Using Custom Tables

advertisement
CH A P T E R
59
Using Custom Tables
As the FireSIGHT System collects information about your network, the Defense Center stores it in a
series of database tables. When you use a workflow to view the resulting information, the Defense Center
pulls the data from one of these tables. For example, the columns on each page of the Network
Applications by Count workflow are taken from the fields in the Applications table.
If you determine that your analysis of the activity on your network would be enhanced by combining
fields from different tables, you can create a custom table. For example, you could combine the host
criticality information from the predefined Host Attributes table with the fields from the predefined
Connection Data table and then examine connection data in a new context.
Note that you can create custom workflows for either predefined or custom tables. For more information
on creating custom workflows, see Creating Custom Workflows, page 58-39.
The following sections describe how to create and use your own custom tables:
•
Understanding Custom Tables, page 59-1
•
Creating a Custom Table, page 59-5
•
Modifying a Custom Table, page 59-7
•
Deleting a Custom Table, page 59-8
•
Viewing a Workflow Based on a Custom Table, page 59-8
•
Searching Custom Tables, page 59-9
Understanding Custom Tables
License: FireSIGHT
Custom tables contain fields from two or more predefined tables. The FireSIGHT System is delivered
with a number of system-defined custom tables, but you can create additional custom tables that contain
only information that matches your specific needs.
For example, the FireSIGHT System is delivered with system-defined custom tables that correlate
intrusion event data with host data, so you can search for events that impact critical systems and view
the results of that search in one workflow. The following table describes the custom tables provided with
the system.
FireSIGHT System User Guide
59-1
Chapter 59
Using Custom Tables
Understanding Custom Tables
Table 59-1
System-Defined Custom Tables
Table
Description
Hosts with Servers
Includes fields from the Hosts and Servers tables, providing you with
information about the detected applications running on your network,
as well as basic operating system information about the hosts running
those applications.
Intrusion Events with
Destination Criticality
Includes fields from the Intrusion Events table and the Hosts table,
providing you with information on the intrusion events, as well as the
host criticality of the destination host involved in each intrusion
event.
Tip
Intrusion Events with Source
Criticality
Use this table to search for intrusion events involving
destination hosts with high host criticality.
Includes fields from the Intrusion Events table and the Hosts table,
providing you with information on the intrusion events and the host
criticality of the source host involved in each intrusion event.
Tip
Use this table to search for intrusion events involving source
hosts with high host criticality.
Understanding Possible Table Combinations
License: FireSIGHT + Protection
When you create a custom table, you can combine fields from predefined tables that have related data.
The following table lists the predefined tables you can combine to create a new custom table. Keep in
mind that you can create a custom table that combines fields from more than two predefined custom
tables.
Table 59-2
Custom Table Combinations
You can combine fields from...
Applications
Correlation Events
FireSIGHT System User Guide
59-2
With fields from...
•
Correlation Events
•
Intrusion Events
•
Connection Summary Data
•
Host Attributes
•
Application Details
•
Discovery Events
•
Connection Events
•
Hosts
•
Servers
•
White List Events
•
Applications
•
Host Attributes
•
Hosts
Chapter 59
Using Custom Tables
Understanding Custom Tables
Table 59-2
Custom Table Combinations (continued)
You can combine fields from...
Intrusion Events
Connection Summary Data
Indications of Compromise
Host Attributes
Application Details
With fields from...
•
Applications
•
Host Attributes
•
Hosts
•
Servers
•
Applications
•
Host Attributes
•
Hosts
•
Servers
•
Applications
•
Application Details
•
Captured Files
•
Connection Events
•
Connection Summary Data
•
Correlation Events
•
Discovery Events
•
Host Attributes
•
Hosts
•
Intrusion Events
•
Security Intelligence Events
•
Servers
•
White List Events
•
Applications
•
Correlation Events
•
Intrusion Events
•
Connection Summary Data
•
Application Details
•
Discovery Events
•
Connection Events
•
Hosts
•
Servers
•
White List Events
•
Applications
•
Host Attributes
•
Hosts
FireSIGHT System User Guide
59-3
Chapter 59
Using Custom Tables
Understanding Custom Tables
Table 59-2
Custom Table Combinations (continued)
You can combine fields from...
Discovery Events
Connection Events
Security Intelligence Events
Hosts
Servers
White List Events
With fields from...
•
Applications
•
Host Attributes
•
Hosts
•
Applications
•
Host Attributes
•
Hosts
•
Servers
•
Applications
•
Host Attributes
•
Hosts
•
Servers
•
Applications
•
Correlation Events
•
Intrusion Events
•
Connection Summary Data
•
Host Attributes
•
Application Details
•
Discovery Events
•
Connection Events
•
Servers
•
White List Events
•
Applications
•
Intrusion Events
•
Connection Summary Data
•
Host Attributes
•
Connection Events
•
Hosts
•
Applications
•
Host Attributes
•
Hosts
Sometimes a field in one table maps to more than one field in another table. For example, the predefined
Intrusion Events with Destination Criticality custom table combines fields from the Intrusion Events table and
the Hosts table. Each event in the Intrusion Events table has two IP addresses associated with it—a
source IP address and a destination IP address. However, the “events” in the Hosts table each represent
a single host IP address (hosts may have multiple IP addresses). Therefore, when you create a custom
FireSIGHT System User Guide
59-4
Chapter 59
Using Custom Tables
Creating a Custom Table
table based on the Intrusion Events table and the Hosts table, you must choose whether the data you
display from the Hosts table applies to the host source IP address or the host destination IP address in
the Intrusion Events table.
When you create a new custom table, a default workflow that displays all the columns in the table is
automatically created. Also, just as with predefined tables, you can search custom tables for data that
you want to use in your network analysis. You can also generate reports based on custom tables, as you
can with predefined tables.
For more information on creating custom tables, see:
•
Creating a Custom Table, page 59-5
•
Modifying a Custom Table, page 59-7
•
Deleting a Custom Table, page 59-8
•
Viewing a Workflow Based on a Custom Table, page 59-8
•
Searching Custom Tables, page 59-9
Creating a Custom Table
License: FireSIGHT
If you determine that your analysis of the activity on your network would be enhanced by combining
fields from different tables, you can create a custom table.
Tip
Instead of creating a new custom table, you can export a custom table from another Defense Center, then
import it onto your Defense Center. You can then edit the imported custom table to suit your needs. For
more information, see Importing and Exporting Configurations, page A-1.
To create a custom table, decide which predefined tables delivered with the FireSIGHT System contain
the fields you want to include in your custom table. You can then choose which fields you want to include
and, if necessary, configure field mappings for any common fields.
Tip
Data involving the Hosts table allows you to view data associated with all IP addresses from one host,
rather than one specific IP address.
For example, consider a custom table that combines fields from the Correlation Events table and the
Hosts table. You can use this custom table to get detailed information about the hosts involved in
violations of any of your correlation policies. Note that you must decide whether to display data from
the Hosts table that matches the source IP address or the destination IP address in the Correlation Events
table.
FireSIGHT System User Guide
59-5
Chapter 59
Using Custom Tables
Creating a Custom Table
If you view the table view of events for this custom table, it displays correlation events, one per row. The
following information is included:
Tip
•
the date and time the event was generated
•
the name of the correlation policy that was violated
•
the name of the rule that triggered the violation
•
the IP address associated with the source, or initiating, host involved in the correlation event
•
the source host’s NetBIOS name
•
the operating system and version the source host is running
•
the source host criticality
You could create a similar custom table that displays the same information for destination, or
responding, hosts.
To build the custom table in the previous example:
Access: Admin
Step 1
Select Analysis > Custom > Custom Tables.
FireSIGHT System User Guide
59-6
Chapter 59
Using Custom Tables
Modifying a Custom Table
The Custom Tables page appears.
Step 2
Click Create Custom Table.
The Create Custom Table page appears.
Step 3
In the Name field, type a name for the custom table, such as Correlation Events with Host
Information (Src IP).
Step 4
From the Tables drop-down list, select Correlation Events.
The fields in the Correlation Events table appear in the Fields list.
Step 5
Under Fields, select Time and click Add to add the date and time when a correlation event was generated.
Step 6
Repeat step 5 to add the Policy and Rule fields.
Tip
Step 7
You can use Ctrl or Shift while clicking to select multiple fields. You can also click and drag to select
multiple adjacent values. However, if you want to specify the order the fields appear in the table view of
events associated with the table, add the fields one at a time.
From the Tables drop-down list, select Hosts.
The fields in the Hosts table appear in the Fields list. For more information on these fields, see
Understanding the Hosts Table, page 50-20.
Step 8
Add the IP Address, NetBIOS Name, OS Name, OS Version, and Host Criticality fields to the custom table.
Step 9
Under Common Fields, next to Correlation Events, select Source IP.
Your custom table is configured to display the host information you chose in step 8 for the source, or
initiating, hosts involved in correlation events.
Tip
Step 10
You could create a custom table that displays detailed host information for the destination, or
responding, hosts involved in a correlation event by following this procedure but selecting Destination IP
instead of Source IP.
Click Save.
The custom table is saved.
Modifying a Custom Table
License: FireSIGHT
You can add or delete fields in a custom table as your needs change.
To modify a custom table:
Access: Any/Admin
Step 1
Select Analysis > Custom > Custom Tables.
The Custom Tables page appears.
Step 2
Click the edit icon (
) next to the table you want to edit.
FireSIGHT System User Guide
59-7
Chapter 59
Using Custom Tables
Deleting a Custom Table
The Edit Custom Table page appears. See Creating a Custom Table, page 59-5 for information on the
various configurations you can change.
Step 3
Note
Step 4
Optionally, remove fields from the table by clicking the delete icon (
remove.
) next to the fields you want to
If you delete fields currently in use in reports, you will be prompted to confirm that you want to remove
the sections using those fields from those reports.
Make other changes as needed and click Save.
Your custom table is updated.
Deleting a Custom Table
License: FireSIGHT
You can delete a custom table that you no longer need. If you delete a custom table, saved searches that
use the custom table are also deleted.
To delete a custom table:
Access: Any/Admin
Step 1
Select Analysis > Custom > Custom Tables.
The Custom Tables page appears.
Step 2
Click the delete icon (
) next to the custom table you want to delete.
The table is deleted.
Viewing a Workflow Based on a Custom Table
License: FireSIGHT
When you create a custom table, the system automatically creates a default workflow for it. The first
page of this workflow displays a table view of events. If you include intrusion events in your custom
table, the second page of the workflow is the packet view. Otherwise, the second page of the workflow
is a hosts page. You can also create your own custom workflows based on your custom table.
Tip
If you create a custom workflow based on a custom table, you can specify it as the default workflow for
that table. For more information, see Configuring Event View Settings, page 71-3.
You can use the same techniques to view events in your custom table that you use for event views based
on predefined tables. See Using Workflow Pages, page 58-18 for more information.
FireSIGHT System User Guide
59-8
Chapter 59
Using Custom Tables
Searching Custom Tables
To view a workflow based on a custom table:
Access: Any/Admin
Step 1
Select Analysis > Custom > Custom Tables.
The Custom Tables page appears.
Step 2
Click the view icon (
) next to the custom table on which the workflow you want to see is based.
The first page of the default workflow for the custom table appears. To use a different workflow, click
(switch workflow) by the workflow title. For information on how to specify a different default workflow,
see Configuring Event View Settings, page 71-3. If no events appear and the workflow can be
constrained by time, you may need to adjust the time range; see Setting Event Time Constraints,
page 58-23.
Searching Custom Tables
License: FireSIGHT
You can create and save searches for a custom table. You may want to create searches customized for
your network environment, then save them to reuse later. Note that if you delete a custom table, all
searches you have saved for that custom table are also deleted.
The search criteria you can use are the same as the criteria for the predefined tables you used to build
your custom table. See the sections listed in the following table for detailed information on the search
criteria you can use.
Table 59-3
Table Search Criteria
For search criteria for...
See...
Audit Events
Searching Audit Records, page 69-8
Application Details
Searching for Application Details, page 50-47
Correlation Events
Searching for Correlation Events, page 51-56
Connection Data
Searching for Connection and Security Intelligence Data,
page 39-31
Hosts
Searching for Hosts, page 50-24
Host Attributes
Searching for Host Attributes, page 50-29
Hosts with Applications
Searching for Hosts, page 50-24 and Searching for Servers,
page 50-38
Intrusion Events
Searching for Intrusion Events, page 41-41
Intrusion Events with Destination
Criticality
Searching for Intrusion Events, page 41-41 and Searching for
Hosts, page 50-24
Intrusion Events with Source
Criticality
Searching for Intrusion Events, page 41-41 and Searching for
Hosts, page 50-24
Status Events
Searching for Remediation Status Events, page 54-20
Discovery Events
Searching for Discovery Events, page 50-16
User Events
Searching for User Activity, page 50-67
FireSIGHT System User Guide
59-9
Chapter 59
Using Custom Tables
Searching Custom Tables
Table 59-3
Table Search Criteria (continued)
For search criteria for...
See...
Rule Update Import Log
Searching the Rule Update Import Log, page 66-25
Applications
Searching for Applications, page 50-43
Security Intelligence Events
Searching for Connection and Security Intelligence Data,
page 39-31
Users
Searching for Users, page 50-62
Vulnerabilities
Searching for Vulnerabilities, page 50-52
White List Events
Searching for Compliance White List Events, page 52-31
White List Violations
Searching for White List Violations, page 52-36
To implement these criteria in a table search, see the following procedure.
To perform a search on a custom table:
Access: Any/Admin
Step 1
Select Analysis > Custom > Custom Tables.
The Custom Tables page appears.
Step 2
Click the view icon (
) next to the custom table you want to search.
The first page of the default workflow for the custom table appears. To use a different workflow,
including a custom workflow, click (switch workflow) by the workflow title. For information on specifying
a different default workflow, see Configuring Event View Settings, page 71-3. If no events appear and
the workflow can be constrained by time, you may need to adjust the time range; see Setting Event Time
Constraints, page 58-23.
Step 3
Click Search.
The custom table’s search page appears.
Tip
Step 4
To search the database for a different kind of event or data, select it from the table drop-down list.
Enter your search criteria in the appropriate fields. For more information about choosing search criteria,
see the Table Search Criteria table.
If you enter criteria for multiple fields, the search returns only the records that match search criteria
specified for all fields.
Tip
Click the object icon ( ) next to a search field to use an object as a search criterion. For more
information on searches, including information on special search syntax, using objects in searches, and
saving and loading searches, see Performing and Saving Searches, page 60-1.
Step 5
Optionally, if you plan to save the search, you can select the Private check box to save the search as
private so only you can access it. Otherwise, leave the check box clear to save the search for all users.
FireSIGHT System User Guide
59-10
Chapter 59
Using Custom Tables
Searching Custom Tables
Tip
Step 6
If you want to use the search as a data restriction for a custom user role, you must save it as a private
search.
Optionally, you can save the search to be used again in the future. You have the following options:
•
Click Save to save the search criteria.
For a new search, a dialog box appears prompting for the name of the search; enter a unique search
name and click Save. If you save new criteria for a previously-existing search, no prompt appears.
The search is saved (and visible only to your account if you selected Private) so that you can run it
at a later time.
•
Click Save As New to save a new search or assign a name to a search you created by altering a
previously-saved search.
A dialog box appears prompting for the name of the search; enter a unique search name and click
Save. The search is saved (and visible only to your account if you selected Private) so that you can
run it at a later time.
Step 7
Click Search to start the search.
Your search results appear in the default workflow for the custom table, constrained by the current time
range (if applicable). To use a different workflow, including a custom workflow, click (switch workflow)
by the workflow title. For information on specifying a different default workflow, see Configuring Event
View Settings, page 71-3.
FireSIGHT System User Guide
59-11
Chapter 59
Searching Custom Tables
FireSIGHT System User Guide
59-12
Using Custom Tables
Download