segment Group Registration
window and the Segment Group Information window.
75
Chapter 4 The Manager Operations
Table 4.14 Segment Group Registration Window & Segment Group Information Window Items
Segment Assignment
Filtering By specifying a Segment Group name, you can filter Segment Groups displayed in
[Segment List] by partial matching.
Segment Group Name
Specify a value with 32 or less letters. This entry cannot be omitted.
Filtering Filtered results are displayed in [Segment Group List].
Segment List The segments are sorted and displayed based on the Segment Group name in
ascending order. Segments with the same Segment Group name are sorted by
segment name in ascending order.
Select the checkbox to the left of a segment to assign the segment to a filtered
Segment Group. If the selected segment already belongs to another Segment
Group, the segment switches to the new Segment Group.
Deselect the checkbox to the left of a segment to clear the assignment to a filtered
Segment Group.
OK Applies the settings and closes the window.
Cancel Closes the window without applying the settings.
Attention
The status of segments in which Segment Groups are changed is as follows:
Operation Mode: Monitoring Mode
Application Monitoring mode: Disabled (or No Monitor Port if the Monitor Port is not
configured)
Behavioral IPS (Malware Detection): Disabled
Block Devices using IP Addresses out of IP Segments: No
The whitelists you created before changing the Segment Group are cleared. If you change
the operation mode to "Blocking Mode", you have to create the whitelists again.
When you click [OK], all the spaces before and after are removed from the specified
Segment Group name before the information is updated with the name.
Up to 75 Segment Groups can be registered. You cannot register more than 75 Segment
Groups.
76
Chapter 4 The Manager Operations
Checkboxes will be cleared when a filtering operation is performed or when the Segment Group
list page changes.
Hint
The "default" Segment Group cannot be deleted.
Segments contained in deleted Segment Groups are automatically moved to the "default"
Segment Group.
All devices belonging to deleted Segment Groups are deleted. Furthermore, device
information of the deleted Segment Groups can no longer be viewed in the Charts. Event
information is not deleted.
77
Chapter 4 The Manager Operations
78
Chapter 4 The Manager Operations
You can use this item to select whether to show the event local time or the event
viewer time in Events List.
Updated time Displays when the Events List was last updated.
Refreshes the Events List.
[Procedure]
79
Chapter 4 Manager Operations
Click [Apply] to apply the settings. If you move to a different window without clicking [Apply], the
entered settings will be lost.
Hint
Click [Apply] and the Manager transfers the Sensor settings to the Sensor on the next
synchronization. Verify the Sensor window to confirm the settings.
80
Chapter 4 Manager Operations
81
Chapter 4 Manager Operations
82
Chapter 4 Manager Operations
4.8.3.1 Notification
83
Chapter 4 Manager Operations
84
Chapter 4 Manager Operations
85
Chapter 4 Manager Operations
Hint
If FQDN is used for an SMTP, SNMP, or POP3 server, ensure that the FQDN can be
resolved by the DNS correctly.
For the approval e-mail, the first line of the mail body should be one of the keywords
(either Approve or Reject). The line should not contain any other words than the keyword.
86
Chapter 4 Manager Operations
IP Address Change Notification Specify IP address for notification exception. Selecting the [Use Default
Exception Setting] checkbox loads the settings of the "default" Segment Group
into the current window.
Segment Group Name Displays Segment Group names.
IP Address Range Specify the range from the IP address for notification exception.
If you specify an IP address range overlapping with a range already
registered, the ranges are merged.
Up to 3,000 IP address ranges can be specified.
Registers the specified IP address range.
87
Chapter 4 Manager Operations
88
Chapter 4 Manager Operations
The times when the attribute values are changed according to the settings
are as follows:
When you change these settings
When device types are changed (the Sensor and the Manager)
Default settings of the approval status, the Application Monitoring mode and
the Behavioral IPS (Malware Detection) mode for each device type are as
follows:
Approval Status
Windows, Mac, Linux/UNIX, Router/Switches, NAS, Mobile Devices,
Others, Unclassified, Classifying
[Enable following setting as policy] (not selected), [Reject].
Printers, Scanners, VoIP Phone, Kiosk Terminals
[Enable following setting as policy] (selected), [Approve]
Application Monitoring
Windows, Mac, Linux/UNIX, Mobile Devices, Unclassified,
Classifying
[Enable following setting as policy] (not selected), [Monitor & Block]
Kiosk Terminals
[Enable following setting as policy] (selected), [Monitor Only]
Routers/Switches, Printers, NAS, Scanners, VoIP Phones, Others
[Enable following setting as policy] (selected), [Disabled]
Behavioral IPS (Malware Detection)
Windows, Mac, Linux/UNIX, NAS, Kiosk Terminals, Mobile Devices,
Unclassified, Classifying
[Enable following setting as policy](not selected), [Monitor & Block]
Routers/Switches, Printers, Scanners, VoIP Phone, Others
[Enable following setting as policy] (selected), [Monitor Only]
89
Chapter 4 Manager Operations
Advanced Settings
Automatic Control for OS Type
Settings Displays the Automatic Control Settings for OS Type window. Refer to
"4.8.3.4 OS Type Based Policy".
Automatic Approval for MAC Address (Vendor ID)
Settings Displays the Automatic Approval for MAC address (Vendor ID) window.
Refer to "4.8.3.5 Automatic Approval for MAC Address (Vendor ID)
Settings".
Automatic Approval for IP Address
Settings Displays the Automatic Approval Settings for IP Address window. Refer to
"4.8.3.6 Automatic Approval Settings for IP Address Window".
Block Device The settings to block devices. Selecting the [Use Default Setting] checkbox
loads the settings of the "default" Segment Group into the current window.
Missing or Disposed
Term Specify the period, from a range of between 1 and 31 days, or between 1
and 24 months. The default value is 1 month. Devices that have passed the
specified term are determined to be missing or disposed according to the
following date for the device.
Last detected date (if [Last detected] is indicated)
Registered date (if [Last detected] is not indicated)
If the applicable day does not exist at the end of a month, a determination is
made on the last day of the applicable month.
Automatic Select this checkbox to automatically delete any devices marked as Missing
Removal or Disposed. Devices with Validity Period Approval are not automatically
deleted until the term expires.
Exception Server Specify the Exception Server that is allowed to communicate with devices in
blocking mode whose approval statuses are "Detected", "Requested", or
"Rejected". However, the server cannot communicate with devices on which
malware has been detected.
Specify the Exception Server with one of the following with 255 or less
letters. Available letters are alphanumeric with the symbols (".", "-", "_", and
"/" can be used).
Host name in FQDN format
IP Address
Network address
The port numbers can be specified for a host name in FQDN format and IP
address.
Up to 10 Exception Servers can be registered.
90
Chapter 4 Manager Operations
Automatic Control Settings for Set the policy for each OS type.
OS Type Selecting the [Use Default Setting] checkbox loads the settings of the
"default" Segment Group into the current window.
Segment Group Name Displays Segment Group names.
Add OS Type Select an OS type from the drop-down list or enter text. The contents of
the drop-down list is the same as the OS type information contained in the
Device Dictionary. For text entry, a string of up to 64 alphanumeric letters
can be entered. Entries are case-sensitive. Duplicated registration of OS
type value is unavailable.
For each OS type to be added, set the policy related to network access
approval, Application Monitoring, and Behavioral IPS (Malware
Detection). For the devices exactly matching the added OS type, the
specified values will be applied.
Up to 100 OS types can be set for each segment group.
OS Type Displays up to 100 OS types. You can sort by the underlined items in the
header of the OS type. If you sort the list, the "▼ (descending order)"
mark or the "▲ (ascending order)" mark appears on the right of the item
name.
Delete Deletes the policy for the selected OS type.
OK Applies the settings and closes the window.
Cancel Closes the window without applying the settings.
Hint
When you set a policy for a OS type, the policy supersede the policy based on the device
type for devices of the OS type.
91
Chapter 4 Manager Operations
New device without New device with
a registered vendor ID a registered vendor ID
92
Chapter 4 Manager Operations
Table 4.21 Automatic Approval for MAC address (Vendor ID) window Items
Automatic Approval for Specify settings related to the automatic approval of MAC addresses (vendor
MAC Address (Vendor ID) IDs). Selecting the [Use Default Settings] checkbox loads the settings of the
"default" Segment Group into the current window.
Segment Group Displays Segment Group names.
Name
Vendor ID Specify a vendor ID for the automatic approval.
Up to 1000 vendor IDs can be set for each Segment Group.
The format of vendor ID is XX:XX:XX. 0 - 9, a - f, and A - F can be used as values
for X. ":", "-", or no delimiters can be used for the delimiters of a vendor ID.
Registers the specified vendor ID.
Exports registered vendor IDs as CSV files. Refer to "A.4 Automatic Approval for
MAC Address (Vendor ID) File".
Imports vendor IDs for approval from CSV files. Refer to "A.4 Automatic Approval
for MAC Address (Vendor ID) File".
Vendor ID List Displays a list of up to 100 vendor IDs per page for approval. If the number of
vendor IDs for approval exceeds 100, page numbers will be indicated at the top of
the vendor ID list.
If you sort the list, the " (descending order)" mark or the " (ascending order)"
mark appears on the right of the item name.
Delete Deletes the vendor IDs with the checkboxes selected.
OK Applies the settings and closes the window.
Cancel Closes the window without applying the settings.
93
Chapter 4 Manager Operations
Hint
Devices detected in iNetSec Smart Finder Manager before enabling automatic approval
will not be determined for automatic approval.
If ":" or "-" is used for the definitions in the vendor ID input format, the zeros, which are the
first digits can be omitted (01:01:01 -> 1:1:1).
When a vendor ID is registered, the vendor name that corresponds to the vendor ID
appears in a list.
Attention
When vendor IDs are imported, all vendor IDs already registered in iNetSec Smart Finder
Manager are deleted and overwritten.
94
Chapter 4 Manager Operations
Automatic Approval Setting for Specify settings related to the automatic approval of IP addresses.
IP Address Selecting the [Use Default Setting] checkbox loads the settings of the
"default" Segment Group into the current window.
Segment Group Name Displays Segment Group names.
Add Approved IP Address If the IP address ranges that are added are duplicated, they are merged.
Range Note that if the IP address range is duplicated when the approval
statuses for automatic approval are different, an error occurs.
Up to 3,000 IP addresses for automatic approval can be set.
Registers the specified IP addresses.
95
Chapter 4 Manager Operations
96
Chapter 4 Manager Operations
Notification Message to Specify the settings for message notification displayed on the client windows.
client Selecting the [Use Default Setting] checkbox loads the settings of the "default"
Segment Group into the current window.
Client Window If "Yes" is selected, the following appears in the Client Windows:
Notification Blocking Notification (New Device) window
Blocking Notification (Pending) window
Blocking Notification (Rejected Device) window
Blocking Notification (Unauthorized IP Address) window
Blocking Notification (Prohibited Application Use) window
Blocking Notification (Behavioral IPS (Malware Detection)) window
External Select [Use] for the External Registration Form Server.
Registration Form External Registration Form Servers must not be set for Exception Servers.
Server
External Specify the URL for the External Registration Form Server. Select one of the
Registration protocols [http] or [https] and specify the address as an IP address or using FQDN,
Form Server with 255 or less alphanumeric letters and the following symbols:
URL .-_
Specify a port number. The default value is "80". 256 or less alphanumeric letters
and the following symbols are available for the path:
%/-_.!
Image Files
97
Chapter 4 Manager Operations
Color
98
Chapter 4 Manager Operations
99
Chapter 4 Manager Operations
Attention
To display a line wrapped for the intended position, use HTML tags to adjust the position,
or use the external application form server.
Refer to "4.10 Using External Registration Form".
100
Chapter 4 Manager Operations
Local Addresses When the checkbox is selected, internal network addresses include the
in the Internal private IP addresses defined in RFC1918 as listed below. By default, the
Network checkbox is selected.
10.0.0.0-10.255.255.255
172.16.0.0-172.31.255.255
192.168.0.0-192.168.255.255
Internal IP Specify addresses other than the above-mentioned private IP addresses as
Addresses the internal network.
For the internal network address, the following format can be used. No more
than 255 alphanumeric and the special characters (".", "-", "_" and "/") can be
used.
Host name in FQDN format (No more than 255 characters)
IP address
Network address (XXX.XXX.XXX.XXX/XX)
IP address range (XXX.XXX.XXX.XXX-YYY.YYY.YYY.YYY)
To specify multiple addresses (up to 20 addresses), delimit them with a
comma.
IP Addresses In organizations using proxy servers (except transparent proxy),
Handled as communication with external networks is performed by the proxy servers, and
External Network the IP addresses of the proxy servers are required to be handled as the
IP Addresses external network. Therefore, it is required to exclude proxy servers from the
internal network definition.
For the exclusion addresses, character strings as shown below can be used.
No more than 255 alphanumeric and the special characters (".", "-", "_" and "/
") can be used.
Host name in FQDN format
IP address
Network address
IP address range
To specify multiple addresses (up to 20 addresses), delimit them with a
comma.
When the Manager is installed or when the patch from V3.0L10 to V3.0L20 is
applied, the address of the proxy server that is defined in Internet Explorer is
automatically imported. Note that it is not imported when the proxy server
names are not resolved.
101
Chapter 4 Manager Operations
Category You can set the application status to [Permit] or [Prohibit] for each category.
By default, this item is set to "Not changed" ([Enable following setting as
policy] is not selected) for all categories.
The status setting is reflected in the policy when the [Enable following setting
as policy] checkbox is selected.
Changing this setting also changes the status of the applications set to
[Preassigned Policy] out of the applications currently registered to the
Manager. When individual policies are used for applications, the statuses of
the applications are not changed.
102
Chapter 4 Manager Operations
License
License Setting Specify the license key to be added.
[Settings] Displays the License Setting window.
Device Classification
Device Dictionary Specify the Device Dictionary file to update the device classification.
[Settings] Displays the Device Dictionary Setting window.
Advanced Settings
SNMP Specify the SNMP community to classify the device types and to collect printer
Community for information with 64 or less alphanumeric letters and symbols (except for
Device spaces and commas). To specify multiple SNMP communities, use a comma.
Classification You can specify up to 10 SNMP communities. In addition to the specified
SNMP communities, "public" is also used.
Application Monitoring
Application Dictionary Specify the Application Dictionary file to update the Application List.
[Settings] Displays the Application Dictionary Setting window.
Operation Settings
Manager Operation Settings
Event Retention Specify the Event Retention Period as 30, 60 or 90 days. The default value is
Period 30 days. If the events exceed 100,000, the past history in chronological order,
is automatically deleted.
103
Chapter 4 Manager Operations
Scheduled Time Specify the Scheduled Time of the Manager Process for daily operations
for Manager including the deletion of events and missing/disposed device information.
Process The Scheduled Time for Manager Process is with a range of 00:00 to 23:59
using "hh:mm", "hh:m", "h:mm" or "h:m". The default is "02:00". The value
must be entered.
Reverse DNS Specify [Yes] if resolving the device's host name from the IP address using the
Lookup DNS on the Manager.
Specify [No] if DNS cannot resolve the device's host name from the IP
address on the Manager.
Registration Form Specify [Use] for the Registration Form window on the Manager. The default
on Manager value is [Not use].
Item header in When exporting device information, specify whether to include item names.
CSV File When the device information is imported, indicate whether the item names
must be included.
Communication Setting
Sync interval Specify the communication interval between the Manager and the Sensor as
between Manager 1, 5, or 10 minutes. The default setting is "1" (minute).
and Sensor Specify the value to apply the setting changes to the Sensor and to monitor
the Sensor status.
Sensor to Sensor Select the [Sensor to Sensor status monitoring] checkbox. The Sensor
Status Monitoring monitors another Sensor in the same Segment Group and if there is a Sensor
error, another Sensor sends an e-mail or SNMP trap. The monitoring interval
is 5 minutes.
Forward DNS Specify [Manager] if resolving the server's IP address from the host name
lookup using the DNS on the Manager.
Specify [Sensor] if DNS cannot resolve the server's IP address from the host
name on the Manager.
Hint
Click [Apply]. The Manager transfers the Sensor's settings to the Sensor in the next
synchronization. Verify the Sensor window to confirm the settings.
Attention
Sensor to Sensor Status Monitoring is unavailable if the Sensor cannot communicate with
other Sensors (in a NAT environment or when a firewall is used).
The Sensors that perform Sensor to Sensor Status Monitoring must communicate via the
gateway in the IP segment specified as Communication Route in the Sensor Basic
Settings window.
104
Chapter 4 Manager Operations
[Procedure]
1. Click [Settings] next to [License Setting] on the [System Settings] tab.
License Settings window appears.
2. Enter the license key described in the License Certificate in [Add License Key].
3. Click .
The license key and the number of segment licenses are displayed.
4. Click [OK].
The licenses are activated and applied to the system.
[Procedure]
1. Click [Settings] next to [Device Dictionary] on the [System Settings] tab.
The Device Dictionary Update window appears. Check a version of the registered
Device Dictionary.
2. Click [Browse].
Select File dialog box appears.
3. Specify a name of the file to register, and then click [Upload].
The [The specified Device Dictionary file will be uploaded. Click OK to continue.]
message dialog box appears.
4. Click [OK].
The "Upload completed." message appears in the Device Dictionary Update window,
and the Device Dictionary is registered. If there is a problem with the file format when
the specified file version is the same or older than the registered file, an error message
is displayed.
105
Chapter 4 Manager Operations
Hint
For the Blocking Notification (New Device) window and the Registration Form window on
the Manager, you can use the External Registration Form according to the customer
environment. Refer to "4.10 Using External Registration Form".
If the web browser of a client device uses an automatic proxy configuration script
(automatic configuration script for Internet Explorer), restart the web browser after
connecting to the network, enabling proxy connection.
Attention
The Blocking Notification (New Device) window is displayed with http connections (port
number 80) only.
(1)
(2)
(3)
(4)
(5)
106
Chapter 4 Manager Operations
(1) Title Displays the letters specified for [Title] and [Message] in Blocking
Notification (New Device) window in the [Segment Group Specific
(2) Message Settings] tab of the System Configuration window. Refer to "4.8.3.3
Block/Approve Devices".
(3) Device MAC Displays the MAC address of the device detected by the Sensor.
Information Address
(4) Additional (Item 1) Specify each registration item with 64 or less letters.
Information Displays the registration items specified for [Item Names on Registration
(Item 2)
Form] on the [Segment Group Specific Settings] tab in the System
(Item 3) Configuration window.
Item names from Item 1 to 5 are the names defined in the System
(Item 4)
Configuration window.
(Item 5) Refer to "4.8.3.3 Block/Approve Devices".
[Submit] Enter the required items for registration and click [Submit].
(5) Footer Displays the letters specified in [Footer] on the [Segment Group Specific
Settings] tab in the System Configuration window. Refer to "4.8.3.3
Block/Approve Devices".
Attention
If a device is moved to another segment while the Manager is not operating, the
registration cannot be shared in the same Segment Group. Please register again.
To use a web browser with a proxy server, specify the Sensor IP address as a proxy
exception.
For HTTP
107
Chapter 4 Manager Operations
For HTTPS
Hint
Specify the port number when installing the Manager (default: 8109).
Attention
The following registration conditions apply to the Manager.
A device requiring registration such as a printer must be detected by the Sensor.
To register the device, you must submit a registration form from a PC managed in the
same Segment Group.
Registration cannot be submitted for devices for when the status is approved,
rejected, or submitted.
(1)
(2)
(3)
(4)
(5)
(1) Title Displays the letters specified for [Title] and [Message] in [Registration]
window (Manager) on the [Segment Group Specific Settings] tab in
(2) Message System Configuration window. Refer to "4.8.3.3 Block/Approve
Devices".
(3) Device IP Address Enter the IP address of the device you are registering and click [Show
Information MAC Address]. The MAC address corresponding to the IP address
appears. An error message appears if an IP address is not found.
MAC Address Select a MAC address from the list of MAC addresses shown.
108
Chapter 4 Manager Operations
(4) Additional (Item 1) Specify each registration item with 64 or less letters.
Information Displays the registration items specified for [Item Names on
(Item 2)
Registration Form] on the [Segment Group Specific Settings] tab in
(Item 3) the System Configuration window.
Item names from Item 1 to 5 are the names defined in the System
(Item 4)
Configuration window.
(Item 5) Refer to "4.8.3.3 Block/Approve Devices".
[Submit] Enter the required items for registration and click [Submit].
(5) Footer Displays the letters in [Footer] on the [Segment Group Specific
Settings] tab in the System Configuration window. For details, refer to
"4.8.3.3 Block/Approve Devices".
(1)
(2)
(3)
109
Chapter 4 Manager Operations
(1)
(2)
(3)
(1)
(2)
(3)
110
Chapter 4 Manager Operations
(1)
(2)
(3)
(1)
(2)
(3)
111
Chapter 4 Manager Operations
(1) Title Displays the letters specified for [Title] and [Message] in the [Segment
Group Specific Settings] tab of the System Configuration window. Refer to
(2) Message "4.8.3.3 Block/Approve Devices".
(3) Footer Displays the letters specified in [Footer] on the [Segment Group Specific
Settings] tab in the System Configuration window. Refer to "4.8.3.3
Block/Approve Devices".
In a Web Browser
Access the following URL from a web browser.
112
Chapter 4 Manager Operations
To authorize by e-mail
Reply to the registration e-mail. Authorization by e-mail is available even on a mobile
device.
To receive the registration mail, [Approval by e-mail] in the System Configuration
window should be enabled. Refer to "4.8.3.1 Notification".
113
Chapter 4 Manager Operations
114
Chapter 4 Manager Operations
115
Chapter 4 Manager Operations
Table 4.31 Parameters When Using Blocking Notification (New Device) window on External Registration
Form Server
action
Other
Parameter Description
Parameters
Value
116
Chapter 4 Manager Operations
action
Other
Parameter Description
Parameters
Value
*: For item 1 through item 5, specify a value of up to 64 characters converted by the base64url encoding with
"no padding". Settings of items not used are optional. For details about base64url encoding, refer to RFC
3548.
The External Registration Form Server must add parameters described in "Table 4.27
Parameters Sent to Manager" to the following Manager address to redirect to the address:
117
Chapter 4 Manager Operations
Hint
Specify the port number indicated when installing Manger (default: 8109).
To select HTTPS for the communications protocol for the Management window, send the
parameters to the following address:
Parameter Description
118
Chapter 4 Manager Operations
Parameter Description
*: Specify a value of up to 64 characters converted by the base64url encoding with "no padding". For details
about base64url encoding, refer to RFC 3548.
Parameter Description
119
Chapter 4 Manager Operations
120
Chapter 4 Manager Operations
When Changing the Basic Settings of the Sensor after the Sensor Is Registered
to the Manager
When you change [Manager's IP Address] in the Sensor Basic Settings window,
operations on the Sensor after you save the modified setting will vary depending on
whether you specify a new Manager Computer or the same Manager Computer.
When the Sensor connects to the same Manager Computer with a new IP address
Stop and restart the Sensor. Refer to "5.3 Stopping the Sensor" and "5.2 Starting the
Sensor".
When the Sensor connects to a new Manager Computer
Save the basic settings of the Sensor, and initialize the Sensor. Refer to "Initializing
the Sensor after saving the basic settings" in "5.4 Initializing the Sensor".
If you delete or modify the network to which the Sensor connects in the Sensor Basic
Settings window, delete all the devices detected by the Sensor in the Management
window.
121
Chapter 4 Manager Operations
122
Chapter 5 Sensor Operations
Chapter 5
Sensor Operations
This chapter describes Sensor components and operations and the Sensor Basic window.
123
Chapter 5 Sensor Operations
Power button
POWER LED
ALARM LED
SENSOR LED
EXT LED
INIT button
Component Description
124
Chapter 5 Sensor Operations
Component Description
LED status
No. Operation POWER ALARM SENSOR
LED LED LED
1 Ensure that the LEDs are in the status as shown on the right
and press the Power button. Off Off Off
1-1 The POWER and ALARM LEDs turn on amber.
On On Off
(amber) (amber)
125
Chapter 5 Sensor Operations
LED status
No. Operation POWER ALARM SENSOR
LED LED LED
1-2 The ALARM LED turns off.
On Off Off
The POWER LED flashes amber during firmware updates or (amber)
initialization with the INIT button.
1-3 When the Sensor operation begins and the connection to
the Manager is established successfully, the LED status On Off On
appears as shown to the right. (amber) (green)
Hint
If shutdown did not complete properly, the Sensor is automatically turned on and starts up
when power is supplied. Even after a power outage, the Sensor automatically restarts
when power is restored.
When the Sensor does not start properly, the LEDs are in the following status:
LED status
Description
POWER ALARM SENSOR
LED LED LED
126
Chapter 5 Sensor Operations
LED status
No. Operation
POWER ALARM SENSOR
LED LED LED
1 Ensure that the LEDs are in the status as shown on the right
and press the Power button. On Off On
(green) (green)
1-1 The POWER LED flashes green. *
Flashing Off On
2 Press the Power button again within 5 seconds after the (green) (green)
POWER LED starts flashing green.
2-1 The POWER LED lights on amber and the Sensor stop
process starts. On Off Off
(amber)
2-2 When the Sensor stop process completes, the POWER LED
turns off. Off Off Off
Attention
If pressing the Power button twice in a row does not stop the Sensor, hold down the
Power button for 4 seconds to force power off the Sensor. Forcing power off the Sensor
may cause a problem. Use this method only in emergency. If a problem occurs after the
Sensor is forced power off, the Sensor must be initialized.
Do not disconnect the power cable while the Sensor is in operation (the POWER LED is
on or flashing). Doing so may cause a serious problem in later startup or operation,
resulting in an error. Be sure to stop the Sensor before disconnecting the power cable.
Hint
If the Power button is not pressed for the second time within 5 seconds after the POWER
LED starts flashing green, the Sensor returns to the status before the Power button is
pressed for the first time.
127
Chapter 5 Sensor Operations
Attention
Do not press the INIT button while the Sensor is turned on.
128
Chapter 5 Sensor Operations
(5)
(1) [Settings] menu Displays the settings in the main display area.
Either one of following configurations appears depending on the Sensor
installation type:
For a 3 port configuration
For a tagged VLAN configuration
By default, the settings for a 3 port configuration appears.
(2) [Export/Import] menu Displays the Export/Import window.
(3) [Erase data] menu Displays the Erase data window.
(4) Logout Logs out from the Sensor and displays the Login window again.
(5) Main display area The window corresponding to the selected menu appears.
129
Chapter 5 Sensor Operations
Hint
In order to display the Sensor Basic Setting window in the PC after setting for the 3 port
configuration, set the following IP address to the PC:
IP address in the IP segments set to LAN 0-2
IP address that can communicate with the IP addresses that are set in the
communication route
130
Chapter 5 Sensor Operations
Manager
Address Specify the host name (FQDN) or IP address of the Manager Computer.
The length of the host name should be 255 or less. Available letters are
alphanumeric letters, ".", and "-". The first and last letters of the Manager
address must be alphanumeric letters. This entry cannot be omitted.
When the Manager address is specified in FQDN format, you must set the
DNS Server or Proxy settings.
Port number Specify the port number for unencrypted communication with the Manager.
Use a number between 1025 and 65535 for the port number. The default value
is "8877". This entry cannot be omitted.
The port number is also used for Sensor to Sensor Status Monitoring,
regardless of any communications protocol with the Manager.
Use HTTPS Specify whether to use https (encrypted communication) as the
(Encryption) communications protocol for the Manager.
HTTPS Port Number When https (encrypted communication) is used as the communications
protocol for the Manager, specify the port number with a number between 1
and 65535.
DNS Server Specify the IP addresses of the primary and secondary DNS server to resolve
the host names on the Sensor.
You must specify the DNS server in the following cases:
When specifying the Manager address or proxy address with a host name
(FQDN) in the Sensor settings.
When [Sensor] is selected for [Forward DNS Lookup] on the [System
Settings] tab in the System window.
When the device host name is reversely resolved on the Sensor.
Proxy
Address Specify the host name (FQDN) or IP address of the proxy.
The length of the host name should be 255 or less. Available letters are
alphanumeric letters, ".", and "-". The first and last letters of the proxy address
must be alphanumeric letters.
When the address is specified in FQDN format, you must set the DNS Server
settings.
Port Number Specify the port number of the proxy with a number between 1 and 65535.
When the proxy address is specified, this entry cannot be omitted.
User Name Specify a user name when user authentication is performed with the proxy.
This entry can be omitted.
Number of letters: 0 to 32
Available letters: Alphanumeric letters, and the symbols "-", "_", ".", and "@"
Password Specify a password when user authentication is performed with the proxy. This
entry can be omitted.
Number of letters: 0 to 32
Available letters: Alphanumeric letters, and the symbols "!", "#", "$", "%", "(",")",
"_", "-", "~", "^", "\", "[", "]", ":", "+", and ","
Monitor Port
Do Not Use Select this option if you do not use a Monitor Port.
131
Chapter 5 Sensor Operations
Use LAN 1 as a Select this option if you use LAN 1 as a Monitor Port.
Monitor Port (for
connection to a
monitoring port of a
switch or an
aggregation TAP)
Use LAN 1 and LAN 2 Select this option if you use LAN 1 and LAN 2 as Monitor Ports.
as Monitor Ports (for
connection to a TAP
without the
aggregation feature)
IP Address Specify the IP address of each LAN port. The default value of LAN 0 port IP
address is "192.168.0.253". You must specify the LAN 0 IP address.
Subnet Mask Select the subnet mask of each LAN port from "8 (255.0.0.0)" to "30
(255.255.255.252)". The default value is "24 (255.255.255.0)".
Gateway IP Address Specify the gateway address of each LAN port. You must specify the LAN 0
Gateway IP address.
Communication Route Select the communication route from the gateway address of LAN 0, LAN 1 or
LAN 2. Sensor communicates with an IP segment other than specified one
through the gateway of the communication route.
Attention
If the VLAN ID set in LAN 2 port is used as a native VLAN ID on the router, the Sensor
cannot manage the segment of the VLAN ID. Change the VLAN ID to a different ID from
the native VLAN ID, or change the native VLAN ID on the router to an different ID from the
VLAN ID.
The native VLAN on the router may be enabled in the default settings.
In this case, the ID "1" is used as the native VLAN ID. (For example, this applies to the
Catalyst series of Cisco.)
Hint
In order to display the Sensor Basic Settings window in the PC after setting for the tagged
VLAN configuration, set the following IP address to the PC:
IP address in the IP segment set to LAN0 or VLAN
IP address that can communicate with the IP addresses that are set in the
communication route
132
Chapter 5 Sensor Operations
133
Chapter 5 Sensor Operations
Manager
Address Specify the host name (FQDN) or IP address of the Manager Computer.
The length of the host name should be 255 or less. Available letters are
alphanumeric letters, ".", and "-". The first and last letters of the Manager
address must be alphanumeric letters. This entry cannot be omitted.
When the Manager address is specified in FQDN format, you must set the
DNS Server or Proxy settings.
Port number Specify the port number for unencrypted communication with the Manager.
Use a number between 1025 and 65535 for the port number. The default value
is "8877". This entry cannot be omitted.
The port number is also used for Sensor to Sensor Status Monitoring
regardless of any communications protocol with the Manager.
Use HTTPS Specify whether to use https (encrypted communication) as the
(Encryption) communications protocol for the Manager.
HTTPS Port Number When https (encrypted communication) is used as the communications
protocol for the Manager, specify the port number with a number between 1
and 65535.
DNS Server Specify the IP addresses of the primary and secondary DNS server to resolve
the host names on the Sensor.
You must specify the DNS server in the following cases:
When specifying the Manager address or proxy address with a host name
(FQDN) in the Sensor settings.
When [Sensor] is selected for [Forward DNS Lookup] on the [System
Settings] tab in the System window.
When the device host name is reversely resolved on the Sensor.
Proxy
Address Specify the host name (FQDN) or IP address of the proxy.
The length of the host name should be 255 or less. Available letters are
alphanumeric letters, ".", and "-". The first and last letters of the proxy address
must be alphanumeric letters.
When the address is specified in FQDN format, you must set the DNS Server
settings.
Port Number Specify the port number of the proxy with a number between 1 and 65535.
When the proxy address is specified, this entry cannot be omitted.
User Name Specify a user name when user authentication is performed with the proxy.
This entry can be omitted.
Number of letters: 0 to 32
Available letters: Alphanumeric letters, and the symbols "-", "_", ".", and "@"
Password Specify a password when user authentication is performed with the proxy. This
entry can be omitted.
Number of letters: 0 to 32
Available letters: Alphanumeric letters, and the symbols "!", "#", "$", "%", "(",")",
"_", "-", "~", "^", "\", "[", "]", ":", "+", and ","
Monitor Port
Do Not Use Select this option if you do not use a Monitor Port.
134
Chapter 5 Sensor Operations
Use LAN 1 as a Select this option if you use LAN 1 as a Monitor Port.
Monitor Port (for
connection to a
monitoring port of a
switch or an
aggregation TAP)
Use LAN 1 and LAN 2 Select this option if you want to use LAN 1 and LAN 2 as Monitor Ports.
as Monitor Ports (for
connection to a TAP
without the
aggregation feature)
LAN 0 IP Address Specify IP address of the LAN 0 port. The default value is "192.168.0.253".
This entry cannot be omitted.
LAN 0 Subnet Mask Select the subnet mask of the LAN 0 port from "8 (255.0.0.0)" to "30
(255.255.255.252)". The default value is "24 (255.255.255.0)".
LAN 0 Gateway IP Address Specify the gateway address of the LAN 0 port. This entry cannot be omitted.
VLAN ID Up to 16 VLAN IDs can be set. Specify the VLAN ID of the LAN 2 port with a
number between 1 and 4094. This entry cannot be omitted if a VLAN ID is
specified.
IP Address Specify the IP address corresponding to the VLAN ID. This entry cannot be
omitted if a VLAN ID is specified.
Subnet Mask Select the subnet mask from "8 (255.0.0.0)" to "30 (255.255.255.252)" for the
VLAN ID. This entry cannot be omitted if a VLAN ID is specified.
Gateway IP Address Specify the gateway address corresponding to the VLAN ID. This entry cannot
be omitted if a VLAN ID is specified.
Communication Route Select the communication route from the gateway address of LAN0 or the
specified VLAN ID. Sensor communicates with an IP segment other than
specified one through the gateway of the communication route.
135
Chapter 5 Sensor Operations
To export/import the settings, Click the [Export/Import] menu and perform the following
operations in the Export/Import window:
To export
a. Click [Export].
The Download File dialog box appears.
b. Specify a folder and file name for the export destination.
The settings is exported to the specified file.
To import
a. Click [Browse].
The Select File dialog box appears.
b. Select the Sensor Configuration File to be imported, and click [Import].
The settings in the Sensor Basic information file are displayed in the Sensor Basic
Settings window.
c. Verify the settings and make changes to the settings required.
d. Click [Apply].
The information displayed in the Sensor Basic Settings window is applied to the
Sensor.
136
Chapter 5 Sensor Operations
Hint
Erasing data of Sensor erases the data and retains the update firmware.
Initializing of the Sensor erases the data and resets the updated firmware to the factory
default firmware.
Refer to "5.4 Initializing the Sensor".
[Procedure]
1. Click the [Erase data] menu.
The Erase data window appears.
137
Chapter 6 Application Monitoring
Chapter 6
Application Monitoring
This chapter provides an overview of Application Monitoring and describes how to manage
applications used on the network with iNetSec Smart Finder.
138
Chapter 6 Application Monitoring
iNetSec Smart Finder monitors device behaviors on the network. It discovers which network
applications are in use and determines which applications can be used. If iNetSec Smart Finder
detects a prohibited application in use, it automatically blocks the device from the network and
requests the device's user not to use that application.
iNetSec Smart Finder creates an Application List based on the Application Dictionary. The
Application List is an active list that includes usage of applications and a policy that determines
which applications can be used. You can set the policy for each application in the Application List
to permit or prohibit. Some applications consist of application groups which are also listed on the
Application List. You can permit or prohibit an application group thus applying the same policy for
all applications that are in the group.
iNetSec Smart Finder creates and maintains an Application List per each Segment Group so that
you can set different policies for different Segment Groups.
Hint
You can combine Application Lists of some Segment Groups with the default Segment
Group by specifying "Join in the Default Segment Group". Refer to "6.2.1 Visualizing and
Managing Applications".
139
Chapter 6 Application Monitoring
Policy Settings
The status policy of the application. Either of the following policies are used:
Individual Policy
The application use is controlled based on the policy individually set on the
application. The policy set in Segment Group does not affect the permission status of
the application.
Preassigned Policy
The application use is controlled based on the policy set on each Segment Group. The
permission status of the application may vary per Segment Group and changes when
the policy on the Segment Group changes.
Name
The name of the application.
Application ID
A unique 8 digit number for each application.
Category
A category for each application.
Risk Level
The risk level of the application as shown below.
Very High
High
Medium
Low
Very Low
Traffic
Accumulated network traffic of the application. Expressed in either bytes (B), kilobytes
(KB), megabytes (MB), gigabytes (GB), terabytes (TB) or petabytes (PB).
Sessions
The accumulated number of detected sessions per each application. The number of
sessions includes the number of TCP sessions, UDP virtual sessions, ICMP virtual
sessions and Layer 7 requests. The number of sessions may be described with one of
following letters that indicates a unit.
K 1,000
M 1,000,000
G 1,000,000,000
T 1,000,000,000,000
P 1,000,000,000,000,000
Summary
A brief description of the application.
Policy Update Time
The date and time when the policy was updated.
Dictionary Version
The version of the Application Dictionary that the Application List is based on.
Dictionary Update
The date when the Application Dictionary that the Application List is based on was
updated.
Description
A detailed description of the application.
140
Chapter 6 Application Monitoring
URL
URL that relates to the application.
Upper Layer Application
The upper layer application that the application uses. If the application uses an upper
layer application such as http-service, http-proxy or socks, at the beginning iNetSec Smart
Finder identifies the application as an upper layer application. Then, it continues to
monitor the behavior of the application for further identification. If you prohibit the use of
the upper layer application, iNetSec Smart Finder does not identify or detect an
application that uses the upper layer application.
Class
The class of the application. The applications are classified into the following classes.
peer-to-peer-static P2P application using static port
peer-to-peer-dynamic P2P application using dynamic port
rpc-based RPC based application
web-service Web service application
l4-protocol-static TCP or UDP service using static port
l4-protocol-dynamic TCP or UDP service using dynamic port
l3-protocol Layer 3 protocol
l2-protocol Layer 2 protocol
Type
The type of application. The applications are classified into the following types.
p2p-application P2P application
rpc-application RPC based application
web-application Web service application
l4-protocol TCP or UDP service
l3-protocol Layer 3 protocol
l2-protocol Layer 2 protocol
Detection Method
The method by which the application was detected. Four methods are shown below.
port-base IP port based detection
context-base Communication context based detection
heuristic Heuristic detection
other Other
Protocol Number
The protocol name and number of the application. The format is <protocol name>
(<number> ).
Conventional TCP Port Number
The TCP Port number that the application conventionally uses. If the application uses
multiple ports, the numbers are separated by commas (no spaces in between), or
connected with a hyphen (-) to indicate the range. "ANY" indicates that the application
uses dynamic port numbers.
141
Chapter 6 Application Monitoring
Attention
The Sensor uses DNS server to identify some applications. If DNS server is not set, such
applications cannot be identified. For DNS server settings, refer to "5.5 Sensor Basic
Settings Window".
142
Chapter 6 Application Monitoring
6.2 Operations
6.2.1 Visualizing and Managing Applications
To view and manage the application on the network, use the Applications window. The
Applications window appears when the [Applications] menu is selected in the Management
window. The Applications window includes an Application List that provides information about
applications. You can also set the permission status of an application to permit or prohibit the
use of that application.
Items Description
143
Chapter 6 Application Monitoring
Items Description
Filtering To filter the applications displayed in the Application List, specify one or
more conditions as shown below.
When you specify two or more conditions, applications that meet all the
conditions are displayed.
Text in Application Info Specify any keywords for searching application information.
Applications that contain specified keywords in the application names
or the summary description are displayed.
The maximum length for keyword is 100 letters.
Risk Level Select the Risk Level range for the items shown below.
All
High to Very High
Medium to Very High
Low to Very High
Very High
Category Select Category.
Status Check the status of applications to be displayed. The status is
displayed with symbols as shown below.
Permitted
Prohibited
Not Detected
Policy Settings The status policy of the application. Either of the following policies are
used:
Individual Policy
The application use is controlled based on the policy individually
set on the application.
Preassigned Policy
The application use is controlled based on the policy set on each
Segment Group.
For details on how to set the policy that determines the status of
applications, refer to "4.8.3.9 Blocking and Approving Application".
Filtering Apply the specified condition.
144
Chapter 6 Application Monitoring
Items Description
Application List The Application List and the operation buttons are displayed. The list
consists of several pages and one page contains up to 100
applications.
Number of Applications Number of applications is displayed in X / Y format. X stands for the
number of applications that meet the filtering conditions and Y stands
for the total number of applications.
Export the application information.
Change time to Event Local Time or Event Viewer Time. The default is
Event Viewer Time.
Updated time The last time the application information was updated is displayed.
Update the information.
145
Chapter 6 Application Monitoring
Items Description
Application information The selected information items of each application are displayed.
The following items are on the first three columns of each line and
selected items follows.
checkbox (First column)
Check to select applications to be permitted or prohibited. You can
select all items displayed in the current page by selecting the
checkbox on the title row.
Status (Second column)
One of following symbols is displayed to show the application
status.
[Permitted] [Mix]
All applications in the application group are permitted for use. The
policy defined on Segment Group is applied to only some
applications. This symbol is displayed only for an application
group.
[Prohibited] [Mix]
All applications in the application group are prohibited for use. The
policy defined on Segment Group is applied to only some
applications. This symbol is displayed only for an application
group.
[Mixed] [Mix]
The applications in the application group are in two or more
different statuses. The policy defined on Segment Group is applied
to only some applications. This symbol is displayed only for an
application group.
(Not Detected)
The application is not detected in the Segment Group and users
have not permitted or prohibited use of it.
146
Chapter 6 Application Monitoring
Items Description
Hint
Each Sensor reports the traffic and session information to the Manager every 15 minutes.
The most recent statistical information is displayed in [Traffic] and [Sessions] when you
click button.
147
Chapter 6 Application Monitoring
After you complete the selection, press [OK] to apply the selection.
To cancel the modification you made on the window, press [Cancel].
148
Chapter 6 Application Monitoring
[Procedure]
1. Click .
The Select File dialog box appears.
2. In the Select File dialog box, specify a folder and a file to export the Application List. The
default file name is appPolicyList_<MMDDYYYY>.csv, and MMDDYYYY is the export
date.
All the application information items of applications that meet the filtering conditions
are exported to the specified file.
[Procedure]
1. Click .
The Import window appears.
2. Click [Browse].
The Select File dialog box appears.
3. Select a file to import and click [OK].
The statuses of applications that have the Applications ID as described in the imported
file are replaced. Other information in the imported file is neglected. If the application
with the same Application ID as described in the imported file does not exist in the
active Application List, the import operation aborts.
149
Chapter 6 Application Monitoring
[Procedure]
1. Click [System].
The System Configuration window appears.
2. Click [Settings] of [Application Dictionary] on the [System Settings] tab.
The Application Dictionary Update window appears. Verify the version of the registered
Application Dictionary.
3. Click [Browse].
The Select File dialog box appears.
4. Specify the name of the revised Application Dictionary file and click [Update].
The [Upload the specified application dictionary file. Click OK to continue] dialog box
appears.
5. Click [OK].
If the version of the specified Application Dictionary is the same or older than the
registered file or if any problem occurred, the update aborts and an error message
appears.
150
Chapter 6 Application Monitoring
The device will be allowed to access the network when the device user clicks [Unblock] on the
window. If more than one prohibited application is detected, the Blocking Notification
(Prohibited Application Use) windows appear in succession and the device will be blocked
until the device user replies to all the windows.
151
Chapter 7 Chart Installation, Setup and Operations
Chapter 7
Chart Installation, Setup and
Operations
152
Chapter 7 Chart Installation, Setup and Operations
Grasp
Manager
Optimize
Chart
Op
tim
ize
Gra
sp
Operation administrator
Integration
Detect
Collect
Sensor Device Device
Integration
Detect
Collect
Sensor Device Device Device
153
Chapter 7 Chart Installation, Setup and Operations
154
Chapter 7 Chart Installation, Setup and Operations
The processing for obtaining and calculating the amount of printed pages is as follows:
Manager Chart
Sensor
Printer
Segment
(1) The Sensor obtains values for
the total Amount of Printed
Pages at 30-minute intervals.
155
Chapter 7 Chart Installation, Setup and Operations
Hint
The user can access information about the amount of printed pages on Chart on the
second day after the Sensor has detected that printer.
If Manager is stopped for one day or longer, the number of pages from the period it
stopped to the period it was turned back on is calculated as the total number of pages in a
single day.
The Sensor obtains the printmib prtMarkerLifeCount (OID: 1.3.6.1.2.1.43.10.2.1.4) from a
printer.
Manager Chart
Device
ice Sensor
Segment
(1) The Sensor checks for
communication with the device
at 30-minute intervals.
Hint
The user can access power consumption and uptime on Chart one day after the Sensors
have detected a device.
If the Manager pauses for a day or longer while the Sensors are obtaining the uptime from
devices, only the power consumption and uptime for the day before the Manager was
turned back on can be accessed.
156
Chapter 7 Chart Installation, Setup and Operations
For HTTP:
For HTTPS:
157
Chapter 7 Chart Installation, Setup and Operations
158
Chapter 7 Chart Installation, Setup and Operations
5. Click [Install].
159
Chapter 7 Chart Installation, Setup and Operations
D:\chartsetup.exe
Follow the procedure in "Downloading installation files from the Manager" with step 5.
Attention
Chart cannot be installed in shared network folders or encrypted folders.
Double-click the Chart icon on the desktop to display the Chart login window. You can also
select [All Programs] - [iNetSec Smart Finder Chart] from the [Start] menu.
160
Chapter 7 Chart Installation, Setup and Operations
When the Chart login window appears, specify a user name and the Manager and click [Login].
When login is completed, the main window appears.
Attention
If HTTPS is required to communicate with the specified Manager and the [Use SSL]
checkbox is selected, several Security Warning dialog boxes might appear. Perform the
necessary actions.
Import an official certification. Refer to "3.2.3 Installing the Manager".
The Manager certification might not have been imported onto the computer that the
application is installed on.
Import the Manager certification onto the computer that the application is installed on.
Procedure for importing a certification:
1. Click [Display Certification] on the Security Warning dialog that appears during
login.
The Certification dialog box appears.
2. Click [Install Certification] on the [General] tab.
The Certification Import Wizard appears.
3. In the Certification Import Wizard, select [Automatically select certification store
based on type of certification] to import the certification.
161
Chapter 7 Chart Installation, Setup and Operations
(2)
(3)
(4)
(7) (9)
(8)
(10)
(1) Logout Click here to log out from the application. After logging out, the login
window appears.
(2) User Name The name of the user logged in.
(3) Summary The Summary window appears in the information display area. Refer to
"7.5 Summary Display".
(4) Details Displays [Devices], [Printer Usage], and [Power Consumption] sub
menus.
Devices The Device List window appears in the information display area. Refer to
"7.6.1 Device List Window".
Printer Usage The Printer Usage window appears in the information display area. Refer
to "7.6.2 Printer Usage Window".
Power The Power Consumption/Uptime window appears in the information
Consumption display area. Refer to "7.6.3 Power Consumption Window" and "7.6.4
(Uptime) Uptime Window".
(5) Last Updated Displays the date and time when the information shown was obtained
from the Manager.
(6) Update Obtains information from the Manager, and updates the information
displayed. When [Update] is clicked, the Summary window appears in
the information display area.
(7) Splitter bar Click to close the menu area on the left side and make the information
display area larger. Click once more to open the menu area again.
162
Chapter 7 Chart Installation, Setup and Operations
163
Chapter 7 Chart Installation, Setup and Operations
164
Chapter 7 Chart Installation, Setup and Operations
(1) Devices The type and number of devices, and any changes in the number of devices.
(*1)
Device Displays the structure of devices in a pie chart. The information for the line
Structure selected in the Number of devices table appears on the pie chart.
pie chart
Number of The following information appears for each item.
devices table [Scope]
(*2), (*3)
Segment groups and segments that can be accessed by the user are
shown. If there is only 1 Segment Group and 1 segment, "All" appears for
[Scope].
[Devices]
The number of devices.
[Increase from last month]
The increase in the number of devices counted this month.
[Decrease from last month]
The decrease in the number of devices counted this month.
The appearance of the Number of devices table switches according to the
following operations.
Clicking a column header
The information is sorted according to the clicked column header.
Clicking a row
The Device Structure pie chart is redrawn using the information.
Clicking or
If "All" is selected, the Segment Groups are expanded/compacted. If a
Segment Group is selected, the segments under the Segment Group are
expanded/compacted.
165
Chapter 7 Chart Installation, Setup and Operations
(2) Printed Pages The amount of printed pages and its trends.
Amount of The three month trend for pages printed and estimation are shown in a bar
Printed Pages graph. The estimated values are calculated based on the average values for the
graph current month.
Amount of The following information appears for each item.
Printed Pages [Scope]
table
Segment groups and segments that can be accessed by the user are
shown. If there is only 1 Segment Group and 1 segment, only "All" appears
for [Scope].
[Pages]
Shows the total amount of printed pages for the printer.
[Difference from last month]
Shows the difference between the amount of printed pages of the previous
month and this month.
[Printers]
Shows the number of printers that printed pages were counted.
The appearance of the Amount of Printed Pages table switches according to the
following operations.
Clicking a column header
The information is sorted according to the clicked column header.
Clicking a row
The Amount of Printed Pages graph is redrawn using the information in that
row.
Clicking or
If "All" is selected, the Segment Groups are expanded/compacted. If a
Segment Group is selected, the segments under the Segment Group are
expanded/compacted.
166
Chapter 7 Chart Installation, Setup and Operations
*1: Devices registered in the Management window are not counted until they have been detected by the
Sensor.
*2: Devices that have been present on the network before the introduction of iNetSec Smart Finder are
counted for the change in number for the month when they are detected.
*3: If a detected device is removed in the month when it was first detected, it is counted both as an
increase of 1 and a decrease of 1 compared to the previous month.
167
Chapter 7 Chart Installation, Setup and Operations
(1) (2)
(5)
(6)
(3)
(4)
168
Chapter 7 Chart Installation, Setup and Operations
(1) Device Structure Displays the structure of the number of devices selected on the Number of devices
pie chart table in a pie chart.
(2) Number of The following information appears for each item.
devices table [Scope]
Segment groups and segments that can be accessed by the user. If there is
only 1 Segment Group and 1 segment, only "All" appears.
[Devices]
The number of devices.
[Increase from last month]
The increase in the number of devices counted this month.
[Decrease from last month]
The decrease in the number of devices counted this month.
The appearance of the table and graph switches according to the following
operations.
Clicking a column header
The information is sorted according to the clicked column header.
Clicking a row
The Device Structure pie chart is redrawn using the information in that row.
Clicking or
If "All" is selected, the Segment Groups are expanded/ compacted. If a
Segment Group is selected, the segments under the Segment Group are
expanded/compacted.
(3) Device The following information appears for the device selected in the Devices table.
Information Last Detected
window
Average Power Consumption
Device Type
MAC Address
MAC Vendor
IP Address
Host Name
NetBIOS Name
Details
Model
OS Type
Vendor
Refer to "Table 7.9 Device Information Window Items".
(4) Devices table Displays the device type, MAC Address, host name and IP address for the devices
in the Segment Group that can be accessed by the user.
The items for the columns can be changed in the Configure Columns window.
The appearance of the table and graph switches according to the following
operations.
Clicking a column header
The information is sorted according to the clicked column header.
Clicking a row
Shows the Device Viewer window for the selected device in the menu display
area.
Double-clicking a row
Shows the Device Information window for the selected device.
169
Chapter 7 Chart Installation, Setup and Operations
(5) Specify search Displays the Filter settings window. The number of devices shown in the Devices
filter table is displayed on the left of the button.
In the Filter settings window, specify the filtering conditions for the devices shown
in the Devices table. When devices are filtered, [Specify search filter] is blue.
Refer to "7.6.6 Filter settings Window".
(6) Configure Displays the Configure Columns window for selecting the column to display in the
columns Devices table.
Refer to "7.6.7 Configure Columns Window".
The following icons are used to indicate the different devices on the Devices table, the Device
Viewer window and Device Information window.
Icon Type
Unclassified
Classifying
Windows
Mac
Linux/UNIX
Routers/Switches
Printers
NAS
Scanners
VoIP Phones
Kiosk Terminals
Mobile Devices
Others
170
Chapter 7 Chart Installation, Setup and Operations
(1) (2)
(3)
(4)
(5)
(6)
(7)
(1) Scope Shows the display range for Segment Groups, segments and printers appearing on
the Amount of Printed Pages table and graph.
The appearance of the table and graph switches according to the following
operations.
Clicking [all]
The display range switches to all Segment Groups that can be accessed by the
user.
Clicking a Segment Group name
The display range switches to the segments in that Segment Group.
(2) Configure Shows the Configure Columns window for selecting the column in the Amount of
columns Printed Pages table.
Refer to "7.6.7 Configure Columns Window".
If devices are not used for the range, button is not displayed.
171
Chapter 7 Chart Installation, Setup and Operations
(3) Period Shows the period for displaying the Amount of Printed Pages table and the Amount of
Printed Pages graph.
(4) [< Monthly Displays the Amount of Printed Pages graph in months. This button can be clicked
view] button only if the graph is currently displayed in days.
(5) Switch The following buttons can be used to switch the appearance of the graph.
buttons [Line Chart]
Displays the Amount of Printed Pages graph as a line chart.
[Stacked Column Chart]
Displays the Amount of Printed Pages graph as a stacked column chart.
(6) Amount of The trend in amount of printed pages for the printer is shown in a graph.
Printed Pages The graph is linked with the Amount of Printed Pages table, with data shown
graph separately for Segment Groups, segments, and printers.
The following appear in the graph legend according to the information in the column
selected on Amount of Printed Pages table.
Segment Group Name
Shown for Segment Groups.
Segment Name
Shown for segments.
Selected column and MAC address
For printers, one of the column names selected via the Choose Display Columns
window and MAC address appear. If any columns other than MAC address, day
and month are not selected, only MAC address appears. If two or more columns
other than MAC address, day and month are selected, the column name on the
top of the [Order] tab appears.
172
Chapter 7 Chart Installation, Setup and Operations
Hint
The Power Consumption graph and Power Consumption table can switch between month
units and day units. The default is a stacked column chart displayed in months. To change
the units from months to days do the following operation:
For a stacked column chart
Click the stacked column chart for the month that you want to display in units of days.
For a line chart
Click the spot that shows the value for the month that you want to display in units of
days.
To reset the units from days to months, click [Monthly view].
To change the units from months to days, click the horizontal date axis on the graph you
want to display in days.
173
Chapter 7 Chart Installation, Setup and Operations
(1)
(3) (2)
(4)
(5)
(6)
(7)
(8)
(1) Scope Shows the information for Segment Groups, segments and devices appearing on the
Power Consumption graph and table.
Click the following items to switch the details that are displayed.
Clicking [all]
The information will be displayed for all the Segment Groups that can be accessed
by the user.
Clicking a Segment Group name
The information will be displayed for the segments in that Segment Group.
(2) Configure Shows the Configure Columns window for selecting the column in the Power
columns Consumption table.
Refer to "7.6.7 Configure Columns Window". If devices are not used for the Scope,
[Configure columns] is not displayed.
(3) Period Shows the period for displaying the Power Consumption graph and the Power
Consumption table.
174
Chapter 7 Chart Installation, Setup and Operations
(4) Switch tabs The following tabs can be used to switch between the Power Consumption window and
the Uptime window.
[Power Consumption] tab
The Power Consumption window appears.
[Uptime] tab
The Uptime window appears.
(5) [< Monthly Displays the Power Consumption graph in units of months. This button can be clicked
view] only if the graph is currently displayed in units of days.
button
(6) Switch The following buttons can be used to change the appearance of the graph.
buttons [Line Chart]
Displays the Power Consumption graph as a line chart.
[Stacked Column Chart]
Displays the Power Consumption graph as a stacked column chart.
(7) Power The trend in power consumption for the device is shown in a graph.
Consumption The graph is linked with the Power Consumption table, with data shown separately for
graph Segment Groups, segments and devices.
The following buttons appear in the graph legend according to the information in the
column selected on the Power Consumption table.
Segment Group Name
Shown for Segment Groups.
Segment Name
Shown for segments.
Selected column and MAC address
For devices, one of the column names selected via the Configure Columns window
and MAC address appear. If any columns other than MAC address, day and month
are not selected, only MAC address appears. If two or more columns other than
MAC address, day and month are selected, the column name on the top of the
[Order] tab appears.
175
Chapter 7 Chart Installation, Setup and Operations
Hint
The Power Consumption graph and Power Consumption table can be switched between
units of months and units of days. The default display is a stacked column chart in units of
months. To change the units from months to days, perform the following operation.
For a stacked column chart
Click the stacked column chart for the month that you want to display in units of days.
For a line chart
Click the spot that shows the value for the month that you want to display in units of
days.
To reset the units from days to months, click [< Monthly view].
To change the units from months to days, click the horizontal date axis on the graph you
want to display in days.
176
Chapter 7 Chart Installation, Setup and Operations
[Procedure]
1. Click [Power Consumption] in the [Details] menu in the main window.
The Power Consumption window appears.
2. If multiple Segment Groups or segments are shown on the Power Consumption table,
click [>] to the left of each Segment Group or segment to display its device type.
3. Click the [Uptime] tab to switch the display.
The Uptime window appears.
(1)
(3) (2)
(4)
(5)
(6)
(7)
(8)
(1) Scope Shows the information for Segment Groups, segments, and devices appearing on the
Uptime graph and table.
Click [all] or a Segment Group name to switch the displayed information to the Power
Consumption window.
(2) Configure Shows the Choose Display Columns window for selecting the column in the Uptime
columns table.
Refer to "7.6.7 Configure Columns Window".
177
Chapter 7 Chart Installation, Setup and Operations
(3) Period Shows the period for displaying the Uptime table and the Uptime graph.
(4) Switch tabs The following tabs can be used to switch between the Power Consumption window
and the Uptime window.
[Power Consumption] tab
The Power Consumption window appears.
[Uptime] tab
The Uptime window appears.
(5) [< Monthly Displays the Uptime graph in units of months. This button can be clicked only if the
view] button graph is currently displayed in units of days.
(6) Switch The following buttons can be used to switch the appearance of the graph.
buttons [Line Chart]
Displays the Uptime graph as a line chart.
[Stacked Column Chart]
Displays the Uptime graph as a stacked column chart
(7) Uptime The trend in uptime for the device is shown in a graph.
graph Uptime is shown for each device.
The following item is displayed in the graph legend, according to the information in the
column selected on the Uptime table.
Selected column and MAC address
For devices, one of the column names selected via the Choose Display Columns
window and MAC address appear. If any columns other than MAC address, day
and month are not selected, only MAC address appears. If two or more columns
other than MAC address, day and month are selected, the column name on the
top of the [Order] tab appears.
(8) Uptime table To display the Uptime table, click [Uptime] while the Power Consumption is shown for
each device on the Power Consumption graph.
The following information appears for each item.
[Type]
The type of device is indicated by an icon.
[Host Name]
The host name of the device.
[IP Address]
The IP address of the device.
[MAC Address]
The MAC address of the device.
[Total]
The total uptime for the displayed device for one year or one month.
[MMM YYYY]
The uptime for the month.
[MMM D]
The uptime for the day.
The following operations can be performed.
Selecting checkboxes
The information for the selected rows are shown in the Uptime graph.
Clicking a column header
The information is sorted according to the clicked column header.
Double-clicking a row
Displays the Device Information window.
178
Chapter 7 Chart Installation, Setup and Operations
Hint
The Uptime graph and Uptime table can switch between units of months and units of
days. The default display is a bar graph in units of months. To change the units from
months to days, perform the following operation.
For a stacked column chart
Click the stacked column chart for the month that you want to display in units of days.
For a line chart
Click the spot that shows the value for the month that you want to display in units of
days.
To reset the units from days to months, click [< Monthly view].
To change the units from months to days, click the horizontal date axis on the graph you
want to display in days.
Attention
Information shown in the Device Information window is from the moment it was obtained
by the Sensors. Therefore, the current conditions of the device might be different from the
actual conditions at the time when the Device Information window is displayed.
179
Chapter 7 Chart Installation, Setup and Operations
(1)
(4)
(5)
(6)
(7)
(8)
(9)
(1) Type Indicated the type of device by an icon. Refer to "Table 7.5 Device Icons".
(2) Registered Date The date and time when the Sensor first detected the device.
(3) Last Detected The date and time when the Sensor last detected the device.
(4) Role The role of the device. One of the following roles is shown. If the device has no role,
"-" is shown.
Manager
Gateway
Registration Form Server
Exception Server
(5) MAC Address The MAC address of the device.
(6) MAC Vendor The vendor indicated by the MAC address of the device.
(7) IP Address The IP address of the device.
(8) Host Name The host name of the device.
(9) NetBIOS Name The NetBIOS name of the device.
(10) Details The details for device types.
(11) Model The model of the device.
(12) OS Type The OS type of the device.
(13) Vendor The vendor of the device.
180
Chapter 7 Chart Installation, Setup and Operations
181
Chapter 7 Chart Installation, Setup and Operations
(25) Printer Status This information is shown only if the device is a printer. One of the following
statuses is shown.
Available
The printer can be used.
Warning
A warning has occurred in the printer.
Low Paper
The printer is low on paper.
Low Toner
The printer is low on toner.
Error
An error has occurred in the printer.
Error (Paper Jam)
Paper has jammed in the printer, causing an error.
Error (No Paper)
The printer has run out of paper, causing an error.
Error (Toner Empty)
The printer has run out of toner, causing an error.
Error (Door Open)
The printer cover is open, causing an error.
Unknown
The printer status cannot be obtained or is unclear.
(26) Total Printed This information is shown only if the device is a printer.
Pages Shows the total number of sheets that have been printed in the printer's lifetime.
(27) Remaining This information is shown only if the device is a printer.
Paper (%) The amount of paper remaining (%) in the printer is shown.
If there is more than one feed tray, this indicates the paper remaining in the tray with
the fewest sheets.
If the number of sheets remaining cannot be obtained from the printer, this field
remains blank.
(28) Remaining This information is shown only if the device is a printer.
Toner (%) The amount of toner remaining (%) in the printer is shown.
If there is more than one toner container, this indicates the amount remaining in the
container with the least toner.
If the information cannot be obtained from the printer, this field remains blank.
(29) Color of Least This information is shown only if the device is a printer.
Toner The color of the toner indicated for Toner Remaining (%) in the printer is shown.
If the information cannot be obtained from the printer, this field remains blank.
182
Chapter 7 Chart Installation, Setup and Operations
(2)
(1)
(3)
(5)
(4) (6)
(1) Select conditions The devices shown in the Devices table are filtered by type.
by device type [Any Type]
All devices are shown.
[Filter with following conditions]
The devices are filtered by placing a checkmark in the appropriate boxes.
If no boxes are selected, all devices are shown.
(2) Text entry fields Specify letters for the following items to filter the devices shown in the Devices
table. If the specified letters are included in the value for an item, devices that
meet those conditions will appear in the list of devices. The fields are not case
sensitive for letters.
[MAC Address]
The MAC addresses of the devices are filtered according to the letters. Use
colons and hyphens as delimiters for MAC addresses, or do not use
delimiters at all.
[IP Address]
The IP addresses of the devices are filtered according to the letters.
[Host Name]
The host names of the devices are filtered according to the letters.
[NetBIOS Name]
The NetBIOS name of the devices are filtered according to the letters.
[Note 1]
Note 1 of the devices is filtered according to the letters.
[Note 2]
Note 2 of the devices is filtered according to the letters.
[Note 3]
Note 3 of the devices is filtered according to the letters.
183
Chapter 7 Chart Installation, Setup and Operations
(3) Scope The devices shown in the Devices table are filtered by the following pull-down
menus.
[Device List]
The list of devices detected by the Sensors is filtered.
[Detected this month]
The list of devices detected by the Sensors this month is filtered.
[Removed this month]
The list of devices deleted this month is filtered.
(4) Clear conditions Clears the filtering conditions that have been set.
Click [OK] to remove all filtering conditions from the Devices table.
(5) OK Applies the settings and closes the window.
(6) Cancel Closes the window without applying the settings.
user, and automatically applied the next time the same user logs in. Click button in one of
the following windows in which the Device List appears to open the Configure Columns window.
Device List Window
Printer Usage Window
Power Consumption Window
Uptime Window
The following describes the operations in the Configure Columns window.
(1)
(2)
(3)
(4)
184
Chapter 7 Chart Installation, Setup and Operations
(1) [Items]/[Order] tabs To select items to display, click the [Items] tab.
To set the display order of items, click the [Order] tab.
(2) Display Column Select the columns to be displayed on the Devices table.
checkboxes
(3) OK Applies the settings and closes the window.
(4) Cancel Closes the window without applying the settings.
(1)
(2)
(3)
(4)
185
Chapter 7 Chart Installation, Setup and Operations
[Procedure]
1. Display the data to be saved into a CSV file in the information display area in the main
window.
2. Arrange the graphs and tables as you want the data to be saved to the CSV file.
3. Select [Output] in the main window and then click [Output to CSV files].
The folder browsing window appears.
4. Select the folder where you want to save the CSV file and then click [OK].
A CSV file is saved in the selected folder.
CSV file names are created with underscores (_) between the information shown below.
Date and time saved (MMDDYYYYhhmmss format)
Fixed words describing the data content
The following example describes the CSV file name and content. "SUMMARY_DEVICE" in the
CSV file name is the fixed part.
SEGMENT_GROUP_NAME,SEGMENT_NAME,DEVICES,
INCREASE_FROM_LAST_MONTH,
DECREASE_FROM_LAST_MONTH
"1_Tokyo_Head_Office",,"381","4","16"
,"Head_Office_Sales","107","1","5"
,"Development1","115","2","4"
,"Development2","100","1","5"
186
Chapter 7 Chart Installation, Setup and Operations
*: If the data in the row indicates a Segment Group, this field might become blank.
*: If the data in the row indicates a Segment Group, this field might become blank.
187
Chapter 7 Chart Installation, Setup and Operations
*: If the data in the row indicates a Segment Group, this field might become blank.
*: If the data in the row indicates a Segment Group, this field might become blank.
188
Chapter 7 Chart Installation, Setup and Operations
189
Chapter 7 Chart Installation, Setup and Operations
190
Chapter 7 Chart Installation, Setup and Operations
* If the device is not a printer, or if it is not set in the Manager, this field remains blank.
The following describes the items and values in a CSV file. The number of columns will vary
according to the content appearing on the Amount of Printed Pages table.
Column
Amount
of Item Content
Segment
Segment Printed
Group
Pages
table
191
Chapter 7 Chart Installation, Setup and Operations
Column
Amount
of Item Content
Segment
Segment Printed
Group
Pages
table
- - 2 to 4 MAC_ADDRESS The MAC address for the device and the value
HOST_NAME for the column selected in the Choose Display
Columns window are displayed.
IP_ADDRESS
Items are sorted according to the order set in
MAC_VENDOR [Configure columns].
NETBIOS_NAME Refer to "Table 7.17 Items in
DETAILS MMDDYYYYhhmmss_DEVICE.csv".
MODEL
OS_TYPE
VENDOR
NOTE1
NOTE2
NOTE3
SERIAL_NUMBER
REGISTRATION_ITEM1
REGISTRATION_ITEM2
REGISTRATION_ITEM3
REGISTRATION_ITEM4
REGISTRATION_ITEM5
*: The start number and end number vary according to the number of items selected.
The following describes the items and values in CSV file. The number of columns will vary
according to the content appearing on the Power Consumption table and the Uptime table.
192
Chapter 7 Chart Installation, Setup and Operations
Column
*: The start number and end number vary according to the number of items selected.
193
Chapter 7 Chart Installation, Setup and Operations
3 to 5 MAC_ADDRESS The MAC address for the device and the value for the column selected
HOST_NAME in the Choose Display Columns window are displayed.
IP_ADDRESS Items are sorted according to the order set in [Configure columns].
MAC_VENDOR Refer to "Table 7.17 Items in MMDDYYYYhhmmss_DEVICE.csv".
NETBIOS_NAME
DETAILS
MODEL
OS_TYPE
VENDOR
NOTE1
NOTE2
NOTE3
SERIAL_NUMBER
REGISTRATION_ITE
M1
REGISTRATION_ITE
M2
REGISTRATION_ITE
M3
REGISTRATION_ITE
M4
REGISTRATION_ITE
M5
6 (*) TOTAL The Total uptime.
7 to 18 MMyyyy yyyy indicates the year.
(*) MM indicates the month (01 to 12).
Columns are displayed for the number of months in a year.
7 to 37 DAY_d d indicates the day (1 to 31).
(*) Columns are displayed for the number of days in a month.
*: The start number and end number vary according to the number of items selected.
194
Chapter 7 Chart Installation, Setup and Operations
You can check the appearance of the data before printing by selecting button and
[Print Preview].
Hint
The data is not printed exactly as it appears in the window. Instead, it is printed according
to the units used in the graphs and tables.
Although you can preview an outline of the content and layout to be printed, you cannot
refer to the page breaks or adjust the printing area.
If there are many rows in the tables shown in the window, printing and previewing will not
be possible. Keep the number of rows in tables in the window to 300 or less. In the
Summary window and the Devices window, keep the total number of rows in all tables to
300 or less.
To print or preview when the number of rows exceeds 300, first save the data into a CSV
file and then view and/or print the CSV file from a spreadsheet application. Refer to "7.7
Saving to a CSV File".
The items displayed for printing and previewing will vary according to the window shown in the
information display area.
However, the following items are always included.
Creation date
Date the print data was created
Data obtained
Date the print data was obtained from the Manager
Title
Title of the printed or previewed data
Summary window
If printing or previewing is performed while the Summary window is open, the following items
are included.
Refer to "7.5 Summary Display".
Device Structure pie chart
Number of Devices table (*)
Amount of Printed Pages graph
Amount of Printed Pages table (*)
Power Consumption graph
Power Consumption table (*)
*: If a table has many rows, printing might require more than one page.
195
Chapter 7 Chart Installation, Setup and Operations
196
Chapter 7 Chart Installation, Setup and Operations
Attention
Specifying more than 10 items for a graph will be difficult to read.
If a large number of items is specified, it will take longer to draw the graph.
Maximum number Specifies the number of items to display on the following graphs:
of items Amount of Printed Pages graph in the Printer Usage window
Power Consumption graph in the Power Consumption window
Uptime graph in the Uptime window
Specify the number of items as one of the following:
10
Displays up to 10 items. 10 is specified by default.
50
Displays up to 50 items. To display more than 10 items, select "50".
OK Applies the settings and closes the window.
Cancel Closes the window without applying the settings.
197
Chapter 7 Chart Installation, Setup and Operations
Time zone information Specify one of the following for time display of device information:
for displaying time Display in Event Viewer Time
Uses the event viewer time specified in the User Information window.
Display in Event Local Time
Displays in the local time of the Sensors or the Manager.
OK Applies the settings and closes the window.
Cancel Closes the window without applying the settings.
198
Chapter 7 Chart Installation, Setup and Operations
The following describes the items in the CSV File Settings window.
UTF-8 coding Select the checkbox to use the UTF-8 character code when saving the data into a
CSV file.
If this checkbox is not selected, a character code that corresponds to the
language of the operating system on the computer where the Charts operate is
used.
OK Applies the settings and closes the window.
Cancel Closes the window without applying the settings.
[Procedure]
1. On the computer from which Chart will be uninstalled, select [Control Panel] and then
[Add or Remove Programs].
2. Select "iNetSec Smart Finder Chart" to remove the application.
Attention
Even after Chart is uninstalled, the following folders and their files remain on your
computer.
Folders created when the application was installed
The following example assumes that Drive C is the system drive and that the default
values were used when installing the application.
C:\Program Files\PFU
Even if no other applications exist inside the "PFU" folder indicated above, that folder
will not be removed when Chart is uninstalled. If the PFU folder is no longer needed,
you can delete it after first making sure there are no important files remaining inside.
199
Chapter 8 Maintenance
Chapter 8
Maintenance
This chapter describes the operations for maintenance of the configured system.
200
Chapter 8 Maintenance
201
Chapter 8 Maintenance
If the above condition is not satisfied, use "8.1.4.1 Using Automatic Inherit to Replace the
Sensor" for performing replacement.
Perform the following operations before replacing the Sensor:
Configure the basic settings for the new Sensor to the same network address and subnet
mask as the Sensor that is to be removed.
For Tagged VLAN configuration, configure the same VLAN ID.
For details about the Sensor basic settings, refer to "3.4.2 Configuring Settings for the Sensor".
Attention
For the Sensor that monitors applications, you must reconnect the cable connected to the
monitoring port of the source Sensor to the destination Sensor. The Sensor starts
Application Monitoring after a warm-up time (90 seconds) to avoid false detections.
Attention
Before performing this operation, use the Customize Configuration command to
enable automatic Sensor inheriting and to confirm that it has been enabled. Refer to
"10.11 Customize Configuration Command (pq_customize_config.exe)".
[Procedure]
1. Remove the Sensor from the segment.
Refer to "9.1.1 Removal of the Sensor".
2. In the Sensors window, confirm that the status of the removed Sensor is "Abnormal", and
then place the new Sensor on the segment.
Attention
After the removal of the Sensor is complete, place the new Sensor on the
segment.
If the Sensor to be removed and the new Sensor are placed in the segment at the
same time, both Sensors will be shown alternately on the [Sensor List] tab on the
Sensors window when the window is updated. If this happens, remove the old
Sensor from the segment.
202
Chapter 8 Maintenance
3. In the Sensors window, confirm that the new Sensor is shown and the segment managed
by the removed Sensor is assigned to the new Sensor. Refer to "4.4 The Sensor
Management".
Hint
The segment information inherited from the removed Sensor to the new Sensor is
shown below.
Segment Group
Sensor Name
Segment Name
Operation Mode
Event Notification of Segment
Application Monitoring mode of Segment
License
Blocking a device using IP addresses out of IP segment
When inheriting is complete, the removed Sensor information is automatically
deleted.
Attention
Use the Customize Configuration command to disable automatic Sensor inheriting
and to check automatic Sensor inheriting has been disabled. Refer to "10.11
Customize Configuration Command (pq_customize_config.exe)".
If the Inherit Sensor command is executed, the network communication might be
blocked. The Inherit Sensor command must be executed when it does not affect
users.
[Procedure]
1. Remove the Sensor from the segment.
Refer to "9.1.1 Removal of the Sensor".
2. In the Sensors window, confirm that the status of the removed Sensor is "Abnormal", and
then place the new Sensor on the segment.
3. In the Sensors window, confirm that the Sensor information for the new Sensor matches
the statuses shown below. Refer to "4.4 The Sensor Management".
Device Information: "Complete"
Application Information: "Complete"
Sensor Information: "Complete"
System Information: "Complete"
Version: Latest version
Operation Status: "Normal"
4. In the Segment Groups window, assign the segment for the removed Sensor and the
segment for the new Sensor to the same Segment Group. Refer to "4.6.2 Adding and
Changing Segment Groups".
203
Chapter 8 Maintenance
5. In the Sensors window, confirm that the device information for the new Sensor is
"Complete".
6. Execute the Inherit Sensor command on the Manager Computer. Refer to "10.10 Inherit
Sensor Command (pq_inherit_sensor.exe)".
7. In the Sensors window, confirm that the new Sensor is shown and the segment managed
by the removed Sensor is assigned to the new Sensor.
Hint
The segment information inherited from the removed Sensor to the new Sensor is
shown below.
Sensor Name
Segment Name
Operation Mode of Segment
Event Notification of Segment
Application Monitoring mode of Segment
License
Blocking of devices out of managed segments
Time zone
8. Delete the removed Sensor from the Sensors window. Refer to "4.4 The Sensor
Management".
204
Chapter 8 Maintenance
Attention
If the Manager Computer is not started over the term specified for [Term] while the
Automatic Removal is enabled, the devices may be determined as missing/disposed
and deleted when the computer is started.
Attention
If the information is not restored, the device information retained by the Manager and the
Sensor is initialized.
If the Manager to communicate with the Sensor is changed during operation, initialize the
Sensor.
Refer to "5.4 Initializing the Sensor".
205
Chapter 8 Maintenance
Depending on the displayed error messages, it may be required to start/stop services manually.
In this case, start/stop the service in the order shown below. For details about the meaning of
error messages and actions, refer to "Chapter 11 Error Messages".
206
Chapter 9 Removal
Chapter 9
Removal
This chapter describes how to remove the Sensor and uninstall the Manager.
207
Chapter 9 Removal
[Procedure]
1. Confirm that the POWER LED on the Sensor lights up green.
2. Press the Power button twice to stop the Sensor.
Refer to "5.3 Stopping the Sensor".
3. After confirming that all LEDs are off, disconnect the power cable and remove the Sensor
from the network.
Attention
Before uninstallation, back up the information retained by the Manager as needed.
Refer to "8.2.2 Backup and Restoration of the Manager".
During uninstallation, the following message may appear: "The following applications
should be closed before continuing the installation:". In this case, stop the services
described in the message and click "Retry" to continue the process.
[Procedure]
1. From [Control Panel] on the Manager Computer, click [Add or Remove Programs].
2. Select "iNetSec Smart Finder Manager" and perform the removal procedure according to
the operating system.
The Ready to uninstall iNetSec Smart Finder Manager window of iNetSec Smart
Finder Manager appears.
208
Chapter 9 Removal
3. Click [Uninstall].
[Procedure]
1. From [Control Panel] on the Manager Computer, click [Add or Remove Program].
2. Select [Microsoft SQL Server 2008 R2] or [Microsoft SQL Server 2008 R2 (64-bit)] (when
using a 64-bit operating system) to start the SQL Server 2008 R2 setup wizard.
3. Select [Remove] in order to uninstall the SQL Server (PFUDACM) instance.
The [Setup Support Rules] dialog box appears.
209
Chapter 9 Removal
4. Click [OK].
The [Select Instance] dialog box appears.
5. Select the PFUDACM instance from the dropdown list of [Instance to remove features
from], and Click [Next].
The [Select Features] dialog box appears.
6. Select [Database Engine Services] under [Features], and click [Next].
The [Removal Rules] dialog box appears.
7. Click [Next].
The [Ready to Remove] dialog box appears.
8. Click [Remove] to uninstall the instance.
When the instance is uninstalled successfully, the [Complete] dialog box appears.
9. Click [Close] to end the setup wizard.
Hint
Uninstalling the SQL Server (PFUDACM) instance will not uninstall "SQL Server
Native Client". Uninstall "SQL Server Native Client" as required.
210
Chapter 10 Commands
Chapter 10
Commands
This chapter describes the commands used to operate the network system using iNetSec Smart
Finder.
Hint
A return value for each command is saved in Windows environmental variable
ERRORLEVEL. To check the return value, refer to the environmental variable
ERRORLEVEL after command
Example:
211
Chapter 10 Commands
Attention
The execution of the Backup command requires Windows administrator privileges.
To specify a folder on the network, assign the network drive in advance so that you can
access it with administrator privileges.
Do not edit the backup file. If a file is restored after edited, normal operation may not be
obtained.
Ensure that the destination disk has sufficient free space before executing the command.
If the space is insufficient, an incomplete file may be created.
Hint
iNetSec Smart Finder Manager Service is not stopped even while the Backup command is
being executed.
If the Backup command failed, only the specified folder is created.
212
Chapter 10 Commands
0
Operation completed normally.
1
Operation terminated abnormally.
Return
3
value Cannot continue the process due to an invalid environment.
5
The specified folder format is incorrect.
6
The command has been already executed.
7
Disk space is insufficient.
8
SQL server is not started.
12
A command argument is incorrect.
If the return value is not "operation completed normally", take actions referring to "11.3
Messages when Commands are Executed".
[Procedure]
1. At the command prompt on the Manager Computer, execute the pq_backup.exe
command.
pq_backup.exe "C:\backup"
The information retained by the Manager is backed up into the C:\backup folder.
213
Chapter 10 Commands
Attention
The execution of the Restore command requires Windows administrator privileges.
To specify a folder on the network, assign the network drive in advance so that you can
access it with administrator privileges.
Do not edit the backup file. If a backup file is restored after edited, normal operation may
not be obtained after restoration.
An encrypted folder cannot be specified for the restoration folder name.
214
Chapter 10 Commands
0
Operation completed normally.
1
Operation terminated abnormally.
If the return value is not "operation completed normally", take actions referring to "11.3
Messages when Commands are Executed".
[Procedure]
1. At the command prompt on the Manager Computer, execute the pq_restore.exe
command.
pq_restore.exe "C:\backup"
The information retained by the Manager is restored from the C:\backup folder.
215
Chapter 10 Commands
Attention
The execution of the Investigate command requires Windows administrator privileges.
To specify a folder on the network, assign the network drive in advance so that you can
access it with administrator privileges.
It may take more than 10 minutes for the command to complete depending on the
execution environment.
An encrypted folder cannot be specified for the destination folder name.
Hint
When the command is executed, SQL server, IIS, and iNetSec Smart Finder Manager in
operation are stopped and then restarted when collection of maintenance information is
completed. However, services that had been stopped before execution of the command
are not restarted.
If the command is executed, the SENSOR LED on the Sensor may be amber. Normally,
the SENSOR LED returns to green during [Sync interval between Manager and Sensor]
after the end of command.
If this command is executed on Windows Server 2008, Windows Server 2008 R2,
Windows Server 2012, or Windows Server 2012 R2, the System Information dialog box
(indicator) appears during collection of system information, which is not a problem. Please
wait without doing anything. If you click [Cancel] in the dialog box, press the "Ctrl+C" keys
to cancel the command and then execute it again.
216
Chapter 10 Commands
0
Operation completed normally.
1
Operation terminated abnormally.
If the return value is not "operation completed normally", take actions referring to "11.3
Messages when Commands are Executed".
[Procedure]
1. At the command prompt on the Manager Computer, execute the pq_investigate.exe
command.
pq_investigate.exe "C:\log"
The maintenance information retained by the Manager is written into the C:\log folder.
217
Chapter 10 Commands
Attention
Executing the Investigate Sensor command requires Windows administrator privileges.
To specify a folder on the network, assign the network drive in advance so that you can
access it with administrator privileges.
If the password for "admin" changes, execute the command after the password is applied
to the Sensor. The command is failed before the password is applied to the Sensor.
Executing multiple instances of this command, may result in an error.
If the MAC address of the Sensor is specified, a time lag occurs until the maintenance
information is stored. If the maintenance information of the Sensor is not stored in the
destination folder 20 minutes after the command is executed, execute the command
again.
Do not change the Sensor Name until Maintenance Information file is stored. If changed,
the maintenance information may be collected multiple times.
An encrypted folder cannot be specified for the destination folder name.
Enter either the IP address or MAC address of the Sensor in the format described below. Both
of the IP address and MAC address cannot be omitted. In an environment such as NAT
environment where the Manager and the Sensor cannot communicate directly, specify the
MAC address of the Sensor.
-d IP address of the Sensor
Specify the IP address of the Sensor whose maintenance information is to be collected (IP
address with the default gateway set) to follow "-d".
MAC address of the Sensor
Argument
Specify the MAC address of the Sensor whose maintenance information is to be collected.
If this argument is specified, the maintenance information is collected after the Manager
and the Sensor are synchronized. As a result, a time lag occurs until the command returns
and the maintenance information is stored in the destination folder.
[Destination folder name]
Specify a folder name to store the collected maintenance information of the Sensor.
If omitted, the maintenance information is stored in "installation folder\Logs". If the
specified folder does not exist, it is created.
218
Chapter 10 Commands
0
Operation completed normally.
1
Failed to access the database.
2
Failed to access the file.
3
Cannot continue the process due to an invalid environment.
5
The specified folder format is incorrect.
7
Disk space is insufficient.
8
SQL server is not started.
Return
12
value A command argument is incorrect.
15
An authentication error occurred.
16
The specified Sensor does not exist.
18
Not supported for the specified Sensor.
19
Failed to access the Sensor.
20
No response from the Sensor.
99
An internal error occurred.
If the return value is not "operation completed normally", take actions referring to "11.3
Messages when Commands are Executed".
[Procedure]
1. At the command prompt on the Manager Computer, execute the
pq_investigate_sensor.exe command.
The maintenance information of the Sensor with the MAC address of 00:11:22:33:44:55 is
written into the C:\log folder. The command initiates the collection of the maintenance
information and returns successfully before it completes. The maintenance information is
not stored until the Sensor maintenance information has been collected and uploaded to
the Manager after the Manager and the Sensor are synchronized.
219
Chapter 10 Commands
Attention
The execution of the Export Device command requires Windows administrator privileges.
To specify a folder on the network, assign the network drive in advance so that you can
access it with administrator privileges.
The CSV file is output by the Export Device command with the UTF-8 code.
220
Chapter 10 Commands
0
Operation completed normally.
1
Operation terminated abnormally.
If the return value is not "operation completed normally", take actions referring to "11.3
Messages when Commands are Executed".
[Procedure]
1. At the command prompt on the Manager Computer, execute the pq_export_device.exe
command.
pq_export_device.exe “C:\deviceList.csv”
The entire device information retained by the Manager is exported to the C:\deviceList.csv
file.
221
Chapter 10 Commands
Attention
The execution of the Import Device command requires Windows administrator privileges.
To specify a folder on the network, assign the network drive in advance so that you can
access it with administrator privileges.
222
Chapter 10 Commands
0
Operation completed normally.
1
Operation terminated abnormally.
If the return value is not "operation completed normally", take actions referring to "11.3
Messages when Commands are Executed".
[Procedure]
1. At the command prompt on the Manager Computer, execute the pq_import_device.exe
command.
pq_import_device.exe "C:\deviceList.csv"
223
Chapter 10 Commands
Attention
The execution of the Export Event Command requires Windows administrator privileges.
To specify a folder on the network, assign the network drive in advance so that you can
access it with administrator privileges.
0
Operation completed normally.
1
Failed to access the database.
2
Failed to access the file.
3
Cannot continue the process due to an invalid environment.
Return
8
value SQL server is not started.
11
The specified file format is incorrect.
12
A command argument is incorrect.
99
An internal error occurred.
If the return value is not "operation completed normally", take actions referring to "11.3
Messages when Commands are Executed".
224
Chapter 10 Commands
[Procedure]
1. At the command prompt on the Manager Computer, execute the pq_export_event.exe
command.
pq_export_event.exe "C:\eventList.csv"
The entire event information retained by the Manager is exported to the C:\eventList.csv
file.
Attention
The execution of the Export Sensor command requires Windows administrator privileges.
To specify a folder on the network, assign the network drive in advance so that you can
access it with administrator privileges.
225
Chapter 10 Commands
0
Operation completed normally.
1
Failed to access the database.
2
Failed to access the file.
3
Cannot continue the process due to an invalid environment.
Return
8
value SQL server is not started.
11
The specified file format is incorrect.
12
A command argument is incorrect.
99
An internal error occurred.
If the return value is not "operation completed normally", take actions referring to "11.3
Messages when Commands are Executed".
[Procedure]
1. At the command prompt on the Manager Computer, execute the pq_export_sensor.exe
command.
pq_export_sensor.exe "C:\sensor_list.csv"
The entire event information retained by the Manager is exported to the C:\sensor_list.csv
file.
226
Chapter 10 Commands
Attention
The execution of the Control Sensor command requires Windows administrator privileges.
0
Operation completed normally.
1
Failed to access the database.
3
Cannot continue the process due to an invalid environment.
8
SQL server is not started.
Return
12
value A command argument is incorrect.
16
The specified Sensor does not exist.
18
Not supported for the specified Sensor.
99
An internal error occurred.
If the return value is not "operation completed normally", take actions referring to "11.3
Messages when Commands are Executed".
227
Chapter 10 Commands
[Procedure]
1. At the command prompt on the Manager Computer, execute the pq_controll_sensor.exe
command.
pq_control_sensor.exe -s -m 00:11:22:33:44:55
The Sensor (MAC address: 00:11:22:33:44:55) stops. After the stop, the Sensor will not
automatically restart even if power is supplied. To restart the Sensor, press the Power
button on the Sensor.
Attention
The execution of the Inherit Sensor command requires Windows administrator privileges.
Before executing the Inherit Sensor command, make sure that the original Sensor and
destination Sensor are registered to the Manager and belong to the same Segment
Group.
The original Sensor and destination Sensor cannot have the same MAC address.
228
Chapter 10 Commands
0
Operation completed normally.
1
Failed to access the database.
3
Cannot continue the process due to an invalid environment.
8
SQL server is not started.
Return 12
value A command argument is incorrect.
16
Cannot find the Sensor with the specified MAC address.
Detected information has the different Sensor/segment configurations. Execute the
command again.
99
An internal error occurred.
If the return value is not "operation completed normally", take actions referring to "11.3
Messages when Commands are Executed".
229
Chapter 10 Commands
[Procedure]
1. At the command prompt on the Manager Computer, execute the pq_inherit_sensor.exe
command.
230
Chapter 10 Commands
Attention
Administrator privileges are required to execute the Customize Configuration command.
When the command is executed, the IIS and iNetSec Smart Finder Manager services are
rebooted.
Do not enable Auto Inherit for the Sensor if iNetSec Smart Finder manages the IP
segments that has the same network address.
-p
This argument shows the details for settings that have been updated from the default
values.
-p AutoInheritSensorSetting
Argument This argument shows the auto inherit details for the Sensors.
-s AutoInheritSensorSetting 1
This argument enables auto inherit for the Sensors.
-s AutoInheritSensorSetting 0
This argument disables auto inherit for the Sensors. (default value)
0
Operation completed normally.
1
Failed to access the database.
3
Cannot continue the process due to an invalid environment.
Return
8
value SQL server is not started.
12
A command argument is incorrect.
99
An internal error occurred.
If the return value is not "operation completed normally", take actions referring to "11.3
Messages when Commands are Executed".
231
Chapter 10 Commands
[Procedure]
Changing configuration
1. Execute the pq_customize_config.exe command at the command prompt on the Manager
Computer. (The specified values will be set, even if they are the same as the current
values.)
pq_customize_config.exe -s AutoInheritSensorSetting 1
pq_customize_config.exe -p
If the command completes successfully, the items and values that have been changed are
shown in the following format:
AutoInheritSensorSetting 1
pq_customize_config.exe -p AutoInheritSensorSetting
If the command completes successfully, the items and values are shown in the following
format:
AutoInheritSensorSetting 1
232
Chapter 11 Error Messages
Chapter 11
Error Messages
This chapter describes the error messages in the Manager, the computers that access the
Manager and Chart and how to check messages.
233
Chapter 11 Error Messages
Log type
Application
Event source
iNetSec Smart Finder Manager (Command)
Event log opened by executing a Manager command
iNetSec Smart Finder Manager (Console)
Event log opened by operations in the Management window
iNetSec Smart Finder Manager (Service)
Event log opened by a Manager service
iNetSec Smart Finder Manager (Viewer)
Event log opened by operating Chart
iNetSec Smart Finder Manager
Shared event log for the above 4 event sources
11001 Detected Devices exceeded system limit. Indicates that the number of devices managed by
the Manager has exceeded the limit (10,000
devices).
The Manager could not manage the devices
detected after the limit was reached.
Checks the Devices window and deletes
unnecessary devices.
11002 Registered Sensors exceeded system limit. Indicates that the number of the Sensors managed
by the Manager has exceeded the limit (100
Sensors).
The Manager could not manage the Sensors
installed after the limit was reached.
Check the Sensors window and delete any
unnecessary Sensors.
11003 Default value is used instead of using Obtain the maintenance information for the
invalid specified value. Parameter: Manager and contact our support representative.
parameter Specified: <specified value>
Default: <default value>
11004 Sending E-mail might be failed. [Sensor Indicates that an error might have occurred when
Name : <Sensor Name> Sensor IP : <IP attempting to send an e-mail. Check if the e-mail
Address> Error Position : <number> Error was actually received. Check the e-mail processing
Code : <number> Event ID : <Event ID> time for the SMTP server. If the processing time is
Details : <error details>] too long, either tune the SMTP server or adjust the
timeout in the E-mail settings.
234
Chapter 11 Error Messages
11005 Segments on this system exceeded system Indicates that the number of segments managed by
limit. the Manager has exceeded the limit (250
segments).
The Manager could not manage the segment
added after the limit was reached.
Reduce the number of segments managed by
iNetSec Smart Finder.
12004 Operation was aborted due to invalid Check if the required services start when the
environment. Details : <error details> Manager processes are executed.
12005 Failed to access the database. Detail : error Check that the SQL Server service has started.
details
12006 Failed to backup database. Details : Indicates the failure to back up when using the
<details message> Backup command.
Check the Details message and perform the
appropriate action. Refer to "11.3 Messages when
Commands are Executed".
12009 Failed to send E-mail. [Sensor Name : Indicates that an error occurred when attempting to
<name> Sensor IP Address : <IP Address> send an e-mail. Check the e-mail processing time
Error Position : <number> Error Code : for the SMTP server. If the processing time is too
<number> Event ID : <event ID> Details : long, either tune the SMTP server or adjust the
<details message>] timeout setting in the E-mail settings.
12010 An error has occurred. Error Type :error Obtain the maintenance information for the
type Details :<error details> Manager, and contact our support representative.
12011 Failed to collect Maintenance Information. Check the following, and then execute the
Detail : <error details> Investigate Sensor command again.
Access privileges for the specified folder
Available disk space
235
Chapter 11 Error Messages
Hint
The Sensor IP address indicates one of the following cases in the event message:
The IP address assigned to the Sensor which belongs to the IP segment where the
event was detected.
The Sensor LAN 0 IP address.
The IP address with the smallest VLAN ID.
Events related to Behavioral IPS (Malware Detection) can be searched for with the
keyword "Malware".
0A010001 The Sensor has been added. Indicates that the new Sensor has been added
[Sensor MAC Address : <MAC Address>] into the Sensors window.
The event is displayed when:
The new Sensor connects to the Manager
The Sensor is initialized and then connects
to the Manager
The firmware in the Sensor is replaced with
an older version and then the Sensor
connects to the Manager
0A010002 Scheduled Manager Process has been Indicates that the scheduled Manager process
executed. was executed normally.
0A010003 The Segment has been added. Indicates that a new segment has been added to
[Sensor Name : <Sensor Name> the Sensors window. Sensor IP addresses of the
Sensor IP Address : <IP Address>] added segment are displayed, separated by
commas.
0A020003 Device Registration Request has been Indicates that a registration form has been
submitted. received from the Registration window. Perform
[Device MAC Address : <MAC Address> the registration approval process from the
Device IP Address : <IP Address>] Devices window.
236
Chapter 11 Error Messages
0A020009 The device status was automatically Indicates that administrator operations cause the
changed. approval status, Application Monitoring, or
[Device MAC Address : <MAC Address> Behavioral IPS (Malware Detection) of the device
Device IP Address : <IP Address> to be changed automatically.
Change Type : <Role|Device Type|OS The reasons for the changes are as follows:
Type|Vendor ID|IP Address>
Approval Status after Change : <Approval [Role], [Device Type], [OS Type], [Vendor ID], [IP
Status> Address]
Application Monitoring after Change :
<Application Monitoring>
Behavioral IPS (Malware Detection) after
Change : <Behavioral IPS (Malware
Detection)>]
0A020016 Application status was automatically Indicates that administrator operations cause the
changed. application status to be changed automatically.
[Application ID : <Application ID> The reason for the change can be one of the
Application Name : <Application Name> following:
Reason : <Category|Dictionary Entry>
Permission/Prohibition Policy after Category|Dictionary Entry
Change : <Permitted|Prohibited>]
0A040002 The malware-detected status was cleared Indicates that an administrator cleared the
upon request of the administrator. malware-detected status in the Management
[MAC Address : <MAC Address> window. No action is required.
IP Address : <IP Address>
Administrator User Name: <User Name>]
0B020001 A new Device has been detected. Indicates that a device, for which no device
[Device MAC Address : <MAC Address> information exists in the Manager, has accessed
Device IP Address : <IP Address> to the network.
Detected Sensor Name : <Sensor Name>
Detected Sensor IP Address :
<IP Address>]
0B020002 A Rejected Device has been detected. Indicates that a new device with "Rejected" has
[Device MAC Address : <MAC Address> accessed to the network. This notification is sent
Device IP Address : <IP Address> once a day in the same segment when a
Detected Sensor Name : <Sensor Name> connection is first made.
Detected Sensor IP Address :
<IP Address>]
0B020003 Device Registration Request has been Indicates a registration form has been received
submitted. from the Blocking Notification (New Device)
[Device MAC Address : <MAC Address> window . Perform the registration approval
Device IP Address : <IP Address>] process from the Devices window.
0B020004 Blocked a Device from network. Indicates that the Sensor blocked a device with
[Device MAC Address : <MAC Address> approval status "Detected" or "Requested", or a
Device IP Address : <IP Address> device which uses a prohibited application. This
Approval Status : <Approval Status> notification is sent once a day after a connection
Detected Sensor Name : <Sensor Name> is first made. However, if the segment has been
Detected Sensor IP Address : moved, the notification is sent as a different
<IP Address>] event.
0B020005 Detected changing of IP Address of the Notification is sent if the IP address of the device
Device. is changed.
[Device MAC Address : <MAC Address>
Old Device IP Address : <IP Address>
New Device IP Address : <IP Address>
Detected Sensor Name : <Sensor Name>
Detected Sensor IP Address :
<IP Address>]
237
Chapter 11 Error Messages
0B020007 Blocked an out of Segment IP Address Indicates that a device with an IP address that is
Device. different from the one for the managed segment
[Device MAC Address : <MAC Address> has connected to the Manager. This notification is
Device IP Address : <IP Address> sent once a day after a connection is first made.
Detected Sensor Name : <Sensor Name> However, if the segment has been moved, the
Detected Sensor IP Address : notification is sent as a different event.
<IP Address>]
0B020008 A Device using Unauthorized IP Address Indicates that a device with an unauthorized IP
was detected. address has connected to the Manager. This
[Device MAC Address : <MAC Address> notification is sent once a day after a connection
Device IP Address : <IP Address> is first made and when the IP address is
Detected Sensor Name : <Sensor Name> changed. However, if the segment has been
Detected Sensor IP Address : moved, the notification is sent as a different
<IP Address>] event.
0B020009 The device status was automatically Indicates that the approval status, the Application
changed. Monitoring mode, or the Behavioral IPS (Malware
[Device MAC Address: <MAC Address> Detection) mode of the device has been
Device IP Address : <IP Address> automatically changed. The reason for the
Change Type : <Role|Device Type|OS change can be that one of the following
Type|Vendor ID|IP Address> information has been modified:
Approval Status after Change : <Approval [Role]
Status>
Application Monitoring after Change: [Device Type]
<Application Monitoring> [OS Type]
Behavioral IPS (Malware Detection) after
Change : <Behavioral IPS (Malware [Vendor ID]
Detection) > [IP Address]
Detection Sensor Name : <Sensor Name>
Detection IP Address : <IP Address>]
0B020013 Prohibited application detected. Indicates that the use of a prohibited application
[Device MAC Address : <MAC Address> by the device managed by Sensor has been
Device IP Address : <IP Address> detected. If the Application Monitoring function is
Device Application Monitoring : used in [Monitor & Block] mode, the device is
<Application Monitoring> blocked until an unblocking request is complete.
Detection Sensor Name : <Sensor Name>
Detection Sensor IP Address :
<Sensor IP>
Detection Application Monitoring Mode :
<Application Monitoring Mode>
Application ID : <Application ID>
Application Name : <Application Name>]
0B020014 Unblocking prohibited applications for the Indicates that unblocking has been requested
device requested. from the device that was blocked because the
[Device MAC Address : <MAC Address> use of a prohibited application was detected. If no
Device IP Address : <IP Address> other prohibited application was detected, the
Detection Sensor Name : <Sensor Name> device is unblocked immediately.
Detection Sensor IP Address : <Sensor
IP> Application ID : <Application ID>
Application Name : <Application Name>]
0B020015 New application detected, permission/ Indicates that a new application that had never
prohibition policy configured. been detected before was detected and the
[Permission/prohibition policy : policy for the application has been changed
<Permitted|Prohibited> according to the settings.
Application ID : <Application ID>
Application name : <Application Name>
Detection Sensor IP address : <IP
Address>]
0B030001 Registration requested. Indicates that a registration form has been
[Device MAC Address : <MAC Address> received from the Blocking Notification window.
Device IP Address : <IP Address>] Perform the registration approval process from
the Devices window.
238
Chapter 11 Error Messages
0B040001 Malware behavior was detected on (*) The information that is output as trail log is as
devices on the network. follows:
[MAC Address : <MAC Address> Type =RAT-Spying | RAT-Infecting
IP Address : <IP Address>
Behavioral IPS (Malware Detection) : C&C Server =<IP Address>
<Behavioral IPS (Malware Detection)> Target =<IP Address>
Detection Sensor Name : <Sensor Name> User Account =<User Account>
Detection Sensor IP Address : <IP
File =<File Name>
Address>
Behavioral IPS (Malware Detection) of User Account is recorded in the "Windows
Detection Sensor : <Behavioral IPS Domain Name (or Work Group Name)\User
(Malware Detection)> Name" format.
Audit Trail : <Trail Log> Files that are operated on a device are stored in
File Name. For example, PSEXESVC.EXE
indicates that the PsExec tool has been used.
The letters that are extracted from the
transmitting packets and then displayed in User
Account and File Name are interpreted as
UNICODE (UCS-2) letters when SMB protocol
version 2 or 3 is used. SMB protocol version 1
interprets letters as UNICODE or CP932
according to the UNICODE bit of the protocol.
Event logs/E-mail notifications/SNMP Trap
reports on the Manager are converted to UTF-8
before notification is sent. Therefore, letters that
cannot be converted because of the character
code may not be displayed correctly.
Indicates that malware behavior was detected on
devices on the network.
Remove malware from the device that may be
infected.
1A011001 Detected Devices exceeded system limit. Indicates that the number of devices managed
by the Manager has exceeded the limit (10,000
devices) and that any device information that
was added after the limit was reached is not
managed.
Check the Devices window, and delete
unnecessary device information such as for
devices that have not connected for a long time.
1A011002 Registered Sensors exceeded system Indicates that the number of the Sensors
limit. managed by the Manager has exceeded the limit
(100 Sensors).
The Manager could not manage the Sensors
installed after the limit was reached.
Check the Sensors window, and delete any
unnecessary Sensors.
1A011004 Scheduled Manager Process has failed. Indicates that an error occurred during the
[Detail : <details message>] scheduled Manager process and that the
process was not executed normally.
Check the Details message and perform the
appropriate action.
After performing the appropriate action, restart
the Manager and the scheduled process will be
executed.
239
Chapter 11 Error Messages
1A011005 Segments on this system exceeded Indicates that the number of segments managed
system limit. by the Manager has exceeded the limit (250
segments).
The Manager could not manage the segment
added after the limit was reached.
Reduce the number of segments managed by
iNetSec Smart Finder.
1A011007 Sending E-mail might be failed. [Sensor Indicates that an error occurred while sending an
Name : <sensor name> e-mail and that the e-mail might not have been
Sensor IP Address : <IP Address> sent. Check the Event ID and Details message
Error Position : <number> and perform the appropriate action.
Error Code : <number>
Event ID : <event ID>
Details : <details message>]
1B011003 Detected Devices exceeded system limit Indicated when the number of managed devices
on Sensor. for all segments managed by one Sensor
[Sensor Name : <Sensor Name> exceeds the number supported by the Sensor
Sensor IP Address : <IP Address>] (3,000).
Notification is sent when the number of devices
detected exceeds the number of devices
supported.
Check the Devices window and delete
unnecessary devices.
1B011004 Detected devices exceeded system limit Indicates that the number of devices managed
on Sensor. by the Manager has exceeded the limit (10,000
devices).
The Manager could not manage the devices
detected after the limit was reached.
Checks the Devices window and deletes
unnecessary devices.
1B011006 Concurrent blocked Devices exceeded The number of connections blocked by the
system limit on Sensor. Sensor exceeds the allowable number of
[Sensor Name : <Sensor Name> connections (the number of simultaneously
Sensor IP Address : <IP Address>] blocked connections: 18,000).
The Sensor could not block the connections.
Reconfigure the network to reduce the number
of devices.
This notification is sent once a day when a
connection is first made.
1B011007 Sending E-mail might be failed. Indicates that an error occurred while sending an
[Sensor Name : <Sensor Name> e-mail and that the e-mail might not have been
Sensor IP Address : <IP Address> sent. Check the Event ID and Details message,
Error Position : <number> and perform the appropriate action. The e-mail is
Error Code : <number> not re-sent.
Event ID : <Event ID>
Details : <details message>]
1B011008 Detected printers exceeded system limit Indicates that the number of printers in the
on Sensor. appropriate Sensor managed by the Manager
[Sensor Name : <Sensor Name> has exceeded the limit (500 devices).
Sensor IP Address : <IP Address>] The Sensor could not manage newly detected
printers.
Check the Devices window and delete
unnecessary printers.
240
Chapter 11 Error Messages
1B011009 Detected Devices exceeded system limit Indicates that the number of managed devices
on Sensor. (based on the number of IP addresses) for all
[Sensor Name : <Sensor Name> segments managed by one Sensor exceeds the
Sensor IP Address : <IP Address>] number supported by the Sensor (3,000).
Notification is sent when accesses concentrate
on one or more devices and the number of IP
addresses related to the devices exceeds the
number of devices supported.
Check usage for each segment and adjust the
network configuration so that the access (such
as IP scans) to the devices are not concentrated
in a short period of time.
1B011010 Stored Events exceeded system limit on Indicates that the event information stored in the
Sensor. Sensors exceeds the limit (10,000) and the
[Sensor Name : <Sensor Name> event information generated by the Sensor
Sensor IP Address : <IP Address>] cannot be sent in one or more of the following
methods: to the Manager, by e-mail or by SNMP
trap.
Check if the Manager starts up normally and if
the applicable Sensors are normal. Check if
communication path between the Sensor and
the SMNP server does not have any trouble and
they can communicate with each other.
1B011014 Failed to resolve Host name. Indicates that FQDN resolution failed. Check the
[Sensor Name : <Sensor Name> following:
Sensor IP Address : <IP Address>] Network status between the Sensor and
DNS server
If the FQDN is correct
If the DNS server is properly configured
1B011017 Unsent application statistics discarded. Indicates that the statistical information of an
[Initial failure time : <MMDDYYYY application that is sent to the Manager every 15
hh:mm:ss tt ±hh:mm> minutes has been discarded because the
Count : <Number of Failed Times> information could not be sent and had exceeded
Sensor Name : <Sensor Name> the limit of the amount that Sensor could hold.
Sensor IP Address : <IP Address>] Check the operation status of the network and
the Manager because communication between
the Sensor and the Manager might have been
disabled for some time.
2A012002 Sensor failure has occurred. (Manager Indicates that communication is not possible
detected). between the Manager and the Sensors.
[Sensor Name : <Sensor Name> Check the power supply of the Sensors and the
Sensor IP Address : <IP Address>] status of the network between the Manager and
the Sensors. If there are no problems, restart
the Sensors.
2A012006 Backup failed. Indicates the failure to back up when using the
[Detail: <details message>] Backup command.
If this event occurs repeatedly, contact our
technical support.
241
Chapter 11 Error Messages
2A012007 iNetSec Smart Finder Manager Service is Indicates that a service that executes the
terminated in unexpected condition Manager processes ended due to an error, and
communication between the Manager and the
Sensors is not possible.
Restart the Manager service and the Manager
Computer. If the error continues even after
restarting the Manager service and the
Manager Computer, contact our technical
support.
2A012009 Failed to send E-mail. Indicates that an error occurred while sending
[Sensor Name : <Sensor Name> an e-mail and that the e-mail was not sent.
Sensor IP Address : <IP Address> Check the Event ID and Details message and
Error Position : <number> perform the appropriate action.
Error Code : <number>
Event ID : <Event ID>
Details : <details message>]
2A012010 Failed to collect Maintenance Information. Indicates that the collection of maintenance
[Detail : <details message>] information failed. This could be due to any of
the following possibilities:
The Sensor stopped working
No communication between the Sensor
and the Manager
The Sensor was restarted
Check the connection between the Sensors and
the Manager.
2A012015 Failed to access the target mail server or Indicates that the target mail server cannot be
failed to receive an e-mail message with the accessed or an e-mail message with the target
target e-mail account. e-mail account cannot be received.
[POP3 Server: IP Address or FQDN Check that the mail server is running or the
User name : User Name] settings such as a user name or password is
correct.
2B012001 Sensor detects errors or generates events. Indicates the Sensor error or an event detected
(Sensor self check) by the Sensor. Refer to "11.7 Detail Codes for
[Sensor Name : <Sensor Name> Sensor Self Checks" and perform the
Sensor IP Address : <IP Address> necessary remedies according to the detail
Details : <code>] codes.
2B012003 Sensor failure has occurred. (Sensor Indicates the Sensor error by Sensor to Sensor
(*) detected). Status Monitoring.
[sensor name : <sensor name> The following might occur in the Sensor in
sensor IP address : <IP address>] which error occurred:
The Sensor stopped working.
The Sensor cannot communicate in the
network with the Sensor.
The Sensor is restating.
Check the following
Check the power supply to the Sensors.
Check the status of the network between
the Sensors.
2B012009 Failed to send E-mail. Indicates that an error occurred while sending
[Sensor Name : <Sensor Name> an e-mail. Check the Event ID and Details
Sensor IP Address : <IP Address> message and perform the appropriate action.
Error Position : <number>
Error Code : <number>
Event ID : <Event ID>
Details : <details message>]
242
Chapter 11 Error Messages
2B012012 Registered Servers exceeded system limit Indicates that the number of servers that can be
on Sensor. set for the Sensor exceeded the maximum
[Sensor Name : <Sensor Name> number and that the mode has changed to
Sensor IP Address : <IP Address> Monitoring Mode. Check the following settings
Detail Code : <code> and decrease the number of servers.
Detail : <details message>] Check the DNS server settings.
Check the following server settings:
External Registration Form Server
Exception Server
To confirm that this event has recovered, check
if the same event with the detail code 0 occurs.
2B012014 Dictionary error detected. Indicates that the process of loading a
[Sensor Name:<Sensor Name> dictionary to Sensor failed. The status is
Sensor IP Address:<IP Address> indicated by the following codes.
Detail Code:<Detail Code> 0: Failed to load the Device Dictionary.
Detail Message:<Detail Message>]
1: Failed to load the Application Dictionary.
2: Failed to read the Application Dictionary.
Whatever the case may be, either the Device
Dictionary is broken or the file system of the
Sensor has errors. Use another dictionary
version, initialize the Sensor, or replace the
Sensor.
*: Sensor to Sensor Status Monitoring monitors the Sensors on the same Segment Group in order. Therefore, if
the monitoring of the Sensor fails, both of the following notifications might be sent:
SNMP trap with notification of the Sensor error for the target Sensor
SNMP trap for the Sensor error generated because monitoring of the Sensor following the target
Sensor failed
Hint
If the Sensor cannot communicate with the Manager, no notification is sent when the
second digit of an event ID is "B". However, note that notification is sent for the events
with an event ID of 0B020001, 0B020003, or 1B011010 after the Sensor can
communicate with the Manager.
243
Chapter 11 Error Messages
Operation is aborted due to invalid The command process cannot be executed, either because
environment the environment of the Manager Computer is inadequate or
because the user does not have administrator privileges.
Execute the command with administrator privileges on a
computer with the Manager installed correctly.
Please specify the folder. The folder name specified in the parameter in the Restore
command and the Investigate command does not exist.
Specify the correct file name and execute the command
again.
Backup file content is incorrect or corrupted. The data in the backup folder specified in the command
parameter is not a backup file on the Manager.
Specify the folder name where the file is saved in the Manager
and execute the command again
Specified folder is not correct. This error message is reported in the following situations.
If the user does not have access privileges for the folder
specified in the parameters.
If the specified folder name is 231 bytes or greater.
If the folder is not saved with the Backup command during
the restore operation,
check the specified folder, and execute the command
again.
Backup failed. The database files used by the Manager are possibly being
accessed by functions other than the Manager.
Cancel the viewing of database files used by the Manager and
execute the command again.
Restore failed. Restore process failed. The system will returns to the status
before the restore operation was performed.
If this message is reported, check if there is a backup file that
was created by the Backup command. Execute the Restore
command again.
Backup or restore process is in progress The Backup or Restore command is currently being executed.
Wait until the current backup or restore process is complete.
Backup failed due to insufficient disk space. There is insufficient disk space available to execute this
command.
Restore failed due to insufficient disk space.
Check the available disk space and execute the command
again.
244
Chapter 11 Error Messages
SQL Server is not running. The SQL server service is not running.
Start the SQL server service and then execute the command
again.
Failed to collect information. An error occurred while collecting information.
Check the following and then execute the command again or
simply use only the information that was collected
successfully.
No access privileges for the specified folder
Failed to write to folder due to insufficient free disk space
Commands executed simultaneously from multiple
command prompts
Do not execute multiple instances of this command
Invalid parameters are specified. A specified parameter is incorrect.
Refer to "Chapter 10 Commands", check the command
parameters and then execute the command again.
Specified file is not found. The file name specified in the parameter for the Import Device
command either does not exist or the user does not have
access privileges for that file.
Specify a file name for which the user has access privileges
and execute the command again.
Specified file is not correct This error message is reported in the following situations.
If the user does not have access privileges for the folder
that contains the file specified in the parameters.
If the folder path for the file specified in the parameters
does not exist.
If the specified folder name (for a relative path, after it has
been converted to an absolute path) is 229 bytes or
greater. Specify a short folder path, and execute the
command again.
If characters that cannot be used in a folder name have
been specified, such as ", <, >, |.
Change the file name and execute the command again.
Check the specified file and execute the command again.
Invalid import file format at line n The file format on the target line of the import device
information file is not correct.
Refer to "A.1 Device Information File Format", check the
format of the import file and then execute the command again.
Failed to import Device Information. An error occurred when device information was imported. This
error occurs in the following situations.
If the same MAC address is specified multiple times in the
import file
If the number of managed devices exceeds the limit due
to importing
If connection to the database failed
Check the import file, and execute the command again.
Failed to export Device Information. An error occurred when device information was exported. This
error occurs in the following situations.
If the user does not have access privileges for the file
specified in the parameters
If connection to the database failed
Check the specified file, and execute the command again.
245
Chapter 11 Error Messages
Failed to export Sensor Information. An error occurred when Sensor information was exported.
This error occurs in the following situations.
If the user does not have access privileges for the file
specified in the parameters
If connection to the database failed
Check the specified file, and execute the command again.
Failed to export Event information An error occurred when event information was exported. This
error occurs in the following situations.
If the user does not have access privileges for the file
specified in the parameters
If connection to the database failed
Check the specified file, and execute the command again.
Failed to control Sensor. An error occurred in Sensor control. This error occurs in the
following situations.
If the format of the specified MAC address is not correct
If connection to the database failed
Check the MAC address specified in the argument, and
execute the command again.
Sensors specified with this command don't There are no matching segment configurations between the
have same network address and same net original and destination Sensors specified in the command
mask. Please check the network address and parameters.
net mask on both Sensors. Align the network addresses and associated Segment Groups
between the original Sensors and destination Sensors, and
then execute the command again.
The Sensor specified by MAC address is not The original Sensor or destination Sensor specified in the
registered command parameters is not registered in the Manager.
Register the original Sensor and destination Sensor in the
Manager, and then execute the command again.
Failed to transfer Sensor Information. An error occurred when inheriting between the Sensors. This
error occurs when connection with the database fails.
Check the operation environment, and execute the command
again.
An error occurred during verification process The command was canceled due to detection of a segment
for transferred Sensor/Segment Information. configuration that differs from the inherited details. Check the
Please try to execute this command again. original Sensor and destination Sensor specified in the
parameters, and then execute the command again.
246
Chapter 11 Error Messages
Hint
The Sensor IP address indicates one of the following in the event message:
The IP address assigned to the Sensor which belongs to the IP segment where
the event was detected
The Sensor LAN 0 IP address
The IP address with the smallest VLAN ID
247
Chapter 11 Error Messages
Automatic Change to Title <iNetSec Smart Finder> Automatic Change of the Approval Status/
the Device Application Monitoring/Behavioral IPS (Malware Detection) of the
(in the Manager) Device
Text Event ID: 0A020009
The device status was automatically changed.
IP Address: IPAddress
MAC Address: MACAddress
Reason: Reason
Approval Status after Change: ApprovalStatus
Application Monitoring after Change: Mode
Behavioral IPS (Malware Detection) after Change: Mode
Automatic Change to Title <iNetSec Smart Finder> Automatic Change of the Approval Status/
the Device Application Monitoring/Behavioral IPS (Malware Detection) of the
(in the Sensor) Device
Text Event ID: 0B020009
The device status was automatically changed.
IP Address: IPAddress
MAC Address: MACAddress
Reason: Reason
Approval Status after Change: ApprovalStatus
Application Monitoring after Change: Mode
Behavioral IPS (Malware Detection) after Change: Mode
Detection Sensor Name: SensorName
Detection Sensor IP Address: IPAddress
Automatic Change to Title <iNetSec Smart Finder> Automatic Change to the Application Status
the Application
Text Event ID: 0A020016
Application status was automatically changed.
Application ID: ApplicationID
Application Name: ApplicationName
Reason: Reason
Status After Change: Status
248
Chapter 11 Error Messages
Behavioral IPS Title <iNetSec Smart Finder> Behavioral IPS (Malware Detection)
(Malware Detection)
Text Event ID: 0B040001
Malware behavior was detected on devices on the network.
MAC Address: MACAddress
IP Address: IPAddress
Behavioral IPS (Malware Detection) of the Device: Mode
Detection Sensor Name: SensorName
Detection Sensor IP Address: IPAddress
Behavioral IPS (Malware Detection) of the Detection Sensor: Mode
Audit Trail: Trail Log (*)
249
Chapter 11 Error Messages
250
Chapter 11 Error Messages
251
Chapter 11 Error Messages
Automatic Change of Title <iNetSec Smart Finder> Automatic Change of the Approval Status/
the Approval Status/ Application Monitoring of the Device
Application
Monitoring of the Text Event ID: 0B020009
Device The approval status or monitoring settings of the device was
automatically changed.
IP Address: IPAddress
MAC Address: MACAddress
Change Type: Role/Device Type/Vendor ID/IP Address
Approval Status after Change: ApprovalStatus
Application Monitoring after Change: ApplicationMonitoringMode
Detection Sensor Name: SensorName
Detection Sensor IP Address: IPAddress
Prohibited Title <iNetSec Smart Finder> Detection of Prohibited Application
Application Detection
Text Event ID: 0B020013
A prohibited application was detected.
IP Address: IPAddress
MAC Address: MACAddress
Application Monitoring: ApplicationMonitoringMode
Application ID: ApplicationID
Application Name: ApplicationName
Detection Sensor Name: SensorName
Detection Sensor IP Address: IPAddress
Detection Sensor Application Monitoring Mode: Disabled/Monitor Only/
Monitor & Block
Unblocking Request Title <iNetSec Smart Finder> Unblocking Prohibited Applications Request
for Prohibited for the Device
Applications
Text Event ID:0B020014
Unblocking prohibited applications for the device was requested.
IP Address: IPAddress
MAC Address: MACAddress
Application ID: ApplicationID
Application Name: ApplicationName
Detection Sensor Name: SensorName
Detection Sensor IP Address: IPAddress
Detection of a New Title <iNetSec Smart Finder> Detection of a New Application
Application
Text Event ID: 0B020015
A new application was detected and a permission/prohibition policy
was configured.
Application ID: ApplicationID
Application Name: ApplicationName
Permission/Prohibition Policy: Permitted/Prohibited
252
Chapter 11 Error Messages
Max. number of Title <iNetSec Smart Finder> Excess of Registered Devices for the Sensor
devices exceeded
(inside Sensor) Text Event ID: 1B011003
Registered devices has exceeded system limit on the Sensor.
The Sensor may not work properly.
Please delete unnecessary devices on the Manager.
Sensor Name: SensorName
Sensor IP Address: SensorIP
* If single segments or multiple segments are supported, the IP
address of the Sensor to be notified is the IP address of the LAN0 port
on the Sensor. If tagged VLAN is supported, the IP address of the
Sensor to be notified is the IP address with the smallest Sensor VLAN
ID.
Max. number of Title <iNetSec Smart Finder> Excess of Registered Devices
devices exceeded
(entire system) Text Event ID: 1B011004
Detected devices has exceeded system limit on the Manager.
The Sensors may not work properly due to overload.
Please delete unnecessary devices on the Manager.
Sensor Name: SensorName
Sensor IP Address: SensorIP
Max. number of Title <iNetSec Smart Finder> Excess of Blocked Devices
simultaneously
blocked connections Text Event ID: 1B011006
exceeded Blocked devices has exceeded system limit on the Sensor.
The Sensor may not work properly.
Please consider redesigning IP segmentation or reducing the number
of managed IP segments per Sensor.
Sensor Name: SensorName
Sensor IP Address: SensorIP
* If single segments or multiple segments are supported, the IP
address of the Sensor to be notified is the IP address of the LAN0 port
on the Sensor. If tagged VLAN is supported, the IP address of the
Sensor to be notified is the IP address with the smallest Sensor VLAN
ID.
Max. number of Title <iNetSec Smart Finder> Excess of Number of Printers
printers exceeded
(inside Sensor) Text Event ID: 1B011008
Number of printers has exceeded system limit on the Sensor.
Please review number of printers managed by the Sensor.
Sensor Name: SensorName
Sensor IP Address: SensorIP
Max. number of Title <iNetSec Smart Finder> Excess of Detected Devices
devices exceeded
(inside Sensor) Text Event ID: 1B011009
Detected devices has exceeded system limit on the Sensor.
The Sensor may not work properly due to overload. Please consider
redesigning IP segmentation to reduce the number of devices per
Sensor.
Sensor Name: SensorName
Sensor IP Address: SensorIP
253
Chapter 11 Error Messages
Max. number of Title <iNetSec Smart Finder> Excess of System Limits on Events
events exceeded
Text Event ID: 1B011010
Number of Events has exceeded its maximum number supported by
the Sensor.
Please verify that the Sensor is able to communicate with the Manager
and E-mail server.
Sensor Name: SensorName
Sensor IP Address: SensorIP
Approval of devices Title <iNetSec Smart Finder> Approval by E-mail Failed (Already
failed (already Completed) (SN=XXXXX)
completed)
Text Event ID:1B011015
Approval by e-mail failed because the approval is already completed.
IP Address: IPAddress
MAC Address: MACAddress
Content of Approval: ApprovalStatus
Serial Number: XXXXX
Approval of devices Title <iNetSec Smart Finder> Approval by E-mail Failed (Incorrect Format)
failed (incorrect
format) Text Event ID:1B011016
Approval by e-mail failed because the e-mail content is incorrect.
Title: OriginalMailTitle
Text: OriginalMailText
Error detected in Title <iNetSec Smart Finder> Sensor Error/Event
Sensor
(self check) Text Event ID: 2B012001
A suspicious event has occurred. It may be a hardware error and affect
Sensor operation.
Sensor Name: SensorName
Sensor IP Address: SensorIP
Detail Code: DetailCode
Refer to "11.7 Detail Codes for Sensor Self Checks".
Error detected in Title <iNetSec Smart Finder> Detection of Sensor Error
Sensor (Sensor to
Sensor Status Text Event ID: 2B012003
Monitoring) (*) Sensor error is detected by another Sensor.
Check the Sensor status or network connection between the Sensors.
Error Sensor Name: SensorName
Error Sensor IP Address: SensorIP
Detect Sensor Name: SensorName
Detect Sensor IP Address: SensorIP
Exceed the Title <iNetSec Smart Finder> Excess of Number of Exception Servers
maximum number of
Exception Servers Text Event ID: 2B012012
The number of exception servers has exceeded system limit. The
Sensor may not work properly.
Please check Segment Group settings and reduce the number of
exception servers per Segment Group.
Sensor Name: SensorName
Sensor IP Address: SensorIP
Detail Code: DetailCode
Detail: DetailMessage
254
Chapter 11 Error Messages
*: Sensor to Sensor Status Monitoring monitors the Sensors on the same Segment Group in order.
If the monitoring process of the Sensor fails both of the following notifications might be sent:
- E-mail with notification of the Sensor error for the target Sensor
- E-mail for the Sensor error generated because monitoring of the Sensor following the target Sensor failed
255
Chapter 11 Error Messages
Hint
The Sensor IP address indicates one of the following in the event message:
The IP address assigned to Sensor which belongs to the IP segment where the
event was detected.
The Sensor LAN 0 IP address.
The IP address with the smallest VLAN ID.
Parameter Content
version 0 (snmp-v1-trap)
community SNMP community set in the System Configuration window
enterprise enterprises.PFU(18886).pfuSystem(3).pfuSmartFinder(2)
agent-addr The Manager Computer that sends SNMP trap, or IP address of the Sensor
generic-trap 6 (enterprise-specific)
time-stamp 0 (unsigned long value)
256
Chapter 11 Error Messages
257
Chapter 11 Error Messages
258
Chapter 11 Error Messages
259
Chapter 11 Error Messages
260
Chapter 11 Error Messages
261
Chapter 11 Error Messages
*1: Multi-byte letters included in the Sensor names and registration information are converted to UTF-8
both on the Sensors and the Manager.
262
Chapter 11 Error Messages
263
Chapter 11 Error Messages
264
Chapter 11 Error Messages
265
Chapter 11 Error Messages
266
Chapter 11 Error Messages
Value Behavioral Malware control mode of the Sensor that detected the
device.
var-bind OID (enterprise-oid).2.1.0 IP address of the device
*1: All segments set for this Sensor are reported in the SNMP trap for this event.
*2: Sensor to Sensor Status Monitoring monitors the Sensors on the same Segment Group in order. If the
monitoring process of the Sensor fails, both of the following notifications might be sent:
- SNMP trap with the notification of the Sensor error for the target Sensor
- SNMP trap for the Sensor error generated because monitoring of the Sensor following the target
Sensor failed
*3: If single segments or multiple segments are supported, the IP address of the Sensor to be notified is
the IP address of the LAN0 port on the Sensor. If tagged VLAN is supported, the IP address of the
Sensor to be notified is the IP address with the smallest Sensor VLAN ID.
*4: The information that is output as trail log is as follows:
Type =RAT-Spying | RAT-Infecting
C&C Server =<IP Address>
Target =<IP Address>
User Account =<User Account>
File =<File Name>
User Account is recorded in the "Windows Domain Name (or Work Group Name)\User Name" format.
Files that are operated on a device are stored in File Name. For example, PSEXESVC.EXE indicates
that the PsExec tool has been used.
The letters that are extracted from the transmitting packets and then displayed in User Account and
File Name are interpreted as UNICODE (UCS-2) letters when SMB protocol version 2 or 3 is used.
SMB protocol version 1 interprets letters as UNICODE or CP932 according to the UNICODE bit of the
protocol.
Event logs/E-mail notifications/SNMP Trap reports on the Manager are converted to UTF-8 before
notification is sent. Therefore, letters that cannot be converted because of the character code may not
be displayed correctly.
Indicates that malware behavior was detected on devices on the network.
Remove malware from the device that may be infected.
267
Chapter 11 Error Messages
268
Chapter 11 Error Messages
269
Chapter 11 Error Messages
270
Chapter 11 Error Messages
C0003005 The temperature monitored by the exhaust temperature monitor exceeded the error threshold
value. The Sensor shuts down.
Adjust and improve the installation conditions of the Sensor. Check if the exhaust openings
around the Sensor are blocked. If this event occurs multiple times even after improvements are
made, either a temperature monitor error or hardware error is possible. Collect Sensor
maintenance information and contact our technical support.
C0003006 The temperature monitored by the exhaust temperature monitor exceeded the warning
threshold value and the fan is running.
Adjust and improve the installation conditions of the Sensor. Check if the exhaust openings
around the device are blocked. If this event occurs multiple times even after improvements are
made, either a temperature monitor error or hardware error is possible. Collect Sensor
maintenance information and contact our technical support.
00003011 The temperature monitored by the exhaust temperature monitor has been returned to a value
within the warning threshold. The fan has stopped running.
No action is required.
C0004002 The temperature monitored by the CPU temperature monitor exceeded the error threshold
value.
The Sensor is shut down.
Adjust and improve the temperature environment around the installation location of the Sensor.
If this event occurs multiple times even after improvements are made, a heat error or CPU error
is possible. Collect Sensor maintenance information and contact our technical support.
C0005001 An error occurred in fan operation during an exhaust temperature error (or warning). The Sensor
is shut down.
If it is necessary to replace the Sensor, collect the Sensor maintenance information and contact
our technical support.
C0005005 An error was detected in a device that contains the Sensor firmware. The Sensor is shut down.
If it is necessary to replace the Sensor, collect the Sensor maintenance information and contact
our technical support.
C0005008 A communication error was detected in the temperature monitor inside the Sensor. The Sensor
is shut down.
If it is necessary to replace the Sensor, collect the Sensor maintenance information and contact
our technical support.
C000500B A DC voltage error was detected in the power supply to the Sensor. The Sensor is shut down.
If it is necessary to replace the Sensor, collect the Sensor maintenance information and contact
our technical support.
C000500C A thermal trip down occurred due to overheating in the Sensor CPU. The Sensor is shut down.
If it is necessary to replace the Sensor, collect the Sensor maintenance information and contact
our technical support.
C000500D An internal error occurred in Sensor's CPU. The Sensor is shut down.
If it is necessary to replace the Sensor, collect the Sensor maintenance information and contact
our technical support.
C000500E A Watchdog timeout occurred. The Sensor was shut down. This message is reported after the
Sensor is restarted.
Collect the Sensor maintenance information and contact our technical support.
C000500F A hard reset signal error was detected by the Sensor. The Sensor is shut down.
If it is necessary to replace the Sensor, collect the Sensor maintenance information and contact
our technical support.
C0005030 An error was detected in a file system that contains the Sensor firmware. The Sensor is shut
down.
If it is necessary to replace the Sensor, collect the Sensor maintenance information and contact
our technical support.
271
Chapter 11 Error Messages
272
Chapter 11 Error Messages
Operation log files are in CSV format and separated by commas and the character code is UTF-
8.
The line break code is CRLF.
The default filename for operation log files is as follows:
Operation log files are created every day. The operation log up until the previous day is saved
with "Operation.log.MMDDYYYY" as the file name. Logs are maintained for 400 days.
Column
Item name Value format Remarks
No.
1 Date/Time MM/dd/yyyy hh:mm:ss.SSS tt Time on the Manager when the operation was
performed.
"tt" represents AM or PM when the 12-hour
clock is used.
2 Session ID Alphanumeric letters, up to 24 The same value is used during a single login
bytes session.
This is not set in the operation log when a
command is executed.
3 IP Address xxx.xxx.xxx.xxx Connected IP Address
273
Chapter 11 Error Messages
Column
Item name Value format Remarks
No.
274
Chapter 11 Error Messages
275
Chapter 11 Error Messages
276
Chapter 11 Error Messages
*1: When the settings are newly registered or changed, the following details are displayed:
Device Type=<device type>
Approval Status=<approval status>
Approval Status Policy=<approval status policy>
Application Monitoring=<application monitoring>
Application Monitoring Policy=<application monitoring policy>
Behavioral IPS (Malware Detection) =<behavioral IPS (malware detection)>
Behavioral IPS (Malware Detection) Policy=<behavioral IPS (malware detection) policy>
Average Power Consumption=<average power consumption>
Device Type Update=<automatic update for device information>
Change of IP Address=<change of IP address>
When the settings are entered, the following details are displayed:
Details=<details of device type>
Model=<model name>
OS Type=<OS type>
Vendor=<vendor name>
Validity Period=<validity period>
Authorized IP Address=<authorized IP address>
Note 1=<note 1>
Note 2=<note 2>
Note 3=<note 3>
Item 1=<(registration item 1)>
Item 2=<(registration item 2)>
Item 3=<(registration item 3)>
Item 4=<(registration item 4)>
Item 5=<(registration item 5)>
*2: When the filtering conditions are set, the following details are output:
Approval Status=<approval status>
Approval Status Policy=<approval status policy>
Application Monitoring=<application monitoring>
Application Monitoring Policy=<application monitoring policy>
Behavioral IPS (Malware Detection) =<behavioral IPS (malware detection)>
277
Chapter 11 Error Messages
278
Chapter 11 Error Messages
*1: When the filtering conditions are set, the following detailed information is output:
Text in Application Info=<keyword>
Risk Level=<risk level>
Category=<category>
Status=<status(Permitted, Prohibited, Not Detected)>
Policy=<policy>
*2: When the settings are changed, the following details are displayed:
Status=<status>
Policy=<policy>
Deleting the Sensor using Sensor List Delete Sensors info Sensor MAC Address=<MAC address>
the [Sensor List] tab on the
Sensors window
Exporting Sensor list Export Sensors List Count=<detecteddevices>
information using the (*1)
[Sensor List] tab on the
Sensors window
Updating Sensor information Sensor Apply Sensors info Sensor MAC Address=<MAC address>
using the Sensor Information Information (*2)
window
279
Chapter 11 Error Messages
Changing the operation Segment List Apply segment Operation Mode=<operation mode>
mode of the segment using operation mode Segment Name=<segment name>
the [Segment List] tab on the
Sensors window
Changing the Application Apply segment Application Monitoring=<application
Monitoring mode of the Application monitoring>
segment using the [Segment Monitoring Segment Name=<segment name>
List] tab on the Sensors
window
Changing the Behavioral IPS Apply segment Behavioral IPS (Malware Detection)=
(Malware Detection) mode of Behavioral IPS <behavioral IPS (malware detection)>
the segment using the (Malware Segment Name=<segment name>
[Segment List] tab on the Detection)
Sensors window
Changing the event Apply segment Event Notification=<Notify/Do Not
notification mode of the event notification Notify>
segment using the [Segment Segment Name=<segment name>
List] tab on the Sensors
window
Changing the license Change license License Settings=<license>
settings of the segment settings Segment Name=<segment name>
using the [Segment List] tab
on the Sensors window
Updating Segment Segment Apply Segment info Sensor MAC Address=<MAC address>
information using the Information (*3)
Segment Information window
*1: When the filtering conditions are set, the following detailed information is output:
Sensor Name=<sensor name>
MAC Address=<MAC Address>
*2: When the settings are changed, the following details are displayed:
Sensor Name=<sensor name>
Time zone=<time zone>
Automatically adjust time for Daylight Saving Time=<automatically adjust time for daylight saving
time>
*3: When the settings are changed, the following details are displayed:
Segment Name=<segment name>
Blocked a Device using IP addresses out of IP Segment=<blocked a device using IP addresses out of
IP segment>
280
Chapter 11 Error Messages
Deleting user information User List Delete Users info User=<user name>
using the User Information
window
Adding User information using User Register User info User=<user name>
the User Information window Registration Password=******
User Role=<role>
Segment Group Name=<Segment
Group name>
Export/Import Encoding=<export/
import character code>
Event Viewer Time=<event viewer
time>
(*1)
Updating user information User Apply Users info User=<user name>
using the User Information Information (*2)
window
*1: When the setting items are entered, the following detailed information is output:
E-mail Address=<e-mail address>
E-mail Notification=<e-mail notification>
New Device Detection=<notification for new device detection>
Registration Form=<Registration Form>
Rejected Device Detection=<rejected device detection>
Change of IP Address=<change of IP address>
Unauthorized IP Address Violation=<unauthorized IP address violation>
Change of Device Information According to Policy=<change of device information according to policy>
Change of Device Information According to Policy (Manager)=<change of device information
according to policy (manager)>
Automatic Approval=<automatic approval device>
New Application Detection=<detected new application>
Prohibited Application Detection=<detected prohibited application>
Prohibited Application Unblocking=<unblocked prohibited application>
Change of Application Information According to Policy (Manager)=<change of application information
according to policy (manager)>
Malware Detection=<malware detection>
Clear Malware Detection Result=<Clear Malware Detection Result>
Sensor Registration=<sensor registration>
Segment Registration=<segment registration>
System Error=<system error>
Append Authorized IP Address=<append authorized IP address>
Automatically adjust time for Daylight Saving Time=<automatically adjust summary time>
Note=<note>
*2: When the settings are changed, the following detailed information is displayed:
Password=******
User Role=<role>
Segment Group Name=<Segment Group name>
E-mail Address=<e-mail address>
E-mail Notification=<e-mail notification>
New Device Detection=<new device detection>
Registration Form=<Registration Form>
Rejected Device Detection=<rejected device detection>
Change of IP Address=<IP address change>
Unauthorized IP Address Violation=<Unauthorized IP address violation>
281
Chapter 11 Error Messages
Deleting Segment Group Segment Delete Segment Group Segment Group Name=<Segment
information using the Group List info Group name>
Segment Groups window
Registering a Segment Segment Register Segment Group Segment Group Name=<Segment
Group using the Segment Group info Group name>
Groups window Registration (*)
Updating Segment Group Segment Apply Segment Group info Segment Group Name=<Segment
information using the Group Group name>
Segment Groups window Information (*)
*: When the settings are changed, the following detailed information is output:
Note=<note>
Segment Assignment=<segment name>
*: When the filtering conditions are set, the following details are output:
Level=<Level (event level)>
Event Date=<event date>
Event ID=<event ID>
Message=<message>
282
Chapter 11 Error Messages
Updating the automatic Automatic Apply Automatic Control Segment Group Name=
control settings for OS type Control Settings for OS Type <segment group name>
Settings for (Register) Controlled OS Type=
OS Type Apply Automatic Control <controlled OS type>
Settings for OS Type Approval Status=<approval
(Update) status>
Apply Automatic Control Application Monitoring=
Settings for OS Type <application monitoring>
(Delete)
Behavioral IPS (Malware
Detection)=<behavioral IPS
(malware detection)>
283
Chapter 11 Error Messages
Operation Log Related to Automatic Approval for MAC address (Vendor ID)
Window
Operation Log Contents
Operation
Name Message Detailed information
Updating the Device Dictionary Device Dictionary Import dictionary Version=<Device Dictionary
setting Update version>
284
Chapter 11 Error Messages
Registering the license settings License Settings Add license License Key=<license key>
*: When the settings are newly registered or changed, the following details are displayed:
Device Type=<device type>
Approval Status=<approval status>
Approval Status Policy=<approval status policy>
Application Monitoring=<application monitoring>
Application Monitoring Policy=<application monitoring policy>
Behavioral IPS (Malware Detection) =<behavioral IPS (malware detection)>
Behavioral IPS (Malware Detection) Policy=<behavioral IPS (malware detection) policy>
Average Power Consumption=<average power consumption>
Device Type Update=<automatic update for device information>
Change of IP Address=<change of IP address>
When the setting items are entered, the following details are output:
Details=<details of device type>
Model=<model name>
OS Type=<OS type>
Vendor=<vendor name>
Validity Period=<validity period>
Authorized IP Address=<authorized IP address>
Note 1=<note 1>
285
Chapter 11 Error Messages
286
Appendix A File Format
Appendix A
File Format
This appendix describes the file format of the following CSV files:
Device Information File to be imported or exported
Event Information File to be exported
Sensor Information File format
Automatic Approval for MAC Address (Vendor ID) File format
IP Address Change Notification Exception File
Automatic Approval for IP Address File
Application Information File
When a CSV format item contains "," (comma) or a line feed, enclose the item in double
quotation marks. When an item contains a double quotation mark ("), change the mark to two
double quotation marks ("") and then enclose the item in double quotation marks.
287
Appendix A File Format
deviceList_<MMDDYYYY>.csv
288
Appendix A File Format
289
Appendix A File Format
*1: The item selected in [Device Information for export] in the [User Specific Settings] tab on the System
Configuration window is added.
Hint
The files are exported from the Devices window in the same order as the sort order
displayed in the window.
290
Appendix A File Format
Vendor
Automated Device Type Any of the following: Can be omitted.
Update Yes If omitted during registration of a new device, "Yes" is set.
If omitted during setting change, the current value is valid.
No
Average Power Integer between 0 - Can be omitted.
Consumption 65535 If omitted during registration of a new device, "default
value according to the type" is set. If omitted during setting
change, the current value is valid.
Note 1-3 Up to 256 letters Can be omitted.
Registration Form Up to 64 letters If omitted, the current value is valid.
(Item1-5)
291
Appendix A File Format
292
Appendix A File Format
Hint
Blanks (space and tab) before and after a comma that separate items are handled as an
input value when importing. If the items are enclosed in ("), any blanks before or after a
comma are omitted.
Up to 10,000 devices can be imported.
If letters that include a comma, tab, or linefeed are used for an item, enclose the item with
("). If (") is used for the item in any other way other than for enclosing, replace (") with ("")
and then enclose the item with (").
Attention
If a file is imported with a value different from the above-mentioned "value format"
described, an error message appears. Check the description and try the import again. If
items are omitted, subsequent commas can be omitted when a MAC address is
described.
If an error occurs during import, all import data becomes invalid. Check the file format and
try the import again.
293
Appendix A File Format
eventList_<MMDDYYYY>.csv
Hint
The files are exported from the Event Viewer window in the same order as the sort order
displayed in the window.
294
Appendix A File Format
sensorList_<MMDDYYYY>.csv
Hint
The files are exported from the Sensors window in the same order as the sort order
displayed in the window.
295
Appendix A File Format
venderIDList_<MMDDYYYY>.csv
Attention
Up to 1,000 vendor IDs can be imported. When over 1,000 IDs are imported, an import
error occurs.
The same vendor ID cannot be specified more than once in the import file. When the
same vendor ID is specified more than once, an import error occurs.
If an error occurs during the import operation, all of the imported data become invalid and
the system is restored to the state before the import operation. Check the file format and
try the import operation again.
296
Appendix A File Format
notifyExcepts_<MMDDYYYY>.csv
Attention
If an error occurs during import, all import data becomes invalid. Check the file format and
try the import again.
autoAdmitIPAddressList _<MMDDYYYY>.csv
Automatic Approval for IP Address files are in CSV format, separated by commas.
The line break code is CRLF and spaces or tabs inserted before and after commas are omitted.
The item details are as follows.
297
Appendix A File Format
appPolicyList_<MMDDYYYY>.csv
298
Appendix A File Format
299
Appendix A File Format
300
Appendix A File Format
Hint
Spaces or tabs before and after commas that separate items are considered as input
values. For items enclosed with "", spaces before and after commas are ignored.
For items which have commas, tabs and line breaks, enclose the items with "". For items
which have " , replace " with "" and then enclose the items with "".
301
Appendix B Changing Settings after Starting Operation
Appendix B
Changing Settings after Starting
Operation
This section describes how to make changes after operations begin for the configured settings
that were performed during installation of the Manager.
302
Appendix B Changing Settings after Starting Operation
For Windows Server 2008, Windows Server 2008 R2, Windows Server 2012, and
Windows Server 2012 R2
1. For Windows Server 2008, click [Control Panel] - [System and Maintenance] -
[Administrative Tools] and then select [Internet Information Services (IIS) Manager]. For
Windows Server 2008 R2, Windows Server 2012, and Windows Server 2012 R2, click
[Control Panel] - [System and Security] - [Administrative Tools] and then select [Internet
Information Services (IIS) Manager].
2. Open the Local Computer settings in the Internet Information Services (IIS) Manager
window. Click [Sites] - [iNetSecSmartFinder] and select [Bindings] in the [Actions] menu.
3. When the Site Bindings window appears, select either http or https and click [Edit].
4. In the Edit Site Binding window, change the port number and click [OK].
Attention
If a firewall is used, configure the firewall to approve the port set above.
303
Appendix B Changing Settings after Starting Operation
For Windows Server 2008, Windows Server 2008 R2, Windows Server 2012, and
Windows Server 2012 R2
Changing HTTP to HTTPS
1. For Windows Server 2008, click [Control Panel] - [System and Maintenance] -
[Administrative Tools], and then select [Internet Information Services (IIS) Manager].
For Windows Server 2008 R2, Windows Server 2012, and Windows Server 2012 R2
click [Control Panel] - [System and Security] - [Administrative Tools], and then select
[Internet Information Services (IIS) Manager].
2. Expand [Sites] node in the [Connections] menu, select [iNetSecSmartFinder] and then
select [Bindings] in the [Actions] menu.
3. When the Site Bindings window appears, select [Add], set the following information,
and then click [OK].
Type: https
IP address: All Unassigned
Port: Any value (default: 443)
SSL certificate: Select the certification imported for [All operating systems]
4. Select the following information and then click [Delete].
Type: http
Port: Number set during installation (default: 8109)
5. Click [Close] in the Site Bindings window, expand [Sites] node in the [Connections]
menu, and select [iNetSecSmartFinder].
6. Double-click [SSL Settings] for [IIS] in [Features View], select [Require SSL]
checkbox, and then click [Apply] in the [Actions] menu.
Changing HTTPS to HTTP
1. For Windows Server 2008, click [Control Panel] - [System and Maintenance] -
[Administrative Tools], and then select [Internet Information Services (IIS) Manager].
For Windows Server 2008 R2, Windows Server 2012, and Windows Server 2012 R2
click [Control Panel] - [System and Security] - [Administrative Tools], and then select
[Internet Information Services (IIS) Manager].
2. Expand [Sites] node in [Connections] window and select [iNetSecSmartFinder].
3. Double-click [SSL Settings] for [IIS] in [Features View], clear [Require SSL] checkbox,
and then click [Apply] in the [Actions] menu.
304
Appendix B Changing Settings after Starting Operation
Attention
If the Manager is uninstalled after HTTPS is changed to HTTP, the "inetsecsmartfinder"
used as certification for the trusted root certificate authority is not deleted. Use the
Windows Management Console to delete the certification.
If a firewall is used, configure the firewall to approve the port set above.
305
Appendix C Specifications
Appendix C
Specifications
C.1 Upper Limits for iNetSec Smart Finder System ...................................................... 307
C.2 List of the Ports used by iNetSec Smart Finder ...................................................... 308
306
Appendix C Specifications
Detected devices 10000 The number of devices (the number of MAC addresses)
managed by the Manager.
If the upper limit is exceeded, the exceeding number of devices
cannot be registered.
If the same Mac address is registered in more than one Segment
Group, it is counted only once.
Number of Sensors 100 The number of the Sensors managed by the Manager.
If the upper limit is exceeded, the exceeding number of the
Sensors cannot be registered.
Number of Segment 75 The number of Segment Groups managed by the Manager.
Groups If the upper limit is exceeded, the exceeding number of Segment
Groups cannot be registered.
Number of 250 The number of segments managed by the Manager.
segments If the upper limit is exceeded, the exceeding number of segments
cannot be registered.
Number of users 50 + 10 n The number of users managed by the Manager.
(*) Up to 50 system administrators + 10 (Segment Group
administrators + read-only users) per Segment Group can be
registered.
Users that exceed the upper limit cannot be registered.
Number of printers 500 The number of printers managed by the Sensor.
If the upper limit is exceeded, the exceeding number of printers
cannot be obtained. It is undetermined from which printer the
amount of printing cannot be obtained.
Number of devices Manageable The number of devices that can be managed by the Sensor. Note
per Sensor devices: 3000 that 1000 devices can be managed by the Sensor simultaneously.
Concurrent If the upper limit (3000 devices) is exceeded, the exceeding
devices: 1000 number of devices cannot be detected/blocked/redirected.
Number of Segment 5 The number of devices that can be managed by the Sensor.
Groups per Sensor If the upper limit is exceeded, the exceeding number of Segment
Groups cannot be registered.
Number of 10 n The number of Exception Servers managed by the Manager. Up
Exception Servers (*) to 10 servers can be registered per Segment Group.
Exception Servers that exceed the upper limit cannot be
registered.
307
Appendix C Specifications
Receiving
Receiving Port Sending Communication
Protocol Remarks
Device (default Port Destination
value)
*1: This can be changed when installing the Manager. The setting must be changed on the Sensor side.
*2: This can be changed when installing the Manager.
*3: This can be changed in the Basic Settings window to match the settings for the Manager.
*4: This is used when the -d option is specified for the Investigate Sensor command.
308
Appendix D Time Zone
Appendix D
Time Zone
This appendix describes the time zone used to indicate the displayed time on the screen and the
time when an operation is performed.
309
Appendix D Time Zone
Time Zone
displayed in Time Zone for
Function Item
"Event Local Operation Time
Time"
*1: If a registration is submitted from the Registration window on the Manager, the event local time is the
local time zone where the Manger Computer is located. If a registration is submitted from the
Registration window in the Sensor, the event local time is the local time zone where the Sensor is
located.
310
Appendix D Time Zone
*2: For Events that occur on the Manager Computer, the event local time is the local time zone where the
Manger Computer is located. For events that occur on the Sensor, the event local time is the local time
zone where the Sensor is located.
*3: The displayed time does not depend on the time zone.
*4: If the application usage policy is updated through the Registration window, the event local time is the
local time where the Manager Computer is located. If the policy is updated by detection of a new
application, the event local time is the local time where the Sensor that detects the application is
located.
311
Appendix E Monitor Port Connection
Appendix E
Monitor Port Connection
312
Appendix E Monitor Port Connection
In a simple configuration where the Sensor controls an IP segment with a single network switch,
a Monitor Port can connect to a mirror port on the switch. If you mirror all other ports except for
upper link port to the mirror port, the Sensor can monitor all packets to and from devices on IP
segments.
Layer 3 Switch
Devices Devices
313
Appendix E Monitor Port Connection
In a layered configuration, an ideal point for a Monitor Port to be connected is the Layer 3 switch
on the top of the layers where all traffic passes from the lower layer switches. If you configure a
mirror port on the switch and mirror all lower link ports to the mirror port, the Sensor can monitor
all traffic except for traffic that passes between devices on a switch in the lower layers.
Connect the Sensor Monitor
Port with a mirror port on a
network switch.
Layer 3 Switch
Layer 2 Layer 2
Switch Switch
314
Appendix F Management Window
315
Appendix F Management Window
316
Glossary
Glossary
Application
A general term for a service or protocol on the application layer.
Application Dictionary
The Application Dictionary contains the application information and a recommended default
policy for the applications.
Application Monitoring
To monitor, visualize, and control the use of applications.
Application Policy
A policy that decides whether or not to permit applications used on the network.
Application Status
A status that indicates whether detected applications are permitted or prohibited. There are
three types of the application statuses: Permitted, Prohibited, or Not Detected.
Applications Window
To view and operate the application information managed by the Manager. Applications
Window is one of the Management Windows.
317
Glossary
Approval Status
Approval status determines if a device connected to the network is approved for connection
(Approved), blocked for connection (Rejected) or not authorized by the administrator
(Registered).
Approved
Determines if a device detected by the Sensor is approved for network connection.
Backup
This function backs up the system information of the Manager in case of an emergency.
iNetSec Smart Finder provides the command.
Block
The Sensor blocks connection of non-approved client devices to the network.
318
Glossary
Blocking Mode
A mode used to block devices "Registered" in the network or devices using prohibited
applications. Blocking mode has the following functions for the devices "Registered" in the
network :
Unblock After Registration
Connection to the network is unblocked if the network user submits a registration form
from the blocked device.
Unblock After Approval
If the System or Group Administrator approves the request, the device is unblocked.
Chart
Chart is the software used to compile IT device information managed by the Manager with
detailed statistical information including displaying information in visual formats such as
graphs and tables. By using Chart, an administrator can analyze the network.
Client Device
The devices that are connected to the network and have an IP address. iNetSec Smart
Finder manages devices based on the MAC address.
Detection
The Sensor detects devices connected to the network.
Detection Sensor
The Sensor that detects a device connected to the network.
Device
A Client Device.
Device Dictionary
The Device Dictionary contains the keywords to classify the device types and the results of
the classification.
Dictionary File
This file is provided as maintenance service. The file is used to update the Dictionary.
Device Information
The Sensors collect device information from devices connected to the network. The
Manager consolidates and displays the information on the Management window and Chart.
319
Glossary
Device Type
The device types are automatically classified by the Sensor and manually classified by the
administrator. The device types are as follows:
Windows
Devices with Windows installed
Mac
Devices with Mac OS installed
Linux/UNIX
Devices with Linux or UNIX installed
Printers
Printers or all-in-one printers connected to the network
Routers/Switches
Network devices such as routers and switches
NAS
Network Attached Storage (NAS) devices
Scanners
Scanners connected to the network
VoIP Phones
VoIP phones
Kiosk Terminals
Kiosk terminals connected to the network
Mobile Devices
Terminals such as mobile phones or smartphones connected to the network
Others
Other described devices not discussed.
Unclassified
Devices that are not classified by iNetSec Smart Finder. "Unclassified" is displayed if
the device type cannot be classified within 24 hours after the Sensor detects the
device.
Detecting
Device types that are being classified by iNetSec Smart Finder.
Devices Window
To view and operate the device information managed by the Manager. Devices window is
one of the Management windows.
320
Glossary
Event
When a significant event in the Manager or the Sensor occurs, the system administrator is
notified by an e-mail or SNMP trap. Events can be filtered from the list in the Event Viewer
window.
Export
This function exports the information managed by the Manager to a file. The character code
for the exported files is UTF-8.
The following information can be exported:
Device Information
Sensor Information
Event Information
Application Information
MAC Address (Vendor ID) Automatic Device Approval Settings
IP Address Change Notification Exception Settings
IP Address Automatic Device Approval Settings
Sensor Basic Settings
Information displayed in Chart
Import
This function imports the information from files to the Manager. The character code for
imported files is UTF-8.
The following information can be imported:
Device Information
MAC Address (Vendor ID) Automatic Device Approval Settings
IP Address Change Notification Exception Settings
IP Address Automatic Device Approval Settings
Sensor Basic Settings
Application Information
INIT Button
The button on the front panel of the Sensor used to initialize the Sensor.
321
Glossary
Maintenance Information
The information includes the Manager maintenance information and Sensor maintenance
information.
Management Window
To view and operate the information managed by the Manager from a web browser.
Manager
The Manager is the abbreviation for iNetSec Smart Finder Manager. The Manager centrally
manages the device and application information detected by the Sensors.
Missing or Disposed
The Sensor determines devices not connected to the network for a specified period of time.
Monitoring Mode
A Sensor operation mode that detects the devices connected to the network and collects the
device information. Device types are classified in Monitoring Mode.
The Sensors block "Rejected" devices.
Notes
Device information set to add optional information to devices.
Notification Window
A window that appears on a client device when the device is blocked or unblocked.
Operation Mode
Operation mode is assigned to each segment with Monitoring and blocking modes. The
Sensor manages each segment in operation mode.
Operation Status
The Sensor status is displayed in the Sensor window.
The two types of operational status are: "Normal" and "Abnormal".
Permitted Application
An application that is permitted in the application policy. The newly detected application is
permitted by default.
322
Glossary
Power Consumption
An estimate of the power consumption. This is calculated by the device uptime and the
average power consumption set for each device.
Prohibited Application
An application that is prohibited according to the application policy. A device that uses
prohibited applications is blocked from the network in blocking mode.
Registered
A device detected by the Sensor whose status is not determined for approval to connect to
the network.
"Registered" includes the following:
Detected
The Sensor detects a device connected to the network. Approval/rejection for
connection has not been determined.
Requested
Registration approval to the network is requested. Approval/rejection for network
connection has not been determined.
Rejected
A device detected by the Sensor whose status is rejected for connection to the network.
Registration
Registration for connection to the network from a blocked device.
Restoration
This function restores the system information into the Manager. iNetSec Smart Finder
provides the command.
Retention Period
The Manager retains event information. The Retention Period of the event information can
be specified on the System Configuration window for 30, 60 or 90 days. The default value is
30 days.
Risk level
The degree of risk for applications. The risk level is specified in the dictionary provided by
iNetSec Smart Finder.
Segment
The IP segment in the network.
Segment Group
This is used to manage segments as a group. Automatic approval, application policies, and
event notification settings can be specified on a Segment Group basis.
323
Glossary
Sensor
The Sensor is the abbreviated name for the iNetSec Smart Finder Sensor. The Sensor
detects and classifies devices connected to the network and blocks devices that have
unauthorized network access. The Sensor also monitors applications on the network and
blocks devices that use prohibited applications.
Sensor Information
Information of the Sensor such as Sensor Name, Sensor IP address and Sensor MAC
address.
Sensors Window
To view and operate the Sensors.
Unauthorized Devices
Unauthorized devices are blocked for network access by iNetSec Smart Finder.
324
Glossary
User
iNetSec Smart Finder user who can log in to the Manager and Chart and manage segments
on a Segment Group basis. User roles can be set for each user. After installation, only a
user named "admin" is registered.
User Role
There are three types of user roles in iNetSec Smart Finder: system administrator, group
administrator and read-only.
Users window
To add, view and delete users.
Whitelist
Is a list of devices with "Approved" status in the Devices window. Devices labeled as
"Detected" can be "Approved" or "Rejected". After the Manager is installed and the Sensor is
setup in each IP segment, create a whitelist before starting operations.
325
iNetSec Smart Finder V3.0
User's Guide
P2WW-2834-01ENZ0