Smartconnector™ Configuration Guide: Arcsight™ Forwarding Connector V5.1.2.5857 For Arcsight Esm™
Smartconnector™ Configuration Guide: Arcsight™ Forwarding Connector V5.1.2.5857 For Arcsight Esm™
Smartconnector™ Configuration Guide: Arcsight™ Forwarding Connector V5.1.2.5857 For Arcsight Esm™
Configuration Guide
ArcSight™ Forwarding Connector
v5.1.2.5857
for ArcSight ESM™
May 2011
SmartConnector™ Configuration Guide
E-mail support@arcsight.com
This chapter provides information for installing an ArcSight Forwarding Connector for event
collection from an ArcSight Manager installation. The following topics are discussed.
The ArcSight Forwarding Connector is supported on Windows, Linux, Solaris, and AIX
platforms.
ArcSight recommends using the Forwarding Connector installer included with the
corresponding ESM release. The Forwarding Connector is released as part of the ESM
release; however, its build version might not match that of other ESM components within
the release.
Product Overview
The ArcSight Forwarding Connector lets you receive events from a source Manager
installation and send them to a secondary destination Manager, a non-ESM location or to
an ArcSight Logger.
What’s New
The ArcSight Forwarding Connector now has compatibility with the HP Operations
Manager (HP OM), providing event and performance management of enterprise
systems, applications, and services. For details on using this destination, Chapter 3‚
Configuration for HP Operations Manager‚ on page 29.
The Source Manager must be of the same version as the Destination Manager.
With data originating from an ArcSight Source Manager, the ArcSight Forwarding Connector
provides various destination options for forwarding events, including:
The Destination Manager must be of the same version as the ource Manager.
Before configuring the Forwarding Connector that sends events to the Receiver, you need
to create a Receiver of type SmartMessage. After you create this Receiver, you can
configure the SmartConnector to send events to Logger.
Refer to the ArcSight Logger Administrator's Guide for complete instructions about:
Receivers
Configuring a SmartConnector to Send Events to Logger
Configuring SmartConnectors to Send Events to Both Logger and a Manager
Sending Events from ArcSight ESM to Logger
Using Logger in FIPS mode
When configuring the Forwarding Connector to send events to a non-ESM destination, you
might encounter a problem with certificate validation during connector setup. Make sure
that the demo CA is added to the client trust store to validate the Manager's demo
certificate.
2 After the screen prompting you to select the destination type is displayed, run the
following command from the $ARCSIGHT_HOME\current\bin directory
For detailed configuration instructions on forwarding CEF Syslog events, see Chapter 2‚
Forwarding CEF Syslog Events‚ on page 21.
For detailed configuration instructions on forwarding events to a .csv file, see Chapter 2‚
Forwarding Events to a CSV File‚ on page 22.
Use of ePO requires installation of MS SQL Server 2005 for JDBC driver. For
instructions on downloading, see “Installing the Microsoft SQL Server 2005
Driver for JDBC” on page 24.
2 Run the ArcSight Manager; the ArcSight Manager command prompt window or
terminal box displays a Ready message when the Manager has started successfully.
You can also monitor the server.std.log file located in
ARCSIGHT_HOME\current\logs.
3 Run the ArcSight Console. Although not necessary, it is helpful to have the ArcSight
Console running when installing the SmartConnector to verify successful installation.
Before you install the SmartConnector, make sure you have the following available:
2 From the Navigator Resources tab, choose Users from the drop-down menu.
4 Under the group created in step 3, create a user account of user type Forwarding
Connector, as shown below.
5 Returning to the Navigator Resources tab, right-click your chosen user group.
7 From the Inspect/Edit window, click the Events tab under the new user type and
assign the proper filters.
For detailed instructions on assigning filters and other Arcsight Console functions, refer to
the Administrator's Guide for your ESM version.
destination) Manager. The ACL can also be configured to allow for viewing of the detailed
chain of the forwarded correlation event, including the original correlated event.
The following steps should be performed in sequence, then restart the source Manager.
Correlated events pulled on-demand are for viewing only. They are not
persisted in the destination Manager.
The source Manager keeps track of the events that have been previously forwarded by
using the “Forwarded” annotation, disallowing duplicates.
To configure the source Manager to send both correlation events and correlated events
automatically, you must specify the container ID. The container ID consists of two
elements, the entityid and the userid. To begin the configuration, you must locate these
two elements and combine them within the server.properties file.
agents[0].entityid=3w+05uiYBABCCLKvzx0stdQ\==
c Locate the Resource ID and copy the text string from the second column, as
shown below.
eventstream.cfc=EntityID.UserID
3 Restart the source Manager and, if still running, the Forwarding Connector.
The capacity of events that can be stored during a system failure is dependent on the
amount of disk space the FileStore can use on the source Manager. Although the default
size of 1024 MB (1 GB) is suitable for most installations, you can increase the size of your
FileStore.
2 Use this formula to determine appropriate rates for minutes of storage on your
system:
Given the most typical event sizes, a FileStore of 1 GB can store approximately
21,474,833 events, and at a rate of 5000 events per second, the default size
provides approximately 71 minutes of storage.
When the FileStore fills up, the oldest events are purged to make room for recent
ones.
2 Start the installer by running the executable for your operating system, then follow the
folder selection tasks and installation of the core SmartConnector software:
Introduction
Choose Install Folder
Choose Install Set
Choose Shortcut Folder
Pre-Installation Summary
Installing...
When installation of the connector core component is complete, the following dialog is
displayed:
Uninstalling a Connector
Before uninstalling a connector that is running as a service or daemon, first stop the
service or daemon. To uninstall on Windows, open the Start menu. Run the Uninstall
SmartConnectors program located under All Programs, ArcSight SmartConnectors.
If Connectors are not installed on the Start menu, locate the
$ARCSIGHT_HOME\UninstallerData folder and run:
Uninstall ArcSightAgents.exe
./Uninstall_ArcSightAgents
Upgrading a Connector
To locally upgrade the Forwarding Connector:
1 Stop the running connector.
2 Run the new installer for the ArcSight Forwarding Connector, which prompts you for an
installation location.
3 Select the location of the Forwarding Connector you want to upgrade; you will receive
the message “Previous Version Found - Upgrade Possible” Select the option to
continue and upgrade the connector.
During upgrade, the "Default User Groups" user group is updated and adds the
/All Filters/ArcSight System/Core/No Events filter to the events ACL. If
the Forwarding Connector user is in that group, the connector cannot send
events to the destination Manager. To prevent this problem, edit the access
control for the Forwarding Connector's parent user group and select a filter
that gives permission to the subset of events for which the user has access.
Alternatively, if the user has access to all the events, delete the /All
Filters/ArcSight System/Core/No Events filter.
2 Rename the current folder to a name based upon the build version of the upgraded
connector.
Rolling back the connector to build 5116 or earlier disallows use of the
McAfee ePolicy Orchestrator destination.
The default is No, the ArcSight Manager is not using a demo certificate.
If your ArcSight Manager is using a self-signed or CA-signed SSL certificate, select No,
the ArcSight Manager is not using a demo certificate and click Next.
3 You are prompted for Manager Host Name and Manager Port. This is your
destination Manager. Enter the information and click Next.
4 Enter a valid ArcSight User Name and Password and click Next.
This is the user name and password for the user account you created on the
destination Manager.
5 You are given a choice of Forwarding Connector versions to install. If you are currently
using ESM v4.0 SP3 or later, ArcSight recommends choosing the ArcSight
Forwarding Connector (Enhanced) option. When choosing which version to use,
note the following:
6 Enter the information to configure the Forwarding Connector, then click Next to
continue. This is information about your source Manager, as described in the table
below.
Parameter Description
ArcSight Source The ArcSight user name created with permissions for
Manager User Name the Forwarding Connector on the ArcSight Source
Manager.
7 Enter a name for the connector and provide other information identifying the
connector's use in your environment. Click Next.
8 Read the connector summary; if it is correct, click Next. If the summary is not correct,
click Previous to make changes before continuing.
9 When the connector completes its configuration, click Next. The wizard now prompts
you to choose whether you want to run the connector as a process or as a service. If
you choose to run the connector as a service, the wizard prompts you to define service
parameters for the connector.
10 After making your selections, click Next. The wizard displays a dialog confirming the
connector's setup and service configuration.
11 Click Finish.
12 Click Done.
Before you continue connector configuration for forwarding events to an ArcSight Logger,
ensure that a SmartMessage Receiver has been set up on ArcSight Logger for the
Forwarding Connector (Refer to the ArcSight Logger Administrator's Guide for details).
2 Enter the Logger Host Name/IP address, leave the port number at the default value
of 443, and enter the Receiver Name. This Receiver Name is the name of the
SmartMessage Receiver you set up on ArcSight Logger for the Forwarding Connector.
Click Next to continue.
3 Click Next and continue following the steps to complete your configuration. Refer to
the Parameters on page 18 for parameter descriptions. When a message confirms
that configuration was successful, click Finish to exit the wizard.
2 Provide the NCM/TRM Host name or IP address, and login credentials for the
NCM/TRM that will interact with the Syslog Connector
3 Click Next and continue following the steps to complete your configuration until a
message confirms that it was successful. Click Finish to exit the wizard.
For more information about NSP, refer to the ArcSight™ NSP Installation and Administration
Guide.
2 Enter the Logger hostname or IP address, the desired port, and choose UDP or
TCP output. Click Next to continue.
3 Click Next and continue following the Configuration Wizard to complete your
configuration until a message confirms that it was successful. Click Finish to exit the
wizard.
Parameter Description
CSV Path The path to the output folder. If one does not exist, a
folder is created.
Parameter Description
File rotation interval The desired file rotation interval, in seconds. The
default is 3,600 (one hour).
Write format header Select true to send a header row with labels for each
column, as described above.
3 Click Next and continue following the steps to complete your configuration until a
message confirms that it was successful. Click Finish to exit the wizard.
For more information about capturing events and .csv files, refer to the section titled
“Capturing Events from SmartConnectors (ESM v4.0)” in the SmartConnector User’s Guide.
Use of ePO requires installation of MS SQL Server 2005 for JDBC driver. For
instructions on downloading, see “Installing the Microsoft SQL Server 2005
Driver for JDBC” on page 24.
2 Enter values for the ePO database connectivity on the window displayed:
3 Click Next to complete your configuration and verify that it is successful. Click Finish
to exit the wizard.
Rolling back the connector to build 5116 or earlier disallows use of the
McAfee ePolicy Orchestrator destination.
http://www.microsoft.com/downloads/details.aspx?FamilyId=
C47053EB-3B64-4794-950D-81E1EC91C1BA&displaylang=en
3 Copy the sqljdbc.jar jar file from the folder C:\Program Files\Microsoft
SQL Server 2005 JDBC Driver\sqljdbc_1.2\enu to
$ARCSIGHT_HOME/current/user/agent/lib, where $ARCSIGHT_HOME refers
to the connector install folder, such as c:\ArcSight\SmartConnectors.
The McAfee CEF field column shown below does not represent fields seen
within the Console GUI of McAfee ePolicy Orchestrator. This column represents
fields within the database.
AnalyzerDATVersion deviceCustomString6
AnalyzerHostName deviceHostName
AnalyzerIPV4 deviceAddress
AnalyzerMAC deviceMacAddress
AnalyzerName deviceProduct
AnalyzerVersion deviceVersion
DetectedUTC deviceReceiptTime
SourceHostName sourceHostName
SourceIPV4 sourceAddress
SourceMAC sourceMacAddress
SourceProcessName sourceProcessName
SourceURL requestUrl
SourceUserName sourceUserName
TargetFileName fileName
TargetHostName destinationHostName
TargetIPV4 destinationAddress
TargetMAC destinationMacAddress
TargetPort destinationPort
TargetProcessName destinationProcessName
TargetProtocol applicationProtocol
TargetUserName destinationUserName
ThreatActionTaken deviceAction
ThreatCategory deviceEventCategory
ThreatEventID agentSeverity
200300 – Unknown
200301 – Low
200302 – Medium
200303 – High
200304 – Very High
ThreatName name
ThreatType deviceEventClassId
For more details regarding McAfee ePolicy Orchestrator, refer to the SmartConnector™
Configuration Guide for McAfee ePolicy Orchestrator DB.
$ARCSIGHT_HOME\current\bin\runagentsetup
You can either modify the existing destination or add a new destination. For this example,
adding a second Manager.
2 Select the destination type. Click ArcSight Manager (encrypted), then Next.
3 Click Add new destination to add a new SmartConnector destination and click
Next.
4 Fill in the parameters for the destination you want to add and click Next to finish.
ArcSight ESM sends correlated security events to IT operation teams to investigate and
take remediation measures to reduce or eliminate security risks. The ArcSight Forwarding
Connector logs into the source Manager, then sends system events and network health
information to HP OM from non-SNMP event sources. The ArcSight Forwarding Connector
can be used to collect from event sources that support syslog, file, database, API, and
other collection methods through ESM.
Supported Versions of HP OM
The supported versions of HP OM include
Although most ESM users can use the default settings available for pulling events, HP OM
users commonly require only correlated events to be pulled from ESM. In such cases,
HP OM users can specify the selection of correlated events. To allow for only correlated
events and restrict the pulling of base events, configure ESM to pull correlated events,
then allow the forwarding of correlated events, in that order. For detailed instructions
to perform these steps, see Chapter 1‚ Forwarding Correlation Events‚ on page 9.
HP OM uses a SNPM trap policy to allow ArcSight events to be accepted within the HP OM
environment. For instructions on how to create an SNMP interceptor, see “Creating an
SNMP Interceptor (Policy)” on page 34.
1 Download the ArcSight executable for your operating system from the ArcSight
Customer Support Site.
Follow the installation wizard through the following folder selection tasks and
installation of the core connector software:
Introduction
Choose Install Folder
Choose Install Set
Choose Shortcut Folder
Pre-Installation Summary
Installing...
3 The destination selection window is displayed. If you are using the Manager Demo
License, continue with steps A through C below. Otherwise, click Next and continue
with step 4.
When configuring the connector to send events to a non-ESM destination, you could
encounter a problem with certificate validation during connector setup when using the
Manager Demo certificate. To make sure the demo CA is added to the client trust store to
validate the Manager's demo certificate, follow these steps:
c Enter the following command from the same location to return to the wizard:
arcsight connectorsetup
4 Fill in the parameter information required for connector configuration, then click Next.
Parameter Description
Authentication For use with SNMP v3; not available at this time.
Username(v3)
Authentication Password(v3)
Security Level(v3)
Authentication Scheme(v3)
Privacy Password(v3)
Context name(v3)
Parameter Description
ArcSight Source Enter the name of the host on which the Source
Manager Host Name Manager is installed.
ArcSight Source Enter the network port from which the Source
Manager Port manager is accepting requests. The default port is
8443.
ArcSight Source Enter the ArcSight password that will be used to log
Manager Password this adaptor into the ArcSight Source Manager.
7 Enter a name for the connector and provide other information identifying the
connector's use in your environment. Click Next.
8 Read the installation summary and click Next. If the summary is incorrect, click
Previous to make changes.
9 When the connector completes its configuration, click Next. The Wizard now prompts
you to choose whether you want to run the connector as a process or as a service.
If you choose to run the connector as a service, the Wizard prompts you to define
service parameters for the connector.
10 After making your selections, click Next. The Wizard displays a dialog confirming the
connector's setup and service configuration.
11 Click Finish.
For some connectors, a system restart is required before the configuration settings you
made take effect. If a System Restart window is displayed, read the information and
initiate the system restart operation.
12 Click Done.
The Interceptor should be configured to monitor SNMP events and respond when a given
pattern is found in an SNMP message. ArcSight provides a template interceptor (policy) for
use in creating your own customized SNMP Inteceptor. This template policy should be
customized and enhanced to satisfy different needs and requirements with HP OM's
powerful policy edit features.
157F1ADF-B7A5-4328-8175-5D370D6EC4A9_data
157F1ADF-B7A5-4328-8175-5D370D6EC4A9_header.xml
PolicyConfig_EE72B589-0893-4EC1-899B-502DE1289DBF.xml
/opt/OV/bin/OpC/utils/opcpolicy -upload
dir=/tmp/hpompolicy/"ArcSight Events"
If this occurs, you can adjust the rate at which events are forwarded to HP OM. To do so,
you will need to change the event processing rate within your XML properties file.
2 From a Windows command line, access your XML properties file using the command
cd %ARCSIGHT_HOME%/current/user/agent
3 Use WordPad or any XML Editor to open the .xml file for your HP OM destination,
similar to the example below:
0Ajv5S8BABCAAeabNXP5Rw==.xml
ProcessingSettings.ThrottleRate="50"
This value controls the current processing event rate, and has a default value of
50 eps.
5 Change this value to the desired rate of events per second. For example, to lower the
rate of events to 10 eps, change the value after the string to 10:
ProcessingSettings.ThrottleRate="10"
If there are multiple destinations, repeat the steps above to change the
rate for each destination, as required.
The following provides explanation and instructions for enabling FIPS compliance in the use
of the Forwarding Connector.
What is FIPS?
Under the Information Technology Management Reform Act (Public Law 104-106), the
Secretary of Commerce approves standards and guidelines that are developed by the
National Institute of Standards and Technology (NIST) for Federal computer systems.
These standards and guidelines are issued by NIST as Federal Information Processing
Standards (FIPS) for use government-wide. NIST develops FIPS when there are compelling
Federal government requirements such as for security and interoperability and there are no
acceptable industry standards or solutions.
For information regarding operating systems and platforms supported, see SmartConnector
Product and Platform Support, available from ArcSight Technical Support with each
SmartConnector release.
When the installation is complete after step 2, the following dialog is displayed:
1 Click Cancel to exit connector setup in order to perform configuration of the NSS DB,
a necessary step for installing the connector in FIPS-compliant mode. (You will return
to the wizard after performing these configuration steps.)
$ARCSIGHT_HOME/user/agent/agent.properties
4 Copy your key files for source and destination Managers (in this example,
srcmgrkey.cert and destmgrkey.cert) into the
$ARCSIGHT_HOME\current\bin directory.
5 Turn off FIPS enablement on the new installation using the following command:
6 Import the certificates for the source and destination Managers. To do this, see the
detailed instructions below:
Where srcmgrkey and destmgrkey are alias names and srcmgrkey.cert and
destmgrkey.cert are the names with which the certificates from the Managers
were saved, import the certificates for the source and destination Managers, using the
following commands:
This command will display, in plain text (as shown below), the contents of the source
Manager’s certificate and can be used to determine the name put into the connector
This command will display, in plain text, the contents of the destination Manager’s
certificate and can be used to determine the name put into the connector
configuration for the destination manager: arcsight runcertutil –L –n
destmgrkey –t "CT,C,C" –d user/agent/nssdb.client
arcsight connectorsetup
10 The Destination selection window is again displayed. Make sure ArcSight Manager
(encrypted) is selected and click Next.
11 You are prompted for Manager Host Name and Manager Port.
The host name and manager’s certificate name must match and be
DNS resolvable. If these fields do not match, the connection will be
unsuccessful.
This is your destination Manager. Enter the information and click Next.
12 Enter a valid ArcSight User Name and Password, and click Next. This should be the
user name and password for the user account you created on the destination Manager.
13 You are given a choice of Forwarding Connector versions to install. If you are currently
using ESM v4.0 SP3 or later, ArcSight recommends choosing the ArcSight
Forwarding Connector (Enhanced) option.
The host name and manager certificate name must match and be
DNS resolvable. If these fields do not match, the connection will be
unsuccessful.
This is information about your source Manager, as described in the table below.
Parameter Description
ArcSight Source The ArcSight user name created with permissions for
Manager User Name the Forwarding Connector on the ArcSight Source
Manager.
15 Enter a name for the connector and provide other information identifying the
connector's use in your environment. Click Next.
16 Read the connector summary; if it is correct, click Next. If the summary is not correct,
click Previous to make changes before continuing.
17 When the connector completes its configuration, click Next. The wizard now prompts
you to choose whether you want to run the connector as a process or as a service. If
you choose to run the connector as a service, the wizard prompts you to define service
parameters for the connector.
18 After making your selections, click Next. The wizard displays a dialog confirming the
connector's setup and service configuration.
19 Click Finish.
2 Locate the following property for ESM destination parameters (approximately, line 10
in the file):
agents[0].destination[0].params=<?xml version\="1.0"
encoding\="UTF-8"?>\n<ParameterValues>\n <Parameter
Name\="port" Value\="8443"/>\n <Parameter
Name\="filterevents" Value\="false"/>\n <Parameter
Name\="host" Value\="samplehost.sv.arcsight.com"/>\n
<Parameter Name\="aupmaster" Value\="false"/>\n <Parameter
Name\="fipsciphers"
Value\="fipsDefault"/>\n</ParameterValues>\n
3 The destination parameters are specified here as an XML string where each element is
one parameter. Based upon the Suite B mode of the Manager, change fipsDefault
to suiteb128 (for 128-bit security) or suiteb192 (for 192-bit security).