F I R E E Y E T E C H N I C A L D O C U M E N T A T I O N CENTRAL MANAGEMENT ADMINISTRATION GUIDE RELEASE 8.7 CENTRAL MANAGEMENT / 2019 FireEye and the FireEye logo are registered trademarks of FireEye, Inc. in the United States and other countries. All other trademarks are the property of their respective owners. FireEye assumes no responsibility for any inaccuracies in this document. FireEye reserves the right to change, modify, transfer, or otherwise revise this publication without notice. Copyright © 2019 FireEye, Inc. All rights reserved. This product is part of the Helix platform. CM Administration Guide Software Release 8.7.0 Revision 4 FireEye Contact Information: Website: www.fireeye.com/company/contact-us.html Technical Support: https://csportal.fireeye.com Phone (US): 1.408.321.6300 1.877.FIREEYE Contents PART I: Overview 23 CHAPTER 1: About the Central Management Appliance 25 Terminology In the User Interface 25 "Single Pane of Glass" 26 Alert Management 26 Alert Correlation 27 Signature Distribution 27 Submit to Malware Analysis for Deep Forensics 27 Appliance Groups 27 Central Management Deployment 28 Standard Deployment 28 Network Address Translation (NAT) Deployment 28 Single-Port Deployment 29 High Availability (HA) Deployment 29 FireEye Network Security (MVX Cluster) Deployment 30 Split DTI Traffic Deployment 30 Management Path 31 Central Management Appliances That Receive DTI Updates 31 Environments That Restrict Outbound Access to Certain IP Addresses 31 CM Appliances with Domain-based Proxy ACL Rules 32 Integrated CM Communications Protocol and Port Configurations 32 FIPS 140-2 and Common Criteria Compliance CHAPTER 2: User Interfaces Overview of CM User Interfaces © 2019 FireEye 32 35 36 3 Contents The CM Appliance Web UI Browser Support 37 Screen Resolution Requirements 37 Logging In Locally to the Helix Appliance Web UI 38 Notifications of Appliance Health Problems 39 The Central Management Appliance Dashboard 39 Central Management Web UI Tabs 54 PDF Generation 56 The CM Appliance Command-Line Interface 56 The CM Appliance LCD Display 57 Navigating the LCD Menus 57 LCD Panel Menus 58 The CM Appliance IPMI Interface 4 37 60 IPMI Browser Support 61 Logging In to the IPMI Interface 61 Power Cycling and Resetting the Device 62 Accessing the Device Serial Console 63 Checking the Status of Device Sensors 64 Resetting the IPMI Interface Using the CLI 64 PART II: Configuration 67 CHAPTER 3: Accessing the Physical or Serial Console 69 CHAPTER 4: Initial Configuration 73 Initial Configuration Overview 74 Initial Configuration Prerequisites 74 Configuring Initial Settings Using a Keyboard and Monitor 75 Configuring Initial Settings Using the Serial Console Port 76 Using a Windows or Mac Laptop 76 Using a Linux System 77 Using a Terminal Server 77 © 2019 FireEye Contents Configuration Wizard Steps 78 Configuring Initial Settings Using the LCD Panel 81 Configuring the IPMI Interface 82 Viewing the IPMI Configuration 82 Configuring the IPMI Port 83 CHAPTER 5: Virtual Central Management Appliances Deploying Virtual Central Management Appliances on VMware ESXi 85 86 VMware ESXi System Requirements 86 Installing a Virtual Appliance in VMware ESXi 88 Performing the Initial Configuration 93 Deploying Virtual Central Management Instances on Amazon Web Services (AWS) 96 AWS System Requirements 97 Launching a Virtual Central Management Instance on AWS 98 Configuring the Activation Code and Initial Admin Password on AWS 99 Performing the Initial Configuration Deploying Virtual Central Management Appliances on KVM Servers 100 101 KVM System Requirements 101 Installing a Virtual Central Management Appliance on KVM 102 Performing the Initial Configuration 105 Understanding Virtual Appliance Licensing 108 Viewing Virtual Appliance License Status Using the CLI Viewing System Entropy Status Viewing System Entropy Status Using the CLI 109 112 113 CHAPTER 6: License Keys 115 About FireEye License Keys 115 Overriding One-Way Sharing License 117 Override One-Way Sharing License Using the CLI Automatic License Updates 117 118 How It Works 118 Enabling Automatic License Updates 119 © 2019 FireEye 5 Contents Manual License Installation 121 Installing Licenses Using the Web UI 121 Removing Licenses Using the Web UI 122 Installing Licenses Using the CLI 122 Removing Licenses Using the CLI 124 Viewing License Notifications Using the Web UI 125 CHAPTER 7: The DTI Network 127 About the DTI Network 127 Threat Intelligence 127 Automatic License Updates 128 System Health Monitoring and Software Updates 129 About DTI Network Communication 130 Changing the Active Setting for a DTI Service 131 Changing the Active Source for a Central Management Appliance Using the Web UI 132 Changing the Active Source for a Central Management Appliance Using the CLI 133 Changing the Global Active Source for Managed Appliances Using the Web UI 134 Changing Global Active DTI Settings for Managed Appliances Using the CLI Using an HTTP Proxy for DTI Service Requests 136 Understanding the DTI Cache 137 Downloading Software Updates to the DTI Cache 139 Managing the DTI Cache 144 Validating DTI Access 149 Validating DTI Access Using the Web UI 150 Validating DTI Access Using the CLI 150 Configuring DTI Credentials Configuring DTI Credentials Using the CLI Automatic Validation of Security Content 6 134 152 152 153 About Automatic Validation of Security Content 153 Conditions That Indicate a Compatible Security Content Package 153 © 2019 FireEye Contents Error Codes for Incompatible Security Content Packages Sharing Anonymized Data 154 155 About Sharing Anonymized Data With the DTI Cloud 155 Uploading Anonymized Data Automatically Using the CLI 157 Uploading Anonymized Data Manually Using the CLI 158 CHAPTER 8: System Security 161 AAA 161 Certificates 161 CHAPTER 9: System Email Settings Configuring the Mail Server 163 164 Configuring the Mail Server Using the Web UI 165 Configuring the Mail Server for Health Check Notifications Using the CLI 166 Configuring the Mail Server for Scheduled Reports Using the CLI 168 Configuring Email Recipients 169 Configuring Email Recipients Using the Web UI 170 Configuring Email Recipients Using the CLI 171 Configuring System Events 172 Configuring System Event Notifications Using the Web UI 173 Configuring System Event Notifications Using the CLI 174 Configuring Auto Support for System Event Notifications Configuring Auto Support for System Event Notifications Using the CLI CHAPTER 10: Date and Time Settings Manual Time Configuration 176 177 179 179 Setting the Date and Time Using the Web UI 179 Setting the Date and Time Using the CLI 180 NTP Server Configuration 181 Configuring NTP Servers Using the Web UI 182 Configuring NTP Servers Using the CLI 183 Configuring NTP Authentication Using the CLI 186 © 2019 FireEye 7 Contents Time Zone Configuration Setting the Time Zone Using the Web UI 191 Setting the Time Zone Using the CLI 191 Synchronizing the System Clock to DTI Server Time Using the CLI 192 PART III: Administration 195 CHAPTER 11: Network Administration 197 Basic Network Configuration 197 Configuring Basic Network Settings Using the Web UI 199 Configuring Basic Network Settings Using the CLI 202 IPMI Firmware Updates Enabling and Disabling IPMI Firmware Notifications Using the CLI IP Filtering 203 204 204 Interfaces Supported by IP Filtering Rules 205 Viewing IP Filtering Rules 205 Enabling IP Filtering Using the CLI 206 Configuring HTTP Proxy Server Settings 207 Configuring HTTP Proxy Server Settings Using the CLI 207 Disabling HTTP Proxy Server Settings Using the CLI 208 Defining Another Management Interface Defining Another Management Interface Using the CLI DTI Traffic and Management Traffic Splitting DTI and Management Traffic Using the CLI CHAPTER 12: Upgrading the FireEye Software 8 190 209 210 212 214 219 Before You Begin the Upgrade 219 Upgrading the Appliance Using the Web UI 221 Select an Upgrade Source 221 Check for Available Update Software 222 Download the Software 222 Install the Software Update 222 © 2019 FireEye Contents Validate the Software Updates Upgrading the Appliance Using the CLI 223 223 Download and Install the Appliance Software Image 224 Restart the Appliance and Accept the EULA 224 Verify the Upgrade 225 Configuring Auto-Mounting on a USB Device 225 Enabling or Disabling Auto-Mounting on a USB Device Using the CLI 226 Configuring HTTP Access to Install Software Updates Using the CLI 227 Installing Guest Images from a USB Device Using the CLI 228 Mounting or Unmounting a USB Device Using the CLI 229 Upgrading Firmware to IPMI 3.11 and BIOS 1.9 Upgrading IPMI 3.11 and BIOS 1.9 Firmware for Specific Platforms 230 230 CHAPTER 13: Log Management 233 Managing Logs Using the Web UI 233 Viewing the Current Log Configuration 236 Configuring a Syslog Server Using the CLI 237 Configuring the Minimum Severity of Messages Sent to Syslog Servers Using the CLI 238 Configuring the Minimum Severity of Messages Stored on the Local Drive Using the CLI 240 Configuring the Timestamp Format Using the CLI 242 Uploading the Active Log File to a Network Location Using the CLI 244 CHAPTER 14: Database Backup and Restore 245 Database Backup and Restore Introduction 245 Task List for Database Backup and Restore 246 Viewing the Last Backup and Restore Results 246 Viewing the Last Backup and Restore Results Using the Web UI 247 Viewing the Last Backup and Restore Status Using the CLI 247 Estimating the Space Needed for the Backup File Estimating the Space Needed for the Backup File Using the Web UI © 2019 FireEye 248 248 9 Contents Estimating the Space Needed for the Backup File Using the CLI 249 Backing Up the Database 249 Backing Up the Database Using the Web UI 250 Backing Up the Database Using the CLI 251 Scheduling Automatic Backups 253 Scheduling Automatic Backups Using the CLI 254 Downloading Backup Files 256 Downloading Backup Files Using the Web UI 257 Uploading Backup Files 257 Uploading Backup Files Using the Web UI 258 Restoring the Database from a Backup File 258 Restoring the Database from a Backup File Using the Web UI 259 Restoring the Database from a Backup File Using the CLI 260 Deleting Previous Backup Files 262 Deleting Previous Backup Files Using the Web UI 262 Deleting Previous Backup Files Using the CLI 263 CHAPTER 15: System Health and Performance 265 Viewing System Health and Performance Check Results 265 Viewing System Health and Performance Check Results Using the Web UI Checking System Health and Status 269 Checking System Health Using the Web UI 269 Checking System Health Using the CLI 274 CHAPTER 16: SNMP Data 279 Retrieving SNMP Data 279 Providing Access to SNMP Data 280 Downloading the MIB 280 Sending Requests for SNMP Information 282 Sending Traps 10 266 283 Enabling and Configuring Traps 283 Logging Trap Messages 284 © 2019 FireEye Contents CHAPTER 17: Login Banners and Messages 287 About Login Banners and Messages 287 Customizing Login Banners and Messages Using the Web UI 289 Customizing Login Banners and Messages Using the CLI 290 CHAPTER 18: Supported Features Viewing Supported Features Using the Web UI CHAPTER 19: Event Notifications Configuring Event Notifications Using the Web UI 293 293 295 295 Configuring Event Notifications 296 CSV Fields for Daily Digest Notifications 297 Configuring Email Notifications Using the Web UI 299 Configuring HTTP Notifications Using the Web UI 301 Configuring Rsyslog Notifications Using the Web UI 305 Configuring SNMP Notifications Using the Web UI 309 Configuring Event Notifications Using the CLI 311 Configuring Event Notifications 312 Configuring Email Notifications Using the CLI 313 Configuring HTTP Notifications Using the CLI 321 Configuring Rsyslog Notifications Using the CLI 328 Configuring SNMP Notifications Using the CLI 335 Configuring the Proxy Server for Notifications Configuring the Proxy Server for Notifications Using the CLI Configuring ATI Alert Updates for Notifications Configuring ATI Alert Updates for Notifications Using the CLI CHAPTER 20: Disk Space Management On-Demand Cleanup Using Profiles 340 340 341 342 345 345 Viewing a Summary of Disk Space Use Using the CLI 346 Viewing Disk Space Use By Profile Using the CLI 347 Deleting Data to Free Disk Space Using the CLI 347 © 2019 FireEye 11 Contents CHAPTER 21: Boot Manager Utilities 349 Working with the Tools Menu 350 System Requirements 350 Setting the Tools Menu Password 352 Accessing the Tools Menu 354 Disabling the Tools Menu 356 Viewing Tools Menu Availability 357 Wiping Persistent Media 358 Wiping Persistent Media Using the Tools Menu 359 PART IV: Appliances 361 CHAPTER 22: Adding and Removing Appliances 363 Adding an Appliance (Using the Central Management Appliance) 363 Adding an Appliance Using the Central Management Web UI 364 Adding an Appliance Using the Central Management CLI 365 Accepting a Management Request 366 Preparing the Central Management to Accept a Management Request 367 Accepting a Management Request Using the Central Management Web UI 368 Accepting a Management Request Using the Central Management CLI 369 Removing a Managed Appliance from the Central Management Network 371 Removing a Managed Appliance from the Central Management Network Using the Web UI 371 Removing a Managed Appliance from the Central Management Network Using the CLI 372 CHAPTER 23: Viewing and Modifying Managed Appliance Information 373 12 Viewing Managed Appliance Information Using the Web UI 375 Viewing Managed Appliance Information Using the CLI 378 Modifying Managed Appliance Information Using the Web UI 379 Modifying Managed Appliance Information Using the CLI 380 © 2019 FireEye Contents CHAPTER 24: Configuring Managed Appliances 383 Configuring Managed Appliances Using the Web UI 384 Configuring Network Settings for Managed Appliances Using the Web UI 385 Setting the Appliance Date and Time Manually on Managed Appliances Using the Web UI 385 Managing Licenses for Managed Appliances Using the Web UI 385 Configuring NTP Servers for Managed Appliances Using the Web UI 386 Configuring System Email Settings for Managed Appliances Using the Web UI 386 Configuring DTI Network Settings for Managed Appliances Using the Web UI 386 Customizing Appliance Login Messages for Managed Appliances Using the Web UI 387 Configuring Guest Images for Managed Appliances Using the Web UI 387 Uploading Certificates to Managed Appliances Using the Web UI 387 Managing Users on Managed Appliances Using the Web UI 388 Configuring Event Notifications for Managed Appliances Using the Web UI 388 Configuring File Types for Managed Malware Analysis Appliances to Analyze Using the Web UI 388 Generating Reports for Managed Appliances Using the Web UI 389 Scheduling Reports for Managed Appliances Using the Web UI 389 Enabling or Disabling Riskware Detection Custom Policy Rules for Managed Appliances Using the Web UI 391 Configuring Inline Operational Modes for Managed NX Series Appliances Using the Web UI 391 Configuring Inline Policy Exceptions for Managed NX Series Appliances Using the Web UI 392 Configuring Whitelists for Managed NX Series Appliances Using the Web UI 392 Defining Filters for Managed NX Series Appliances Using the Web UI 392 Uploading YARA Rules to Managed Appliances Using the Web UI 393 Uploading Custom Rules to Managed NX Series Appliances Using the Web UI 393 Configuring Forensic Analysis Integration on Managed NX Series Appliances Using the Web UI 394 Configuring IPS Settings for Managed NX Series Appliances Using the Web UI 394 Configuring SSL Interception for Managed NX Series Appliances Using the Web UI © 2019 FireEye 394 13 Contents Allowing Increased Detection for Managed Appliances Using the Web UI 395 Enabling Advanced URL Defense on Managed CM Appliances Using the Web UI 396 Configuring Email MTA Settings for Managed CM Appliances Using the Web UI 397 Configuring Email Policy Using the Web UI 397 Configuring Impersonation Rules Using the Web UI 397 Configuring Rules on an Allowed List for Managed CM Appliances Using the Web UI 398 Configuring Rules on a Blocked List for Managed CM Appliances Using the Web UI 398 Configuring Attachment Decryption Settings for Managed CM Appliances Using the Web UI 399 Configuring Malware Analysis Settings for Managed AX Series Appliances Using the Web UI 399 Configuring File Types for Managed Malware Analysis Appliances to Analyze Using the Web UI 399 Configuring Malware Repository Settings for Managed AX Series Appliances Using the Web UI 400 Configuring and Managing Scans for Managed FX Series Appliances Using the Web UI 400 Configuring and Managing Storage for Managed FX Series Appliances Using the Web UI Configuring Managed Appliances Using the CLI 401 Canceling Outstanding Commands 403 CHAPTER 25: Using Appliance Groups and Command Profiles Grouping Appliances 14 401 405 405 Creating and Managing Groups Using the Web UI 406 Creating and Managing Groups Using the CLI 408 Adding Appliances to Groups Using the Web UI 410 Adding Appliances to Groups Using the CLI 410 Removing Appliances from Groups Using the Web UI 411 Removing Appliances from Groups Using the CLI 412 © 2019 FireEye Contents Working with Command Profiles 412 Creating and Managing Profiles Using the CLI 413 Adding Commands to Profiles Using the CLI 415 Removing Commands from Profiles Using the CLI 417 Applying Profiles Using the CLI 418 CHAPTER 26: Monitoring Aggregated Alert Data Managing the Distribution of Alert Notifications 421 421 Centralized Notifications 421 Mixed Notifications 422 Decentralized Notifications 423 Monitoring Appliances Using the Web UI 424 Viewing Alerts and Events for Managed NX Series Appliances Using the Web UI 424 Managing Suppressed Alerts on Managed NX Series Appliances Using the Web UI 425 Monitoring Malware and Callback Activity for Managed NX Series Appliances Using the Web UI 426 Viewing Malware Summaries for Managed NX Series Appliances Using the Web UI 426 Viewing Riskware for Managed Appliances Using the Web UI 426 Viewing SmartVision Alerts on SmartVision Appliances Using the Web UI 427 Viewing the Campaigns for Managed CM Appliances Using the Web UI 427 Managing Quarantined Emails for Managed CM Appliances Using the Web UI 428 Viewing Email Analysis Results for Managed CM Appliances Using the Web UI 428 Viewing and Exporting the Results of Processed Emails on a Managed CM Appliance Using the Web UI 429 Viewing the Messages in the Email Queue on a Managed CM Appliance Using the Web UI 429 Viewing URL Click Reports for Managed EX Series Appliances Using the Web UI 429 Viewing Malware Analysis Results for Managed AX Series Appliances Using the Web UI 431 © 2019 FireEye 15 Contents Managing File Quarantines for Managed FX Series Appliances Using the Web UI 431 Managing File Alerts for Managed FX Series Appliances Using the Web UI Monitoring Appliances Using the CLI 432 NX Series and CM Event Correlation 433 Reviewing Email Alerts Correlated with Web Events 434 Reviewing Web Alerts Correlated with Email Events 437 Enabling Remote CM Appliance Event Correlation 439 Endpoint Security Event Correlation 440 Sending Alerts to the Helix Web UI Using the CLI 440 CHAPTER 27: Working with Reports for Managed Appliances 443 About Reports 443 Predefined Report Templates 443 Custom Reports 443 Customizing Reports for Managed Appliances 444 Task List for Customizing Reports for Managed Appliances 444 Creating and Configuring Settings for a Custom Report 445 Configuring Graphs for Custom Reports 450 Configuring Tables for Custom Reports 460 Creating a Custom Report from a Predefined Report Template 471 Editing and Cloning Reports That Have Been Generated 475 Sending, Downloading, and Deleting Custom Reports 481 Generating and Scheduling Reports for Managed Appliances 485 Generating Reports for Managed Appliances Using the Web UI 485 Scheduling Reports for Managed Appliances Using the Web UI 486 Generating and Scheduling Reports for Managed Appliances Using the CLI 487 CHAPTER 28: Checking Status and Health of Managed Appliances 489 Checking Status and Health of Managed Appliances Using the Web UI 490 Refreshing the Status Information Checking Status and Health of Managed Appliances Using the CLI 16 432 491 492 © 2019 FireEye Contents Defining Status and Health Check Settings for Managed Appliances Using the CLI 496 CHAPTER 29: Updating Managed Appliances 499 Updating Managed Appliances Using the Web UI 500 Updating Managed Appliances Using the CLI 503 CHAPTER 30: Configuring Custom IOC Feeds 505 About Custom IOC Feeds Task List for Managing Custom IOC Feeds Enabling or Disabling Custom IOC Feeds 505 506 507 Enabling or Disabling Third-Party IOC Feeds on All Appliances Using the CLI 508 Enabling or Disabling the Local Feed on All Appliances Using the CLI 509 Enabling or Disabling Third-Party IOC Feeds on a Specific Appliance Using the CLI 511 Enabling or Disabling the Local IOC Feed on a Specific Appliance Using the CLI 513 Creating a Custom Blacklist from Third-Party Feeds 514 Uploading a Third-Party Feed 516 Uploading a Third-Party Feed Using the Web UI Viewing Custom Feed Details 516 518 Viewing Custom Feed Details Using the Web UI 519 Viewing Custom Feed Details Using the CLI 519 Viewing Custom Feed Details Grouped by Alert Using the Web UI 520 Deleting Third-Party IOC Feeds Using the Web UI 521 Downloading a Third-Party Feed Using the Web UI 523 CHAPTER 31: Filtering Alerts Using Tags and Rules Overview of Filtering Alerts Using Tags and Rules Task List for Filtering Alerts Using Tags and Rules Configuring Tags and Values 525 525 525 526 Adding Tags Using the Web UI 527 Editing Tags Using the Web UI 528 © 2019 FireEye 17 Contents Deleting Tags Using the Web UI 529 Adding Values to a Tag Using the Web UI 530 Editing Values for a Tag Using the Web UI 531 Deleting Values From a Tag Using the Web UI 533 Configuring Rules to Manage Alert Tags 534 Adding a Rule to Match a Condition for a Particular IP Address Using the Web UI 535 Adding a Rule to Match a Condition for a Particular VLAN Using the Web UI 537 Adding a Rule to Match a Condition for a Particular Appliance Using the Web UI 538 Adding a Rule to Match a Condition for a Particular Product Type Using the Web UI 540 Adding a Rule to Match a Condition for a Particular Severity Type Using the Web UI 542 Adding a Rule to Match a Condition for a Particular Email Using the Web UI 543 Editing a Rule Using the Web UI 545 Deleting a Rule for an Alert Tag Using the Web UI 547 Setting or Changing the Priority of Rules Using the Web UI 548 Viewing Tags for an Alert for Managed Email Security — Server Edition Appliances Using the Web UI 549 Viewing Tags for an Alert for Managed Network Security Appliances Using the Web UI 550 Adding Tags to Alerts Manually for Managed Appliances Using the Web UI 550 Adding a Tag to an Alert for Managed Appliances Using the Web UI 551 Editing a Tag for an Alert for Managed Appliances Using the Web UI 552 Deleting a Tag From an Alert for Managed Appliances Using the Web UI 553 PART V: Appendices 555 APPENDIX A: Configuring Secure Shell (SSH) Authentication 557 About SSH Authentication 557 User Authentication 558 Creating a Public Key Using the CLI 18 559 © 2019 FireEye Contents Pushing a Public Key Using the CLI 560 Configuring User Authentication Using the Web UI 562 Configuring User Authentication Using the CLI 563 Host-Key Authentication 565 Obtaining a Host Key Using the Web UI 566 Obtaining a Host Key Using the CLI 567 Importing a Host Key into the Global Host-Keys Database Using the Web UI 568 Importing a Host Key into the Global Host-Keys Database Using the CLI 570 Enabling Strict and Global Host-Key Checking Using the CLI 572 APPENDIX B: Configuring Network Address Translation (NAT) About NAT Address Mapping 575 575 Port Accessibility for Single-Port Communication 576 Port Accessibility for Dual-Port Communication 576 Mappings Used When the Central Management Appliance Initiates the Connection 576 Central Management Appliance Is Behind a NAT Gateway 577 Managed Appliance Is Behind a NAT Gateway 578 Central Management and Managed Appliance Are Behind Different NAT Gateways 579 Central Management and Managed Appliance Are In an External Network 580 Mappings Used When the Managed Appliance Initiates the Connection 580 Central Management Appliance Is Behind a NAT Gateway 581 Managed Appliance Is Behind a NAT Gateway 582 Central Management and Managed Appliance Are Behind Different NAT Gateways 582 Central Management and Managed Appliance Are in External Networks 584 Adding an Appliance in a NAT Deployment (Using the Central Management Appliance) 584 Adding an Appliance in a NAT Deployment Using the Central Management CLI Accepting a Management Request in a NAT Deployment Accepting a Management Request in a NAT Deployment Using the Central Management Web UI © 2019 FireEye 584 586 587 19 Contents Accepting a Management Request in a NAT Deployment Using the Central Management CLI Configuring Global Host-Key Authentication in a NAT Deployment 588 590 APPENDIX C: Configuring the CM Peer Service 591 About CM Peer Service 591 Task List for Configuring the CM Peer Service 592 Enabling or Disabling the CM Peer Service 593 Enabling or Disabling the CM Peer Service Using the CLI 594 Generating and Importing Authentication Tokens Between CM Peers 595 Generating and Importing Tokens for CM Peers Using the CLI 596 Importing New Tokens for an Existing CM Peer Using the CLI 598 Exporting an Existing Token from a CM Peer Using the CLI 599 Enabling or Disabling All the Features of the CM Peer Service on the Peers 600 Enabling or Disabling All the Features of the CM Peer Service on the Peers Using the CLI 601 Deleting a CM Peer Using the CLI 603 CM Peer Distributed Correlation 603 Enabling or Disabling CM Peer Distributed Correlation Using the CLI 604 Viewing CM Peer Distributed Correlation Alerts in the Web UI 606 CM Peer Signature Sharing 607 Enabling or Disabling CM Peer Signature Sharing Using the CLI 607 Viewing the Number of Rules for CM Peer Signature Sharing Using the CLI 609 Allowing or Preventing a CM Peer to Use a Proxy Server Allowing or Preventing a CM Peer to Use a Proxy Server Using the CLI 610 611 APPENDIX D: Monitoring Email Alerts from the Email Security - Cloud Edition. 613 Enabling the ETP Cloud Endpoint Using the CLI 613 ETP Cloud Aggregation 614 Solving Connection Issues Viewing Email Alerts from the ETP Cloud in the Web UI 20 615 615 © 2019 FireEye Contents Index 617 Technical Support 625 Documentation © 2019 FireEye 625 21 Contents 22 © 2019 FireEye Central Management Administration Guide PART I: Overview l About the Central Management Appliance on page 25 l User Interfaces on page 35 © 2019 FireEye 23 Central Management Administration Guide 24 PART I: Overview © 2019 FireEye Central Management Administration Guide Terminology In the User Interface CHAPTER 1: About the Central Management Appliance The FireEye Central Management appliance provides a centralized way to configure, manage, and update groups of connected FireEye security appliances. It serves as both a security event storehouse and central management device for the appliances it manages. This section highlights the primary Central Management appliance features. Terminology In the User Interface Some FireEye Network Security components are referred to differently in the user interface. The following table maps the component name to the user interface term. Product or Component Name User Interface name On-Premises MVX Smart Grid MVX Cluster Network Smart Node Network Security Sensor Email Smart Node Email Security — Server Edition Sensor Content Smart Node File Security Sensor MVX Smart Grid Broker Broker Node MVX Smart Grid Element Compute Node Cloud MVX Smart Grid Cloud MVX Network Smart Node Network Security Sensor Email Smart Node Email Security — Server Edition Sensor © 2019 FireEye 25 Central Management Administration Guide CHAPTER 1: About the Central Management Appliance Product or Component Name User Interface name Content Smart Node File Security Sensor MVX Smart Grid Broker Cloud MVX Broker "Single Pane of Glass" Rather than using several interfaces for multiple appliances, the Central Management appliance streamlines the workflow by consolidating the functions of all managed appliances into a single interface—all individual or grouped appliances are fully configurable and operational from the Central Management appliance. You can perform the following functions remotely from the Central Management appliance on behalf of its managed appliances: l Application configuration l Policy enforcement l Alert monitoring l Software image, security content, and guest images updates l Report generation l Appliance health monitoring Alert Management The Central Management Dashboard provides tables, graphs, and charts that afford instant visibility into malware threats and appliance status. You can drill down to view details and take appropriate action. The pages you access from the Alerts tab in the Central Management Web UI mirrors the comprehensive information available on the managed appliances about detected malware. As with the Dashboard, you can drill into this information for deeper forensic analysis. You can use the following methods to send alerts to notification servers: l l l Centralized—Notifications are sent from the Central Management appliance only Mixed—Notifications are sent from both the Central Management appliance and from managed appliances. Decentralized—Notifications are sent from managed appliances only. For details, see Managing the Distribution of Alert Notifications on page 421. 26 © 2019 FireEye Release 8.7 Alert Correlation Alerts in Central Management are retained in the CM database as long as they are retained by the connected FireEye appliances. When the data is removed from the databases of connected FireEye appliances, it is removed from Central Management. See the documentation for the connected FireEye appliances for details about their alert retention periods. Alert Correlation All results of malware detected by any managed appliance can be monitored by the Central Management appliance. To offer advanced protection against spearphishing attacks and converged threats, the Central Management appliance identifies correlations between email- and Web-based malware events. When characteristics of malware detected by an Network Security appliance are identified in an Email Security — Server Edition event, the Central Management appliance alerts users of a blended attack. For details, see NX Series and CM Event Correlation on page 433. Signature Distribution Locally generated malware profiles and detection information can be shared among appliances using the Central Management appliance. Once malware is detected by one blocking appliance, its profile can be uploaded to other appliances in the network to make it easier to identify and protect against that threat in the future. Submit to Malware Analysis for Deep Forensics Malware detected by any managed appliance can be submitted from the Central Management Web UI to the Malware Analysis appliance for deeper forensic analysis. Appliance Groups You can manage and monitor appliances individually or in groups. By default, a group is created for each product type when an appliance of that type is added to the Central Management appliance. You can create custom groups and add appliances to them as needed. The benefits of appliance groups include: © 2019 FireEye 27 Central Management Administration Guide l l l CHAPTER 1: About the Central Management Appliance Limiting the displayed event data to specific appliances. Making the same configuration changes to multiple appliances at one time, instead of individually. Organizing appliances in logical groups (for example, based on geographic region or security level) and specifying configuration and policy settings accordingly. For details, see Grouping Appliances on page 405. Central Management Deployment This section describes the supported Central Management deployment scenarios. Standard Deployment To manage other FireEye appliances, the Central Management appliance simply needs a connection that allows it to communicate with the managed appliances. This connection can be practically anywhere in the network. The diagram below illustrates the typical deployment of managed appliances and a CM 9400 connected to a typical network device. Network Address Translation (NAT) Deployment When the Central Management appliance or the managed appliance is behind a network address translation (NAT) gateway, it has an internal address that cannot be reached. NAT techniques hide the internal address, so requests appear to originate from the NAT gateway instead of the internal network. For details about the required address mapping and the procedures for establishing a connection between the Central Management 28 © 2019 FireEye Release 8.7 Central Management Deployment appliance and the appliances, see Configuring Network Address Translation (NAT) on page 575. Single-Port Deployment By default, the Central Management appliance and a managed appliance use a single port (the SSH port, 22 by default) for the following types of communication: l l Remote management—Initiates the connection and configures the managed appliance. DTI network service—Requests software updates (such as guest images, security content, and system images) from the DTI network. The single-port configuration reduces the complexity of firewall rules, and provides an additional layer of security and privacy between the Central Management appliance and the appliances it manages. In environments in which the Central Management appliance is behind a Network Address Translation (NAT) gateway, using a single port also eliminates the need to open an additional HTTPS port (443) for the managed appliance to request software updates from the Central Management appliance. (For details about NAT deployment, see Configuring Network Address Translation (NAT) on page 575.) You can instead configure the dual-port address type, in which the management traffic uses the SSH port (22) and the DTI network service traffic uses the HTTPS port (443). If you change the configuration on an appliance that was already added to the Central Management appliance using a client-initiated connection, that managed appliance will be briefly disconnected and then reconnected using the new configuration. NOTE: Single- and dual-port communication is configured on the managed appliance, not on the Central Management appliance. For details, see the System Administration Guide or Administration Guide for the managed appliance. High Availability (HA) Deployment With Central Management high availability (HA), you can cluster two Central Management appliances for failover. The primary Central Management appliance (or node) is available continuously. If the primary node fails, your entire configuration fails over automatically to the secondary node; the secondary node then becomes the primary appliance. Central Management HA can be configured for high availability in local area network (LAN) environments and for disaster recovery in wide area network (WAN) environments. The following configurations fail over to the secondary node: l Security content l Software updates l Aggregated FireEye database information © 2019 FireEye 29 Central Management Administration Guide l CHAPTER 1: About the Central Management Appliance Central Management management configuration (except interface, licensing, and host-specific configurations) IMPORTANT! Network address translation (NAT) is not supported in Central Management HA deployments. Client-initiated connections are only supported in a Central Management HA LAN deployment with a configured VIP address. Central Management HA is not supported on all virtual CM models. See Limitations on page 87. For details about Central Management HA deployment, see the Central Management High Availability Guide. FireEye Network Security (MVX Cluster) Deployment A standard (or integrated) appliance performs both monitoring and analysis. FireEye Network Security separates these two functions. Network Security appliances that function as sensors extract objects and URLs from the traffic they monitor, and send submissions to an MVX cluster for inspection and analysis. The sensors generate alerts based on the analysis results. The sensors can be standalone or managed appliances. The same Central Management appliance can manage both sensors and integrated appliances. l l On-Premises Deployment—The MVX cluster components (VX Series appliances that function as brokers or compute nodes) must be managed by the same Central Management appliance. Although the brokers and compute nodes only need reliable IP connectivity, FireEye recommends that they be deployed on the same LAN. The MVX cluster, the sensors, and the Central Management appliance can be in different physical locations. However, FireEye does not recommend transcontinental deployments due to throughput, reliability, and latency issues. Cloud Deployment—The MVX cluster components are hosted in the FireEye public cloud. The sensors send submissions to the cloud broker. For details, see the MVX Smart Grid Deployment Guide and the Cloud MVX Deployment Guide. Split DTI Traffic Deployment By default, both management and DTI traffic use the ether1 network interface, which needs Internet access for DTI network downloads and uploads. For security, you might want to isolate the management traffic by streaming it from an out-of-band network interface with no Internet access. For details, see DTI Traffic and Management Traffic on page 212. IMPORTANT! Splitting DTI traffic is not currently supported in Central Management HA deployments. 30 © 2019 FireEye Release 8.7 Management Path Management Path CM appliances can download security content and software updates from the FireEye Dynamic Threat Intelligence (DTI) network. With a two-way content license, the appliance can also upload threat intelligence information to the DTI network. Central Management Appliances That Receive DTI Updates The Central Management appliance and standalone appliances use the ether1 port to communicate with the DTI network. In the default configuration, where you receive updates from the DTI network (cloud.fireeye.com), allow outbound access to all IP addresses on the following ports: l DNS (UDP/53) l HTTPS (TCP/443) Management interface ether1 requires a static IP address or reserved DHCP address and subnet mask. Environments That Restrict Outbound Access to Certain IP Addresses If your security policy requires that you restrict outbound access to certain IP addresses, you cannot use the DTI network. Instead, point to staticcloud.fireeye.com for DTI updates, and allow access to the *incapdns.net domain. For appliances that get threat intelligence from the DTI cloud, you need to enable access to the Amazon Web Services (AWS) cloud for ATI communication. The intel context service is hosted in multiple AWS regions and resolves to multiple IP addresses based on geographic location. To configure and access staticcloud.fireeye.com: 1. Enable CLI configuration mode. hostname > enable hostname # configure terminal 2. Enter the following command from the appliance CLI: hostname (config) # fenet dti source default DTI 3. Save your configuration. hostname (config) # write mem 4. Add the following block of IP addresses to the firewall: l © 2019 FireEye 199.16.196.0/22 31 Central Management Administration Guide CHAPTER 1: About the Central Management Appliance To allow access to *incapdns.net: 1. Add the block of IP addresses found at https://incapsula.zendesk.com/hc/enus/articles/200627570-Restricting-direct-access-to-your-website-Incapsula-s-IPaddresses-to the firewall. 2. Allow access to the *.incapdns.net domain at the proxy device. To allow access to the AWS cloud for threat intelligence:: 1. Go to https://dnschecker.org/#A/context.fireeye.com to determine the IP addresses for your location. 2. See the AWS IP address range documentation for information about whitelisting the IP addressses. CM Appliances with Domain-based Proxy ACL Rules If your configuration includes domain-based proxy ACL rules, allow access to *.fireeye.com. Integrated CM Communications Protocol and Port Configurations Establish SSH connectivity between the Central Management appliance and each managed appliance. For details about port and protocol configuration, see the CM Hardware Administration Guide. FIPS 140-2 and Common Criteria Compliance Use the Compliance Settings page to configure compliance features on the CM appliance. You can instead use the following CLI commands to configure compliance features on the appliance: 32 l compliance apply standard l compliance declassify zeroize l compliance options l show compliance l show compliance options l show compliance standard © 2019 FireEye Release 8.7 FIPS 140-2 and Common Criteria Compliance For details, see the FIPS 140-2 and Common Criteria Addendum and the CLI Command Reference. © 2019 FireEye 33 Central Management Administration Guide 34 CHAPTER 1: About the Central Management Appliance © 2019 FireEye Central Management Administration Guide CHAPTER 2: User Interfaces This section covers the following information: l Overview of CM User Interfaces on the next page l The CM Appliance Web UI on page 37 l The CM Appliance Command-Line Interface on page 56 l The CM Appliance IPMI Interface on page 60 l The CM Appliance LCD Display on page 57 © 2019 FireEye 35 Central Management Administration Guide CHAPTER 2: User Interfaces Overview of CM User Interfaces FireEye Helix enables you to access all of your FireEye on-premises and Cloud-based services from a single view. The CM appliance has the following user interfaces: l l l l Web UI—A Web-based UI used to configure and manage the appliance and the appliances it manages. This is described in The CM Appliance Web UI on the facing page. The appliance Web UI includes a Dashboard, described in The Central Management Appliance Dashboard on page 39. CLI—A command-line interface used to configure and manage the CM appliance. To access the appliance CLI, see The CM Appliance Command-Line Interface on page 56. LCD Display—The LCD display and associated controls (available on some appliance models) can be used to initially set up the CM appliance. It can also be used to check system status and make certain configuration changes. This is described in The CM Appliance LCD Display on page 57. IPMI Interface—The IPMI interface enables you to access the CM appliance over the network and perform recovery activities even if the system is powered down or otherwise unresponsive. This is described in The CM Appliance IPMI Interface on page 60. Two user interfaces that are external to the CM appliance pertain to using the CM appliance in a FireEye Helix environment: l l FireEye Helix Web UI―An interface that provides a single view of alerts from all the Helix appliances in your network. For more information, see the Helix User Guide FireEye Cloud IAM Web UI―An interface to the Cloud IAM server. It is used primarily by your IAM organization administrator (a user account that FireEye provides for you along with your IAM organization). The administrator creates FireEye Cloud accounts for users and applies role-based and rule-based access controls. This is described in "FireEye Cloud IAM User Accounts" in the System Security Guide. The owners of these user accounts can also log in to the FireEye Cloud IAM Web UI. Their access privileges in the FireEye Cloud IAM Web UI are generally limited updating their account preferences and changing their passwords. This is described in "Your FireEye Cloud IAM User Account" in the System Security Guide. Access to the FireEye Cloud IAM Web UI is necessary for you to configure support for single sign-on (SSO) authentication. When SSO authentication is enabled and Helix mode is enabled on FireEye appliances, users can sign in once to authenticate to their FireEye 36 © 2019 FireEye Release 8.7 The CM Appliance Web UI Cloud Account and then navigate among the components without having to log in locally to each appliance. This is described in "Single Sign-On Authentication" in the System Security Guide. Do not change the password for the permanent api_analyst user account on the Endpoint Security server. Doing so could break the connection between the Endpoint Security server and Helix. If you need API connectivity between the Endpoint Security server and a third-party product, add another user account with the api_analyst role. The CM Appliance Web UI The CM appliance Web UI uses HTTPS to provide a secure connection for configuring the appliance. The Web UI functions you have access to depend on the privileges granted by your role. You access the CM appliance Web UI by directing a browser to the management port's IP address or hostname using HTTPS. The IP address and hostname are set during the initial configuration of the appliance. The hostname must be resolved by a DNS server if you use it to access the Web UI. The Helix CM appliance Web UI includes controls for logging in and out using local, appliance-specific credentials. The Web UI also indicates whether Helix mode is enabled and whether alerts are Helix alerts. For details, see the Helix User Guide. Browser Support Use one of the following browsers to access the CM appliance Web UI: l Internet Explorer 11.0 or higher and Microsoft Edge on supported versions of Windows l Firefox 15 or higher on supported versions of Windows and Mac l Google Chrome 13.0 or higher on supported versions of Windows and Mac Screen Resolution Requirements The CM appliance Web UI supports the following screen resolutions: 1152 x 864 pixels 1440 x 900 pixels 1280 x 800 pixels 1600 x 900 pixels 1280 x 1024 pixels 1680 x 1050 pixels © 2019 FireEye 37 Central Management Administration Guide CHAPTER 2: User Interfaces 1360 x 768 pixels 1920 x 1080 pixels 1366 x 768 pixels 1920 x 1200 pixels Logging In Locally to the Helix Appliance Web UI To log in locally to the Helix CM appliance Web UI, you need the appliance IP address or hostname, and you need the local username and password that the appliance administrator created for you. Prerequisites l Before the default Admin user can log in to the appliance Web UI and create other user accounts, the manufacturing default password (admin) must be changed to a new password that is 8 to 32 characters long. This step is included in Initial Configuration on page 73. To log in locally to the Helix CM appliance Web UI: 1. Open a Web browser and enter https://<appliance> in the address line, where appliance is the IP address or hostname of the appliance. For example, if the configured IP address of the appliance is 10.1.0.1, enter https://10.1.0.1. 2. In the appliance Web UI login page, enter the local user name and password for this appliance as provided by your administrator. 38 © 2019 FireEye Release 8.7 The CM Appliance Web UI Notifications of Appliance Health Problems The bell at the top right of the Web UI indicates the number of appliance health issues that need to be addressed. When you click the bell, the notifications are displayed with links to the relevant Web UI pages. The bell is not displayed when there are no notifications. The following illustration indicates that one issue needs to be addressed. The Central Management Appliance Dashboard The CMS Dashboard page of the Central Management Web UI provides a high-level view of the threat intelligence gathered by the appliances it manages. Within many panels on the Dashboard, you can click blue buttons and text links to drill down to critical threat information affecting your network. The following example is a partial view of the Central Management Dashboard: If an appliance needs your attention, a notification bell is displayed at the top right corner of the Dashboard and all other Web UI pages. Click the bell to open a window that lists the messages. Some messages include a link to the relevant Central Management Web UI page. (For details, see Notifications of Appliance Health Problems above). For example: © 2019 FireEye 39 Central Management Administration Guide l l l l l 40 CHAPTER 2: User Interfaces This message indicates that at least one appliance needs to be updated to be compatible with this Central Management appliance version. Clicking the button opens the Sensor Updates page, where the managed appliance can be updated. This message indicates that at least one node in MVX cluster needs to be updated or has some other issue that needs your attention. Clicking this link opens the Appliances > Nodes page. This message indicates that an appliance sent a request to be managed by this Central Management appliance. The button opens the Connection Requests dialog box, where the request can be accepted or rejected. This message indicates that a problem prevents at least one appliance from being managed properly. Clicking the button opens the Sensors page, where you can refresh the status, or reset the connection after the underlying problem is resolved. This message includes a link that opens a dialog box with options for sending additional information to FireEye for analysis to increase detection rates. For more information, see Allowing Increased Detection for Managed Appliances Using the Web UI on page 395. © 2019 FireEye Release 8.7 l The CM Appliance Web UI This message includes a link for enabling Advanced URL Defense on qualified Email Security — Server Edition appliances. For more information, see Enabling Advanced URL Defense on Managed CM Appliances Using the Web UI on page 396. Only those panels that pertain to the types of appliances under management are included. Some panels of the Dashboard do not appear if the information is not relevant to the configuration of those appliances. By default, information about all managed appliances is displayed on the Dashboard. You can filter the display by selecting an appliance group or a specific appliance from the menus at the top of the page. A label at the top of each panel identifies the appliance type to which the information pertains. NOTE: The Dashboards of managed appliances running releases earlier than 7.5.0 may show slightly different numbers from the Central Management appliance Dashboard. Enhancements have been made to the way the Central Management appliance aggregates data from managed appliances. However, there is still a chance of discrepancies, even when the appliances are running the same release as the Central Management appliance. These discrepancies could be due to the time delay to complete full aggregation of statistics on the Central Management appliance from the managed appliances. Discrepancies could also be due to the correlation of malicious URL events from a managed Network Security appliance with malicious email events on an Email Security — Server Edition appliance managed by the same Central Management appliance. You can control the display of the Dashboard or panels by clicking the following menus and icons: Panel Control Icon Description In the main view of the Dashboard, use this menu to select the appliance group for which the Dashboard displays information, or to show information about all managed groups. © 2019 FireEye 41 Central Management Administration Guide Panel Control Icon CHAPTER 2: User Interfaces Description In the main view of the Dashboard, use this menu to select the appliance for which the Dashboard displays information, or to show information about all managed appliances or all appliances in a selected group. When the selected group is an MVX cluster, the VX Series appliances (nodes) are the only selections. In the main view of the Dashboard, click this icon to select the print-to-PDF processing time and initiate printing of the current Dashboard contents. In the main view of the Dashboard, click this icon to maximize the display of a panel. In a panel with the maximized display, click this icon to minimize the display and restore the main (full) view of the Dashboard. In any Dashboard panel, click this icon to reload the displayed data. In any Dashboard panel that displays these buttons, select the period of time for which the panel displays information. The default is Day. In the Top Malware By Host and Activity panel for a managed Network Security appliance, filter the displayed data: Hosts—(Default) Display malware counts by host. Activities—Display malware counts by threat activities that have occurred. 42 © 2019 FireEye Release 8.7 The CM Appliance Web UI Panel Control Icon Description In the Top Email Domains By Sender, Recipient, URL panel for a managed Email Security — Server Edition appliance, filter the displayed data: Sender—Display email counts for the five domains that sent the most emails. Recipient—Display email counts for the five email addresses that received the most malicious emails. URL—Display email counts for the five malicious URLs that were most frequently seen in emails. In the What's Happening and Critical Malware Detection panels for a managed Network Security appliance, use this button to control whether the displayed data includes or excludes acknowledged alerts. If a table in a panel has more than five rows, click these buttons to view the other rows. In some panels, click icons like these to control whether the displayed data includes or excludes certain information. For example, the data for .xls files will not be shown in this Top Scanned File Types panel. In some panels, click icons like these to navigate to the relevant Web UI page. For example, clicking these icons on the Cloud Detection panel will open the Alerts > Alerts page. © 2019 FireEye 43 Central Management Administration Guide CHAPTER 2: User Interfaces Panel Control Icon Description In some What's Happening and Summary panels, click links like this to navigate to the relevant Web UI page. For example: l l l Clicking the Files infected link will open the File Analysis page for a managed File Security appliance Clicking the Malicious Attachments link will open the Email Alerts page for a managed Email Security — Server Edition appliance. Clicking the Cluster-Acme link will open the Appliances > Clusters page for a managed MVX cluster. In the Cluster Utilization graph, pause on a graph point to open a tooltip that shows the MVX cluster utilization at that date and time. In the Submission Statistics graph, pause on a graph point to open a tooltip that shows the MVX cluster submission statistics at that date and time. What's Happening The What's Happening panel displays the total number of alerts and events for its managed appliances in common categories (such as APT Attacks and Not Seen Before), and in categories that are specific to each type of appliance. The right side of the panel provides appliance summary information if a group, All Groups, or All Appliances is selected. In the following example, all appliances are being shown. If a group were selected, the Showing field would show the number of appliances in that group. 44 © 2019 FireEye Release 8.7 The CM Appliance Web UI The right side of the panel provides appliance detail information if a specific appliance is selected. If none of the categories is represented or if no data is available for the selected appliances and time period, the left side of the panel is empty. Central Management Service Health Statistics Trend This panel plots the trend of the system health statistics for the Central Management appliance by day, week, or month. © 2019 FireEye 45 Central Management Administration Guide CHAPTER 2: User Interfaces MVX Cluster Dashboard Panels This section contains examples of MVX cluster Dashboard panels. For details, see the MVX Smart Grid Administration Guide. The following example is a partial view of the MVX cluster panels on the Dashboard: NOTE: This section describes the Dashboard panels for the MVX cluster and individual nodes (VX Series appliances). The Dashboard panels for sensors (Network Security appliances that send submissions to an MVX cluster) are the same as the panels for integrated Network Security appliances, and are described in the Network Security User Guide. Summary Panels The Central Management Dashboard includes summary information for clusters, for the "VX" group, and for individual VX Series appliances (nodes). This Summary panel example for a cluster shows information about the overall cluster health and status. It includes the total number of nodes and sensors, and the number of nodes that are brokers, ready to be brokers (because their submission and cluster interfaces are configured), and not ready to be brokers (because those interfaces are not configured). 46 © 2019 FireEye Release 8.7 The CM Appliance Web UI This Summary panel example for the VX group shows the number of available nodes (VX Series appliances connected to the Central Management platform but not in a cluster), the number of nodes that are in a cluster, the number of nodes that are ready to be a broker, and the number of nodes that are not ready to be a broker. This Summary panel example for the vx-1 node shows the connection and health status of the node, and the cluster the node belongs to. Cluster Utilization Panel This Cluster Utilization panel example shows utilization and submission statistics for an MVX cluster. NX Series Dashboard Panels This section contains examples of NX Series Dashboard panels. For details, see the NX Series User Guide or IPS Feature Guide. © 2019 FireEye 47 Central Management Administration Guide CHAPTER 2: User Interfaces What's Happening This is an example of the What's Happening panel for a managed IPS-enabled Network Security appliance. Callback Events, Critical Malware Detection, Threat Attacks These panel examples show callback data ranked in order of the most infected subnets in your network, malicious infections uniquely detected by FireEye, and threat attacks most detected in your network. IMPORTANT! The Critical Malware Detection panel displays information for the past 24 hours. 48 © 2019 FireEye Release 8.7 The CM Appliance Web UI Top 25 Infected Subnets These panel examples show the 25 subnets in your network with the most infections, the number of unique malware events, and the number of infected hosts. Top Malware By Host and Activity This panel example shows malware infections based on the amount of activity in your network. Daily Monitored Traffic (Mbps) This panel example shows the monitored traffic, measured in megabits per second, for the past 24 hours. IPS Trend This panel example plots the number of IPS alerts and IPS critical events. © 2019 FireEye 49 Central Management Administration Guide CHAPTER 2: User Interfaces Email Security — Server Edition Dashboard Panels This section contains examples of Email Security — Server Edition dashboard panels. For details, see the CM User Guide. What's Happening This is an example of the What's Happening panel for a managed Email Security — Server Edition appliance. Email Campaign Trend This panel example shows the total number of infected emails that are part of a campaign based on similar characteristics, such as the attachment name, subject, or sender observed. The chart shows the total number of infected emails that are associated with each campaign that received malicious emails during the selected time period. When the Central Management appliance manages multiple Email Security — Server Edition appliances, the campaigns that contain the same name are combined in the Email Campaign Trend panel on the Central Management Dashboard. The campaigns associated with the same name might be different campaigns. 50 © 2019 FireEye Release 8.7 The CM Appliance Web UI Top Email Domains By Sender, Recipient, URL This panel example shows total email counts filtered by the five domains that sent the most emails, the five email addresses that received the most malicious emails, or the five malicious URLs that were most frequently seen in emails. Email Infection Trend This panel example shows the total number of infected emails, attachments, URLs, and headers that have been observed on the monitored network. © 2019 FireEye 51 Central Management Administration Guide CHAPTER 2: User Interfaces Email Statistics Trend This panel shows the total number of scanned emails, URLs, attachments, deferred emails, and bypassed emails that have been observed on the monitored network. This panel will not display statistics for any category in which the count is zero. FX Series Dashboard Panels This section contains examples of File Security dashboard panels. For details, see the FX Series User Guide. What's Happening This is an example of the What's Happening panel for a managed File Security appliance. 52 © 2019 FireEye Release 8.7 The CM Appliance Web UI Top Scanned File Types This panel example shows the number and type of the top five file formats found and analyzed. Top Infected File Types This panel example shows the top five types of files found to be infected. Files Analyzed This panel example shows the number of analyzed files. AX Series Dashboard Panel This is an example of the What's Happening panel for a managed AX Series appliance. There are no other AX Series dashboard panels displayed on the Central Management © 2019 FireEye 53 Central Management Administration Guide CHAPTER 2: User Interfaces dashboard. For details, see the AX Series User Guide. HX Series Dashboard Panel This is an example of the What's Happening information for a managed HX Series appliance. There are no other HX Series dashboard panels displayed on the Central Management dashboard. For details, see the HX Series User Guide. Central Management Web UI Tabs This section describes the Central Management Web UI tabs. The following illustration shows the tabs on a Central Management appliance that manages one or more Email Security — Server Edition and Network Security appliances. l 54 Dashboard—Provides a high-level view of the threat intelligence gathered by the appliances the Central Management appliance manages. © 2019 FireEye Release 8.7 l l l l l l l The CM Appliance Web UI Appliances—Displays information about all currently managed appliances, and allows you to add or remove appliances, configure connection parameters, configure appliance groups, import host keys for global host-key authentication, and update managed appliances. Alerts—Displays aggregated alert, detection, and quarantine information. IPS—Displays information about Integrated Intrusion Prevention System (IPS) events and alerts, and allows IPS configuration and setting of policy exceptions and custom rules. Search Emails—Allows you to search for all emails the Central Management appliance processed, and to view and manage the emails that are being processed or in queue to be processed. Settings—Provides options for configuring system administration and policy settings for the Central Management appliance and its managed appliances. Reports—Allows you to generate and schedule reports in various formats on behalf of managed appliances. About—Provides access to the following pages: o Summary — Displays system information, such as software version and Security Contents version. See Viewing System Health and Performance Check Results on page 265. o Supported Features — Displays features available for the appliance and whether they are enabled or disabled. See Supported Features on page 293. o Health Check—Provides comprehensive and current system status information such as software version, patch version, content version, MVX engine version, DTI connection, and configured interfaces. This page also provides an Appliance Health link, which takes you to the page where you can view the health status of managed appliances. See System Health and Performance on page 265. o Log Manager—Allows you to manage system logs. See Log Management on page 233. o Upgrade—Allows you to update software for the Central Management appliance, and provides an Upgrade Appliances link, which takes you to the page where you can update software and guest images for managed appliances. See Upgrading the FireEye Software on page 219. Other tabs are displayed depending on the appliances the Central Management appliance is currently managing. For example, the Alerts tab displays aggregated alert and detection statistics from managed appliances, the Search Emails tab allow you to search for processed and queued emails on a managed Email Security — Server Edition appliance, and so on. © 2019 FireEye 55 Central Management Administration Guide CHAPTER 2: User Interfaces PDF Generation Some Web UI pages, such as those that display analysis results, have a Print PDF button at the top right side of the page that allows you to save the content of the page to PDF so it can be printed or saved. Only the content that is visible on the page is included in the PDF output. For example, if an item on the page is not expanded, the details about that item are not displayed and will not be included in the PDF output. Depending on your Web browser settings, the generated PDF opens in the Web browser or is downloaded to your computer. The amount of time needed to generate the PDF depends on the current load on the system. By default, the system will try to generate the PDF using Standard Processing Time, the fastest way possible. If the PDF generation times out, you can try again using other options by clicking the arrow on the button and then selecting Extra Processing Time or Heavy Processing Time, where heavy processing time takes the longest. The CM Appliance Command-Line Interface The CM appliance includes a standard command-line interface (CLI) that can be used to configure, manage and monitor the CM system, including its managed appliances. To log into the CLI using a terminal window or SSH client: 1. Using the SSH protocol, log in to the appliance using the management interface’s IP address or hostname. $ ssh <username>@<ipAddress> | <hostName> where ipAddress specifies the IPv4 or IPv6 address of the management interface. 2. When prompted, enter your password. Password: <password> The hostname > prompt is displayed after you are logged in. 56 © 2019 FireEye Release 8.7 The CM Appliance LCD Display The CM Appliance LCD Display An LCD panel is available on the front of some appliance models. You can perform the initial configuration of the appliance using the LCD panel, as described in Configuring Initial Settings Using the LCD Panel on page 81. You can use the LCD panel to perform other basic configuration tasks as well. Navigating the LCD Menus The following illustration of the LCD panel shows how to use the navigation buttons to configure settings. For details about the menus, see LCD Menu on page 60. On some models, you need to remove the front panel to access the LCD panel navigation buttons. To remove the front panel: 1. Unscrew the front panel to unlatch it. © 2019 FireEye 57 Central Management Administration Guide CHAPTER 2: User Interfaces 2. Remove the front panel. LCD Panel Menus The LCD panel has four menus: Network Menu below, Config Options Menu on the facing page, LCD Menu on page 60, and Restart Options Menu on page 60. See Navigating the LCD Menus on the previous page for information about moving through the menus and selecting options. Network Menu The following table provides information about the Network menu. 58 © 2019 FireEye Release 8.7 The CM Appliance LCD Display Prompt Description Hostname Hostname for the appliance. DHCP enabled Enter “yes” to use DHCP on the ether1 (management interface) port. Enter “no” to manually configure your IP address and network settings. Static IP address This prompt is available if DHCP is disabled. Enter the IP address for the ether1 (management interface) port. Netmask This prompt is available if DHCP is disabled. Enter the network mask. Default gateway This prompt is available if DHCP is disabled. Enter the gateway IP address for the management interface. Primary DNS This prompt is available if DHCP is disabled. Enter the Primary DNS server IP address. Domain name This prompt is available if DHCP is disabled. Enter the domain name for the management interface; for example, it.acme.com IPv6 enabled Enter “yes” to enable IPv6 protocol, which changes the network IP routing from IPv4 to IPv6. SLAAC enabled This prompt is available if IPv6 is enabled. Enter “yes” to enable IPv6 autoconfig on the ether1 (management interface) port. Enter "no" to disable IPv6 autoconfig on the ether1 (management interface) port. Admin net login Enter “yes” to enable the administrator to log in to the appliance remotely. Enter "no" to disable remote access. Config Options Menu The following table provides information about the Config Options menu. Prompt Description Save settings Saves changes made during a session so they will persist after a reboot. Revert to factory defaults Reverts the appliance to its factory default settings, which include user name and password, and network configuration information. © 2019 FireEye 59 Central Management Administration Guide CHAPTER 2: User Interfaces Prompt Description Reset admin password Resets the admin password for accessing the appliance itself. (This does not set the password for accessing the LCD panel.) The new password is randomly generated. The LCD will display the password. When you have memorized it, press a button to move to the next prompt or menu. You can change to a password of your choice using the appliance CLI or Web UI after the basic configuration is complete. LCD Menu The following table provides information about the LCD menu. Prompt Description Password Sets a password for LCD panel access. (This does not set the password for accessing the appliance.) Brightness Sets the LCD panel’s level of brightness from 0 to 9, with 9 being the brightest. Contrast Sets the LCD panel’s level of contrast between the background and text from 0 to 9, with 9 being the highest contrast. Restart Options Menu The following table provides information about the Restart Options menu. Prompt Description Reboot system Restarts the system. Halt system Brings the system down to its lowest state while remaining on. Next boot loc Specifies disk partition (1 or 2) to boot from during the next reboot. The CM Appliance IPMI Interface IMPORTANT: The IPMI interface port is only enabled in CM Release 8.2.0 or later and IPMI firmware version 2.07 or earlier. The FireEye Intelligent Platform Management Interface (IPMI) allows you to perform the following tasks remotely from a Web browser: 60 © 2019 FireEye Release 8.7 l The CM Appliance IPMI Interface Cycle the power on your appliance when it is unresponsive. NOTE: The IPMI is active even if the appliance was powered down from the appliance CLI or from the power button on the front panel, as long as the main power is on. l l l Reset the server. Access the serial console when the management interface is unavailable or unresponsive. Check the status of server sensors. For IPMI interface configuration details, see Configuring the IPMI Interface on page 82. The IPMI interface uses a network connection to the IPMI port of the appliance and is accessed through a secure Web browser session. (The standard IPMI interface allows connections using third-party tools such as Supermicroʼs IPMI View; however, all such external access to the IPMI interface from the appliance is disabled.) IMPORTANT! The IPMI remote control cannot perform a graceful power down of the appliance. IPMI Browser Support Use one of the following Web browsers to access the Web UI: l l Internet Explorer 11.0 or higher and Microsoft Edge on supported versions of Windows Google Chrome 13.0 or higher on supported versions of Windows and Macintosh IMPORTANT! Do not use Firefox to access the IPMI port. The Firefox browser interprets a regenerated HTTPS certificate as a possible attack, and it generates an Invalid Certificate Error code ("sec_error_reused_issuer_and_serial"). Instead of completing the connection, Firefox displays a "Secure Connection Failed" page. Logging In to the IPMI Interface This procedure describes how to log in the CM appliance IPMI interface from a Web browser. © 2019 FireEye 61 Central Management Administration Guide CHAPTER 2: User Interfaces Prerequisites l The 100BASE-T IPMI port on the rear of the appliance is cabled and configured as described in Configuring the IPMI Interface on page 82. l The IP address that was configured for the IPMI port is known. l You are using a Web browser listed in IPMI Browser Support on the previous page. To log in to the IPMI interface: 1. Using a Web browser, access the IPMI port through a secure Web browser session. In the browser address bar, enter https:// followed by the IP address of the IPMI port. 2. Log in to the IPMI Web UI using ADMIN as the username and the password that was configured for the IPMI user. Power Cycling and Resetting the Device This procedure describes how to use the IPMI interface to power cycle the CM appliance. Prerequisites l You are logged in to the appliance IPMI. To cycle power or reset the server: 1. Click the Remote Control tab. 2. Click Power Control in the sidebar. 62 © 2019 FireEye Release 8.7 The CM Appliance IPMI Interface 3. Select the option you need: l Reset Server l Power Off Server – Immediate l Power Off Server – Orderly Shutdown l Power On Server l Power Cycle Server 4. Click Perform Action. Accessing the Device Serial Console This procedure describes how to use the IPMI interface to access the CM appliance through a serial console. IMPORTANT! Use the IPMI Web UI to access the compute node serial console only during a power or system reset or when the system is not otherwise responding on the management interface. Prerequisites l You are logged in to the appliance IPMI. l The appliance is not using its management interface. To access the serial console: IMPORTANT! Use the IPMI Web UI to access the serial console only during a power or system reset or when the system is not otherwise responding on the management interface. 1. Click the Remote Control tab. 2. Click Console Redirection in the sidebar. © 2019 FireEye 63 Central Management Administration Guide CHAPTER 2: User Interfaces 3. Click Launch Console. You might be prompted to install a Java program to launch the console, which could require changes to your Java security settings. If your security policy does not allow this, and if your appliance uses a recent IPMI firmware version, you can instead open ports on the firewall. To view the installed and available firmware versions, click System and then System Information, or follow the instructions in IPMI Firmware Updates on page 203. Checking the Status of Device Sensors This procedure describes how to use the IPMI interface to check the status of the CM appliance sensors. Prerequisites l You are logged in to the appliance IPMI. To check the status of server sensors: 1. Click the Server Health tab. 2. Click Sensor Readings in the sidebar. 2. Click options at the bottom of the page as needed: l Refresh l Show Thresholds l Intrusion Reset Resetting the IPMI Interface Using the CLI This procedure describes how to reset the IPMI interface. 64 © 2019 FireEye Release 8.7 The CM Appliance IPMI Interface Prerequisites l Admin access to the CM appliance. If the IPMI interface stops working, follow these steps to reset it. You might need to schedule a maintenance window to do this. To reset the IPMI interface: 1. Log in to the CM CLI. 2. Go to CLI configuration mode: hostname > enable hostname # configure terminal 3. Reload the IPMI firmware: hostname (config) # ipmi firmware reload cold 4. Wait five minutes. 5. Check whether the IPMI interface is up: hostname (config) # show ipmi 6. If the IPMI interface is down: a. Shut down the appliance: hostname (config) # reload halt b. Unplug all power cables. c. Wait 90 seconds. d. Plug in the power cables. e. Push the power button to restart the appliance. © 2019 FireEye 65 Central Management Administration Guide 66 CHAPTER 2: User Interfaces © 2019 FireEye Central Management Administration Guide PART II: Configuration l Initial Configuration on page 73 l Virtual Central Management Appliances on page 85 l License Keys on page 115 l The DTI Network on page 127 l System Email Settings on page 163 l Date and Time Settings on page 179 © 2019 FireEye 67 Central Management Administration Guide 68 PART II: Configuration © 2019 FireEye Central Management Administration Guide CHAPTER 3: Accessing the Physical or Serial Console Use one of the methods in this section to establish a connection with the physical or serial console. Physical Console Method You can connect keyboard and video cables to the appliance and then log in to the CM CLI. See your Hardware Administration Guide to view the port locations To access the physical console: l Plug in a keyboard and a VGA monitor. Serial Console Methods If you are not using a terminal server, you need to be physically near the CM appliance to use the serial port. The serial port is on the back of the appliance. See your Hardware Administration Guide to view the port location. The serial port uses the following settings: l Baud rate: 115200 l Data bits: 8 l Stop bits: 1 l Parity: None l Flow control: XON/XOFF © 2019 FireEye 69 Central Management Administration Guide CHAPTER 3: Accessing the Physical or Serial Console NOTE: If the appliance stops responding on startup without displaying an error message, the serial port or the connection may be faulty. If this occurs, do the following: 1. Press and hold the power button on the front of the appliance for a few seconds until the appliance powers off. 2. Unplug all power cables from the server and wait for about 5 minutes to ensure shutdown is complete. 3. Connect a different serial cable. 4. Plug in the power cables. 5. If the server does not automatically restart, press the power button. You can access the serial port as described in the following topics: l PC or Mac below l Linux on the facing page l Terminal Server on the facing page PC or Mac Because laptops do not usually have a serial port, you need a USB-to-serial cable to connect the laptop to the DB-9 serial port of the CM appliance. FireEye uses Prolific Technology Inc. adapters. IMPORTANT! A USB-to-serial cable is not provided with the appliance. To access the serial console from a PC or Mac laptop: 1. Connect the USB-to-serial cable to the USB port of the laptop. 2. Connect one end of the null modem cable that is provided with the appliance to the USB-to-serial cable. 3. Connect the other end of the null modem cable to the serial port of the appliance. 4. Use a serial application (such as PuTTY) to establish a connection. Specify the COM port assigned to the USB-to-serial cable. 70 © 2019 FireEye Release 8.7 Linux You can use a serial cable or a USB-to-serial cable to connect the Linux machine to the serial port of the CM appliance. FireEye uses Prolific Technology Inc. adapters. IMPORTANT! A USB-to-serial cable is not provided with the appliance. To access the serial console from a Linux machine: 1. Connect the cable to the serial port of the appliance and to the Linux machine. 2. From a command prompt, establish a connection. If you are using a USB-to-serial cable, specify the COM port assigned to it. Terminal Server To access the serial console from a terminal server: 1. Set the terminal server to a baud rate of 115200. 2. Plug one end of a serial cable into the DB-9 serial port on the CM appliance and plug the other end into the terminal server. 3. In a Telnet application (such as PuTTY), enter the host name or terminal server IP address, the terminal server port number that the appliance is using, and the appliance port number. © 2019 FireEye 71 Central Management Administration Guide 72 CHAPTER 3: Accessing the Physical or Serial Console © 2019 FireEye Central Management Administration Guide CHAPTER 4: Initial Configuration This section covers the following information: l Initial Configuration Overview on the next page l Initial Configuration Prerequisites on the next page l Use one of the following methods to configure initial settings: o Configuring Initial Settings Using a Keyboard and Monitor on page 75 o Configuring Initial Settings Using the Serial Console Port on page 76 o Configuring Initial Settings Using the LCD Panel on page 81 For information about responding to the configuration wizard prompts, refer to Configuration Wizard Steps on page 78. l Configuring the IPMI Interface on page 82 © 2019 FireEye 73 Central Management Administration Guide CHAPTER 4: Initial Configuration Initial Configuration Overview The management interface is the port through which the CM appliance is managed and administered. It is also the port through which an appliance is managed by the Central Management appliance. With the single-port address type, the management interface is also the port through which a managed appliance requests and downloads software updates from the DTI network. Initial settings need to be configured to set up the management interface, and to allow access to the network, change the default administrator password, and so on. The following initial configuration methods are available: Use one of the following methods to log in to the CM CLI and configure initial settings: l l l Keyboard and monitor—Connect a USB keyboard and VGA monitor directly to the USB 3.0 ports and a video port that are on the rear panel of the appliance. This is the easiest way to configure the initial settings, provided that you are physically near the appliance. Serial port—Connect a Windows laptop, a Mac laptop, a Linux system, or a terminal server to the appliance serial port. The serial port is on the rear panel. LCD panel—Use the navigation buttons and menus on the liquid crystal display (LCD) panel to select initial settings. The LCD panel is on the front of most appliance models. Be sure to cable and configure the IPMI interface so that you can access the appliance should it become unresponsive to network or serial port access. NOTE: You must access the appliance through the serial port if you want to monitor appliance boot activities. You can enter CLI commands through direct keyboard and monitor connection only before the boot loader begins loading the kernel, for example, to post output, and after the boot is completed. Initial Configuration Prerequisites Before you configure the appliance: 74 © 2019 FireEye Release 8.7 Configuring Initial Settings Using a Keyboard and Monitor l Read the Release Notes for the current release. l Collect the following information from your network administrator: l o Static IP address, subnet mask, and default gateway address for the appliance management interface. (You do not need this information if Dynamic Host Configuration Protocol (DHCP) will be used on the management interface.) o IP address for each Domain Name System (DNS) server (if DNS name resolution will be used). o IP address for each Network Time Protocol (NTP) server (if NTP synchronization will be used). o Telnet or SSH client on the remote system (if the appliance will be managed remotely). If you plan to configure initial settings using the serial console port and a Windows or Mac laptop, obtain a USB-to-serial cable. Configuring Initial Settings Using a Keyboard and Monitor You can connect keyboard and video cables to the appliance and then log in to the CM CLI to perform the initial configuration. See your Hardware Administration Guide to view the port locations. To configure initial settings using a keyboard and monitor: 1. Plug in a keyboard and a VGA monitor. 2. When prompted, enter the default username (admin) and password (admin) for the permanent "admin" user. 3. You are asked to accept the End User License Agreement (EULA). Enter y to accept the terms of the agreement. 4. Enter y when you are prompted to use the Configuration Wizard for initial configuration. Then respond to the prompts as described in Configuration Wizard Steps on page 78. 5. After you answer the questions, the wizard summarizes your answers. To change an answer, enter the step number. Press Enter to save changes. © 2019 FireEye 75 Central Management Administration Guide CHAPTER 4: Initial Configuration Configuring Initial Settings Using the Serial Console Port If you are not using a terminal server, you need to be physically near the CM appliance to use the serial port. The serial port is on the back of the appliance. See your Hardware Administration Guide to view the port location. The serial port uses the following settings: l Baud rate: 115200 l Data bits: 8 l Stop bits: 1 l Parity: None l Flow control: XON/XOFF NOTE: If the appliance stops responding on startup without displaying an error message, the serial port or the connection may be faulty. If this occurs, do the following: 1. Press and hold the power button on the front of the appliance for a few seconds until the appliance powers off. 2. Unplug all power cables from the server and wait for about 5 minutes to ensure shutdown is complete. 3. Connect a different serial cable. 4. Plug in the power cables. 5. If the server does not automatically restart, press the power button. Configure initial settings as described in the following topics: l Using a Windows or Mac Laptop below l Using a Linux System on the facing page l Using a Terminal Server on the facing page Using a Windows or Mac Laptop Use the procedure in this section to configure initial settings from a Windows or Mac laptop. 76 © 2019 FireEye Release 8.7 Configuring Initial Settings Using the Serial Console Port To configure initial settings from a Windows or Mac laptop: 1. Establish a connection with the serial console as described in PC or Mac on page 70. 2. When prompted, enter the default username (admin) and password (admin) for the administrator. 3. You are asked to accept the End User License Agreement (EULA). Enter y to accept the terms of the agreement. 4. Enter y when you are prompted to use the Configuration Wizard for initial configuration. Then respond to the prompts as described in Configuration Wizard Steps on the next page. 5. After you answer the questions, the wizard summarizes your answers. To change an answer, enter the step number. Press Enter to save changes. Using a Linux System Use the procedure in this section to configure initial settings from a Linux system. To configure initial settings from a Linux system: 1. Establish a connection with the serial console as described in Linux on page 71. 2. When prompted, enter the default username (admin) and password (admin) for the administrator. 3. You are asked to accept the End User License Agreement (EULA). Enter y to accept the terms of the agreement. 4. Enter y when you are prompted to use the Configuration Wizard for initial configuration. Then respond to the prompts as described in Configuration Wizard Steps on the next page. 5. After you answer the questions, the wizard summarizes your answers. To change an answer, enter the step number. Press Enter to save changes. Using a Terminal Server Use the procedure in this section to configure initial settings from a terminal server. To configure initial settings from a terminal server: 1. Establish a connection with the serial console as described in Terminal Server on page 71. 2. When prompted, enter the default username (admin) and password (admin) for the administrator. 3. You are asked to accept the End User License Agreement (EULA). Enter y to accept the terms of the agreement. © 2019 FireEye 77 Central Management Administration Guide CHAPTER 4: Initial Configuration 4. Enter y when you are prompted to use the Configuration Wizard for initial configuration. Then respond to the prompts as described in Configuration Wizard Steps below. 5. After you answer the questions, the wizard summarizes your answers. To change an answer, enter the step number. Press Enter to save changes. Configuration Wizard Steps The configuration wizard is typically used to perform the initial configuration of the system. See Initial Configuration on page 73 for information about running the wizard before the management interface is configured. After the management interface is configured, an administrator can use the configuration jump-start CLI command to run the wizard. The following table describes the questions the configuration wizard prompts you to answer as it moves through the wizard steps. As noted in the table, the wizard skips some steps based on your answers to previous steps. NOTE: To exit the configuration wizard, press CTRL+C. To restart the configuration wizard, use the configuration jump-start command. Step 78 Response Activation code? (Virtual KVM deployments only) Enter the activation code you obtained from FireEye. Hostname? Enter the hostname for the appliance. Admin password? Enter a new administrator password. The new password must be 8–32 characters. If you do not change the password, the administrator will be unable to log in to the appliance. Confirm admin password? Re-enter the new administrator password. Enable remote access for ‘admin’ user? Enter yes to enable the administrator to log in to the appliance remotely. Enter no to disable remote access. Use DHCP on ether1 interface? Enter yes to use Dynamic Host Configuration Protocol (DHCP) to configure the appliance IP address and other network parameters. Enter no to manually configure your IP address and network settings. (If you enter yes, the zeroconf and static IP addressing steps are skipped.) © 2019 FireEye Release 8.7 Configuration Wizard Steps Step Response Use zeroconf on ether1 interface? Enter yes to use zero-configuration (zeroconf) networking. Enter no to specify a static IP address and network mask. (If you specify yes, the next step is skipped.) NOTE: Do not use zeroconf on the primary interface. Primary IP address and masklen? Enter the IP address for the management interface in A.B.C.D format and enter the network mask, for example: 1.1.1.2/12. Default gateway? Enter the gateway IP address for the management interface. Primary DNS server? Enter the IP address of the DNS server. Domain name? Enter the domain for the management interface; for example: it.acme.com. Activation code Enter the activation code you obtained from FireEye. (Some virtual appliances only) Enable fenet service? Enter yes to enable access to the DTI network. (If you enter no, the next three steps are skipped.) Enable fenet license update service? Enter yes to enable the licensing service to automatically download your licenses from the DTI network and install them. (If licenses are downloaded and installed successfully, the wizard skips the step that prompts for the product license key and the step that prompts for the security-content updates key.) Sync appliance time with fenet? Enter yes to synchronize the appliance time with the DTI server time. If you enabled the licensing service, synchronization prevents a feature from being temporarily unlicensed due to a time gap. The wizard makes three attempts to perform this step before it gives up and moves to the next step. Update licenses from fenet? Enter yes to download and install your licenses. The wizard makes three attempts to perform this step before giving up and moving on to the next step. © 2019 FireEye 79 Central Management Administration Guide Step CHAPTER 4: Initial Configuration Response Enable NTP? Enter yes to enable automatic time synchronization with one or more Network Time Protocol (NTP) servers. Enter no to manually set the time and date on the appliance. (This step is skipped if you entered yes in the "Sync appliance time with fenet?" or "Enable Incident Response or Compromise Assessment?" step.) If you enter no, specify the time and date in Greenwich Mean Time (GMT). Set time (<hh>:<mm>:<ss>)? Enter the appliance time. (This step and the next step are skipped if you entered yes in the "Sync appliance time with fenet?" or "Enable NTP?" step.) Set date Enter the appliance date. (<yyyy>/<mm>/<dd>)? Enable IPv6? Enter yes to enable IPv6 protocol, which changes network IP routing from IPv4 to IPv6. (This step and the next two steps are skipped if you entered yes in the "Enable Incident Response or Compromise Assessment?" step. This step and the next two steps will be automatically performed if you entered yes in the “Enable FaaS VPN” step.) Enable IPv6 autoconfig (SLAAC) on ether1 interface? Enter yes to enable IPv6 autoconfig on the ether1 (management interface) port. (This step is skipped if you entered no in the "Enable IPv6?" step.) Enable DHCPv6 on ether1 interface? Enter yes to use DHCPv6 to configure IPv6 hosts with IP addresses. (This step is skipped if you entered no in the "Enable DHCP?" or "Enable IPV6?" step.) Product license key? Enter the product license key you obtained from FireEye, or press Enter to install a 15-day evaluation license. (This step and the next step are skipped if you entered yes in the "Enable fenet license update service?" step and if licenses were successfully installed as a result.) Security-content updates key? Enter the security-content license key you obtained from FireEye, or press Enter to skip this step and install the license later. Configure CMS HA? Enter yes to configure the Central Management appliance in a high availability (HA) environment. (For the remaining HA configuration steps, see the Central Managment High Availibility Guide.) (Physical models and selected virtual models only) 80 © 2019 FireEye Release 8.7 Configuring Initial Settings Using the LCD Panel Configuring Initial Settings Using the LCD Panel An LCD panel is available on the front of some appliance models. To configure initial settings from the LCD panel: 1. Press the center button to access the Network menu and respond to the prompts: a. Hostname—Specify the hostname for the system. b. DHCP enabled—Enter yes to use dynamic host configuration protocol (DHCP). Enter no to manually configure your IP address and network settings. If you entered yes, proceed to the IPv6 enabled step. c. Static IP address—Enter the IP address for the Ethernet 1 (management interface) port. d. Netmask—Enter the network mask. e. Default gateway—Enter the gateway IP address for the management interface. f. Primary DNS—Enter the primary DNS server IP address. g. Domain name—Enter the domain name for the management interface; for example, it.acme.com. h. IPv6 enabled—Enter yes to enable IPv6 protocol, which changes network IP routing from IPv4 to IPv6. If you enter no, proceed to the Admin net login step. i. SLAAC enabled—Enter yes to enable IPv6 autoconfig on the ether1 (management interface) port. Enter no to disable IPv6 autoconfig on the ether1 (management) interface port. j. Admin net login—Enter yes to enable the administrator to log in to the system remotely. Enter no to disable remote access. 2. Press the left or right arrow button until you reach the LCD menu. At the Password prompt, enter a password used to access the LCD panel. (This is not the password used to access the appliance Web UI or CLI.) © 2019 FireEye 81 Central Management Administration Guide CHAPTER 4: Initial Configuration 3. Press the left or right arrow button until you reach the Config Options menu. At the Reset admin password prompt: a. Press the center button to reset the password used by the permanent admin user to log in to the appliance Web UI or CLI. (This is not the password used to access the LCD panel.) b. A randomly generated password is displayed. After you memorize it, press the center or exit button to dismiss the display. After the initial configuration, you can change to a password of your choice using the appliance Web UI or CLI. Configuring the IPMI Interface Use the commands in this section to configure the IPMI interface. For information about using the IPMI interface after it is configured, see The CM Appliance IPMI Interface on page 60. Prerequisites l One end of an Ethernet cable is plugged in to the IPMI port, and the other end of the cable is plugged in to an administrative computer or terminal server Viewing the IPMI Configuration This procedure describes how to use the CLI to view the IPMI configuration. To view the IPMI configuration: 1. Go to CLI enable mode: hostname > enable 2. Display the configuration. For example: hostname (config) # show ipmi interface IPMI LAN Settings ---------------------------------------Admin Shut Down : no Shut Down : no IP Address Source : Static Address IP Address : 192.168.42.27 Subnet Mask : 0.0.0.0 Default Gateway IP : 0.0.0.0 82 © 2019 FireEye Release 8.7 Configuring the IPMI Interface Configuring the IPMI Port This procedure describes how to use CLI commands to configure the IPMI interface. To configure the IPMI port: 1. If you want to configure a static IP address for the IPMI interface, do the following: a. Log in to the appliance CLI. b. Go to CLI configuration mode. hostname > enable hostname # configure terminal c. If DHCP was previously configured for IPMI, change to the static method: hostname (config) # ipmi lan ipsrc static d. Configure the IP address for the IPMI interface: hostname (config) # ipmi lan ipaddr <ipAddress> e. Configure the netmask for the IPMI interface: hostname (config) # ipmi lan netmask <netMask> f. Configure the default gateway for the IPMI interface: hostname (config) # ipmi lan defgw <ipAddress> 2. If you want to configure DHCP: a. Make sure that DHCP is enabled on your network: hostname (config) # show ip dhcp b. Enable DHCP: hostname (config) # ipmi lan ipsrc dhcp 3. The default username for logging in to the IPMI Web UI is ADMIN. Configure the password. The password must be a minimum of five characters, and a maximum of 20 characters. hostname (config) # ipmi user set password <password> 4. Save your changes. hostname (config) # write memory To revert to the default configuration: 1. Go to CLI configuration mode. hostname > enable hostname # configure terminal 2. Revert to the default configuration: hostname (config) # ipmi lan ipsrc static © 2019 FireEye 83 Central Management Administration Guide CHAPTER 4: Initial Configuration 3. Save your changes. hostname (config) # write memory NOTE: It is important to use the latest IPMI firmware available for your system. For details, see IPMI Firmware Updates on page 203. 84 © 2019 FireEye Central Management Administration Guide CHAPTER 5: Virtual Central Management Appliances A virtual Central Management appliance is a virtual instance of a physical Central Management appliance. It manages a virtual appliance the same way it manages a physical appliance, but requires no hardware. The same virtual Central Management appliance can manage both physical and virtual appliances. Both physical and virtual appliances depend on the FireEye DTI network (cloud.fireeye.com) for automatic license updates and DTI services such as threat intelligence and software and security content updates. Virtual appliances also depend on the DTI network for the token server, which continually renews the lease on its product license, and the entropy server, which generates randomness for more secure connections. A virtual appliance has a unique activation code, which serves the following purposes: l Gives the appliance a unique identity (its appliance ID). l Activates the product (FIREEYE_APPLIANCE) license. l Allows access to the license token server. l Provides access to the DTI network. l Protects you from fraudulent use of the virtual appliance. l Allows the virtual appliance to initialize—the appliance remains disabled until you apply the activation code. The activation code is highly sensitive, because it gives the virtual appliance its identity and access credentials. FireEye takes measures to prevent fraudulent use of activation codes as described in How It Works on page 108. This section includes the following information: l l Deploying Virtual Central Management Appliances on VMware ESXi on the next page Deploying Virtual Central Management Instances on Amazon Web Services (AWS) on page 96 © 2019 FireEye 85 Central Management Administration Guide CHAPTER 5: Virtual Central Management Appliances l Understanding Virtual Appliance Licensing on page 108 l Viewing System Entropy Status on page 112 Deploying Virtual Central Management Appliances on VMware ESXi Open Virtualization Format (OVF) is an open standard for various virtualization platforms, and is used to package and distribute the software that runs on virtual machines. A virtual appliance is packaged as an OVA image, which is a compressed file containing the contents of an OVF folder. The OVF folder contains the appliance system image as well as virtual machine files. You install a virtual appliance in a VMware ESXi server. CAUTION! VMware EXSi host version 6.0 or later is required. Earlier ESXi versions are not supported, and virtual appliances installed using those versions will not function properly. NOTE: This section assumes a familiarity with deploying virtual machines and administering ESXi hosts. This section provides the basic steps for creating and deploying a virtual appliance. For comprehensive information about deploying virtual machines, see the documentation provided by VMware, Inc. VMware ESXi System Requirements Before you deploy a virtual Central Management appliance, make sure the following requirements are met. VMware Requirements The following VMware resources are required: l VMware EXSi host version 6.0 or later. Earlier ESXi versions are not supported. l VMware vSphere Client l 86 VMware vCenter Server (recommended). When you use vSphere Client to add your virtual appliances to vCenter Server, the Deploy OVF Template wizard provides an easy way to enter your activation code. Otherwise, you must type it in the virtual appliance console, because you cannot paste into this console. l VMXNET 3 network adapters l Link aggregation enabled on ESXi host © 2019 FireEye Release 8.7 Deploying Virtual Central Management Appliances on VMware ESXi Virtual Appliance Specifications Each virtual appliance must meet the following specifications. All CPU cores are Intel Xeon E5-2630 v4, with 2.20 GHz processor (minimum). Model CPU Cores RAM CM2500V 4 32 GB Virtual NICs 4 (total): Hard Disk Space 512 GB 1 (management) 1—3 (for future use) CM4500V 8 64 GB 4 (total): 1200 GB 1 (management) 1—3 (for future use) CM7500V 16 128 GB 4 (total): 1200 GB 1 (management) 1—3 (for future use) Limitations l l l Central Management high availability (HA) is supported on the CM4500V and CM7500V models only. You cannot change the number of network interfaces on the virtual appliance. If the server that hosts your virtual appliances does not have enough physical NICs, you can use VLAN tagging, assign unused interfaces to a virtual switch that is not bound to a physical NIC, or add physical NICs to the server. Changing storage policy and adding partitions is not supported. © 2019 FireEye 87 Central Management Administration Guide l l CHAPTER 5: Virtual Central Management Appliances Snapshots are not supported. Content is encoded and decoded on each virtual appliance, and will not be decoded correctly on the snapshot. The following VMware features are not supported: l Virtual SMP l Update Manager l Data Protection l High Availability (HA) l vMotion (including Storage vMotion, Enhanced vMotion Compatibility, and Cross-vSwitch vMotion) l Storage APIs for Data Protection l Memory hot add l Endpoint l Replication l Fault Tolerance l Virtual Volumes l Offline operational mode Installing a Virtual Appliance in VMware ESXi This section describes how to install a virtual appliance. IMPORTANT! This procedure uses VMware ESXi version 6.0.0 (build 3568940) and vSphere Client version 6.0.0 (build 3562874) on VMware vCenter Server version 6.0.0 (build 3018524). The navigation instructions and user interface may vary based on your version of these products. NOTE: procedure covers the required settings for a FireEye virtual appliance. You can accept the default values for the other settings, or specify values that are appropriate for your setup. Prerequisites 88 l Root user account on an ESXi server. l Requirements in VMware ESXi System Requirements on page 86 are met. © 2019 FireEye Release 8.7 Deploying Virtual Central Management Appliances on VMware ESXi To install a virtual appliance: 1. Log in to vSphere Client. 2. From the File menu, select Deploy OVF Template to start the wizard. 3. On the Source screen, paste the URL that FireEye provided that points to the OVA file containing the Central Management system image, or click Browse and navigate to the OVA file stored in your file system, and then click Next. © 2019 FireEye 89 Central Management Administration Guide CHAPTER 5: Virtual Central Management Appliances 4. On the OVF Template Details screen, review the information. If the information is correct, click Next. Otherwise, click Back and enter the correct URL or path. 5. On the Name and Location screen, enter a unique name that describes the virtual appliance. 90 © 2019 FireEye Release 8.7 Deploying Virtual Central Management Appliances on VMware ESXi 6. On the Disk Format screen, select Thin Provision, and then click Next. 7. On the Network Mapping screen, click Next to accept the default settings. © 2019 FireEye 91 Central Management Administration Guide CHAPTER 5: Virtual Central Management Appliances 8. On the Properties screen, you can complete fields to configure initial settings as described in Using the Properties Screen on page 94. (If you do not use this screen, you must type the values into the vSphere Client console manually, because you cannot paste into this console.) 92 © 2019 FireEye Release 8.7 Deploying Virtual Central Management Appliances on VMware ESXi 9. On the Ready to Complete screen: a. Verify the information. b. (Optional) Select the Power on after deployment check box. c. Click Finish. Performing the Initial Configuration The management interface is the port through which the virtual appliance is managed and administered. It is also the port through which integration of the Central Management appliance and a managed appliance is managed. With the single-port address type, the management interface is also the port through which a managed appliance requests and downloads software updates from the DTI network. Initial settings need to be configured to set up the management interface, and to allow access to the network, change the default administrator password, and so on. If your virtual appliances are managed by VMware vCenter Server, the installation wizard includes a Properties screen that allows you to enter your activation code and supply © 2019 FireEye 93 Central Management Administration Guide CHAPTER 5: Virtual Central Management Appliances CLI commands that configure the appliance. You can also reset the password for the "admin" user on this screen. If the wizard does not include the Properties screen or if you choose not to use it, you can use the console of the vSphere client to type the activation code and commands that allow the admin to log in to the CLI or Web UI to configure the appliance. You can fully configure the appliance from the console, but it might be inconvenient because you cannot paste into the console. Using the Properties Screen The Properties screen is included in the Deploy OVF Template wizard if you connect to your ESXi host through VMware vCenter Server. Installing a Virtual Appliance in VMware ESXi on page 88 shows an illustration of this screen and provides information about the other wizard screens. FireEye recommends that you use the Properties screen to do at least the following: l l Enter the activation code for your virtual appliance. The activation code contains many characters. The vSphere Client prevents you from pasting the activation code into the vSphere Client console, and it is easy to make a typing error. Reset the password for the "admin" user if password authentication will be used to log into the CLI or Web UI over the network. The password must be changed to a password of at least eight characters. You can also use this screen to provide commands for configuration settings that the system will apply during the initial boot. This is convenient if you have a large number of virtual appliances to deploy, because you can create base sets of commands and then customize them for each deployment. NOTE: You can use the system virtual bootstrap reset command to reset the Properties screen values after the virtual appliance is deployed and running. The following table describes the fields in the Properties screen. Field Activation Code 94 Description The code you received in a secure email from FireEye that gives the virtual appliance its identity and access credentials. © 2019 FireEye Release 8.7 Deploying Virtual Central Management Appliances on VMware ESXi Field Description Initial CLI commands A Base64-encoded set of commands that at a minimum allow the appliance to connect to your network. To use this field, type the commands in plain-text format, encode them to Base64, and then paste the encoded string into this field. (You can use the Linux command cat <filename>.txt | base64 | tr -d '\n' to encode the commands.) Consider using this field for network connectivity only, because the size of the string could become unwieldy. The string can be a maximum of 65,535 bytes, and cannot be line-wrapped. Initial CLI commands URL A URL that points to a file on your network (for example, http://acme.com/operations/6500V_config.txt). To use this field, enter CLI commands that configure additional settings in plain-text format, and store the file on an HTTP server in your network. The virtual appliance needs network connectivity (which the commands in the Initial CLI commands field can establish) to access the file referenced in the URL. Reset admin password A password of at least eight characters. The initial "admin" password must be reset to allow the admin user to log into the CLI or Web UI over the network unless both of the following are true: l l The CLI commands being executed set an SSH authorized key for the admin use, which allows the admin to log in remotely without a password. You disable password login using the username admin disable password command. Using the Console FireEye recommends that you use the Properties screen to provide initial configuration settings, because you cannot copy and paste into the vSphere Client console. However, if you do not use this screen, and if the license update feature is not enabled, FireEye recommends that you accept the evaluation licenses during the initial configuration, because typing the keys is tedious and prone to error. After the activation code is entered and the admin user has access to the appliance Web UI or CLI , you can copy and paste the license keys. To perform the initial configuration of a virtual appliance: 1. Log in to vSphere client. 2. In the left pane, expand the ESXi IP address and then select the virtual appliance. © 2019 FireEye 95 Central Management Administration Guide CHAPTER 5: Virtual Central Management Appliances 3. Click the Console tab. 4. If the console is not running, click the green arrow to launch it. 5. At the login prompt, enter admin. 6. At the password prompt, enter admin. 7. Start the configuration jump-start wizard: hostname (config) # configuration jump-start 8. Answer the wizard questions as described in Configuration Wizard Steps on page 78. NOTE: To navigate away from the vSphere Client console and return to the vSphere Client user interface or your local machine, press Ctrl+Alt. Deploying Virtual Central Management Instances on Amazon Web Services (AWS) An AMI (Amazon Machine Image) is a template that contains the software configuration needed to deploy a virtual Central Management instance. The software configuration includes the operating system, application server, and applications that are needed to launch the instance. The following table summarizes the steps to launch a virtual Central Management instance in Amazon Web Services (AWS). NOTE: This document provides the basic steps for launching FireEye virtual appliances, and assumes familiarity with launching virtual machines in AWS. For comprehensive information, see the AWS documentation provided by Amazon. 96 © 2019 FireEye Release 8.7 Deploying Virtual Central Management Instances on Amazon Web Services (AWS) Task Description 1. Launch the instance. Some settings are defined by your system administrator. Other settings are required for the Central Management instance. For instructions, see Launching a Virtual Central Management Instance on AWS on the next page. 2. Apply the activation code and configure the initial admin password for the instance. See Configuring the Activation Code and Initial Admin Password on AWS on page 99. 3. Perform the initial configuration of the instance. See Performing the Initial Configuration on page 100. CAUTION: In the "Primary IP address and masklen?" step of the configuration jump-start wizard, enter the same values you configured when you launched the instance on AWS. Prerequisites l FireEye AMIs in the US West region are copied to My AMIs in your region. l Access to the AWS Management Console. l l Items from your AWS administrator, such as the network, subnet, and IP addresses for the instance, and key pairs and security groups to secure the instance. Items from FireEye, such as the activation code and licenses for your instance. AWS System Requirements Each virtual appliance launched in AWS must meet the following specifications. All AWS virtual CM models must be deployed on AWS memory optimized instances such as r4.xxx. Instance Requirements Model CPU Cores RAM CM 4500V 8 61 GB 1 1200 GB r4.2xlarge CM 7500V 16 122 GB 1 120 GB r4.4xlarge © 2019 FireEye Virtual NICs Disk Space AWS Instance Type 97 Central Management Administration Guide CHAPTER 5: Virtual Central Management Appliances Network Requirements l Connectivity with the DTI network (one-way or two-way sharing) l Network access to the following ports: l 80 TCP l 22 TCP l 443 TCP Launching a Virtual Central Management Instance on AWS This topic describes how to launch a virtual Central Management instance on AWS (Amazon Web Services). IMPORTANT: The navigation instructions and user interface may vary based on the AWS Management Console version that is running when you launch your instances. NOTE: This procedure covers the required settings for a FireEye virtual appliance. You can accept the default values for the other settings, or specify values that are appropriate for your environment. To launch a Central Management instance on AWS: 1. Go to the AWS login page and log in using your AWS ID. 2. On the Profile page, select your AWS role and then click AWS Console URL. 3. On the next page, click AWS Console login. The AWS Management Console opens. 4. In the navigation bar at the top of the console, select the region for the instance. 5. In the AWS services section, select EC2. 6. Click Launch Instance in the Create Instance section. 7. On the Choose an Amazon Machine Image (AMI) page, locate the AMI for the Central Management model. For example, select FireEyeCM4500Vec2 for the CM 4500V model. Then click Select. 8. On the Choose an Instance Type page, select Memory optimized - r4.2xlarge for the CM 4500V model or Memory optimized - r4.4xlarge for the CM 7500V model. Then click Next: Configure Instance Details. 98 © 2019 FireEye Release 8.7 Deploying Virtual Central Management Instances on Amazon Web Services (AWS) 9. On the Configure Instance Details page, select the management network and subnet from the Network and Subnet drop-down lists, and specify other settings provided by your network administrator. Click Next: Add Storage. NOTE: FireEye recommends that you configure a static IP address in the Primary IP field in the Network interfaces section at the bottom of the page. 10. On the Add Storage page, keep the default settings and then click Next: Add Tags. 11. (If required by your AWS administrator) On the Add Tags page, provide key and value combinations. Then click Next: Configure Security Group. 12. On the Configure Security Group page, select or add the security group that defines firewall rules that control traffic to the Central Management instance. Then click Review and Launch. IMPORTANT: FireEye recommends using a security group applicable to your organization instead of using the default security group, which is less secure. 13. On the Review Instance Launch page, review the details about your instance. Click the appropriate Edit link if you need to make changes. When you are satisfied with the details, click Launch. 14. In the Select an existing key pair or create a new key pair dialog box: a. Select an existing pair or create a new one. To use the key pair you created when you were set up to use Amazon EC2, click Choose an existing key pair, and then select that key. IMPORTANT: Store the name of the key pair and the private key in a secure location. b. Select the checkbox to confirm that you agree to the acknowledgement statement, and then click Launch Instances. 15. Continue to Configuring the Activation Code and Initial Admin Password on AWS below. Configuring the Activation Code and Initial Admin Password on AWS This topic describes how to apply the activation code for the Central Management instance and configure a temporary password for the initial admin user. © 2019 FireEye 99 Central Management Administration Guide CHAPTER 5: Virtual Central Management Appliances NOTE: You will use this password to log in to an SSH session using password authentication and perform the initial configuration of the appliance. During the jump-start wizard, you can configure another password. If the password you configure in this topic is not 8–32 characters long, you must change the password during the jump-start wizard to meet this password length requirement. To apply the activation code to the instance: 1. Open the EC2 Management Console. 2. Select Instances > Instances in the left pane. 3. Select the instance, right-click, and then select Instance Settings > View/Change User Data. 4. Copy and paste the following script in the User Data field. Replace <code> with the activation code for the instance that was included in the onboarding email from FireEye and replace <password> with the new password for the initial admin user. { "va_bootstrap": { "activation_code": "<code>", "reset_admin_password": "<password>" } } IMPORTANT: This step is required. The syntax (including the indentation) must match what is shown in this step. Otherwise, you will be unable to establish an SSH session with the instance. 5. Click Save. 6. Right-click the instance, and select Instance State > Start. 7. Continue to Performing the Initial Configuration below. Performing the Initial Configuration The management interface is the port through which the Central Management instance is managed and administered. It is also the port through which integration of the Central Management instance and managed appliances is managed. Initial settings need to be configured to set up the management interface and to allow access to the network, change the default admin password, and so on. To perform the initial configuration of a Central Management instance: 1. Connect to the instance through an SSH client. 2. At the login prompt, enter admin. 100 © 2019 FireEye Release 8.7 Deploying Virtual Central Management Appliances on KVM Servers 3. At the password prompt, enter the initial password you configured in Configuring the Activation Code and Initial Admin Password on AWS on page 99. NOTE: Alternatively, you can use the ssh -i command to use the private key file to establish an SSH session. For example, ssh -i /path/<my-keypair>.pem admin@<instance>. 4. Accept the license agreement. The configuration jump-start wizard begins. 5. Answer the wizard questions as described in Configuration Wizard Steps on page 78. CAUTION: In the "Primary IP address and masklen?" step, enter the same values you configured on the Configure Instance Details page when you launched the instance (see Launching a Virtual Central Management Instance on AWS on page 98). NOTE: The "Admin password?" step is optional if you configured an 8–32 character password in Configuring the Activation Code and Initial Admin Password on AWS on page 99. Deploying Virtual Central Management Appliances on KVM Servers The following sections describe how to deploy a virtual Central Management appliance on KVM (Kernel-based Virtual Machine) servers. KVM is an open-source hardware virtualization software through which you can create and run multiple Linux and Windows-based virtual machines simultaneously. Supported virtual CM models include CM 4500V and CM 7500V. l KVM System Requirements below l Installing a Virtual Central Management Appliance on KVM on the next page l Performing the Initial Configuration on page 105 KVM System Requirements The following KVM (Kernel-based Virtual Machine) resources are required: l l Ubuntu 18.4 or later or CentOS 7.4 or later Standard virtual switch, connected to an external network and shared by the operating system © 2019 FireEye 101 Central Management Administration Guide l l l CHAPTER 5: Virtual Central Management Appliances Software bridge (for example, "br0") in the operating system for the management connection to the virtual Central Management appliance. The software bridge should be configured with the physical NIC mapping on the host, which is then used for management access to the virtual Central Management appliance. (For instructions, see the documentation provided by Ubunto.) Ubuntu: l KVM version (kvm -version): QEMU emulator version 2.11.1 (Debian 1: 2.11 l + dfsg-1ubuntu 7.9) l libvirtd version: libvirtd (libvirt) 4.0.0 l virt-manager version: 1.5.1 CentOS: l KVM version: QEMU emulator version 1.5.3 (qemu-kvm-1.5.3-160.el7) l libvirtd version: libvirtd (libvirt) 4.5.0 l virt-manager version: 1.5.0 Installing a Virtual Central Management Appliance on KVM This section describes how to install a virtual Central Management appliance on a KVM server using the KVM Virtual Machine Manager UI. IMPORTANT: This procedure uses KVM version libvert 4.5 on Ubuntu 18.04. The navigation instructions and user interface may vary if you are using CentOS or a different version of Ubuntu. NOTE: This procedure covers the required settings for a FireEye virtual appliance. You can accept the default values for the other settings, or specify values that are appropriate for your setup. Before starting the virtual appliance installation, ensure you have the required prerequisite software installed. See KVM System Requirements on the previous page. The following packages are required for a successful virtual Central Management appliance deployment on KVM: 102 l qemu-kvm l qemu-img l virt-manager l libvirt © 2019 FireEye Release 8.7 l libvirt-python l libvirt-client l virt-install l virt-viewer l librbd1-devel Deploying Virtual Central Management Appliances on KVM Servers In the following procedure, you will create the virtual appliance and configure its management port. To install a virtual appliance using the KVM Virtual Machine Manager UI: 1. Download the Central Management KVM deployment .zip file from the FireEye DTI network to a KVM server and extract the files within it to the /home/admin/images directory. The .zip file name is based on your appliance model. For example, the .zip for the CM 7500V is image-cms-fireeyecm4500v.zip. © 2019 FireEye 103 Central Management Administration Guide CHAPTER 5: Virtual Central Management Appliances 2. In KVM Virtual Machine Manager, select File > New Virtual Machine. 3. Complete the Create a new virtual machine screens: Screen Step 1 of 4 Action 1. Select Import existing disk image. 2. Click Forward. Step 2 of 4 1. Browse to and select the folder to which you extracted the .zip file in the first step. 2. Select the .qcow2 file, such as image-cmsfireeyecm4500v.qcow2, and click Choose Volume. 3. Select OS type Linux and in the Version field, select your version of CentOS or Ubuntu. 4. Click Forward. Step 3 of 4 1. Set Memory and CPU settings to the values for your virtual CM model. 2. Click Forward. Step 4 of 4 1. Enter a name, such as FireEye-CM-4500V. 2. Click Customize configuration before install and select Network selection Bridge br0. The bridge must have already been created in the host OS. This is the management (ether1) port for the virtual appliance. 3. Click Finish. The KVM installation page opens. 104 © 2019 FireEye Release 8.7 Deploying Virtual Central Management Appliances on KVM Servers 4. In the KVM installation page, configure the basic information and disk IO for the virtual Central Management appliance. Tab Overview Action 1. Enter a domain name, such as FireEye-CM4500V, for the virtual Central Management appliance in the Name field and optionally enter a Title and Description. 2. Click Apply. VirtIO Disk 1 1. Click Advanced options. 2. Select SCSI in the Disk bus field. 3. Click Apply. 5. In the KVM installation page, add the virtual hardware for the controller: a. At the bottom left of the KVM installation page, click Add Hardware. b. In the Add New Virtual Hardware page, select the Controller tab and then select the following values: l Type—SCSI l Model—VirtIO SCSI c. Click Finish. 6. Click Begin installation. 7. After the installation is complete, proceed to Performing the Initial Configuration below. Performing the Initial Configuration The management interface is the port through which the Central Management instance is managed and administered. It is also the port through which integration of the Central Management instance and managed appliances is managed. Initial settings need to be configured to set up the management interface and to allow access to the network, change the default admin password, and so on. After the virtual Central Management appliance finishes booting for the first time, the configuration wizard starts. Answer the wizard questions as described in the following table. Configuration Wizard Steps on page 78 © 2019 FireEye 105 Central Management Administration Guide Step CHAPTER 5: Virtual Central Management Appliances Response Activation code? (Virtual KVM deployments only) Enter the activation code you obtained from FireEye. Hostname? Enter the hostname for the appliance. Admin password? Enter a new administrator password. The new password must be 8–32 characters. If you do not change the password, the administrator will be unable to log in to the appliance. Confirm admin password? Re-enter the new administrator password. Enable remote access for ‘admin’ user? Enter yes to enable the administrator to log in to the appliance remotely. Enter no to disable remote access. Use DHCP on ether1 interface? Enter yes to use Dynamic Host Configuration Protocol (DHCP) to configure the appliance IP address and other network parameters. Enter no to manually configure your IP address and network settings. (If you enter yes, the zeroconf and static IP addressing steps are skipped.) Use zeroconf on ether1 interface? Enter yes to use zero-configuration (zeroconf) networking. Enter no to specify a static IP address and network mask. (If you specify yes, the next step is skipped.) NOTE: Do not use zeroconf on the primary interface. Primary IP address and masklen? Enter the IP address for the management interface in A.B.C.D format and enter the network mask, for example: 1.1.1.2/12. Default gateway? Enter the gateway IP address for the management interface. Primary DNS server? Enter the IP address of the DNS server. Domain name? Enter the domain for the management interface; for example: it.acme.com. Activation code Enter the activation code you obtained from FireEye. (Some virtual appliances only) Enable fenet service? 106 Enter yes to enable access to the DTI network. (If you enter no, the next three steps are skipped.) © 2019 FireEye Release 8.7 Deploying Virtual Central Management Appliances on KVM Servers Step Response Enable fenet license update service? Enter yes to enable the licensing service to automatically download your licenses from the DTI network and install them. (If licenses are downloaded and installed successfully, the wizard skips the step that prompts for the product license key and the step that prompts for the security-content updates key.) Sync appliance time with fenet? Enter yes to synchronize the appliance time with the DTI server time. If you enabled the licensing service, synchronization prevents a feature from being temporarily unlicensed due to a time gap. The wizard makes three attempts to perform this step before it gives up and moves to the next step. Update licenses from fenet? Enter yes to download and install your licenses. The wizard makes three attempts to perform this step before giving up and moving on to the next step. Enable NTP? Enter yes to enable automatic time synchronization with one or more Network Time Protocol (NTP) servers. Enter no to manually set the time and date on the appliance. (This step is skipped if you entered yes in the "Sync appliance time with fenet?" or "Enable Incident Response or Compromise Assessment?" step.) If you enter no, specify the time and date in Greenwich Mean Time (GMT). Set time (<hh>:<mm>:<ss>)? Enter the appliance time. (This step and the next step are skipped if you entered yes in the "Sync appliance time with fenet?" or "Enable NTP?" step.) Set date Enter the appliance date. (<yyyy>/<mm>/<dd>)? Enable IPv6? Enter yes to enable IPv6 protocol, which changes network IP routing from IPv4 to IPv6. (This step and the next two steps are skipped if you entered yes in the "Enable Incident Response or Compromise Assessment?" step. This step and the next two steps will be automatically performed if you entered yes in the “Enable FaaS VPN” step.) Enable IPv6 autoconfig (SLAAC) on ether1 interface? Enter yes to enable IPv6 autoconfig on the ether1 (management interface) port. (This step is skipped if you entered no in the "Enable IPv6?" step.) © 2019 FireEye 107 Central Management Administration Guide Step CHAPTER 5: Virtual Central Management Appliances Response Enable DHCPv6 on ether1 interface? Enter yes to use DHCPv6 to configure IPv6 hosts with IP addresses. (This step is skipped if you entered no in the "Enable DHCP?" or "Enable IPV6?" step.) Product license key? Enter the product license key you obtained from FireEye, or press Enter to install a 15-day evaluation license. (This step and the next step are skipped if you entered yes in the "Enable fenet license update service?" step and if licenses were successfully installed as a result.) Security-content updates key? Enter the security-content license key you obtained from FireEye, or press Enter to skip this step and install the license later. Configure CMS HA? Enter yes to configure the Central Management appliance in a high availability (HA) environment. (For the remaining HA configuration steps, see the Central Managment High Availibility Guide.) (Physical models and selected virtual models only) Understanding Virtual Appliance Licensing Licenses for virtual appliances are based on a unique appliance ID. FireEye sends you two secure emails. One email contains the appliance ID, a unique activation code, and a link to download the software image for the virtual appliance. The other email contains the license keys for the virtual appliance. The FIREEYE_APPLIANCE (product) license for a virtual appliance must be continually validated by a token server. The token server uses a time-limited token to activate the product license on the virtual appliance. The token also provides a short-term lease on the product license. The virtual appliance must continually renew this lease to keep its product license active. If the product license becomes inactive, malware detection is disabled on the appliance. NOTE: The start and stop dates for the product license also govern whether the license remains active. How It Works After the virtual appliance has been activated, it connects to the token server and requests a license token for its product license. If the DTI credentials the appliance presents are 108 © 2019 FireEye Release 8.7 Understanding Virtual Appliance Licensing valid, the token server sends the appliance a token that allows the product license to be active for the duration of the lease. The duration of a lease is one hour, so the license token must be renewed every hour. The appliance applies for the lease renewal with enough lead time to keep the appliance functioning if an event such as a brief network outage occurs. The lead time is 15 minutes by default and can be changed with the assistance of FireEye Technical Support. The token server grants grace periods to allow for token server failures and network outages. Initially there is no grace period. After the virtual appliance has been continually licensed for three hours, the token server grants the appliance six hours of grace time. If the current token expires and the token renewal fails, the product license will remain active for up to six hours while the appliance continues to send a renewal request every minute to the token server. The grace period is extended to three days if FireEye determines that your network is down and unable to contact the DTI network. When connectivity is restored, the appliance automatically requests a new license token. FireEye takes the following measures to guard against accidental or malicious abuse of the product license. l l l Hourly validation. Authentication and authorization take place every hour, because each token request must be validated against the virtual appliance's DTI credentials. Duplicate detection. The token server detects duplicate virtual appliances based on the appliance ID in the activation code, the universal unique identifier (UUID) of the virtual appliance, and the last license token renewal request that was presented to the server. A brief period of overlap is allowed to support a legitimate migration of the virtual appliance to another ESXi server, or a database backup and restore operation. Time service. The token server provides a time service to prevent appliance clock manipulation. SNMP and email event notifications warn you if the product license becomes inactive, if the token server cannot be reached, and if a duplicate virtual appliance is detected. The identity of the duplicate appliance is kept confidential for security. Prerequisites l Monitor, Operator, or Admin access to view licensing information Viewing Virtual Appliance License Status Using the CLI Use the commands in this section to view current token status and configuration information. © 2019 FireEye 109 Central Management Administration Guide CHAPTER 5: Virtual Central Management Appliances To view license token status: 1. Log in to the virtual appliance. 2. Enable the enable CLI mode: hostname > enable 3. View the status: hostname # show licenses token To view license token configuration: 1. Log in to the virtual appliance. 2. Enable the enable CLI mode: hostname > enable hostname # 3. View the configuration: hostname # show licenses tokens configured Examples The following example shows license token configuration information for the vCM-04 virtual appliance. vCM-04 # show licenses tokens configured License token configuration: Query Enabled: yes Query lead time: 25% (15 min) Query Retry interval: 1 min The following example shows the current status of license tokens on the vCM-04 virtual sensor. vCM-04 # show licenses tokens Token Summary : Token Active : Token Required : yes yes Token Lease : Lease Active: Lease Time Remaining : yes 12 min Token Grace Period : Grace Period Active : Grace Period Available : Grace Period Remaining : no yes 360 min Token Server Current Time : 2016/07/25 14:49:21 Token Details : Next Token : Sequence Number : Lease Duration : Timestamp : 110 186 60 min 2016/07/25 14:47:21 © 2019 FireEye Release 8.7 Understanding Virtual Appliance Licensing Active Token : Sequence Number : Lease Duration : Timestamp : 185 60 min 2016/07/25 14:01:21 Previous Token : Sequence Number : Lease Duration : Timestamp : 184 60 min 2016/07/25 13:15:21 Output Fields The following table describes the show licenses tokens configured command output fields. Field Description Query Whether the virtual appliance is enabled to request license token renewals. Enabled Query Lead time The percentage of the lease duration before the active lease expires at which the virtual appliance should request license token renewal. This value is 25 percent of the lease duration (15 minutes). Query Retry interval How soon the license token renewal is tried again after an unsuccessful attempt. This value is one minute. The following table describes the show licenses tokens command output fields. The output fields and values depend on the current license token status. For example, when a token has not been obtained yet, the Next Token field is (not fetched). Field Description Token Active Whether the current token is active. Token Required Whether a token is required to keep the product license active. Token Lease Lease Active Whether the lease on the current token is active. Lease Time Remaining Number of minutes before the lease expires. Token Grace Period Grace Period Active © 2019 FireEye Whether the virtual appliance is currently using grace time because its license token expired. 111 Central Management Administration Guide Field CHAPTER 5: Virtual Central Management Appliances Description Grace Period Available Whether the appliance has available grace time to use if necessary. Grace Period Remaining The number of minutes remaining in the grace period. The maximum is 360 minutes (six hours). Token Server Current Time Current date and time of the token server. Next Token Sequence Number Number identifying the next token on the token server. Lease Duration Number of minutes the next token will last. Timestamp Date and time the next token was obtained. Active Token Sequence Number Number identifying the license token that is currently in use. Lease Duration Number of minutes the lease on the token will last. Timestamp Date and time the current token was obtained. Previous Token Sequence Number Number identifying the last token that was used. Lease Duration Number of minutes the lease on the token lasted. Timestamp Date and time the previous token was obtained. Viewing System Entropy Status Unpredictability (or randomness) plays a critical role in securing connections between entities. Entropy is a generator of randomness. As a rule, entities with more randomness have a more secure connection. A lack of entropy can have a negative impact on security and performance. The Central Management appliance must have adequate entropy to generate keys for secure SSL and SSH communication. Physical appliances have a built-in source of highquality entropy. Virtual appliances do not have a built-in source, so they continually obtain entropy information from a centralized, upstream DTI entropy server. 112 © 2019 FireEye Release 8.7 Viewing System Entropy Status Prerequisites l Monitor, Operator, or Admin access Viewing System Entropy Status Using the CLI Use the commands in this section to view the current status of system entropy. To view the status of system entropy: 1. Log in to the Central Management CLI. 2. View the status: hostname > show system entropy Example The following example shows the status of system entropy on a virtual Central Management appliance. vCM-03 > show system entropy Entropy bootstrap complete: Entropy bits available: Entropy refresh interval: yes 983 900 Entropy last fetch status: success Entropy last fetch success time: 2016/07/23 06:46:47 Output Fields Field Description Entropy bootstrap complete Whether the system got sufficient initial entropy to generate keys for secure SSL and SSH communication. Entropy bits available The number of random bits that are currently available for applications that need random numbers. Entropy refresh interval The interval at which the virtual appliance requests entropy (every 900 seconds, or 15 minutes). Entropy last fetch status The status of the last entropy request. Entropy last fetch success time The date and time the last entropy request succeeded. © 2019 FireEye 113 Central Management Administration Guide 114 CHAPTER 5: Virtual Central Management Appliances © 2019 FireEye Central Management Administration Guide About FireEye License Keys CHAPTER 6: License Keys This section covers the following information: l About FireEye License Keys below l Automatic License Updates on page 118 l Manual License Installation on page 121 l Viewing License Notifications Using the Web UI on page 125 About FireEye License Keys License keys are required for system operation. The CM appliance requires these license keys: License Key FIREEYE_ APPLIANCE Description Required to register your system and use the product features. Version l l Central Management Central Management HA Used in high availability deployments. © 2019 FireEye 115 Central Management Administration Guide License Key CONTENT_ UPDATES CHAPTER 6: License Keys Description Allows your system to access the Dynamic Threat Intelligence (DTI) network, which provides the latest intelligence on advanced cyber attacks and malware callback destinations. This enables FireEye products to proactively recognize new threats and block attacks. You can override the one-way sharing license on your appliance to submit information to AV-Suite and the DTI cloud by using the analysis oneway-override enable FIREEYE_ SUPPORT Version Two license versions: License type 1—The two-way sharing license provides your appliance with malware intelligence from the DTI network and shares data about malware analyzed by your appliance. License type 2—The one-way sharing license provides your appliance with malware intelligence, but no information is submitted to the DTI cloud. command. See Overriding OneWay Sharing License on the facing page. Note: When using a one-way license, locally generated intel is shared across all appliances attached to the Central Management appliance. Allows your system to receive software image updates and the latest guest images. — The following licenses are optional: NOTE: The functionality provided by optional licenses is disabled if the FIREEYE_APPLIANCE license is invalid. License Key Description MD_ACCESS Allows FireEye products to connect to the Managed Defense VPN. Without this license, Managed Defense cannot manage the server. DA_HANCOM Allows your appliance to perform dynamic analysis of Hancom Office files. If licenses have expired or will expire within 30 days, warnings are displayed on the Central Management License Settings page. For details, see Viewing License Notifications Using the Web UI on page 125. 116 © 2019 FireEye Release 8.7 Overriding One-Way Sharing License Overriding One-Way Sharing License A one-way sharing license on the appliance provides the CM appliance with malware intelligence, but no information is submitted to AV-Suite and the DTI Cloud. When you override the setting for one-way license sharing, the appliance is allowed to submit information such as an MD5 checksum to the AV-Suite and the DTI Cloud for further malware analysis. Prerequisites l Administrator or Operator access to the appliance l A one-way sharing CONTENT_UPDATES license l Verify that AV-Suite integration is enabled and that AV-Suite version 6 is configured. Use the show static-analysis config command. Override One-Way Sharing License Using the CLI Follow these steps to override the one-way sharing license setting and share information with AV-Suite and the DTI Cloud from the CM appliance. To override the one-way sharing license: 1. Go to CLI configuration mode. hostname > enable hostname # configure terminal 2. Override the one-way sharing license on the appliance. hostname (config) # analysis one-way-override enable 3. Verify that the one-way sharing license was overridden. hostname # show analysis one-way-override one_way license override :Enabled 3. Save your changes: hostname (config) # write memory To return the one-way sharing license to its default setting: 1. Go to CLI configuration mode. hostname > enable hostname # configure terminal 2. Return the one-way sharing license to its default setting. hostname (config) # no analysis one-way-override enable © 2019 FireEye 117 Central Management Administration Guide CHAPTER 6: License Keys 3. Verify that the one-way sharing license has returned to its default setting. hostname # show analysis one-way-override one_way license override :Disabled 4. Save your changes: hostname (config) # write memory Automatic License Updates The license update feature enables the CM appliance with basic network connectivity to automatically download licenses from the DTI network and install them. This feature provides the following benefits: l l l Minimal initial configuration—The license update feature is enabled with the configuration jump-start wizard during the initial system configuration. This means the feature can be fully functional after the jump-start wizard is completed. Simplified license management—There is no need to contact FireEye for license keys when new features are added or when licenses are renewed, because the new licenses are automatically downloaded and installed. Scalability—Organizations, such as those with a large number of appliances, can benefit from all appliances being updated automatically, instead of entering license keys manually on each appliance, one at a time. You can enable automatic license updates on the CM appliance using the configuration wizard or the CLI. How It Works The license update feature, if enabled, downloads and applies licenses to which the customer is contractually entitled. If an active license for a feature is already installed and the licensing service downloads an active license for the feature, the installed license is replaced by the downloaded license only if the downloaded license offers new functionality, a later expiry date, or was part of a more recent customer order. This process is automatic; however, you can also explicitly update licenses. The license update feature will not: l l Install a downloaded license that would cause a feature to become temporarily unlicensed. Remove a feature license if there is no newly ordered replacement for it. If you experience issues with a license retrieved from an automatic update, you can use the command no fenet license update enable to disable the automatic update process and 118 © 2019 FireEye Release 8.7 Automatic License Updates you can use the command license install <cr> to manually install your older license key or keys. You can synchronize the system time to the DTI server time to prevent a feature from being temporarily unlicensed due to time differences. This is a one-time synchronization, but it can be repeated. When an appliance is managed by the Central Management appliance, the Central Management appliance acts as a proxy between the managed appliance and the licensing service. The license update feature must still be enabled on the managed appliance. In such an integrated environment, the Central Management appliance acts as the DTI server for the managed appliances, so the licensing service uses the Central Management DTI network credentials instead of the appliance's credentials. Enabling Automatic License Updates This section describes two ways to enable automatic license updates on the CM appliance. Configuration Wizard Method The configuration wizard is typically used to initially configure a new system. The wizard steps, which include the following license activation steps, allow a customer to have a functioning system with only minimal configuration. l Enable fenet service? l Enable fenet license update service? l Sync appliance time with fenet? l Update licenses from fenet? For details about the wizard steps, see Configuration Wizard Steps on page 78. CLI Method The following topic describes how to use CLI commands to enable and work with the license update feature: l Enabling Automatic License Updates Using the CLI on the next page Prerequisites l l An established connection between the appliance and the Internet. Operator or Admin access to enable the license update feature and download and install licenses. © 2019 FireEye 119 Central Management Administration Guide l l CHAPTER 6: License Keys DTI network access to allow the appliance to get updates directly from the DTI network. (Optional) Admin access to synchronize the system clock with the DTI server clock. Enabling Automatic License Updates Using the CLI When the license update feature is enabled, license updates are automatic. You can also explicitly update licenses. To verify and enable automatic license updates: 1. Go to CLI configuration mode: hostname > enable hostname # configure terminal 2. Verify the license update feature status: hostname (config) # show fenet license fenet License Update Service Licensing service: Administratively enabled Last time licensing service was contacted: 2014/08/11 10:50:04 Last time licensing service was contacted successfully: 2014/08/11 10:50:04 Last time keys from licensing service were applied: 2014/08/07 17:50:03 3. If the license update feature service is disabled, enable it: hostname (config) # fenet license update enable 4. Save your changes: hostname (config) # write memory NOTE: See Synchronizing the System Clock to DTI Server Time Using the CLI on page 192 for an option that prevents potential licensing issues if there is a time gap between the two clocks. To explicitly update licenses: 1. Go to CLI configuration mode: hostname > enable hostname # configure terminal 2. Update licenses: hostname (config) # fenet license update 3. Save your changes: hostname (config) # write memory 120 © 2019 FireEye Release 8.7 Manual License Installation To disable automatic license updates: 1. Go to CLI configuration mode: hostname > enable hostname # configure terminal 2. Disable the feature: hostname (config) # no fenet license update enable 3. Save your changes: hostname (config) # write memory Manual License Installation If the license update feature is not enabled, you need to install license keys manually. Licenses need to be installed when an evaluation license expires or when a license expires or no longer meets your needs. In addition, replacement licenses need to be installed after a Return Material Authorization (RMA). You can obtain your license keys from the Assets tab in the FireEye Customer Support Portal or by sending an email that includes the MAC address of your appliance to key_ request@fireeye.com. There are two ways to manually install licenses, described in the following topics: l Installing Licenses Using the Web UI below l Installing Licenses Using the CLI on the next page Installing Licenses Using the Web UI Use the CM License Settings page to install licenses on the Central Management appliance. © 2019 FireEye 121 Central Management Administration Guide CHAPTER 6: License Keys NOTE: Clicking the Enable VPN link in the Description column for an MD_ ACCESS license allows you to connect the appliance to FireEye as a Service over the Internet using a secure SSL VPN connection. For details, see the FireEye as a Service Quick Start Guide. Prerequisites l Admin or Operator access. l The appliance does not already have the type of license key you are installing. To install license keys using the Web UI: 1. Click the Settings tab. 2. Click CM Licenses on the sidebar. 3. Click Add License. The Add License dialog box opens. 4. Paste the license key you obtained from FireEye in the License Key box. 5. Click Add. The page refreshes to show the license key in the table. If the key is valid, the Valid column shows a check mark and additional information is displayed about the license. Removing Licenses Using the Web UI Use the CMS License Settings page to remove Central Management licenses. Prerequisites l Admin or Operator access To remove license keys: 1. Click the Settings tab. 2. Click CMS Licenses on the sidebar. 3. Click the icon in the Delete column in the row for the license you want to remove. 4. Click Yes in the confirmation message that appears. Installing Licenses Using the CLI Use the CLI commands in this topic to install licenses on the CM appliance. 122 © 2019 FireEye Release 8.7 Manual License Installation Prerequisites l Admin or Operator access To install licenses: 1. Go to CLI configuration mode: hostname > enable hostname # configure terminal 2. Install each license: hostname (config) # license install <key1> <key2> <key3> NOTE: You can enter the license keys sequentially separated by spaces as shown above, or enter license install and then press Enter to be prompted to enter the license keys one at a time. 3. Verify the licenses: hostname (config) # show licenses License 1: LK2-FIREEYE_APPLIANCE-0000-0000-0000-0000-0000-0000-00000000-0000 Feature: FIREEYE_APPLIANCE Description: FireEye Appliance Valid: yes Start date: 2016/11/21 (ok) Tied to Appl ID: 000000000000 (ok) Product: eMPS (ok) Type: PROD (ok) Agreement: EULA (ok) Active: yes ... License 2: LK2-CONTENT_UPDATES-0000-0000-0000-0000-0000-0000-0000-00000000 Feature: CONTENT_UPDATES Description: Content updates Valid: yes Start date: 2016/11/21 (ok) End date: 2017/11/21 (ok) Tied to Appl ID: 000000000000 (ok) Sharing: all (ok) Active: yes License 3: LK2-FIREEYE_SUPPORT-0000-0000-0000-0000-0000-0000-0000-00000000 Feature: FIREEYE_SUPPORT Description: FireEye Support Valid: yes Start date: 2016/11/21 (ok) End date: 2017/11/21 (ok) Tied to Appl ID: 000000000000 (ok) Sharing: all (ok) Active: yes ... 4. Save your changes: hostname (config) # write memory © 2019 FireEye 123 Central Management Administration Guide CHAPTER 6: License Keys Removing Licenses Using the CLI Use the CLI commands in this topic to remove licenses. Prerequisites l Admin or Operator access To remove licenses: 1. Go to CLI configuration mode: hostname > enable hostname # configure terminal 2. List the installed licenses: hostname (config) # show licenses License 1: LK2-FIREEYE_APPLIANCE-0000-0000-0000-0000-0000-0000-0000 Feature: FIREEYE_APPLIANCE Description: FireEye Appliance Valid: yes Start date: 2016/11/01 (ok) Tied to appl ID: 000000000000 (ok) Product: MPS (ok) Type: PROD (ok) Agreement: EULA (ok) Op Mode: inline (ok) Active: yes ... License 2: LK2-CONTENT_UPDATES-0000-0000-0000-0000-0000-0000-0000 Feature: CONTENT_UPDATES Description: Content updates Valid: yes Start date: 2016/11/01 (ok) End date: 2017/11/01 (ok) Tied to appl ID: 000000000000 (ok) Sharing: all (ok) Active: yes License 3: LK2-FIREEYE_SUPPORT-0000-0000-0000-0000-0000-0000-0000 Feature: FIREEYE_SUPPORT Description: FireEye Support Valid: yes Start date: 2016/11/01 (ok) End date: 2017/11/01 (ok) Tied to appl ID: 000000000000 (ok) Sharing: all (ok) Active: yes 3. Specify the license ID to remove an individual license. For example, 3 is the license ID for the Support license shown in the previous example. hostname (config) # license delete 3 4. Save your changes. hostname (config) # write memory 124 © 2019 FireEye Release 8.7 Viewing License Notifications Using the Web UI NOTE: The show licenses command output in this procedure shows the basic licenses installed on an Network Security appliance. The output is similar for CM appliances. Viewing License Notifications Using the Web UI Functionality associated with a license stops when a license expires. For example, when the FIREEYE_APPLIANCE license expires, the appliance will block access to all pages except the CMS License Settings page, and CLI commands (except those that install licenses) are disabled or their execution fails. For example, the report generate command will not create a report. To prevent a gap in functionality, the CMS License Settings page displays notifications about expired license and licenses that will expire within 30 days. For example: NOTE: See Automatic License Updates on page 118 for information about enabling the appliance to automatically download licenses from the DTI network when it is time to renew them. © 2019 FireEye 125 Central Management Administration Guide 126 CHAPTER 6: License Keys © 2019 FireEye Central Management Administration Guide About the DTI Network CHAPTER 7: The DTI Network This section covers the following information: l About the DTI Network below l About DTI Network Communication on page 130 l Changing the Active Setting for a DTI Service on page 131 l Using an HTTP Proxy for DTI Service Requests on page 136 l Understanding the DTI Cache on page 137 l Validating DTI Access on page 149 l Configuring DTI Credentials on page 152 l Automatic Validation of Security Content on page 153 l Sharing Anonymized Data on page 155 About the DTI Network The FireEye Dynamic Threat Intelligence (DTI) network (cloud) provides subscriber platforms with the latest intelligence on advanced cyber attacks and malware callback destinations. This enables FireEye products to proactively recognize new threats and block attacks. The DTI cloud is also used to enable automatic software updates. Finally, a connection to the DTI cloud is required to use the license update feature. Threat Intelligence The FireEye DTI cloud interconnects FireEye platforms deployed within customer networks, technology partner networks, and service provider networks around the world. The FireEye DTI cloud serves as a global distribution hub to efficiently share automatically generated threat intelligence such as new malware profiles, vulnerability exploits, and obfuscation tactics, as well as new threat findings from the FireEye APT Discovery Center and verified third-party security feeds. By leveraging the FireEye DTI cloud, the FireEye Threat Prevention Platform is more efficient at detecting unknown zero-day, highly targeted © 2019 FireEye 127 Central Management Administration Guide CHAPTER 7: The DTI Network attacks used in cybercrime, cyber espionage, and cyber reconnaissance as well as known malware. NOTE: A subscription to the FireEye DTI cloud service is required before you can use the features described in this section. When the DTI cloud receives threat intelligence from customers and partners from around the world, this information is analyzed and distributed to all customers with a DTI cloud subscription. The information includes: l New malware profiles l Vulnerability exploits l Obfuscation tactics l New threat findings from the FireEye Labs and verified third-party security feeds Each customer controls what information is shared with and received from the DTI cloud. Automatic License Updates The license update feature enables appliances to automatically download the appropriate licenses from the DTI cloud and install them. This feature provides the following benefits: 128 © 2019 FireEye Release 8.7 l l l About the DTI Network Minimal initial configuration—The license update feature is enabled with the configuration jump-start wizard during the initial configuration. This means the feature can be fully functional after the jump-start wizard is completed. Simplified license management—There is never a need to contact FireEye for license keys when new features are added or when licenses are renewed, because new licenses are automatically downloaded and installed. Scalability—Organizations, such as those with a large number of appliances, can benefit from having all of them being updated automatically, instead of entering license keys manually on each appliance, one at a time. For more information on automatic license activation, see Automatic License Updates on page 118. System Health Monitoring and Software Updates When connected to the DTI cloud, the CM appliance regularly provides system and diagnostic information to the DTI cloud. This information is then analyzed to ensure that the appliance is operating as expected. The system and diagnostics checks include the following: l System Image Version l System Processes l Hardware State l Network State If problems are found, the customer is alerted. If a new system image is available, administrators can choose to download it and then update the appliance. NOTE: No customer-specific proprietary information is included this system and diagnostic information exchange. © 2019 FireEye 129 Central Management Administration Guide CHAPTER 7: The DTI Network About DTI Network Communication To communicate with the DTI network, the CM appliance needs the following information: l DTI server address l DTI network username l DTI network user password This information is pre-configured on new physical appliances and on virtual appliances. For older appliances, the information was supplied in the box containing your appliance or otherwise provided by FireEye. Communication with the DTI network is enabled during the initial appliance configuration if default values are accepted, as described in Initial Configuration Overview on page 74. The appliance sends requests to the DTI network for the services shown in the following table. 130 DTI Service Description Download source The source for software updates (system images, guest images, and security content). Upload destination The destination for anonymized data (system statistics). MIL The destination for Malware Intelligence Lab (MIL) malware detection and callback intelligence. FAUDE The destination for Advanced URL Detection Engine (FAUDE) malware detection and callback intelligence. AV-Suite The destination to store verdicts for both malicious (blacklist) and nonmalicious (whitelist) objects in the AV-Suite cloud-based detection service. Enrollment The Central Management appliance that manages the MVX cluster to which sensors and hybrid appliances send submissions for inspection and analysis. This service is used by appliances that submit to or are part of an MVX cluster. Helix The destination for health statistics from Helix-enabled appliances. Virtual The destination for virtual appliance services, such as license token renewals and system entropy information. This service is used by virtual appliances. © 2019 FireEye Release 8.7 Changing the Active Setting for a DTI Service Changing the Active Setting for a DTI Service Appliances send requests for DTI services to the following servers: l l l l Dynamic Threat Intelligence (DTI)—The FireEye DTI server. The DTI server addresses follow: l staticcloud.fireeye.com (Download source and virtual service) l up-staticcloud.fireeye.com (Upload destination) l mil-staticcloud.fireeye.com (MIL service) l unity.fireeye.com (FAUDE and AV-Suite services) l Helix full URL (Helix service) Content Delivery Network (CDN)—A content delivery network server. The server address is cloud.fireeye.com or download.fireeye.com. The Central Management appliance (CMS)—Available only to managed appliances. The address is the Central Management address. A custom DTI server, if configured—A custom DTI server used only for managed appliances in a Network Address Translation (NAT) deployment in which the appliance uses the non-default dual-port address type to communicate with the Central Management appliance, and an accessible address needs to be configured for the Central Management appliance. The address is the accessible Central Management address. For details, see the System Administration Guide or Administration Guide for the managed appliance. Each appliance has an active setting and available options for each DTI service. By default, CMS is the active setting for all DTI services on managed appliances. This is the default global setting, which means all appliances that are managed by the Central Management appliance use this setting. You can change the global setting on the Central Management appliance, and you can override the global setting for individual managed appliances. You can also change the active download source setting for standalone appliances and the Central Management appliance. Reasons for changing the active setting for a DTI service include: l Faster download speed. A CDN server is typically geographically closer to standalone appliances than the FireEye DTI server. The DTI or CDN server could be closer to managed appliances than the Central Management appliance. © 2019 FireEye 131 Central Management Administration Guide l l l l CHAPTER 7: The DTI Network Decentralization —You can limit the amount of traffic passing through the Central Management appliance when requests for one or more DTI services go directly to the DTI network. Security. Your security policies could require you to download the software updates directly from the FireEye DTI server. HTTP proxy. You can use an HTTP proxy as an intermediary between an appliance and the DTI network. In this scenario, managed appliances using the single-port address type must use DTI. Managed appliances using the dual-port address type can use either CMS or DTI. For details, see Using an HTTP Proxy for DTI Service Requests on page 136. Network address translation. When the Central Management appliance is behind a NAT gateway, an accessible IP address that the managed appliances can reach could need to be configured as a custom DTI source. For details, see the System Administration Guide or Administration Guide for the managed appliance. Prerequisites l Admin access. l Appliances are in "online" mode and connected to the DTI network. Changing the Active Source for a Central Management Appliance Using the Web UI Use the DTI Network Settings page to change the active DTI source setting for a Central Management appliance. To change the active source setting: 1. Select Settings > CM Settings. 2. Click DTI Network in the sidebar. 132 © 2019 FireEye Release 8.7 Changing the Active Setting for a DTI Service 3. In the Source list in the CM Local DTI Settings section, select the DTI the Central Management appliance will use for software updates. 4. Click Save Local DTI Settings. Changing the Active Source for a Central Management Appliance Using the CLI Use the commands in this section to change the active DTI source for a Central Management appliance. To change the active source setting: 1. Log into the standalone appliance. 2. Go to CLI configuration mode: hostname > enable hostname # configure terminal 3. View the current active and available DTI sources: hostname (config) # show fenet dti configuration 4. Change the active download source: hostname (config) # fenet dti source default {CDN | DTI} 5. Verify your change: hostname (config) # show fenet dti configuration 6. Save your change: hostname (config) # write memory Example In this example, the active download source on a Central Management appliance is changed from DTI to CDN. hostname (config) # show fenet dti configuration DTI CLIENT CONFIGURATIONS: ACTIVE SETTINGS: Mode Download source ... : : online DTI (DTIUser@staticcloud.fireeye.com) AVAILABLE OPTIONS: -------------------------------------------------------------Download User Address -------------------------------------------------------------CDN DTIUser cloud.fireeye.com DTI DTIUser staticcloud.fireeye.com ... -------------------------------------------------------------- © 2019 FireEye 133 Central Management Administration Guide CHAPTER 7: The DTI Network hostname (config) # fenet dti source default CDN hostname (config) # show fenet dti configuration DTI CLIENT CONFIGURATIONS: ACTIVE SETTINGS: Mode Download source ... : : online CDN (DTIUser@cloud.fireeye.com) Changing the Global Active Source for Managed Appliances Using the Web UI Use the DTI Network Settings page to change the DTI source from which the appliances managed by a Central Management appliance download software updates. To change the global source setting: 1. Select Settings > CM Settings. 2. Click DTI Network in the sidebar. 3. In the Source list in the Appliance DTI Settings section, select the DTI source from which managed appliances download software updates. 4. Click Save Appliance DTI Settings. Changing Global Active DTI Settings for Managed Appliances Using the CLI Use the commands in this section to change global active DTI settings for the appliances that are managed by a Central Management appliance. To change global active DTI settings: 1. Go to CLI configuration mode: hostname > enable hostname # configure terminal 134 © 2019 FireEye Release 8.7 Changing the Active Setting for a DTI Service 2. View the current active and available DTI sources. hostname (config) # show fenet dti configuration 3. To change the active global source setting: a. Specify the active setting: hostname (config) # fenet dti source managed {DTI | CDN | CMS} b. Apply the setting to all managed appliances: hostname (config) # fenet dti source managed-sync 4. To change the active global upload destination setting: a. Specify the active setting: hostname (config) # fenet dti upload destination managed {DTI | CMS} b. Apply the setting to all managed appliances: hostname (config) # fenet dti upload destination managed-sync 5. To change the active global setting for the mil, faude, avsuite, helix, or virtual service: a. Specify the active setting: hostname (config) # fenet dti <service> service managed {DTI | CMS} b. Apply the setting to all managed appliances: hostname (config) # fenet dti <service> service managed-sync 6. Verify your changes: hostname (config) # show fenet dti configuration 7. Save your changes: hostname (config) # write memory Examples In this example, the active setting for the download source is changed to DTI for the appliances that are managed by this Central Management appliance. hostname (config) # show fenet dti configuration DTI CLIENT CONFIGURATIONS: ACTIVE SETTINGS: Mode : Download source : Upload destination : ... online CDN (DTIUser@cloud.fireeye.com) DTI (DTIUser@up-staticcloud.fireeye.com) ACTIVE SETTINGS FOR MANAGED APPLIANCES: Download source : CMS Upload destination : CMS ... AVAILABLE OPTIONS: © 2019 FireEye 135 Central Management Administration Guide CHAPTER 7: The DTI Network -------------------------------------------------------------Download User Address -------------------------------------------------------------CDN DTIUser cloud.fireeye.com CMS DTIUser 10.2.3.4 DTI DTIUser staticcloud.fireeye.com -------------------------------------------------------------... hostname (config) # fenet dti source managed DTI hostname (config) # fenet dti source managed-sync hostname (config) # show fenet dti configuration DTI CLIENT CONFIGURATIONS: ACTIVE SETTINGS: Mode : Download source : Upload destination : ... online CDN (DTIUser@cloud.fireeye.com) DTI (DTIUser@up-staticcloud.fireeye.com) ACTIVE SETTINGS FOR MANAGED APPLIANCES: Download source : DTI Upload destination : CMS ... Using an HTTP Proxy for DTI Service Requests An HTTP proxy server can act as an intermediary between an appliance and the DTI network. The following table describes the default behavior, and the behavior after an HTTP proxy is configured on the appliance and enabled for DTI service requests. Appliance Standalone Appliance Default Behavior The appliance connects directly to the DTI network. Central The Central Management Management Appliance appliance connects directly to the DTI network. 136 HTTP Proxy Behavior The appliance connects to the DTI network through the HTTP proxy. The Central Management appliance connects to the DTI network through the HTTP proxy. © 2019 FireEye Release 8.7 Understanding the DTI Cache Appliance Managed Appliance Default Behavior The appliance communicates with the DTI network through the Central Management appliance. HTTP Proxy Behavior Single-port communication with the Central Management appliance (the default, in which both management and DTI network traffic use SSH port 22)—The appliance connects to the DTI network through the HTTP proxy. Dual-port communication with the Central Management appliance (in which management traffic uses SSH port 22 and DTI network traffic uses HTTP port 443)—The appliance either connects directly to the DTI network through the HTTP proxy, or through the managing Central Management appliance to the HTTP proxy. IMPORTANT: If an HTTP proxy server is configured and enabled on a managed appliance that uses single-port communication with the Central Management appliance, the managed appliance will automatically fail over to the proxy server for all DTI services if the Central Management appliance becomes unavailable. For information about configuring an HTTP proxy server on the Central Management appliance, see Configuring HTTP Proxy Server Settings on page 207. For information about configuring managed appliances to use an HTTP proxy server for DTI services, see the System Administration Guide or Administration Guide for the managed appliance. Understanding the DTI Cache When the Central Management appliance is the default DTI source for managed appliances, it downloads software updates from the DTI network on behalf of the appliances. The software updates are temporarily stored in a DTI cache on the Central Management appliance. When the Central Management appliance receives an update request from a managed appliance or makes an update request on behalf of the appliance, the Central Management appliance first determines whether the requested software is already in the cache and whether it is the latest version. If the requested software is not in the cache, or if the software is out-of-date, the Central Management appliance downloads the latest software from the DTI network. After the software is in the cache, it is available to update the appliances, as described in Updating Managed Appliances on page 499. You can explicitly download system images and guest images from the DTI network and store them in the cache, even if no appliance requested it. This saves bandwidth and shortens the maintenance window for appliance updates. It also allows you to be more © 2019 FireEye 137 Central Management Administration Guide CHAPTER 7: The DTI Network flexible about scheduling appliance updates, because the software is already downloaded and ready to push to the appliances. This can be especially useful for guest images, which can take hours to download. For details, see Downloading Software Updates to the DTI Cache on the facing page. To save space on the hard disk, the Central Management appliance continuously removes out-of-date security content, and removes out-of-date system images and guest images as they are replaced. You can also manually remove security content, guest images, and system images from the cache. The Central Management appliance provides the following information about the cache contents. l Size. The size of the guest image, system image, or security content, in bytes. l Type. The type of content: l SysImage—Appliance system image. l GI—Guest image. l l l l l GI-Delta—A file containing the changes between a particular version of the guest images and the latest version. GI-Metadata—A list of the names and versions of the guest images that are available for the managed appliances. SC-Full—Security content (stored for three hours). SC-Delta—A file containing the changes between a particular version of the security content and the latest version. Security content is updated every hour (by default), and stale files are automatically removed from the cache. State. Fresh or Stale. If a system image or guest image has been in the cache longer than 90 days, or if security content has been in the cache longer than three hours for SC-Full or one hour for SC-Delta, it is marked stale. Otherwise, it is marked fresh. NOTE: If a system image or guest image is the latest available version, but is older than 90 days, it is still marked stale. l l l l 138 File. The name of the system image, guest image, delta, metadata, or security content file. For example, image-emps_7.7.0.img, win7-sp1.15.0826.img, sc-stable_ 114.150.img. Last Modification Time. The date and time the file finished downloading from the DTI network to the cache. Max-Age. The amount of time the content is in the cache before it is marked stale. System images and guest images become stale after 7776000 seconds (90 days). Security content becomes stale after 10800 seconds (3 hours). Etag. An internal identifier. © 2019 FireEye Release 8.7 l Understanding the DTI Cache Active Download ID. An internal identifier that is displayed when you view the status of the download. For details about viewing the cache contents, removing software from the cache and other cache management tasks, see Viewing the Cache Configuration on page 146. NOTE: This information pertains to a Central Management appliance running in online mode, in which the cache is always running. The cache is disabled on a Central Management appliance running in offline mode. For information about how the Central Management appliance handles software updates for managed appliances when it is in offline mode, see the DTI Offline Portal User's Guide. NOTE: The cache is disabled for cloud Central Management models CM 2500V and CM 4500V. Appliances managed by these models download software updates directly from the DTI network. Downloading Software Updates to the DTI Cache The following sections describe how to download software updates to the DTI cache in advance, before an appliance requests them. l Downloading System Images to the DTI Cache Using the CLI on the next page l Downloading Guest Images to the DTI Cache Using the CLI on page 142 Cached guest images that were downloaded on behalf of a particular appliance type can potentially be used for other appliances. Consider the following examples. l l l l A Central Management administrator initiates a download of guest images for a managed Network Security 7.9.0 appliance. The latest guest images in the DTI network are version 3. The system checks which guest images version is installed on the Network Security appliance, and determines it is version 2. The DTI network has a delta file containing the changes between guest images version 2 and 3, so only the delta file is downloaded to the Central Management cache. A managed Email Security — Server Edition appliance (EX-01) running release 7.8.0 requests a guest images update. Guest images version 2 is installed on the Email Security — Server Edition appliance, so the delta file in the cache can be used to update the appliance. Nothing needs to be downloaded from the DTI network in this case. © 2019 FireEye 139 Central Management Administration Guide l CHAPTER 7: The DTI Network A managed Email Security — Server Edition appliance (EX-02) running release 7.7.0 requests a guest images update. Guest images version 1 is installed on the appliance. The delta file in the cache does not contain the differences between version 1 and 2 of the guest images, so a full update is needed. The complete guest images version 3 is not in the cache, so the Central Management appliance must download it from the DTI network before it can update the EX-02 appliance. NOTE: You cannot manually download security content to the DTI cache. Security content is updated frequently, so there is no benefit to downloading it before a maintenance window. The newest security content is automatically downloaded to the cache when the new security content is released. NOTE: You can schedule the DTI cache storage operations using the job CLI commands. For details, see the CLI Command Reference. Prerequisites l l l l Operator or Admin access The type of appliance for which you will download content is connected to the Central Management appliance. Minimum appliance release for downloading system images: Network Security 7.5.0, Email Security — Server Edition 7.6.0, Malware Analysis 7.7.0, File Security 7.7.0, and Endpoint Security 3.0.0. Minimum appliance release for downloading guest images: Network Security 7.7.0 Downloading System Images to the DTI Cache Using the CLI Use the commands in this section to download system images from the DTI network and store them in the cache on the Central Management appliance. You can download the latest system image for all managed appliances or for a specific type of managed appliance. You can also download a specific version of a system image. NOTE: You can perform only one download operation at a time. To download the latest system image for all appliances: 1. Go to CLI configuration mode: hostname > enable hostname # configure terminal 2. Download the system image: hostname (config) # fenet dti cache populate image product all 140 © 2019 FireEye Release 8.7 Understanding the DTI Cache 3. Confirm that the operation succeeded: hostname (config) # show fenet dti cache populate images status To download the latest system image for a specific appliance type: 1. Go to CLI configuration mode: hostname > enable hostname # configure terminal 2. Download the system image: hostname (config) # fenet dti cache populate image product <product> where <product> is the product identifier, such as wMPS. Use the fenet dti cache populate image product ? command to see a list of the product identifiers. 3. Confirm that the operation succeeded: hostname (config) # show fenet dti cache populate images status To download a specific version of a system image: 1. Go to CLI configuration mode: hostname > enable hostname # configure terminal 2. Download the system image: hostname (config) # fenet dti cache populate image product <product> version <version> where : l <product> is the product identifier, such as wMPS. Use the fenet dti cache populate image product ? command to see a list of the product identifiers. l <version> is the product version. Use the fenet dti cache populate image product <product> version ? command to see a list of the available versions. 3. Confirm that the operation succeeded: hostname (config) # show fenet dti cache populate images status Examples The following example downloads the latest system image for the Network Security appliance. hostname (config) # fenet dti cache populate image product wMPS Operation started in the background. Run 'show fenet dti cache populate images status' to check on status. hostname (config) # show fenet dti cache populate images status Active Download ID: v54n Start Time: © 2019 FireEye 2015/10/08 00:57:36.139 141 Central Management Administration Guide Elapsed Time: CHAPTER 7: The DTI Network 12 sec ============================================================== Download Tasks ============================================================== Downloading the 7.7.0 image for wMPS Progress: 59.00 % Status: running hostname (config) # show fenet dti cache populate images status Active Download ID: v54n Start Time: Elapsed Time: 2015/10/08 00:57:36:139 20 sec ============================================================== Download Tasks ============================================================== Downloading the 7.7.0 image for wMPS Progress: 100 % Status: success The following example downloads the Email Security — Server Edition 7.6.1 system image. hostname (config) # fenet dti cache populate image product eMPS 7.6.1 Operation started in the background. Run 'show fenet dti cache populate images status' to check on status. hostname (config) # show fenet dti cache populate images status Active Download ID: pzz2 Start Time: End Time: Elapsed Time: 2015/10/07 14:37:51.220 2015/10/07 14:38:02.520 11 sec ============================================================== Download Tasks ============================================================== Downloading the 7.6.1 image for eMPS Progress: 100.00 % Status: success Downloading Guest Images to the DTI Cache Using the CLI Use the commands in this section to download guest images from the DTI network and store them in the cache on the Central Management appliance. You can download guest images for all managed appliances, or guest images for a specific appliance. NOTE: You can perform only one guest images download operation at a time. To download guest images for all managed appliances: 1. Go to CLI configuration mode: hostname > enable hostname # configure terminal 142 © 2019 FireEye Release 8.7 Understanding the DTI Cache 2. Download the guest images: hostname (config) # fenet dti cache populate guest-images all 3. Confirm that the operation succeeded: hostname (config) # show fenet dti cache populate guest-images status To download guest images for a specific appliance: 1. Go to CLI configuration mode: hostname > enable hostname # configure terminal 2. Download the guest images: hostname (config) # fenet dti cache populate guest-images appliance <applianceName> where <applianceName> is the hostname of the appliance. Use the fenet dti cache populate guest-images appliance ? command to list the hostnames. 3. Confirm that the operation succeeded: hostname (config) # show fenet dti cache populate guest-images status Examples The following example downloads guest images for the NX-01 appliance and shows the download progress. hostname (config) Operation started Run 'show fenet hostname (config) # fenet dti cache populate guest-images appliance NX-01 in the background. dti cache populate guest-images status' to check on status. # show fenet dti cache populate guest-images status Active Download ID: grgf Start Time: Elapsed Time: 2015/10/07 20:24:17.701 13 sec ============================================================================ Download Tasks ============================================================================ Downloading Guest-Image Profile (Full-Image) winxp-sp3 for NX-01 Progress: 4.97% Status: running Downloading Guest Image-Profile (Full-Image) win7-sp1 for NX-01 Progress: Status: not started Downloading Guest-Image Profile (Full-Image) win7x64-sp1 for NX-01 Progress: Status: not started hostname (config) # show fenet dti cache populate guest-images status Active Download ID: grgf © 2019 FireEye 143 Central Management Administration Guide Start Time: Elapsed Time: CHAPTER 7: The DTI Network 2015/10/07 20:24:17:701 218 sec =========================================================================== Download Tasks =========================================================================== Downloading Guest-Image Profile (Full-Image) winxp-sp3 for NX-01 Progress: 100.00% Status: success Downloading Guest-Image Profile (Full-Image) win7-sp1 for NX-01 Progress: 14.62% Status: running Downloading Guest-Image Profile (Full-Image) win7x64-sp1 for NX-01 Progress: Status: not started Managing the DTI Cache DTI cache management tasks include: l l l l Viewing detailed information about the contents of the cache. For details, see Viewing the DTI Cache Using the CLI below. Viewing the cache configuration. For details, see Viewing the Cache Configuration on page 146. Manually removing images, if needed. For details, see Removing Images from the Cache on page 147. Disabling the automatic removal of stale security content. For details, see Disabling Automatic Removal of Stale Security Content on page 148. Prerequisites l Operator or Admin access Viewing the DTI Cache Using the CLI Use the commands in this section to view the contents of the DTI cache. You can view a basic list of the files in the cache, or include details such as the state, age, and version of the files. To list the cache contents: 1. Go to CLI enable mode: hostname > enable 2. View the cache contents: hostname # show fenet dti proxy cached-content 144 © 2019 FireEye Release 8.7 Understanding the DTI Cache To view the state of each file in the cache: 1. Go to CLI enable mode: hostname > enable 2. View the cache contents and state information: hostname # show fenet dti proxy cached-content show-stale To view age details for each file in the cache: 1. Go to CLI enable mode: hostname > enable 2. View the cache contents and age details: hostname # show fenet dti proxy cached-content freshness-info To view the version of each file in the cache: 1. Go to CLI enable mode: hostname > enable 2. View the cache contents and file versions: hostname # show fenet dti proxy cached-content version Examples The following example shows the cache contents. hostname # show fenet dti proxy cached-content Size Type File ================================================= 931798 SC-Full sc-stable_114.150.img 294514420 SC-Full sc-stable_409.198.img 12357897831 GI win7-sp1.15.0826.img 931626 SC-Full sc-stable_114.149.img 6314243531 GI winxp-sp3.15.0826.img 586688050 SysImage image-hx_3.0.0.img 294476781 SC-Full sc-stable_409.194.img 602473341 SysImage image-fmps_7.7.0.img 12783320704 GI win7x64-sp1.15.0826.img 627703972 SysImage image-emps_7.7.0.img The following example includes state information. hostname # show fenet dti proxy cached-content show-stale Size Type State File ========================================================== 931798 SC-Full Fresh sc-stable_114.150.img 294514420 SC-Full Fresh sc-stable_409.198.img 12357897831 GI Fresh win7-sp1.15.0826.img 931626 SC-Full Fresh sc-stable_114.149.img 294156637 SC-Full Stale sc-stable_409.186.img 6314243531 GI Fresh winxp-sp3.15.0826.img 586688050 SysImage Fresh image-hx_3.0.0.img 294415556 SC-Full Stale sc-stable_409.190.img © 2019 FireEye 145 Central Management Administration Guide 294476781 602473341 12783320704 627703972 SC-Full SysImage GI SysImage Fresh Fresh Fresh Fresh CHAPTER 7: The DTI Network sc-stable_409.194.img image-fmps_7.7.0.img win7x64-sp1.15.0826.img image-emps_7.7.0.img The following example includes age information. (The values in the Etag and File columns shown in this example have been shortened.) hostname # show fenet dti proxy cached-content freshness-info Size Type Etag Last Modification Time Max-Age State File ============================================================================= 93179 SC-Full "6xxx" Wed Oct 7 21:53:15 2015 10800 Fresh sc-xxx.img 29451442 SC-Full "6xxx" Wed Oct 7 22:22:28 2015 10800 Fresh sc-xxx.img 12357897831 GI "4xxx" Wed Oct 7 20:31:20 2015 7776000 Fresh win7xx.img 931626 SC-Full "6xxx" Wed Oct 7 20:57:15 2015 10800 Fresh sc-xxx.img 6314243531 GI "4xxx" Wed Oct 7 20:27:22 2015 7776000 Fresh winxp.img 586688050 SysImage "6xxx" Wed Oct 7 20:27:55 2015 7776000 Fresh image-n.img 294476781 SC-Full "6xxx" Wed Oct 7 20:22:20 2015 10800 Fresh sc-xxx.img 602473341 SysImage "6xxx" Wed Oct 7 20:24:25 2015 7760000 Fresh image-n.img 12783320704 GI "4xxx" Wed Oct 7 20:34:52 2015 7776000 Fresh win7xx.img 627703972 SysImage "6xxx" Wed Oct 7 20:21:02 2015 7776000 Fresh image-n.img The following example includes version information. hostname # show fenet dti proxy cached-content version Size Type File Details ============================================= 931798 SC-Full stable: 114.150 294514420 SC-Full stable: 409.198 12357897831 GI win7-sp1: 15.0826 931626 SC-Full stable: 114:149 6314243531 GI winxp-sp3: 15.0826 586688050 SysImage hx: 3.0.0 294476781 SC-Full stable: 409.194 602473341 SysImage fmps: 7.7.0 12783320704 GI win7x64-sp1: 15.0826 627703972 SysImage emps: 7.7.0 Viewing the Cache Configuration IMPORTANT: FireEye recommends that you do not change the cache configuration settings. To view the cache configuration: 1. Go to CLI enable mode: hostname > enable 2. View the cache configuration: hostname # show fenet dti proxy configuration 146 © 2019 FireEye Release 8.7 Understanding the DTI Cache To view full cache configuration information: 1. Go to CLI enable mode: hostname > enable 2. View the full cache configuration: hostname # show fenet dti proxy configuration all Example The following example shows the full cache configuration: hostname # show fenet dti proxy configuration all Fenet Cache Proxy State: running Fenet Cache Proxy Configurations: Listening Port: 8443 Cache Size: 130000 MB Maximum Cache-able Object Size: 26843545600 bytes Additional Configurations: CDN Server: download.fireeye.com Auto-Purge Cached Security-Content Deltas: yes Terminate Connection on SSL error: yes Debug Options: ALL,1 URL Query String Logging: no Removing Images from the Cache Use the commands in this section to remove images from the DTI cache. To remove a single image: 1. Go to CLI configuration mode: hostname > enable hostname # configure terminal 2. Remove the image: hostname (config) # fenet dti proxy cache purge file <fileName> where <fileName> is a value listed in the show fenet dti proxy cached-content command output. 3. Verify your change: hostname (config) # show fenet dti proxy cached-content To remove all images of a specific type: 1. Go to CLI configuration mode: hostname > enable hostname # configure terminal © 2019 FireEye 147 Central Management Administration Guide CHAPTER 7: The DTI Network 2. Remove the images: hostname (config) # fenet dti proxy cache purge file-type <fileType> where <fileType> can be SysImage, GI, GI-Delta, GI-Metadata, SC-Full, or SCDelta. See Understanding the DTI Cache on page 137 for a description of the file types. 3. Verify your change: hostname (config) # show fenet dti proxy cached-content To remove all images in the cache: 1. Go to CLI configuration mode: hostname > enable hostname # configure terminal 2. Remove the images: hostname (config) # fenet dti proxy cache purge 3. Verify your change: hostname (config) # show fenet dti proxy cached-content Examples The following example removes all guest image delta files from the cache. hostname (config) # fenet dti proxy cache purge file-type GI-Delta The following example removes the File Security 7.7.0 system image from the cache. hostname (config) # fenet dti proxy cache purge file image-fmps_7.7.0.img The following example removes all images from the cache, and then verifies the change. hostname (config) # fenet dti proxy cache purge Operation started in the background. Run 'show fenet dti proxy cached-content' to check on progress. hostname (config) # show fenet dti proxy cached-content The cache is empty. Disabling Automatic Removal of Stale Security Content Security content is updated every hour, so stale files are automatically removed from the cache by default. Use the commands in this section to stop stale files from being removed automatically. To disable the automatic removal of stale security content: 1. Go to CLI configuration mode: hostname > enable hostname # configure terminal 148 © 2019 FireEye Release 8.7 Validating DTI Access 2. Disable the automatic removal feature: hostname (config) # no fenet dti proxy cache purge auto enable 3. Verify your change: hostname (config) # show fenet dti proxy configuration all The value of the Auto-Purge Cached Security-Content Deltas line should be no. 4. Save your change: hostname (config) # write memory NOTE: Use the fenet dti proxy cache purge auto enable command to reenable the feature. Example The following example disables automatic removal of stale security content delta files. hostname (config) # no fenet dti proxy cache purge auto enable hostname (config) # show fenet dti proxy configuration all Fenet Cache Proxy State: running Fenet Cache Proxy Configurations: Listening Port: 8443 Cache Size: 130000 MB Maximum Cache-able Object Size: 26843545600 bytes Additional Configurations: CDN Server: download.fireeye.com Auto-Purge Cached Security-Content Deltas: no Terminate Connection on SSL error: yes Debug Options: ALL,1 URL Query String Logging: no Validating DTI Access Before using the features associated with the DTI network, you must establish communication between the appliance and the DTI network. Use the following procedures to verify this communication. Prerequisites l Operator or Admin access l Access to the DTI network © 2019 FireEye 149 Central Management Administration Guide CHAPTER 7: The DTI Network Validating DTI Access Using the Web UI Use the FireEye CMS System Information page to validate DTI cloud communication. To validate DTI access: 1. Click the About tab. 2. Click Health Check on the upper left side. 3. Locate the DTI Cloud section. 4. Verify that the DTI Client field is Enabled. Validating DTI Access Using the CLI Use the commands in this topic to verify DTI communication. To validate DTI access: 1. Go to CLI configuration mode. hostname > enable hostname # configure terminal 150 © 2019 FireEye Release 8.7 Validating DTI Access 2. Check the status of the DTI service. (This example is from a managed appliance.) hostname (config) # show fenet status Dynamic Threat Intelligence Service: Update source Enabled Download Upload Mil : : : : : <online> yes DTIUser@10.11.121.13 : singleport DTIUser@10.11.121.13 : singleport DTIUser@10.11.121.13 : singleport HTTP Proxy: Address Username User-agent : : : Request Session: Timeout Retries Speed Time Max Time Rate Limit Speed Limit : : : : : 30 0 60 14400 : 1 Dynamic Threat Intelligence Lockdown: Enabled Locked Lock After : no : no : 5 failed attempts UPDATES Security contents: 05:43:00 Stats contents : 18:55:00 Enabled ------yes yes Notify -----no Scheduled -------------every Last Updated At --------------2016/07/20 none 2016/07/20 3. Confirm the following information: © 2019 FireEye l Update source is online. l DTI service is enabled. l DTI service username is the name provided with DTI subscription license. l DTI service address is cloud.fireeye.com. 151 Central Management Administration Guide CHAPTER 7: The DTI Network Configuring DTI Credentials Virtual appliances have appliance-specific DTI credentials that are generated from the appliance's activation code and that cannot be changed. Physical appliances have factoryconfigured DTI credentials that should not be changed. You should never change DTI credentials, except when you need to configure a custom DTI source in a Network Address Translation (NAT) deployment in which both of the following are true: l l The Central Management appliance is behind a NAT gateway. The managed appliance uses the non-default dual-port address type for communication with the Central Management appliance. Prerequisites l Admin access Configuring DTI Credentials Using the CLI Use the commands in this topic to configure DTI credentials (username and password). To configure DTI credentials: 1. Go to CLI configuration mode: hostname > enable hostname # configure terminal 2. Specify the user and password: hostname (config) # fenet dti source type <name> username <user> password <password> The variables have the following values: l <name>—The name of the custom DTI source. l <user> and <password>—The new credentials. 3. Verify your changes: hostname (config) # show fenet dti configuration 4. Save your changes. hostname (config) # write memory 152 © 2019 FireEye Release 8.7 Automatic Validation of Security Content Automatic Validation of Security Content To prevent the installation of incompatible security content, security content packages are validated automatically when they are downloaded from the FireEye Dynamic Threat Intelligence (DTI) cloud or from the FireEye DTI Offline Update Portal. This feature is supported for the following appliances: l Central Management release 8.1.0 and later. l Network Security release 8.0.0 and later. l Email Security — Server Edition release 8.1.4 and later. About Automatic Validation of Security Content When a security content package is downloaded, the appliance queries the package to obtain its attributes. Some of the attributes are compared to attributes of the installed security content and to values configured on the target appliance. The criteria that determine whether a downloaded package is compatible are listed in Conditions That Indicate a Compatible Security Content Package below. If the package passes all applicable compatibility checks, the new security content is installed on the target appliance. If the package fails a compatibility check, the appliance does the following: l Sends an error code in log messages. l Displays an error message at the CLI or the Web UI. l Performs no further checking on the downloaded package. l Discards the downloaded package without installing l Requires that the next security content update uses a full update package and not a delta update package. Conditions That Indicate a Compatible Security Content Package Downloaded security content packages are automatically evaluated against the following conditions in the order listed: 1. If the appliance is connected to the Internet: Was the package downloaded from the correct update channel of the DTI download server? 2. If the appliance is not connected to the Internet: Was the package downloaded from the correct content channel of the DTI Offline Portal? © 2019 FireEye 153 Central Management Administration Guide CHAPTER 7: The DTI Network 3. Is the package version number compatible with the target appliance release? 4. Does the package acceptance level match the level configured on the target appliance? 5. If the downloaded package is a delta package: Is the version of the content delta package compatible with the version of the security content installed on the target appliance? 6. Is the version of the downloaded package the same as or newer than the version of the installed content? Error Codes for Incompatible Security Content Packages The appliance writes a log message when a downloaded security content package is determined to be incompatible with the target appliance settings or the security content installed on the appliance. The following paragraphs describe the error codes for these events. 81 ― Incompatible DTI download server update channel The package was built for an update channel other than stable (such as beta), but the appliance is not configured to use the same update channel. 82 ― Incompatible DTI Offline Portal content channel The package was built for and downloaded from a content channel other than the one configured on the target appliance. Examples of DTI Offline Portal content channels are SCNET-5.0, SCNET-4.0, SCNET-3.0, SCNET-2.0, and SCEP-1.0. 83 ― Package version is incompatible with the appliance release The package acceptance level configured on the appliance must be compatible with the appliance software release. By default, the package acceptance level configured on the appliance is stable. Other package acceptance levels are beta and long_beta. 154 © 2019 FireEye Release 8.7 Sharing Anonymized Data 84 ― Package acceptance level does not match the target appliance configuration The package acceptance level (such as beta or long_beta) does not match the acceptance level configured on the appliance. 85 ― Delta content package version is incompatible with the installed security content The package is a delta (incremental) content package, and its version number is incompatible with the security content version installed on the target appliance. 86 ― Package version is newer than the installed security content version The package version is newer than the installed security content version, and this is not a content rollback operation. Sharing Anonymized Data The CM appliance can share anonymous data with the DTI cloud. No customer-specific proprietary information is exchanged. This section covers the following information: l About Sharing Anonymized Data With the DTI Cloud below l Uploading Anonymized Data Automatically Using the CLI on page 157 l Uploading Anonymized Data Manually Using the CLI on page 158 Prerequisites l Admin access l Two-way CONTENT_UPDATES license About Sharing Anonymized Data With the DTI Cloud FireEye appliances automatically push anonymous data to and pull security information from the Dynamic Threat Intelligence (DTI) cloud. This feature requires a two-way sharing CONTENT_UPDATES license. © 2019 FireEye 155 Central Management Administration Guide CHAPTER 7: The DTI Network NOTE: All FireEye devices upload information using a secure (HTTPS) connection to cloud.fireeye.com. By default, managed appliances communicate with the DTI cloud through the managing Central Management appliance. No customer-specific or proprietary information is exchanged. Two types of data are shared: real-time system statistics and threat intelligence information. Real-Time Statistics The following real-time statistics are anonymized and uploaded to the DTI cloud: l l l l License information―Status of the FireEye licenses on the device. Appliance health―Environmental information relating to all components such as fans and hard disk drive with System Activity Report data. Traffic Measurements―Traffic throughput statistics and capacity monitoring. Statistics of critical sub-systems capacity―Interface status, packet counts, number of flows, broken or asymmetric flows, binaries, packet loss, protocol-based stats, memory usage, and Kernel-level information. Threat Intelligence Information The following threat intelligence information is shared with the DTI cloud: l l l l Timestamp―The timestamp can be used as a reference for other events and can provide additional information about the attack and the methods used. URL―List of malicious URLs contacted during traffic analysis in the Virtual execution (VX) engine. MD5―An MD5 hash is generated for information such as IP addresses or MAC addresses. The MD5 hash enables FireEye to maintain the data for analysis without the data being traceable or recognizable in its original form. The information is important for correlation of multiple threats on a common host. File types―File types used in the course of an attack. FireEye determines the entry point, the payload, and the methods used. Information That Is Not Uploaded to the DTI Cloud The following information is NOT uploaded to the DTI cloud: 156 l No customer-specific information l No proprietary information l No packet captures © 2019 FireEye Release 8.7 Sharing Anonymized Data Benefits of Sharing Data With the DTI Cloud Uploading data to the DTI cloud provides the following benefits: l l l l Participating FireEye appliances share malware intelligence in real time. The FireEye Customer Support team can provide you with proactive operational monitoring and support. This monitoring and support includes the identification of targeted attacks. The FireEye Research Labs team processes the collection of shared data to extract the malicious content. Updated security content, some of which is developed using anonymous customer data, is included in the security content delivered to the DTI cloud for distribution to licensed FireEye appliances and compute nodes. The FireEye DTI cloud itself employs technology to detect zero-day callbacks. NOTE: You are not required to upload data in order to receive any benefits of the DTI cloud. A managed appliance can download and install updated security content, even if it does not upload data. Uploading Anonymized Data Automatically Using the CLI Use the CLI commands in this topic to specify how often the CM appliance uploads anonymized system information to the DTI cloud. No customer-specific or proprietary information is exchanged. To configure automatic system information updates: 1. Go to CLI configuration mode: hostname > enable hostname # configure terminal 2. Set the automatic update schedule: l To update hourly, enter the following command, where <mm> is the number of minutes within the hour when the update is triggered: fenet stats-content upload auto hourly at <mm> l To update daily, enter: fenet stats-content upload auto daily at <hh>:<mm> where <hh>:<mm> specifies the time to start the update based on a 24 hour clock. l To update weekly, enter the following command, where <day> is the day of the week the update should occur. fenet stats-content upload auto weekly on <day> © 2019 FireEye 157 Central Management Administration Guide l l sun l mon l tue l wed l thu l fri l sat CHAPTER 7: The DTI Network To update monthly, enter the following command, where <dd> is the day the update should occur: fenet stats-content upload auto monthly on <dd> l To disable automatic updates, enter the following command: fenet stats-content upload auto none 3. Validate the update configuration: hostname (config) # show fenet stats-content status DTI Stats Content Status Information: Dynamic Threat Intelligence Enabled Address Username Service : yes : fenet1.fireeye.com : engtest Stats Content Uploads Enabled : yes Auto Upload Schedule : none (only rt-stats upload every 3 hours) Last Uploaded At : 2014/07/16 21:36:00 Status : Uploads done successfully: rt-stats Stats-content aggregators enabled (schedule): db-aggr no (default) dmesg-aggr no (default) pcaps-aggr no (default) rt-stats-aggr yes (default) Stats Aggregators Version: AGVR_00052 Run 'show fenet stats-content aggregator <aggr-name>' for further details. 4. Save your changes. hostname (config) # write memory Uploading Anonymized Data Manually Using the CLI Use the CLI commands in this topic to push aggregated system statistics from the CM appliance to the DTI cloud. 158 © 2019 FireEye Release 8.7 Sharing Anonymized Data To manually push statistics to the DTI cloud: 1. Go to CLI configuration mode: hostname > enable hostname # configure terminal 2. Upload the statistics: hostname (config) # fenet stats-content upload now © 2019 FireEye 159 Central Management Administration Guide 160 CHAPTER 7: The DTI Network © 2019 FireEye Central Management Administration Guide AAA CHAPTER 8: System Security This section lists methods you can use to secure your FireEye appliances. For detailed information about implementing the methods, see the FireEye System Security Guide. AAA Authentication, authorization and accounting (AAA) methods control users' access to network resources, and monitor users' activities. AAA information in the System Security Guide includes: l Authentication—Configuring authentication methods and order, local authentication (user accounts and password policies), remote authentication, Common Access Card (CAC) authentication, Secure Shell (SSH) authentication, and Single Sign-On (SSO) authentication. l Authorization—Defining roles for local user accounts. l Accounting—Managing audit logs. l FireEye Cloud IAM—Using Identity Access Management (IAM), a Web service that provides user authentication and authorization. The guide also provides reference information about FireEye appliance roles and capabilities and FireEye Cloud IAM entitlements. Certificates FireEye appliances use X.509 (TLS/SSL) certificates to allow secure connections between the appliance and the Web browser running the Web UI, and to verify remote servers for various client applications. They also use the certificates to encrypt the emails they forward to a downstream MTA on the Email Security — Server Edition appliance, and secure the connection to a WebDAV server on the File Security appliance. Certificate information in the System Security Guide includes: © 2019 FireEye 161 Central Management Administration Guide 162 CHAPTER 8: System Security l Regenerating the system self-signed server certificate l Managing HTTPS and MTA server certificates l Configuring Web server and SharePoint CA certificate chains l Adding supplemental CA client certificates l Importing and downloading public and private keys, and exporting public keys l Defining common attributes of X.509 certificates l Obtaining a CA certificate from a trusted public Certificate Authority (CA) l Specifying the minimum version requirement for Transport Layer Security (TLS) l Improving certificate security © 2019 FireEye Central Management Administration Guide CHAPTER 9: System Email Settings The appliance can send email notifications about system health events, such as low disk space or a power supply failure, or a split brain condition in a High Availability (HA) deployment. It can also send scheduled reports containing malware analysis data, and email notifications triggered by malware alerts. Health Check Notifications The system email server can send notifications about system events and Central Management HA events to configured recipients. You configure the email server and recipients for these events on the Email Settings page of the Web UI or by using the email notify CLI commands. You can also: l l l Specify whether each recipient should receive notifications for "fail" events, "info" events, or both "fail" and "info" events. Specify whether each recipient should receive detailed or summarized notifications. Enable or disable specific events from triggering notifications (except for Central Management HA events). For details, see: l Configuring the Mail Server on the next page l Configuring Email Recipients on page 169 l Configuring System Events on page 172 Scheduled Reports Scheduled reports use the same email server and recipient list as the system events. If you use the CLI, you configure them using the report email commands instead of the email notify commands, as described in Configuring the Mail Server for Scheduled Reports Using the CLI on page 168. You configure the report data and schedule on the Reports > © 2019 FireEye 163 Central Management Administration Guide CHAPTER 9: System Email Settings Schedule page of the Web UI or by using the report schedule CLI commands. See Scheduling Reports for Managed Appliances Using the Web UI on page 486 for details. Malware Alert Notifications You configure email settings for malware alert notifications on the Notification Settings page of the Web UI or by using the fenotify email CLI commands. See Event Notifications on page 295 for details. Configuring the Mail Server Health check event notifications and scheduled reports can use the same mail server. If you use the CLI to configure the server, you must use two separate sets of CLI commands. The mail server settings are described in the following table. System Mail Server Settings Web UI Field Health Report Check CLI CLI Parameter Parameter Description Enable email — — Enables the email delivery of health check notifications and scheduled reports. Mail hub mailhub server Port mailhubport port Domain domain domain The domain name from which emails will appear to come. The default is the active domain for the appliance. Return Addr returnaddr returnaddr Health check parameter: The username or fully qualified return address from which emails are sent. If the string contains the @ character, it is considered fully qualified. Otherwise, it is considered a username, and by default takes the form <username>@<hostname>.<domain>. The default username is do-not-reply. The hostname or IP address of the mail server. The SMTP port used to send the emails. The default is 25. Report parameter: The fully qualified return address from which emails are sent. 164 © 2019 FireEye Release 8.7 Web UI Field Incl. hostname Configuring the Mail Server Health Report Check CLI CLI Parameter Parameter returnhost — Description Whether the appliance hostname is included in the return address. If it is excluded, the return address takes the form <username>@<domain>. This setting is ignored if the provided return address is fully qualified. Prerequisites l Operator or Admin access Configuring the Mail Server Using the Web UI Use the Email Settings page to configure settings for the mail server. To configure the mail server: 1. Click the Settings tab. 2. Click Email on the sidebar. 3. Specify settings as described in System Mail Server Settings on the previous page. 4. Click Update to save your changes. © 2019 FireEye 165 Central Management Administration Guide CHAPTER 9: System Email Settings Configuring the Mail Server for Health Check Notifications Using the CLI Use the CLI commands in this topic to configure the mail server that sends health check notifications. See System Mail Server Settings on page 164 for a description of each parameter. NOTE: See Configuring Email Recipients Using the CLI on page 171 for information about configuring the notification recipients. See Configuring System Event Notifications Using the CLI on page 174 for information about configuring the events that trigger notifications. To configure the mail server for system notifications: 1. Go to CLI configuration mode: hostname > enable hostname # configure terminal 2. Specify the hostname or IP address of the mail server: hostname (config) # email mailhub {<hostname> | <IPv4 or IPv6 address>} 3. Specify the SMTP port used by the mail server to send notifications: hostname (config) # email mailhub-port <port> 4. Specify the domain name from which emails will appear to come: hostname (config) # email domain <domainName> 5. Specify the username or fully qualified return address from which emails are sent: hostname (config) # email return-addr {<username> | <returnAddress>} 6. (Optional) Include the hostname of the mail server in the return address: hostname (config) # email return-host 7. Verify your changes: hostname (config) # show email 8. Save your changes: hostname (config) # write memory NOTE: To remove a configuration or restore a default setting, append no to the command. For example, to exclude the hostname in the return address, use the no email return-host command, and to restore the default domain name, use the no email domain command. 166 © 2019 FireEye Release 8.7 Configuring the Mail Server Examples In this example, the return address is not fully qualified, so the hostname ("hostname") and domain are appended to it. hostname (config) # email mailhub 10.1.0.0 hostname (config) # email domain mail.acme.com hostname (config) # email return-addr admin hostname (config) # show email Mail hub: 10.1.0.0 Mail hub port: 25 Domain override: mail.acme.com Return address: admin Include hostname in return address: yes Current reply address: admin@hostname.mail.acme.com ... In this example, the return address is fully qualified, so the hostname and domain are not included. hostname (config) # email mailhub 10.1.0.0 hostname (config) # email domain mail.acme.com hostname (config) # email return-addr notify@acme.com hostname (config) # show email Mail hub: 10.2.0.0 Mail hub port: 25 Domain override: mail.acme.com Return address: notify@acme.com Include hostname in return address: yes Current reply address: notify@acme.com ... In this example, all settings are restored to their default values. hostname (config) # show email Mail hub: 10.3.0.0 Mail hub port: 26 Domain override: mailhost.acme.com Return address: admin Include hostname in return address: no Current reply address: admin@hostname.mailhost.acme.com ... hostname (config) # no email mailhub hostname (config) # no email mailhub-port hostname (config) # no email return-addr hostname (config) # email return-host hostname (config) # show email Mail hub: Mail hub port: 25 Domain override: Return address: do-not-reply Include hostname in return address: yes Current reply address: do-not-reply@hostname.acme.com ... © 2019 FireEye 167 Central Management Administration Guide CHAPTER 9: System Email Settings Configuring the Mail Server for Scheduled Reports Using the CLI Use the CLI commands in this topic to configure the mail server that sends scheduled reports. See System Mail Server Settings on page 164 for a description of each parameter. IMPORTANT! If you use the CLI to configure the mail server, the changes will not appear on the Email Settings page in the Web UI. NOTE: See Adding and Removing Scheduled Report Recipients on page 171 for information about configuring the report recipients using the CLI. To configure the mail server for scheduled reports: 1. Go to CLI configuration mode: hostname > enable hostname # configure terminal 2. Specify the hostname or IP address of the mail server: hostname (config) report email smtp server {<hostname> | <ipAddress>} 3. Specify the SMTP port used by the mail server to send reports: hostname (config) # report email smtp port <port> 4. Specify the domain name from which emails will appear to come: hostname (config) # report email smtp domain <domainName> 5. Specify the fully qualified return address from which emails are sent: hostname (config) # report email smtp return-addr <returnAddress> 6. Verify your changes: hostname (config) # show report email 7. Save the configuration: hostname (config) # write memory NOTE: To remove a configuration or restore the default setting, append no to the command. For example, to restore the default return address, use the no report email return-addr command, and to remove the configured domain name, use the no report email smtp domain command. Examples In this example, the email server is configured to send scheduled reports. hostname hostname hostname hostname 168 (config) (config) (config) (config) # # # # report email server 10.4.0.0 report email smtp domain mailer.acme.com report email smtp return-addr reports@acme.com show report email © 2019 FireEye Release 8.7 Configuring Email Recipients Report email SMTP SMTP SMTP SMTP ... configurations: server: 10.4.0.0 server port: 25 Domain: mailer.acme.com Return addr: reports@acme.com In this example, all configuration settings are restored to their default values. hostname (config) # show report email Report email configurations: SMTP server: 10.4.0.0 SMTP server port: 26 SMTP Domain: acme.com SMTP Return addr: admin@acme.com ... hostname (config) # no email report smtp hostname (config) # no email report smtp hostname (config) # no email report smtp hostname (config) # no email report smtp hostname (config) # show report email Report email SMTP SMTP SMTP SMTP ... server port domain return-addr configurations: server: server port: 25 Domain: Return addr: do-not-reply Configuring Email Recipients The same users can receive both system event notifications and scheduled reports. If you use the CLI to configure them, you must use two separate sets of CLI commands. Each new recipient will receive detailed notifications for all enabled system health check events. You can customize the notifications for individual users, and configure which specific events trigger notifications. (See Configuring System Events on page 172 for details.) IMPORTANT! If you use the CLI to configure a scheduled report recipient, the change will not be reflected in the Web UI. For example: l l © 2019 FireEye You add analyst@acme.com using the report email recipient analyst@acme.com CLI command. That recipient will be listed in the show report email command output, but will not be added to the recipient list on the Email Settings page in the Web UI. The recipient list on the Email Settings page includes admin@acme.com, but the Report checkbox is not selected. You then add that recipient using the report email recipient admin@acme.com CLI command. The Report checkbox will still not be selected on the Email Settings page. 169 Central Management Administration Guide CHAPTER 9: System Email Settings IMPORTANT! If you use the Web UI to add an email recipient, the recipient will be enabled to receive both system event notifications and scheduled reports. However, if you use the email notify recipient CLI command to add this recipient, the recipient will receive only system event notifications, not scheduled reports (the Report check box will be cleared on the Email Settings page). Prerequisites l Operator or Admin access Configuring Email Recipients Using the Web UI Use the Email Settings page to add or remove the email recipients for system event notifications and for scheduled reports. 1. Click the Settings tab. 2. Click Email in the sidebar. 3. Locate the Email Recipients section. 4. Click Add Email Recipient. 5. Enter the email address of the user in the Add Email Recipient box and then click Add Recipient. 6. (Optional) Clear the Info, Fail, and Detail checkboxes as needed to customize the notifications the user will receive. (See Configuring System Event Notifications Using the Web UI on page 173 for details.) To add a scheduled report recipient: 1. Click Add Email Recipient. 2. Enter the email address of the user in the Add Email Recipient box and then click Add Recipient. 3. Make sure the Report checkbox remains selected. 170 © 2019 FireEye Release 8.7 Configuring Email Recipients 4. (Optional) Clear the Info, Fail, and Detail checkboxes to prevent the user from receiving system event notifications as well as scheduled reports. To remove an email recipient: 1. Click the icon in the Delete column. 2. When prompted, click OK to confirm the action. Configuring Email Recipients Using the CLI Use the commands in this section to add or remove email recipients for system event notifications and scheduled reports. IMPORTANT! If you use the CLI to add or remove a scheduled report recipient, the changes will not appear on the Email Settings page in the Web UI. Adding and Removing System Event Notification Recipients To add system event notification recipients: 1. Enable the CLI configuration mode: hostname > enable hostname # configure terminal 2. To add a recipient: hostname (config) # email notify recipient <emailAddress> 3. To remove a recipient: hostname (config) # no email notify recipient <emailAddress> 4. Verify your changes: hostname (config) # show email 5. Save your changes: hostname (config) # write memory Adding and Removing Scheduled Report Recipients To configure scheduled report recipients: 1. Go to CLI configuration mode: hostname > enable hostname # configure terminal 2. To add a recipient: hostname (config) # report email recipient <emailAddress> © 2019 FireEye 171 Central Management Administration Guide CHAPTER 9: System Email Settings 3. To remove a recipient: hostname (config) # no report email recipient <emailAddress> 4. Verify your changes: hostname (config) # show report email 5. Save your changes: hostname (config) # write memory Examples This example adds analyst@acme.com as a system event notification recipient and removes user3@acme.com. hostname (config) # show email ... Email notification recipients: admin@acme.com (all events, in detail) exec@acme.com (failure events only, in detail) user3@acme.com (all events, summarized) ... hostname (config) # email notify recipient analyst@acme.com hostname (config) # no email notify recipient user3@acme.com hostname (config) # show email ... Email notification recipients: admin@acme.com (all events, in detail) analyst@acme.com (all events, in detail) exec@acme.com (failure events only, in detail) This example adds analyst@acme.com as a scheduled report recipient, and removes admin@acme.com. hostname (config) # show report email Report email configurations: ... Email recipients: admin@acme.com exec@acme.com hostname (config) # report email recipient analyst@acme.com hostname (config) # no report email recipient admin@acme.com hostname (config) # show report email Report email configurations: ... Email recipients: analyst@acme.com exec@acme.com Configuring System Events By default, configured users receive detailed notifications about all enabled system events. Informational events are logged when there is a change in the system. Failure events are 172 © 2019 FireEye Release 8.7 Configuring System Events logged when there is a failure in the system. You can use the CLI to change which events are enabled. For example, you could disable informational events, such as system log file rotations, from triggering notifications. For each recipient, you can specify whether failure notifications, informational notifications, or both are sent. For example, a user might want to know that a disk failed, but not that an excessive temperature condition returned to normal. You can also specify whether a user receives summarized or detailed notifications. Prerequisites l Operator or Admin access Configuring System Event Notifications Using the Web UI Use the Email Settings page to configure the severity of system email event notifications to be sent to each configured recipient. To enable or disable specific system notifications, you must use the CLI. See Configuring System Event Notifications Using the CLI on the next page. To configure severity of system event notifications to be sent to recipients: 1. Click the Settings tab. 2. Click Email in the sidebar. 3. Locate the Email Recipients section. 4. Select or clear the Info and Fail checkboxes to specify the severity of events for which the user receives notifications. 5. Select or clear the Detail checkbox to specify whether the user receives detailed or summarized notifications. 6. Click Update to save your changes. © 2019 FireEye 173 Central Management Administration Guide CHAPTER 9: System Email Settings Configuring System Event Notifications Using the CLI Use the commands in this topic to customize system event notifications for each user and to configure which events trigger notifications. IMPORTANT: You cannot view most Central Management high availability (HA) events as described in this topic, and cannot configure which of those events trigger notifications. For a list of the HA events and their severity, see the Central Management High Availability Guide. Viewing System Events You can view all system events, or the system events that are currently enabled to trigger notifications, ordered by their severity. To view all system events: 1. Go to CLI configuration mode: hostname > enable hostname # configure terminal 2. View the events: hostname (config) # email notify event ? To view enabled system events and their severity: l View the events by severity: hostname > show email events Configuring System Event Notifications for Each User To configure system event notifications for each user: 1. Go to CLI configuration mode: hostname > enable hostname # configure terminal 2. View the current configuration: hostname (config) # show email 174 © 2019 FireEye Release 8.7 Configuring System Events 3. Specify the severity of events for which each user should receive notifications. l To receive "info" events: hostname (config) # email notify recipient <emailAddress> class info l To stop receiving "info" events: hostname (config) # no email notify recipient <emailAddress> class info l To receive "failure" events: hostname (config) # email notify recipient <emailAddress> class failure l To stop receiving "failure" events: hostname (config) # no email notify recipient <emailAddress> class failure 4. Specify the notification format. l To receive detailed notifications: hostname (config) # email notify recipient <emailAddress> detail l To receive summarized notifications: hostname (config) # no email notify recipient <emailAddress> detail Configuring Which Events Trigger Notifications To configure which events trigger notifications: 1. Go to CLI configuration mode: hostname > enable hostname # configure terminal 2. View the current configuration as described in Viewing System Events on the previous page. 3. To enable an event: hostname (config) # email notify event <event> 4. To disable an event: hostname (config) # no email notify event <event> 5. Verify your changes: hostname (config) # show email events 6. Save your changes: hostname (config) # write memory © 2019 FireEye 175 Central Management Administration Guide CHAPTER 9: System Email Settings Examples This example stops admin@acme.com from receiving "info" notifications and changes the message format to a summary. hostname (config) # show email ... Email notification recipients: admin@acme.com (all events, in detail) operator@acme.com (failure events only, in detail) user3@acme.com (all events, in detail) ... hostname (config) # no email notify recipient admin@acme.com info hostname (config) # no email notify recipient admin@acme.com detail hostname (config) # show email ... Email notification recipients: admin@acme.com (failure events only, summarized) operator@acme.com (failure events only, in detail) user3@acme.com (all events, in detail) This example disables log file rotations from triggering event notifications: hostname (config) # no email notify event syslog-rotation Configuring Auto Support for System Event Notifications You can configure the appliance to send emails to autosupport@fireeye.com when specific system events occur. This includes configuring settings to ensure the emails are sent securely. You can specify one of the following security types: l l l none—Do not use TLS to secure the autosupport emails. tls—Use TLS over the default server port to secure autosupport emails. Do not send the emails if TLS fails. tls-none—Use TLS over the default server port to secure autosupport email. The email is sent in plain text if TLS fails. Prerequisites l 176 Operator or Admin access © 2019 FireEye Release 8.7 Configuring Auto Support for System Event Notifications Configuring Auto Support for System Event Notifications Using the CLI Use the commands in this section to configure autosupport for system event notifications. (See Viewing System Events on page 174 for information about viewing a full list of events.) To configure autosupport: 1. Go to CLI configuration mode: hostname > enable hostname # configure terminal 2. Enable autosupport email notifications (disabled by default): hostname (config) # email autosupport enable 3. Display the current configuration for generating autosupport emails for system events: hostname (config) # show email 4. Specify each event for which autosupport email notifications should be sent: hostname (config) # email autosupport event <event> 5. Configure the supplemental Certificate Authority (CA) certificates that are used to verify the server certificates. l To use only the built-in list: hostname (config) # email autosupport ssl ca-list none l To use the default supplemental CA certificate list: hostname (config) # email autosupport ssl ca-list default-ca-list 6. Configure a security type to use for autosupport email. l No TLS: hostname (config) # email autosupport ssl mode none l TLS: hostname (config) # email autosupport ssl mode TLS l TLS none: hostname (config) # email autosupport ssl mode tls-none 7. Verify the server certificates: hostname (config) # email autosupport cert-verify 8. Save your changes: hostname (config) # write memory © 2019 FireEye 177 Central Management Administration Guide 178 CHAPTER 9: System Email Settings © 2019 FireEye Central Management Administration Guide Manual Time Configuration CHAPTER 10: Date and Time Settings You can set the CM appliance date and time manually, or configure one or more Network Time Protocol (NTP) servers that synchronize the time automatically. You can also perform a one-time synchronization of the system clock to the DTI server clock. This section covers the following information: l Manual Time Configuration below l NTP Server Configuration on page 181 l Time Zone Configuration on page 190 l Synchronizing the System Clock to DTI Server Time Using the CLI on page 192 NOTE: The date and time are stored as Coordinated Universal Time (UTC) in the database. The Z character in syslog output indicates that the time displayed is in the UTC time zone; for example, Oct 19 2016 16:10:10 Z. By default, the display time zone is UTC. Manual Time Configuration You can manually set the date and time on your CM appliance. l Setting the Date and Time Using the Web UI below l Setting the Date and Time Using the CLI on the next page Setting the Date and Time Using the Web UI Use the top section of the Date and Time Settings page to set the date and time for your CM appliance. © 2019 FireEye 179 Central Management Administration Guide CHAPTER 10: Date and Time Settings IMPORTANT! NTP synchronization is set by default and must be disabled before you can manually configure the date and time. For instructions about disabling NTP, see NTP Server Configuration on the facing page. Prerequisites l Admin access To set the date and time: 1. Click the Settings tab. 2. Click Date and Time on the sidebar. 3. Select the date and time from the drop-down lists. 4. Click Update Time. 5. Set the time zone as described in Time Zone Configuration on page 190. Setting the Date and Time Using the CLI Use the CLI commands in this topic to set the time zone on your CM appliance. IMPORTANT! NTP synchronization is set by default and must be disabled before you can manually configure the date and time. For information about disabling NTP, see NTP Server Configuration on the facing page. Prerequisites l Admin access To set the date and time: 1. Go to CLI configuration mode: hostname > enable hostname # configure terminal 180 © 2019 FireEye Release 8.7 NTP Server Configuration 2. (Optional) Use the clock set <HH>:<MM> <YYYY>/<MM>/<DD> command to specify the time and date. For example, the following command sets the time and date to 2:00 p.m. on July 21, 2014: hostname (config) # clock set 14:00 2014/07/21 3. Use the clock timezone <timezone> command to specify the time zone. For example, both of the following commands set the time zone to Pacific Standard Time: hostname (config) # clock timezone UTC-offset UTC+8 hostname (config) # clock timezone America North United_States Pacific NOTE: The time zone is for display purposes and should match other security device settings. 4. To restore the default time zone: hostname (config) # no clock timezone 5. View the configured time and date settings: hostname (config) # show clock 6. Save your changes. hostname (config) # write memory Examples l Time and date using the North America Central Daylight time zone: hostname > show clock Time: 16:39:35 Date: 2014/06/25 Time zone: America North United_States Central (US/Central) UFC offset: -0500 (UTC minus 5 hours) l Time and date settings using the default time zone: hostname > show clock Time: 21:40:37 Date: 2014/06/25 Time zone: UTC (Etc/UTC) UTC offset: same as UTC NTP Server Configuration Instead of manually setting the system date and time, you can specify one or more Network Time Protocol (NTP) servers and peers to synchronize the time automatically. By default, NTP version 4 is used, but you can specify version 3 instead. You can perform a © 2019 FireEye 181 Central Management Administration Guide CHAPTER 10: Date and Time Settings one-time action that synchronizes the system clock with a specific NTP server. NTP is enabled by default. The appliance is pre-configured with four NTP servers your appliance can use if it can reach them. The appliance can authenticate that the time it obtains from an NTP server is from a known and trusted source. The system clock is updated only if a key ID in the incoming NTP packet matches a key ID configured on the appliance, and if that key ID is mapped to the same MD5 or SHA1 hash value stored on both the NTP server and the appliance. If the key ID/value pair on NTP server and appliance do not match, the clock is not updated. NTP authentication is enabled by default, but the NTP server must already have the key ID/value pair, and the same key ID/value pair must be configured on the appliance and then associated with the NTP server. A total of 16 keys can be configured on a single appliance. l Configuring NTP Servers Using the Web UI below l Configuring NTP Servers Using the CLI on the facing page l Configuring NTP Authentication Using the CLI on page 186 Prerequisites l l l l Admin access to configure NTP Monitor, Operator, or Admin access to view NTP configuration and status information Connectivity to at least one NTP server For NTP authentication: Authentication key ID/value pairs on the NTP servers for which authentication will be configured Configuring NTP Servers Using the Web UI Use the Enable NTP section of the Date and Time Settings page to configure NTP servers. 182 © 2019 FireEye Release 8.7 NTP Server Configuration To configure NTP servers: 1. Click the Settings tab. 2. Click Date and Time on the sidebar. 3. Click Add NTP Server. 4. Enter the IP address or hostname of the NTP server that you want to use in the Add NTP Server box. 5. Click Add. 6. Repeat the previous three steps to add additional servers. 7. To synchronize the system time once with a selected NTP server, click Update next to the server entry. The time is updated, and the needed adjustment is displayed in a message on the page. 8. To delete an NTP server, select the checkbox next to the server and then click Remove NTP Server. 9. Click Yes to confirm the action. Configuring NTP Servers Using the CLI Use the commands in this topic to configure NTP servers. NOTE: See Configuring NTP Authentication Using the CLI on page 186 for information about ensuring that the system clocks are only updated if the time is obtained from a trusted source. To enable and configure NTP servers: 1. Go to CLI configuration mode: hostname > enable hostname # configure terminal 2. Enable NTP synchronization: hostname (config) # ntp enable 3. Specify the primary NTP server: hostname (config) # ntp server <server> where <server> is the IPv4 or IPv6 address, or hostname of the NTP server. 4. Repeat the previous step for the secondary NTP server and any additional NTP servers. © 2019 FireEye 183 Central Management Administration Guide CHAPTER 10: Date and Time Settings To change the NTP version: 1. Specify the version: hostname (config) # ntp 2. To change the version on an NTP server: hostname (config) ntp server <server> version <version> where <server> is the IPv4 or IPv6 address, or hostname of the NTP server, and <version> is either 3 or 4 3. To change the version on an NTP peer: hostname (config) ntp peer <peer> version <version> where <peer> is the IPv4 or IPv6 address, or hostname of the NTP peer, and <version> is either 3 or 4. 4. Save your changes: hostname (config) # write memory To disable NTP: 1. Disable NTP synchronization: hostname (config) # ntp disable or hostname (config) # no ntp enable 2. Save your changes: hostname (config) # write memory To synchronize the system time with a specific NTP server one time: 1. Synchronize the system time: hostname (config) # ntpdate <server> where <server> is the IPv4 or IPv6 address, or hostname of the NTP server to synchronize with. 2. Save your changes: hostname (config) # write memory To view the current NTP runtime state and configuration: 1. Go to CLI standard mode. 2. View the information: hostname > show ntp 184 © 2019 FireEye Release 8.7 NTP Server Configuration To view the configured NTP servers and their settings: 1. Go to CLI standard mode. 2. View the information: hostname > show ntp configured Examples The following example configures two NTP servers and an NTP peer. hostname (config) # ntp server 0.acme.pool.ntp.org hostname (config) # ntp server 1.acme.pool.ntp.org hostname (config) # ntp peer 5.acme.pool.ntp.org hostname (config) # show ntp configured NTP enabled: yes NTP Authentication enabled: yes NTP peer 5.acme.pool.ntp.org Enabled: yes NTP version: 4 Key: none NTP server 0.acme.pool.ntp.org Enabled: yes NTP version: 4 Key: none NTP server 1.acme.pool.ntp.org Enabled: yes NTP version: 4 Key: none The following example disables NTP synchronization on the system. hostname (config) # no ntp enable hostname (config) # show ntp configured NTP enabled: no NTP Authentication enabled: yes No NTP peers configured. NTP server 0.acme.pool.ntp.org Enabled: yes ... hostname (config) # show ntp NTP is administratively disabled. NTP Authentication is administratively enabled. Clock is unsynchronized. No NTP associations present. The following example temporarily disables NTP on the "3.acme.pool.ntp.org" server. hostname (config) # ntp server 3.acme.pool.ntp.org disable hostname (config) # show ntp configured NTP enabled: yes NTP Authentication enabled: yes No NTP peers configured. NTP server 0.acme.pool.ntp.org Enabled: yes ... NTP server 3.acme.pool.ntp.org Enabled: no ... The following example removes the "2.acme.pool.ntp.org" NTP server. © 2019 FireEye 185 Central Management Administration Guide CHAPTER 10: Date and Time Settings hostname (config) # no ntp server 2.acme.pool.ntp.org The following example synchronizes the system clock with the NTP server. hostname (config) # ntpdate 0.acme.pool.ntp.org adjust time server 192.168.120.23 offset -0.023716 sec The following example changes the NTP version on the "3.acme.pool.ntp.org" server to version 3. hostname (config) # ntp server 3.acme.pool.ntp.org version 3 hostname (config) # show ntp configured NTP enabled: yes NTP Authentication enabled: yes No NTP peers configured. ... NTP server 3.acme.pool.ntp.org Enabled: yes NTP version: 3 Key: none The following example shows the current NTP runtime state and configuration. hostname > show ntp NTP is administratively enabled. NTP Authentication is administratively enabled. Clock is synchronized. Reference: 10.255.34.6 Offset: 1.713 ms. Active servers and peers: Poll Last Conf Offset Ref Interv Resp Address Type Status Stratum (msec) Clock (sec) (sec) =========================================================================== 192.168.1.1 n/a candidat (+) 2 -0.233 10.2.3.4 64 60 10.2.3.4 n/a outlyer (-) 2 12.069 192.168.2.2 64 50 172.16.4.5 n/a candidat (+) 2 -0.958 10.5.6.7 64 50 10.255.34.6 n/a sys.peer (*) 2 1.713 172.16.3.4 64 45 The following example shows the configured NTP servers and their settings: hostname > show ntp configured NTP enabled: yes NTP Authentication enabled: yes No NTP peers configured. NTP server 0.acme.pool.ntp.org Enabled: yes NTP version: 4 NTP server 1.acme.pool.ntp.org Enabled: yes NTP version: 4 NTP server 2.acme.pool.ntp.org Enabled: yes NTP version: 4 NTP server 3.acme.pool.ntp.org Enabled: yes NTP version: 4 Configuring NTP Authentication Using the CLI This topic describes how to configure NTP authentication using the CLI. 186 © 2019 FireEye Release 8.7 NTP Server Configuration Enabling NTP Authentication and Configuring Keys Perform the tasks in this section in the order shown to configure NTP authentication. Obtain the authentication keys from the NTP server: 1. On the NTP server, map a key ID from 1–16 to an MD5 or SHA1 hash value. 2. Repeat the previous step for additional key ID/value pairs. 3. Copy and paste the key ID/value pairs so they can be configured on the appliance later in this procedure. Enable NTP and NTP authentication: 1. Go to CLI configuration mode: hostname > enable hostname # configure terminal 2. View the current status. hostname (config) # show ntp configured 3. If NTP enabled: no appears in the command output, enable NTP. hostname (config) # ntp enable 4. If NTP Authentication enabled: no appears is the command output, enable NTP authentication. hostname (config) # ntp authentication enable Define the authentication keys: 1. Use the following command to configure the key ID and hash value you obtained from the NTP server: hostname (config) # ntp authentication key <number> hash <type> <value> where: l <number> is an integer from 1–16 l <type> is md5 or sha1 l <value> is the hash value 2. Repeat the previous step for each key you want to define. 3. View the configured keys. hostname (config) # show ntp authentication configured 4. Save your changes. hostname (config) # write memory © 2019 FireEye 187 Central Management Administration Guide CHAPTER 10: Date and Time Settings Assign the keys to the NTP servers: 1. To assign a key to an NTP server, use the ntp server <server> authentication key <number> command, where <server> is the IP address or hostname of the NTP server, and <number> is the integer that you assigned to the key in the previous task The following example assigns hash key 1 to the NTP server 0.acme.pool.ntp.org: hostname (config) # ntp server 0.acme.pool.ntp.org authentication key 1 2. Repeat the previous step for each key you want to define. 3. View the assigned keys: hostname (config) # show ntp configured 4. Verify that the keys are valid: hostname (config) # show ntp authentication 5. Save your changes: hostname (config) # write memory Disabling NTP Authentication and Removing Keys You cannot delete an authentication key from the system if it is mapped to an NTP server. If a key is mapped to an NTP server, you must disable NTP authentication on that server before you delete the key. To disable NTP authentication on the system: 1. Go to CLI configuration mode: hostname > enable hostname # configure terminal 2. Disable NTP authentication: hostname (config) # no ntp authentication 3. Save your changes: hostname (config) # write memory To disable NTP authentication on a specific server: 1. Go to CLI configuration mode: hostname > enable hostname # configure terminal 188 © 2019 FireEye Release 8.7 NTP Server Configuration 2. To disable NTP authentication with a specified NTP server, use the no ntp server <server> authentication command, where <server> is the hostname or IP address of the NTP server. The following example disables NTP authentication with the NTP server with hostname 1.acme.pool.ntp.org: hostname (config) # no ntp server 1.acme.pool.ntp.org authentication 3. Save your changes: hostname (config) # write memory To delete an NTP authentication key: 1. Go to CLI configuration mode: hostname > enable hostname # configure terminal 2. To delete a key, use the no ntp authentication key <number> command, where <number> is the key ID. hostname (config) # no ntp authentication key 1 3. Save your changes: hostname (config) # write memory Examples The following example shows the current configuration. hostname (config) # show ntp configured NTP enabled: yes NTP Authentication enabled: yes No NTP peers configured. NTP server 0.acme.pool.ntp.org Enabled: yes NTP version: 4 Key: none NTP server 1.acme.pool.ntp.org Enabled: yes NTP version: 4 Key: none NTP server 2.acme.pool.ntp.org Enabled: yes NTP version: 4 Key: none The following example defines two authentication keys and assigns each one to an NTP server. hostname (config) # ntp authentication key 1 hash md5 153ffa51cc765fb257e384e8e6aec8fe hostname (config) # ntp server 0.acme.pool.ntp.org key 1 hostname (config) # ntp authentication key 2 hash sha1 27a048b642be47d50a9c38427495945429597d91 © 2019 FireEye 189 Central Management Administration Guide CHAPTER 10: Date and Time Settings hostname (config) # ntp server 1.acme.pool.ntp.org key 2 hostname (config) # show ntp configured NTP enabled: yes NTP Authentication enabled: yes No NTP peers configured. NTP server 0.acme.pool.ntp.org Enabled: yes NTP version: 4 Key: 1 NTP server 1.acme.pool.ntp.org Enabled: yes NTP version: 4 Key: 2 NTP server 2.acme.pool.ntp.org Enabled: yes NTP version: 4 Key: none hostname (config) # show ntp authentication configured NTP enabled: yes NTP Authentication enabled: yes NTP Key Number 1 Type: md5 Key: 153ffa51cc765fb257e384e8e6aec8fe NTP Key Number 2 Type: sha1 Key: 27a048b642be47d50a9c38427495945429597d91 hostname (config) # show ntp authentication NTP is administratively enabled. NTP authentication is administratively enabled. Active servers and peers: Address auth keyid ===================================== 172.16.2.3 ok 1 10.30.4.3 ok 2 192.168.10.12 none none The following example disables NTP authentication on the 1.acme.pool.ntp.org server and then deletes the key it was using from the system. hostname (config) # no ntp server 1.acme.pool.ntp.org authentication hostname (config) # no ntp authentication key 2 Time Zone Configuration You must set the time zone on your CM appliance whether you configure the date and time manually or synchronize with an NTP server. 190 l Setting the Date and Time Using the Web UI on page 179 l Setting the Date and Time Using the CLI on page 180 © 2019 FireEye Release 8.7 Time Zone Configuration Setting the Time Zone Using the Web UI Use the bottom section of the Date and Time Settings page to set the time zone for your appliance. Prerequisites l Admin access To set the time zone: 1. Click the Settings tab. 2. Click Date and Time on the sidebar. 3. Select the time zone from the drop-down list. 4. Select options from other drop-down lists, if present. 5. Click Set Time Zone. Setting the Time Zone Using the CLI Use the CLI commands in this topic to set the time zone on your CM appliance. Prerequisites l Admin access To set the time zone: 1. Go to CLI configuration mode: hostname > enable hostname # configure terminal 2. To specify the time zone, use the clock timezone <timezone> command. For example, both of the following commands set the time zone to Pacific Standard Time: hostname (config) # clock timezone UTC-offset UTC+8 © 2019 FireEye 191 Central Management Administration Guide CHAPTER 10: Date and Time Settings hostname (config) # clock timezone America North United_States Pacific NOTE: The time zone is for display purposes and should match other security device settings. 3. Restore the default time zone: hostname (config) # no clock timezone 4. View the configured time and date settings: hostname (config) # show clock 5. Save your changes: hostname (config) # write memory Examples Time and Date Using the North America Central Daylight Timezone hostname # show clock Time: 16:39:35 Date: 2014/06/25 Time zone: America North United_States Central (US/Central) UFC offset: -0500 (UTC minus 5 hours) Time and Date Settings Using the Default Timezone hostname # show clock Time: 21:40:37 Date: 2014/06/25 Time zone: UTC (Etc/UTC) UTC offset: same as UTC Synchronizing the System Clock to DTI Server Time Using the CLI The system time should match the DTI server time as closely as possible. This is necessary for features such as the license update service, in which licenses are downloaded from the DTI server and installed on the CM appliance. IMPORTANT! To prevent time gaps that could affect the validity of your licenses, FireEye recommends that you perform this synchronization before you enable the feature. The fenet time sync CLI command retrieves the time (in UTC) from the DTI server and then synchronizes the system clock to it. This command is especially useful if you do not use NTP servers to synchronize your system clock. 192 © 2019 FireEye Release 8.7 Synchronizing the System Clock to DTI Server Time Using the CLI IMPORTANT! This action synchronizes the system clock to the DTI server a single time. It does not change the system time zone. Prerequisites l Admin access To synchronize the system clock to the DTI server clock: 1. Go to CLI configuration mode: hostname > enable hostname # configure terminal 2. Synchronize the clocks: hostname (config) # fenet time sync 3. Save your changes: hostname (config) # write memory © 2019 FireEye 193 Central Management Administration Guide 194 CHAPTER 10: Date and Time Settings © 2019 FireEye Central Management Administration Guide PART III: Administration l Network Administration on page 197 l Upgrading the FireEye Software on page 219 l Log Management on page 233 l Database Backup and Restore on page 245 l System Health and Performance on page 265 l SNMP Data on page 279 l Login Banners and Messages on page 287 l Event Notifications on page 295 l Disk Space Management on page 345 © 2019 FireEye 195 Central Management Administration Guide 196 PART III: Administration © 2019 FireEye Central Management Administration Guide Basic Network Configuration CHAPTER 11: Network Administration This section covers the following information: l Basic Network Configuration below l IPMI Firmware Updates on page 203 l IP Filtering on page 204 l Configuring HTTP Proxy Server Settings on page 207 l Defining Another Management Interface on page 209 For additional information about configuring interfaces, see the CLI Command Reference. IMPORTANT: You must use the same link settings on both ends of a network connection. For example, you cannot change the interface speed on one end to "auto" if the other end has a manual speed configured. NOTE: For information about connecting to, configuring, and troubleshooting FireEye as a Service, see the FireEye as a Service Quick Start Guide. Basic Network Configuration The following sections describe basic management interface and global network configuration settings. Management Interface Settings The following list describes the management interface configuration settings. l IP Version—The appliance has dual-stack support for Internet Protocol version 4 (IPv4) and version 6 (IPv6) on the management interface. © 2019 FireEye 197 Central Management Administration Guide l l l l l l l CHAPTER 11: Network Administration DHCP—Dynamic Host Configuration Protocol (DHCP) dynamically distributes network configuration parameters. If DHCP is disabled on the management interface, you must manually configure the IP address, subnet mask, and default gateway or next-hop device. IP Address—The IPv4 or IPv6 address of the management interface. Both types of addresses can be configured. The IPv4 address is enabled by default. You must explicitly enable the IPv6 address. Subnet Mask—The network portion of the IP address. For example, 255.255.255.0 indicates that the first 24 bits of an IPv4 address are used for the network portion of the address. Default Gateway—For an IPv4 address, the IPv4 address of the default router. For an IPv6 address, the IPv6 address of the default router or next-hop device. Autoconf Enabled—When Stateless Address Autoconfiguration (SLAAC) is enabled, an IPv6 address is automatically assigned for the interface. The address is based on an IPv6 prefix learned from router advertisements, combined with an interface identifier based on the MAC address of the interface. Autoconf Route—When this feature is enabled, the system learns a default route from the automatically assigned IPv6 address. Autoconf Privacy—When this feature is enabled, the system generates random host identifiers (known as privacy extensions) to construct the IPv6 address. This provides more security when communicating with remote hosts. Global Network Settings The following list describes global network configuration settings. l l l 198 DNS Servers—Domain Name System (DNS) servers translate domain names to IP addresses for routing. At least one DNS server is required. You can optionally configure a secondary DNS server that is used when the primary server is unavailable or cannot resolve a domain name. You can view a list of DNS servers that will be traversed for DNS resolution, in order, from top to bottom. Only active DNS servers are listed. If neither DNS server can resolve the domain name, an error is displayed. Domain Names—The domain names the DNS servers resolve to IP addresses. You can view a list of domain names in order, from top to bottom. Hostname—The hostname of the appliance (for example, dc-01). You can include the domain (for example, dc-01.acme.com). © 2019 FireEye Release 8.7 l l Basic Network Configuration IPv6—You can enable or disable IPv6 routing on the system, on the management interface, or both. IPv6 must be enabled on the Network Security appliances that are members of an Network Security High Availability (HA) pair. It is enabled automatically by the Central Management appliance that manages the HA pair. VPN—You can enable or disable virtual private networking (VPN) on the system. When VPN is enabled, the appliance can connect to FireEye as a Service over the Internet using a secure SSL VPN connection. VPN requires a valid MD_ACCESS license on the appliance. VPN requires IPv6 routing, so IPv6 must be enabled on the system before you can enable VPN. For more information, see the FireEye as a Service Quick Start Guide. Prerequisites l Operator or Admin access Configuring Basic Network Settings Using the Web UI Use the Network Settings page to configure basic network settings for the CM appliance. For a description of the information and settings on this page, see Basic Network Configuration on page 197. Viewing Management Interface Detail Settings Use the Interface Details section to view the configuration of the management interface. This is a read-only section. The management interface is configured during the initial configuration, and can be modified later using the CLI. For details, see Initial Configuration on page 73 or the CLI Command Reference. To view the management interface configuration: 1. Click the Settings tab. 2. Select Network on the sidebar. 3. Locate the Interface Details section at the top of the page. Configuring DNS Servers Use the Configure DNS Server Addresses section to configure DNS server addresses. © 2019 FireEye 199 Central Management Administration Guide CHAPTER 11: Network Administration To configure DNS servers: 1. Click the Settings tab. 2. Select Network on the sidebar. 3. In the Configure DNS Server Addresses section, enter the IP address of the primary DNS server. 4. (Optional) Enter the IP address of a secondary DNS server. 5. Click Apply. The order in which the DNS servers are traversed is displayed in the DNS Resolution order list. An error message is displayed if no server is active. Configuring Domain Names Use the Configure Domain Names section to add or remove domain names. To add domain names: 1. Click the Settings tab. 2. Select Network on the sidebar. 3. In the Configure Domain Names section, click Add Domain Name. 4. Enter a domain name, click Add. 200 © 2019 FireEye Release 8.7 Basic Network Configuration 5. Repeat the previous steps to configure additional domain names. The order in which the domain names are traversed is displayed in the Domain Names Resolution order list. To remove domain names: 1. Locate the domain name you want to delete. 2. Click the Delete (trash can) icon in the Delete column for each domain name you want to remove. 3. Click YES. The domain name is deleted from the configuration. The following message appears: 4. Close the message. Enabling IPv6 Use the Configure IPv6 section to enable or disable IPv6 routing. You can also use this section to enable or disable IPv6 on the SMTP interface. To enable IPv6 routing: 1. Click the Settings tab. 2. Select Network on the sidebar. 3. Enable IPv6: l l © 2019 FireEye To enable IPv6 routing on the system, select the Global IPv6 checkbox, and then click Apply. To enable IPv6 on the management interface, select the Management Interface IPv6 checkbox, and then click Apply. 201 Central Management Administration Guide CHAPTER 11: Network Administration To disable IPv6 routing: 1. Click the Settings tab. 2. Select Network on the sidebar. 3. Disable IPv6: l l To disable IPv6 routing on the system, clear the Global IPv6 checkbox, and then click Apply. To disable IPv6 on the management interface, clear the Management Interface IPv6 checkbox, and then click Apply. Enabling VPN The VPN Settings section appears at the bottom of the page if a valid MD_ACCESS license is installed. You can enable VPN only when IPv6 is enabled on the system. For details, see the FireEye as a Service Quick Start Guide. Configuring Basic Network Settings Using the CLI Use the commands in this topic to configure the network settings manually. To configure basic network settings: 1. Go to CLI configuration mode: hostname > enable hostname # configure terminal 2. To disable DHCP for the interface: hostname (config) # no interface ether1 dhcp NOTE: If you use DHCP and there is no network connection for the management interface, do the following: 1. Restore the network connection. 2. Disable DHCP. 3. Enable DHCP. 3. Set the interface IP address and network mask. For example: hostname (config) # interface ether1 ip address 1.1.1.1 255.240.0.0 202 © 2019 FireEye Release 8.7 IPMI Firmware Updates 4. Specify the default gateway. For example: hostname (config) # ip default-gateway 1.1.1.2 ether1 5. Specify a DNS server. For example: hostname (config) # ip name-server 10.10.20.5 6. Save your changes. hostname (config) # write memory IPMI Firmware Updates New Intelligent Platform Management Interface (IPMI) firmware is packaged with the appliance software image, but is not automatically installed when you upgrade to a new appliance release. It is important to update the IPMI firmware to ensure that you are using the latest, most secure version. By default, if the IPMI interface has been configured with an IP address, you are notified when a newer version is available. The notice is displayed when you log in to the CLI and when you view the Version Information section on the About > FireEye CMS System Information page in the Web UI. If you prefer, you can disable the notification from appearing again. For details, see Enabling and Disabling IPMI Firmware Notifications Using the CLI on the next page. You can use the show ipmi version include-firmware-update-notice command to view the notice, even if your firmware is up to date. IMPORTANT! Updating the IPMI firmware reverts all settings to factory defaults, including the IPMI username and password, network configuration, and event logs. Before starting the update, gather all information you will need to reconfigure IPMI. NOTE: The IPMI Web UI will be unavailable during the IPMI firmware update. NOTE: The IPMI firmware type is specific to the appliance model, so it is possible that not all models will get an IPMI firmware update in the same CM software release. Prerequisites l Admin access © 2019 FireEye 203 Central Management Administration Guide CHAPTER 11: Network Administration Enabling and Disabling IPMI Firmware Notifications Using the CLI This procedure describes how to use CLI commands to disable and re-enable notifications about out-of-date IPMI firmware on the CM appliance. This notification is enabled by default. To disable notifications about out-of-date firmware: 1. Go to CLI configuration mode: hostname > enable hostname # configure terminal 2. Disable notifications: hostname (config) # no ipmi firmware update notice enable 3. Save your changes. hostname (config) # write memory To re-enable notifications about out-of-date firmware: 1. Go to CLI configuration mode: hostname > enable hostname # configure terminal 2. Enable notifications: hostname (config) # ipmi firmware update notice enable 3. Save your changes. hostname (config) # write memory IP Filtering IP filtering allows you to manage rules for filtering IP packets entering and leaving the appliance through its management interfaces. IP filtering supports IPv4 and IPv6, by separate but largely identical sets of CLI commands. For more information, see the CLI Command Reference. IP filtering is disabled by default for both IPv4 and IPv6. However, some appliances may have IP filtering enabled by existing components on the system which will still be visible in the show ip filter command output. NOTE: Enabling IPv6 filtering has no effect unless IPv6 is enabled. 204 © 2019 FireEye Release 8.7 IP Filtering Interfaces Supported by IP Filtering Rules When you use IP filtering, interfaces can be grouped into three sets: 1. Management interfaces: ether*. IP filtering rules apply to these interfaces. Some appliances such as the Network Security appliance, have one management interface, ether1. On the Central Management platform and Endpoint Security appliance, there are multiple management interfaces, named ether1, ether2, and so on. If an interface is not specified for a rule, the default is "ether+," which in IP filtering matches any interface beginning with "ether". 2. Data ports: pether* . These interfaces cannot have IP filtering rules. 3. Other interfaces: lo, tun0 (if a VPN is enabled). These interfaces may have IP filtering rules installed automatically by the system. You cannot configure the rules for these interfaces. Viewing IP Filtering Rules When you view a list of IP filtering rules using the show ip filter or show ipv6 filter command, rules added for management interfaces as described above and rules added automatically by the system are listed together, in the order in which they are applied. If you are on the VPN, you should use the show ipv6 filter command, which displays detailed information about the firewall rules. The show ipv6 filter configured command, described below, does not include this information. Rules that are manually configured are shown with numbers in the left column, which correspond to the rule numbers visible in show ip filter configured and show ipv6 filter configured command output. Rules that are added automatically by the system do not have numbers. The default filter configuration for the INPUT and OUTPUT chains is an ACCEPT rule with a DROP policy for all traffic on all interfaces whose names begin with "ether". The default configuration for the FORWARD is simply a DROP policy with no rules since CM appliances do not forward packets. Enabling IP filtering has no effect on your network's function until you create new IP filter rules. When IP filtering is enabled, one additional rule is added automatically by the system after all configured rules. This rule is to ACCEPT all inbound and outbound traffic on the loopback 'lo' interface. The system requires the loopback interface to work for internal purposes. NOTE: When you enable FireEye as a Service, IP filters are automatically enabled. See the FireEye as a Service Quick Start Guide for details. © 2019 FireEye 205 Central Management Administration Guide CHAPTER 11: Network Administration CAUTION: This feature will affect integration with third-party services. Exercise caution and common sense when adding IP filtering rules. If rules are set improperly, it may cause problems such as dropping all traffic. For example, adding DROP rules on the OUTPUT chain for ether1 or ether+ could interfere with remote syslog; or adding DROP rules on the INPUT chain could interfere with external access to system services such as SNMP. Prerequisites l Operator or Admin access to configure IP filtering l Monitor, Operator, or Admin access to view IP filtering Enabling IP Filtering Using the CLI Use the commands in this section to enable IP filtering. NOTES: l l The default rules do not place any restrictions on incoming and outgoing packets on ether* interfaces. You may add rules using the CLI. Use caution to not block access to needed network services. IP filtering is automatically enabled when you connect to FireEye as a Service, described in the FireEye as a Service Quick Start Guide. To view the active rules: 1. Go to CLI enable mode: hostname > enable 2. View the rules: hostname # show ip filter hostname # show ipv6 filter To enable IP filtering: 1. Go to CLI configuration mode: hostname > enable hostname # configure terminal 2. Enable IP filtering: hostname (config) # ip filter enable hostname (config) # ipv6 filter enable 3. Save your changes: hostname (config) # write memory 206 © 2019 FireEye Release 8.7 Configuring HTTP Proxy Server Settings Configuring HTTP Proxy Server Settings Configuring an HTTP proxy server on your appliance involves the following tasks: l l Configuring the hostname or IP address of the proxy server. Configuring the port for client communication, if you do not want to accept the default port (port 8080). l (Optional) Enabling basic authentication on the proxy server. l (Optional) Specifying a user-agent string that is included in HTTP requests. l Enabling the proxy server. Prerequisites l Admin access. l The HTTP proxy server is deployed in your network. Configuring HTTP Proxy Server Settings Using the CLI Use the commands in this section to configure and enable an HTTP proxy server on an appliance. To configure and enable an HTTP proxy server: 1. Go to CLI configuration mode: hostname > enable hostname # configure terminal 2. Configure the proxy server hostname or IP address, and the port (if you do not want to use the default, port 8080): hostname (config) # fenet proxy host <hostname or IP address>[:<port>] 3. Optional: Specify the credentials for basic authentication: l Specify the user: hostname (config) # fenet proxy auth basic user <username> l Specify the password: hostname (config) # fenet proxy auth basic password <password> 4. Optional: Specify a user-agent string: hostname (config) # fenet proxy user-agent <string> 5. Enable the proxy server: hostname (config) # fenet proxy enable © 2019 FireEye 207 Central Management Administration Guide CHAPTER 11: Network Administration 6. Verify your changes: hostname (config) # show fenet 7. Save your changes: hostname (config) # write memory NOTE: The show fenet status command also displays HTTP proxy settings, but does not show whether the proxy server is enabled or disabled. The show fenet command output includes or excludes "disabled" to indicate the status. Example The following example configures an HTTP proxy server with basic authentication credentials. hostname hostname hostname hostname hostname (config) (config) (config) (config) (config) # # # # # fenet proxy fenet proxy fenet proxy fenet proxy show fenet host 192.168.2.3 auth basic user bsmith auth basic password abcd6789 enable DTI CLIENT CONFIGURATION: ... Http proxy : bsmith@192.168.2.3:8080 (user agent:) ... hostname (config) # show fenet status ... HTTP Proxy: Address Username User-agent ... : 192.168.2.3:8080 : bsmith : Disabling HTTP Proxy Server Settings Using the CLI Use the commands in this section to disable an HTTP proxy server or to remove its configuration settings. To disable an HTTP proxy server or remove its configuration settings: l To disable an HTTP server: hostname (config) # no fenet proxy enable l To remove the HTTP proxy server: hostname (config) # no fenet proxy l To remove the basic authentication user: hostname (config) # no fenet proxy auth basic user 208 © 2019 FireEye Release 8.7 l Defining Another Management Interface To remove the basic authentication password: hostname (config) # no fenet proxy auth basic password l To remove the user-agent string: hostname (config) # no fenet proxy user-agent Example The following example disables an HTTP proxy server. hostname (config) # no fenet proxy enable hostname (config) # show fenet DTI CLIENT CONFIGURATION: ... Http proxy : bsmith@192.168.2.3:8080 (user agent:) Disabled ... Defining Another Management Interface The management interface is used for remote access to the Web UI and CLI, and for other management traffic (such as NTP, SNMP, and syslog). The default management interface is ether1. You can define a different interface (such as ether2) for remote access to the Web UI and CLI. Reasons for doing so include: l l A private IP address is defined for ether1, so remote users cannot reach it. You could use ether1 for the connection between a Central Management appliance and its managed appliances, and define an accessible IP address for the ether2 interface. You want to use one network for Web UI and CLI traffic, and another network for other management traffic. By default, listen interface constraints are enabled on the appliance. This means only interfaces that meet the following criteria can accept HTTP/HTTPS requests (for Web UI access) and SSH connections (for CLI access). l l The interface must be in the listen interface list. By default, only ether1 is in this list. The interface must meet the eligibility requirements listed in Prerequisites on the next page. The system prevents remote users from being locked out of the system when the criteria are not met by at least one interface. If no interface meets the criteria, listen interface constraints are not enforced, and all viable interfaces are open and can accept HTTP/HTTPS requests and SSH connections. Examples © 2019 FireEye 209 Central Management Administration Guide l l CHAPTER 11: Network Administration The appliance uses the default configuration (listen interface constraints are enabled and ether1 is in the listen interface list). You configure a static IPv4 or IPv6 address for the ether1 and ether2 interfaces and bring them up. Remote users do not have access to the system over ether2, because it was not added to the listen interface list. You then shut down the ether1 interface, and ether2 (the only viable interface) immediately becomes accessible, because the listen interface constraints are no longer enforced. You add ether2 to the listen interface list, but both ether1 and ether2 use DHCP to obtain IPv4 addresses or DHCPv6 to obtain IPv6 addresses. Because neither interface meets the IPv4 or IPv6 static IP address requirement listed in Prerequisites below, the listen interface constraints are no longer enforced. All viable interfaces, including ether1 and ether2, become accessible. Prerequisites l Operator or Admin access. l The appropriate management port is connected to the network switch or router. l Eligibility requirements: l l l The interface exists and is running. DHCP and zeroconf are disabled on the interface (for IPv4), or IPv6 is enabled on both the interface and the system (for IPv6). The interface has an IPv4 or IPv6 address: l l IPv4: At least one static nonzero IPv4 address is available to be assigned to the interface. IPv6: A static IPv6 address is available to assign to the interface, or the address can be obtained dynamically through Stateless Address Autoconfiguration (SLAAC) or DHCPv6. Defining Another Management Interface Using the CLI Use the commands in this section on an appliance that enforces listen interface constraints to define a management interface other than ether1, and add it to the listen interface list so it can accept HTTP/HTTPS requests and SSH connections. To define another management interface: 1. Go to CLI configuration mode: hostname > enable hostname # configure terminal 210 © 2019 FireEye Release 8.7 Defining Another Management Interface 2. Assign an IP address to the other interface: hostname (config) # interface <interfaceName> ip address <ipAddress> <mask> where: l <ipAddress> is the IPv4 or IPv6 address of the interface. l <mask> is the IPv4 mask length prefixed by a slash (for example, /24) or an IPv4 netmask (for example, 255.255.255.0), or the IPv6 mask length prefixed by a slash (for example, /48). 3. (For IP routing) Set the static route for the interface: hostname (config) # ip route <networkPrefix> <mask> <gatewayIP> <interfaceName> where: l <networkPrefix> is the IPv4 or IPv6 network prefix specifying the network. l <mask> is the IPv4 mask length prefixed by a slash (for example, /24) or a netmask (for example, 255.255.255.0), or the IPv6 mask length preceded by a slash (for example, /48). l <gatewayIP> is the IPv4 or IPv6 address of the gateway or next-hop device. l <interfaceName> is the name of the management interface. 4. (For Web UI access): Add the interface to the listen interface list for HTTP/HTTPS requests: hostname (config) # web server listen interface <interfaceName> 5. (For CLI access): Add the interface to the listen interface list for SSH connections: hostname (config) # ssh server listen interface <interfaceName> 6. Verify your changes: hostname (config) # show web hostname (config) # show ssh server 7. Save your changes: hostname (config) # write memory NOTE: This procedure assigns a static IPv4 or IPv6 address to the interface. SLAAC or DHCPv6 can instead automatically assign the IPv6 address. Example The following example configures ether2 as the management interface on the acme-1 appliance. It then adds ether2 the listen interface list. acme-1 (config) # interface ether2 ip address 10.1.2.3 /24 acme-1 (config) # web server listen interface ether2 © 2019 FireEye 211 Central Management Administration Guide CHAPTER 11: Network Administration acme-1 (config) # ssh server listen interface ether2 acme-1 (config) # show web Web User Interface server: Web interface enabled: yes HTTP enabled: yes HTTP port: 80 HTTP redirect to HTTPS: yes HTTPS enabled: yes HTTPS port: 443 HTTPS protocols: TLSv1 HTTPS minimum protocol version: TLSv1 HTTPS cipher list: compatible HTTPS certificate name: system-self-signed HTTPS CA chain name: Listen enabled: yes Listen Interfaces: Interface: ether1 Interface: ether2 Interface: lo ... acme-1 (config) # show ssh server SSH server configuration: SSH server enabled: yes Minimum protocol version: 2 TCP forwarding enabled: yes X11 forwarding enabled: no Audit log file transfers: yes Cipher list: compatible Minimum key length: 1024 bits Client Alive Interval: 0 Client Alive Count Max 3 SSH server ports: 22 Interface listen enabled: Listen Interfaces: Interface: ether1 Interface: ether2 ... yes IMPORTANT: Listen interface constraints are enabled on the system by default. However, if the Listen enabled line in the show web command output is no, use the web server listen enable command to enable constraints for HTTP/HTTPS requests. If the Interface listen enabled line in the show ssh server command output is no, use the ssh server listen enable command to enable constraints for SSH connections. DTI Traffic and Management Traffic By default, both management and DTI traffic use the ether1 network interface, which needs Internet access for DTI network downloads and uploads. For security, you might want to isolate the management traffic by streaming it from an out-of-band network interface with no Internet access. 212 © 2019 FireEye Release 8.7 DTI Traffic and Management Traffic To split the DTI traffic from the ether1 interface, you need a dedicated network interface on the Central Management appliance that is connected to the Internet, as shown in the following illustration. The default gateway of the managed appliance must be reconfigured to this interface. If the managed appliance and the Central Management appliance are in different subnets, a static route must be configured to stream the management traffic from the ether1 interface. IMPORTANT! After traffic is split, accessing the management interface through the Web UI or the CLI must be done from clients in the same subnet as the management interface. © 2019 FireEye 213 Central Management Administration Guide CHAPTER 11: Network Administration Prerequisites l l Admin access Dedicated port for Internet access. For example, in a standard Central Management deployment, the ether2, ether3, and ether4 ports are unused and can be used for this purpose. (On some appliances, ports are labeled pether). For details, see the Central Management Hardware Administration Guide for your Central Management model. Splitting DTI and Management Traffic Using the CLI Use the commands in this section to split DTI and management traffic. The following topologies are supported: l l Central Management Appliance and Managed Appliance in Same Subnet below Central Management Appliance and Managed Appliance in Different Subnets on the facing page Central Management Appliance and Managed Appliance in Same Subnet To configure split traffic when the devices are in the same subnet: 1. Go to CLI configuration mode: cm-hostname > enable cm-hostname # configure terminal 2. Enable the interface that should have Internet access for DTI traffic: cm-hostname (config) # no interface <interface> shutdown where <interface> is the name of the interface (for example, ether4). 3. Configure the interface for DTI traffic: cm-hostname (config) # interface <interface> ip address <ipAddress> <mask> where <interface> is the interface name, <ipAddress> is the interface IP address, and <mask> is the network mask. The network mask can be specified in a dotted decimal format (such as 255.255.255.0) or in a mask length format (such as /24). 4. Remove the existing default gateway route: cm-hostname (config) # no ip default-gateway 5. Configure the default gateway to the interface for DTI traffic: cm-hostname (config) # ip default-gateway <ipAddress> <interface> where <ipAddress> is the IP address and <interface> is the name of the interface for DTI traffic. 214 © 2019 FireEye Release 8.7 DTI Traffic and Management Traffic 6. Verify the default gateway configuration: cm-hostname (config) # show ip default-gateway 7. Verify the IP route: cm-hostname (config) # show ip route 8. Save your changes: cm-hostname (config) # write memory Example In this example, the current settings are shown, DTI traffic is configured to go through the ether4 interface, and the configuration is verified. cm-hostname (config) # show ip default-gateway Active default gateways: 172.16.1.1 (interface: ether1) cm-hostname (config) # show ip route Destination Mask Gateway default 0.0.0.0 172.16.1.1 172.16.0.0 255.240.0.0 0.0.0.0 cm-hostname cm-hostname cm-hostname cm-hostname (config) (config) (config) (config) # # # # Interface ether1 ether1 Source static interface no interface ether4 shutdown interface ether4 ip address 10.13.66.12 255.255.255.0 no ip default-gateway ip default-gateway 10.13.66.1 ether4 cm-hostname (config) # show ip default-gateway Active default gateways: 10.13.66.1 (interface: ether4) cm-hostname (config) # show ip route Destination Mask Gateway default 0.0.0.0 10.13.66.1 10.13.66.1 255.255.255.0 0.0.0.0 172.16.0.0 255.240.0.0 0.0.0.0 Interface ether4 ether4 ether1 Source static interface interface Central Management Appliance and Managed Appliance in Different Subnets When the Central Management appliance and the managed appliance are in different subnets, there is an additional step to configure a static route for the managed appliance to connect to the Central Management appliance. To configure split traffic when the devices are in different subnets: 1. Go to CLI configuration mode: cm-hostname > enable cm-hostname # configure terminal 2. Enable the interface that should have Internet access for DTI traffic: cm-hostname (config) # no interface <interface> shutdown where <interface> is the name of the interface (for example, ether4). © 2019 FireEye 215 Central Management Administration Guide CHAPTER 11: Network Administration 3. Configure the IP address and netmask of the interface for DTI traffic: cm-hostname (config) # interface <interface> ip address <ipAddress> <mask> where <interface> is the name of the interface, <ipAddress> is the IP address of that interface, and <mask> is the network mask. The network mask can be specified in a dotted decimal format (such as 255.255.255.0) or in a mask length format (such as /24). 4. Remove the static default gateway: cm-hostname (config) # no ip default-gateway 5. Reconfigure the default gateway to the interface for DTI traffic: cm-hostname (config) # ip default-gateway <ipAddress> <mask> where <ipAddress> is the IP address and <interface> is the name of the interface for DTI traffic. 6. Add a static route for the Central Management platform to send management traffic to the managed appliance over the ether1 interface: cm-hostname (config) # ip route <ipAddress> <mask> ether1 where <ipAddress> is an IP address in the same subnet as the managed appliance and <mask> is the network mask. 7. Verify the default gateway configuration: cm-hostname (config) # show ip default-gateway 8. Verify the IP route: cm-hostname (config) # show ip route 9. Save your changes: cm-hostname (config) # write memory Example In this example, the current settings are shown, DTI traffic is configured to go through the ether4 interface, a new static route is configured for management traffic, and then the configuration is verified. cm-hostname (config) # show ip default-gateway Active default gateways: 172.16.1.1 (interface: ether1) cm-hostname (config) # show ip route Destination Mask Gateway default 0.0.0.0 172.16.1.1 172.16.0.0 255.240.0.0 0.0.0.0 cm-hostname cm-hostname cm-hostname cm-hostname cm-hostname 216 (config) (config) (config) (config) (config) # # # # # Interface ether1 ether1 Source static interface no interface ether4 shutdown interface ether4 ip address 10.13.66.12 255.255.255.0 no ip default-gateway ip default-gateway 10.13.66.1 ether4 ip route 172.17.74.0 255.255.255.0 ether1 © 2019 FireEye Release 8.7 cm-hostname (config) # show ip default-gateway Active default gateways: 10.13.66.1 (interface: ether4) cm-hostname (config) # show ip route Destination Mask Gateway default 0.0.0.0 10.13.66.1 10.13.66.1 255.255.255.0 0.0.0.0 172.16.0.0 255.240.0.0 0.0.0.0 172.17.74.0 255.255.255.0 0.0.0.0 © 2019 FireEye DTI Traffic and Management Traffic Interface ether4 ether4 ether1 ether1 Source static interface interface static 217 Central Management Administration Guide 218 CHAPTER 11: Network Administration © 2019 FireEye Central Management Administration Guide Before You Begin the Upgrade CHAPTER 12: Upgrading the FireEye Software The CM appliance automatically checks for new system images. Updates are made on an ongoing basis and are easy to download and install. This section describes how to update the Central Management system image. For information about updating managed appliances from the Central Management appliance, see Updating Managed Appliances on page 499. NOTES: l l l Refer to the FireEye DTI Offline Update Portal Guide for upgrade instructions if your server is offline and cannot download updates from the DTI network. Upgrade times vary, based on the operating environment at your site and the size of the server database. Do not reboot your server during an upgrade, unless prompted to do so. Before You Begin the Upgrade Review the items in this section before you begin your upgrade. l l User Role—You must have admin access to upgrade the CM appliance. Back Up the Appliance—Before performing the upgrade, back up your appliance. See Database Backup and Restore on page 245 for more information. © 2019 FireEye 219 Central Management Administration Guide l CHAPTER 12: Upgrading the FireEye Software Licenses—Before performing upgrades, confirm that the following licenses are installed and valid: l CONTENT_UPDATES license (needed for security content updates) l FIREEYE_SUPPORT license (needed for software updates) NOTE: See License Keys on page 115 for more information. If you need to obtain the licenses, send an email to key_request@fireeye.com. l l l l l End-User License Agreement (EULA)—The upgrade could require acceptance of the End User License Agreement (EULA). If it is required, the appliance will not function until the EULA is accepted. To review the EULA before the upgrade, download a copy from the FireEye Customer Support Portal at http://csportal.fireeye.com. Minimum Version to Upgrade—Refer to the Release Notes to determine whether you can upgrade directly from the current release to the new release. IPMI and BIOS Versions—The CM 4500 model requires IPMI 3.11 and BIOS 1.9. Check the versions installed on the appliance with the show system bios command and the show system bios include-firmware-update-notice command. If they are earlier than IPMI 3.11 and BIOS 1.9, see Upgrading Firmware to IPMI 3.11 and BIOS 1.9 on page 230 for upgrade instructions. Download Time—Downloading the operating system software requires about 45 minutes when upgrading from the CLI. Downloading the guest images typically requires 2 ½ to 9 hours from the CLI, depending on connection speed and whether the full set of guest images is downloaded. A complete set can require 24 hours or more. Network Proxy Configuration—If you have an intelligent proxy appliance that is required for access to the Internet, ensure that it does not perform secure sockets layer (SSL) terminations with certificate replacement. An example of such a proxy is the Blue Coat ProxySG appliance. If the proxy does perform SSL terminations, then you must whitelist the FireEye Dynamic Threat Intelligence (DTI) network server (staticcloud.fireeye.com), or the Content Distribution Network (CDN) server (cloud.fireeye.com or download.fireeye.com) in the proxy configuration. For integration with third-party products, such as ArcSight, Juniper STRM, Blue Coat ProxySG, or Q1 Lab QRadar, contact FireEye Technical Support. Refer to the vendor documentation for proxy configuration information. 220 © 2019 FireEye Release 8.7 Upgrading the Appliance Using the Web UI Upgrading the Appliance Using the Web UI Use the Upgrade page to upgrade the CM appliance. To open the Upgrade page, click the About tab and then click Upgrade. The following is an example of the Update page for a Central Management appliance. Task List for Upgrades Perform the following steps (detailed in the sections that follow) to upgrade the CM appliance. NOTE: If your appliance is offline and cannot download updates from the DTI network, perform Select an Upgrade Source below and then refer to the FireEye DTI Offline Update Portal User Guide for additional instructions. 1. Select an Upgrade Source below. 2. Check for Available Update Software on the next page. 3. Download the Software on the next page. 4. Install the Software Update on the next page. 5. Upgrading the Appliance Using the Web UI above. 6. Validate the Software Updates on page 223. Select an Upgrade Source The upgrade source is the location from which the software updates will be downloaded. Online Option l DTI—The software is downloaded from the Dynamic Threat Intelligence (DTI) server or a Content Delivery Network (CDN) server. The server address is © 2019 FireEye 221 Central Management Administration Guide CHAPTER 12: Upgrading the FireEye Software displayed at the top right of the page. See Changing the Active Setting for a DTI Service on page 131 for details about these options. Offline Options The following options can be used if your appliance cannot download updates from a DTI source server. For details and upgrade instructions, see the FireEye DTI Offline Update Portal User Guide. l l Local—Upload a local file that was obtained from the FireEye DTI Update Portal for offline appliances. Click Local to specify a path to the locally stored update software, and then click Save. URL—Upload a local file that was obtained from FireEye via the DTI Update Portal for offline appliances and hosted on a local site identified by a URL. Click URL to specify a URL to the update software, and then click Save. NOTE: For offline guest image updates, downloads are more efficient if Source is set to URL, not Local. If neither offline option is feasible, contact FireEye Technical Support. Check for Available Update Software Click the action icon ( ) in the Action column, and then click Check for a resource row to determine if update software is available. The status is displayed in the expanded Status area. NOTE: If the Check option does not appear in the Action column, then the software is already available for download or an update has recently taken place. The Check option also does not appear during software downloads. Download the Software If a software update is available, the Download option in the Action column is displayed. Click the action icon ( ) in the Action column, and then click Download to begin the software download. The download status is displayed in the expanded Status area. Install the Software Update Installation status is displayed in the expanded Status area. After you download a software update, click the action icon ( 222 ) in the Action column, and then click Install to © 2019 FireEye Release 8.7 Upgrading the Appliance Using the CLI install it. Installation status is displayed in the expanded Status area. If prompted, read the End User License Agreement (EULA), and then accept it if you agree to its terms. If you do not accept it, the appliance will not function. NOTE: If an upgrade process is interrupted or fails, the appliance software automatically falls back to the currently installed image. When installation of the software image is complete, click the action icon ( ) in the Action column, and then click Reboot to complete the update process. NOTE: You must access the appliance through the serial port if you want to monitor appliance boot activities. You can enter CLI commands through direct keyboard and monitor connection only before the boot loader begins loading the kernel, for example, to post output, and after the boot is completed. Validate the Software Updates After software updates are installed, verify the installations: l l Click the About tab. The current software image version information is displayed on the FireEye CMS System Information page. Click the Settings tab, and then click CMS Licenses on the sidebar to verify and view installed licenses. Valid and active licenses display the attribute “True.” If the licenses are not valid and active, the updates are not functional. Upgrading the Appliance Using the CLI Use the commands in the following sections to upgrade the CM appliance. Task List for Upgrades Perform the following steps (detailed in the sections that follow) to upgrade the appliance. 1. Download and Install the Appliance Software Image on the next page. 2. Restart the Appliance and Accept the EULA on the next page. 3. Verify the Upgrade on page 225. IMPORTANT: Be sure to download the software image files from the configured DTI source server before beginning any installations. © 2019 FireEye 223 Central Management Administration Guide CHAPTER 12: Upgrading the FireEye Software Download and Install the Appliance Software Image To download and install the software image: 1. Go to CLI configuration mode: hostname > enable hostname # configure terminal 2. Check for downloads: hostname (config) # fenet image check hostname (config) # show fenet image status 3. Download the software image: hostname (config) # fenet image fetch 4. View the download progress: hostname (config) # show fenet image status Progress of latest action taken: action fetch initiated Tue Nov 22 13:04:44 2016 applying fetch for image lms fetching checksum of the requested image done fetching requested image 7.9.0 initiated fetching requested image 7.9.0 done action fetch completed Tue Nov 22 13:06:03 2016 fetch-done: OS image downloaded successfully: image-lms_7.9.0.img If you have already downloaded the latest software, you may see an error: "Latest image already downloaded and ready to install (error)." To check which images are downloaded, use the following command: hostname (config) # show fenet image list 5. Install the downloaded software image: hostname (config) # image install image-lms_7.9.0.img hostname (config) # image boot next NOTE: If an upgrade process is interrupted or fails, the appliance software automatically falls back to the currently installed image. 6. Save your changes: hostname (config) # write memory Restart the Appliance and Accept the EULA To restart the appliance and accept the EULA: 1. Go to CLI configuration mode: hostname > enable hostname # configure terminal 2. Restart the appliance: 224 © 2019 FireEye Release 8.7 Configuring Auto-Mounting on a USB Device hostname (config) # reload 3. After restarting the appliance, the system could display the FireEye End User License Agreement (EULA). Read the EULA. Click Yes if you agree to its terms, and then click Submit. If you do not accept the EULA, the appliance will not function. After accepting the EULA, the login page is displayed. Wait a few minutes before logging in because database records are undergoing an update in preparation for the upgrade. NOTE: You must access the appliance through the serial port if you want to monitor appliance boot activities. You can enter CLI commands through direct keyboard and monitor connection only before the boot loader begins loading the kernel, for example, to post output, and after the boot is completed. Verify the Upgrade To verify the upgrade: 1. Go to CLI configuration mode: hostname > enable hostname # configure terminal 2. Display the version information for the current system image: hostname (config) # show version Configuring Auto-Mounting on a USB Device You can configure auto-mounting on a USB device attached to the CM appliance. Only one USB device can be mounted at a time. You can configure HTTP access to install system images from the USB device onto the appliance. NOTE: You can configure auto-mounting on a USB device only using the CLI. Prerequisites l Admin access © 2019 FireEye 225 Central Management Administration Guide CHAPTER 12: Upgrading the FireEye Software Enabling or Disabling Auto-Mounting on a USB Device Using the CLI Use the commands in this topic to enable or disable auto-mounting on a USB device attached to the CM appliance. You must enable auto-mounting when the USB device is attached. By default, auto-mounting is disabled. Auto-mounting will not mount the USB device when it is already attached to the appliance. Prerequisites l Admin access To enable auto-mounting on a USB device: 1. Go to CLI configuration mode: hostname > enable hostname # configure terminal 2. Enable auto-mounting on a USB device attached to the appliance: hostname (config) # media usb auto-mount enable 3. Plug the USB device in to the appliance immediately. 4. Verify the USB device auto-mount configuration. hostname (config) # show media usb USB auto-mount configuration: Enabled: yes Local web access: yes Top-level directory: fireeye To disable auto-mounting on the USB device: 1. Go to CLI configuration mode: hostname > enable hostname # configure terminal 2. Disable auto-mounting on the USB device: hostname (config) # no media usb auto-mount enable 3. Verify the USB device auto-mount configuration. hostname (config) # show media usb USB auto-mount configuration: Enabled: no Local web access: yes Top-level directory: fireeye 226 © 2019 FireEye Release 8.7 Configuring Auto-Mounting on a USB Device Configuring HTTP Access to Install Software Updates Using the CLI Use the commands in this topic to configure HTTP access to install software updates from a USB device onto the appliance. By default, you can access only the contents locally in the fireeye directory for the first partition from a specified URL. NOTE: The Central Management appliance does not host guest images when it is operating in "inline" mode. Prerequisites l l Admin access Enable auto-mounting on the USB device to the attached appliance. For details about how to enable auto-mounting, see Enabling or Disabling Auto-Mounting on a USB Device Using the CLI on the previous page. To configure HTTP access to install software updates from a USB device: 1. Go to CLI configuration mode: hostname > enable hostname # configure terminal 2. Enable HTTP access on the loopback interface on the appliance: hostname (config) # media usb web-access enable local Local web access is enabled by default. 3. Specify the top-level directory as the location to extract software updates on a USB device: hostname (config) # media usb web-access top-dir fireeye This directory will be used as the URL to extract the software on the USB device. 4. Verify that the USB device is mounted: hostname (config) # show media usb USB auto-mount configuration: Enabled: yes Local web access: yes Top-level directory: fireeye USB auto-mount status: Device mounted: yes Access URL: N/A © 2019 FireEye 227 Central Management Administration Guide CHAPTER 12: Upgrading the FireEye Software 5. Download software updates using the specified URL as the location to install the updates. See Installing Guest Images from a USB Device Using the CLI below for a representative procedure. Installing Guest Images from a USB Device Using the CLI Use the commands in this topic to install guest images from a USB device onto the appliance. By default, you can access only the contents locally in the fireeye directory for the first partition from a specified URL. NOTE: The Central Management appliance does not host guest images when it is operating in "inline" mode. Prerequisites l l l l Admin access Enable auto-mounting on the USB device to the attached appliance. For details about how to enable auto-mounting, see Enabling or Disabling Auto-Mounting on a USB Device Using the CLI on page 226. Configure HTTP access. For details, see Configuring HTTP Access to Install Software Updates Using the CLI on the previous page. Complete the steps in the following order to set up the files correctly to install guest images from a USB device: 1. Download the guest images tar file from the FireEye network. 2. Extract the contents on the USB device. 3. Remove the version numbers. Copy the following file names: l server-manifest.VERSION to server-manifest l server-manifest.VERSION.md5 to server-manifest.md5 l server-manifest.VERSION.v2 to server-manifest.v2 l server-manifest.VERSION.v2.md5 to server-manifest.v2.md5 To download guest images from a USB device: 1. Download guest images using the specified URL as the location to install the guest images: hostname (config) # guest-images download url <URL> where URL is the location that you specified as the top-level directory for the installation. 228 © 2019 FireEye Release 8.7 Configuring Auto-Mounting on a USB Device Wait for the appliance to fully download the guest images before beginning any installations. 2. Verify the download progress: hostname (config) # show guest-images download 3. After the download is complete, install the guest images: hostname (config) # guest-images install 4. Verify that guest images are properly installed: hostname (config) # show guest-images Mounting or Unmounting a USB Device Using the CLI Use the commands in this topic to manually mount or unmount a USB device to the attached appliance. FireEye recommends that you physically remove the USB device from the port. Use the media usb mount command before you attach the drive, and use the media usb eject command after you unplug it. NOTE: The media usb eject command will have no effect if the USB device is not mounted. Prerequisites l Admin access To mount a USB device: 1. Go to CLI configuration mode: hostname > enable hostname # configure terminal 2. Mount the USB device to the attached appliance: hostname (config) # media usb mount To unmount a USB device: 1. Go to CLI configuration mode: hostname > enable hostname # configure terminal 2. Unmount the USB device from the attached appliance: hostname (config) # media usb eject © 2019 FireEye 229 Central Management Administration Guide CHAPTER 12: Upgrading the FireEye Software Upgrading Firmware to IPMI 3.11 and BIOS 1.9 Upgrading IPMI 3.11 and BIOS 1.9 Firmware for Specific Platforms The CM 4500 model requires an upgrade to IPMI 3.11 and BIOS 1.9. You must install the IPMI upgrade before you upgrade the BIOS. To upgrade IPMI to version 3.11: CAUTION: IPMI network and password settings revert to factory defaults after this upgrade, and IPMI logs are deleted. Make a note of your settings and back up your IPMI logs. WARNING: Do not shut down or remove power from the appliance during the upgrade. 1. Go to CLI configuration mode. hostname> enable hostname# configure terminal 2. Begin the upgrade: hostname (config)# ipmi firmware update latest 3. Confirm the upgrade: hostname (config)# show ipmi If the upgrade fails, try the steps again. If IPMI functions are not fully restored, perform a full power cycle (cold shutdown) on the appliance: 1. Stop the reload process: hostname (config)# reload halt 2. Disconnect all power cables for 2 minutes. 3. After 2 minutes, reconnect power cables and restart the appliance. To upgrade the BIOS to version 1.9: 1. Go to CLI configuration mode. hostname> enable hostname# configure terminal 230 © 2019 FireEye Release 8.7 Upgrading Firmware to IPMI 3.11 and BIOS 1.9 2. Begin the upgrade: hostname (config)# system bios firmware update latest WARNING: Do not shut down or remove power from the appliance during the upgrade. 3. Confirm the upgrade: hostname (config)# show system bios 4. Stop the reload process: hostname (config)# reload halt 5. Disconnect all power cables for 2 minutes. 6. After 2 minutes, reconnect power cables and restart the appliance © 2019 FireEye 231 Central Management Administration Guide 232 CHAPTER 12: Upgrading the FireEye Software © 2019 FireEye Central Management Administration Guide Managing Logs Using the Web UI CHAPTER 13: Log Management This section covers the following information: l Managing Logs Using the Web UI below l Viewing the Current Log Configuration on page 236 l Configuring a Syslog Server Using the CLI on page 237 l l Configuring the Minimum Severity of Messages Sent to Syslog Servers Using the CLI on page 238 Configuring the Minimum Severity of Messages Stored on the Local Drive Using the CLI on page 240 l Configuring the Timestamp Format Using the CLI on page 242 l Uploading the Active Log File to a Network Location Using the CLI on page 244 For a full list and for details about command usage and parameters, see the CLI Command Reference. NOTE: You may need to download logs and provide them to FireEye Technical Support for troubleshooting. Managing Logs Using the Web UI Use the About > Log Manager page to manage appliance logs. This page allows you to customize log generation for various time periods. © 2019 FireEye 233 Central Management Administration Guide CHAPTER 13: Log Management NOTE: You may need to download logs and provide them to FireEye Technical Support for troubleshooting. You may also be asked to upload the logs to FireEye. To manage logs: 1. Click the About tab. 2. Click Log Manager. 3. Select which log categories to include by clicking Selected Logs or All logs and outputs. 4. Select or clear checkboxes to specify the categories you want to include in the logs. 5. If a drop-down list is present, select the time period the log should cover. The default is today. The other options are past week, past 2 weeks, and past month. 6. If you want to view the log files you download, clear the Password-protect generated log archive checkbox in the Password area. IMPORTANT: If this checkbox is selected, you will be unable to open the files. 7. Click Create. The log is added to the Log Archives area. 8. To download a log, click the action icon ( ) in the Action column and then click Download. The log archive is downloaded to your local file system. The archive name begins with the hostname of the appliance. 9. To delete an archive, click the action icon ( ) in the Action column and then click Delete. 234 © 2019 FireEye Release 8.7 Managing Logs Using the Web UI 10. If FireEye requests that you upload an archive, click the action icon ( ) in the Action column and then click Upload. The file is automatically uploaded to FireEye. © 2019 FireEye 235 Central Management Administration Guide CHAPTER 13: Log Management Viewing the Current Log Configuration This topic describes how to use CLI commands to view the current log configuration on the CM appliance. For a full list of logging commands and the usage and parameters, see the CLI Command Reference. Prerequisites l Admin access To view the current log configuration: 1. Go to CLI enable mode: hostname > enable 2. View the current logging configuration: hostname # show logging Local logging level: Override for class mgmt-back: Override for class mgmt-front: 236 notice notice notice Remote syslog default level: No remote syslog servers configured. notice Receive remote messages via UDP: no Receive remote messages via TCP: no Receive remote messages via TLS: no Log file rotation: Log rotation size threshold: Archived log files to keep: 256 megabytes 40 Log format: Timestamp format: Subsecond timestamp field: rfc-3164 disabled Secure channel logs: yes © 2019 FireEye Release 8.7 Configuring a Syslog Server Using the CLI Configuring a Syslog Server Using the CLI This topic describes how to use CLI commands to specify a syslog server for log messages on the CM appliance. For a full list of logging commands and the usage and parameters, see the CLI Command Reference. Prerequisites l Admin access To specify a syslog server: 1. Go to CLI configuration mode: hostname > enable hostname # configure terminal 2. To specify a syslog server to which logging messages are sent, use the logging <serverAddress> command, where <serverAddress> is the server IP address. For example: hostname (config) # logging 10.10.20.62 3. Verify your changes: hostname (config) # show logging Local logging level: Override for class mgmt-back: Override for class mgmt-front: Remote syslog default level: Remote syslog servers: 10.10.20.62 protocol: port: [ . . . ] notice notice notice notice notice udp 514 4. Save your changes. hostname (config) # write memory © 2019 FireEye 237 Central Management Administration Guide CHAPTER 13: Log Management Configuring the Minimum Severity of Messages Sent to Syslog Servers Using the CLI This topic describes how to use CLI commands to specify the minimum severity level of log messages sent to syslog servers. For a full list of logging commands and the usage and parameters, see the CLI Command Reference. Prerequisites l Admin access To configure the minimum severity of log messages sent to syslog servers: 1. Go to CLI configuration mode: hostname > enable hostname # configure terminal 2. To specify the minimum severity level of messages sent to syslog servers, use the logging trap <severity> command, where <severity> is one of the following: l none—Disables logging. l emerg—System failure. l alert—Immediate action required. l crit—Critical condition. l err—Error condition. l warning—Warning condition. l notice—Normal but significant condition. l info—Informational message. l debug—Debug-level message. The following example specifies that all log messages of error level or higher severity are sent to the syslog server: hostname (config) # logging trap err 238 © 2019 FireEye Release 8.7 Configuring the Minimum Severity of Messages Sent to Syslog Servers Using the CLI 3. Verify your changes: hostname (config) # show logging Local logging level: Override for class mgmt-back: Override for class mgmt-front: Remote syslog default level: Remote syslog servers: 10.10.20.62err protocol: port: [ . . . ] notice notice notice err udp 514 4. Save your changes. hostname (config) # write memory © 2019 FireEye 239 Central Management Administration Guide CHAPTER 13: Log Management Configuring the Minimum Severity of Messages Stored on the Local Drive Using the CLI This topic describes how to use CLI commands to specify the minimum severity level of log messages stored on the local drive. For a full list of logging commands and the usage and parameters, see the CLI Command Reference. Prerequisites l Admin access To configure the minimum severity of log messages stored on the local drive: 1. Go to CLI configuration mode: hostname > enable hostname # configure terminal 2. To specify the minimum severity level of messages stored on the local disk, use the logging local <severity> command, where <severity> is one of the following: l none—Disables logging. l emerg—System failure. l alert—Immediate action required. l crit—Critical condition. l err—Error condition. l warning—Warning condition. l notice—Normal but significant condition. l info—Informational message. l debug—Debug-level message. l override—Override a log level. The following example specifies that all log messages of "error" level or higher severity are saved in the log files on the local disk: hostname (config) # logging local err 240 © 2019 FireEye Release 8.7 Configuring the Minimum Severity of Messages Stored on the Local Drive Using the CLI 3. Verify your changes: hostname (config) # show logging Local logging level: Override for class mgmt-back: Override for class mgmt-front: err notice notice 4. Save your changes. hostname (config) # write memory © 2019 FireEye 241 Central Management Administration Guide CHAPTER 13: Log Management Configuring the Timestamp Format Using the CLI This topic describes how to use CLI commands to specify the syslog timestamp format. For a full list of logging commands and the usage and parameters, see the CLI Command Reference. Prerequisites l Admin access To configure the timestamp format used in log messages: 1. Go to CLI configuration mode: hostname > enable hostname # configure terminal 2. Enter the logging fields timestamp format <format> command, where <format> is one of the following: l l rfc-3164—Use the timestamp format specified in RFC-3164 (for example, May 13 15:12:01). rfc-3339—Use the timestamp format specified in RFC-3339 (for example, 2017-05-15T15:22:33). The following example specifies that all log messages use RFC-3339 format: hostname (config) # logging fields timestamp format rfc-3339 242 © 2019 FireEye Release 8.7 Configuring the Timestamp Format Using the CLI 3. Verify your changes: hostname (config) # show logging Local logging level: err Remote syslog default level: notice No remote syslog servers configured. Receive remote messages via UDP: no Receive remote messages via TCP: no Receive remote messages via TLS: no Log file rotation: Log rotation size threshold: Archived log files to keep: 256 megabytes 40 Log format: Timestamp format: rfc-3339 Subsecond timestamp field: Secure channel logs: disabled no 4. Save your changes. hostname (config) # write memory © 2019 FireEye 243 Central Management Administration Guide CHAPTER 13: Log Management Uploading the Active Log File to a Network Location Using the CLI This topic describes how to use CLI commands to upload the active log file to a network location. For a full list of logging commands and the usage and parameters, see the CLI Command Reference. Prerequisites l Admin access To upload the active log file to a network location: 1. Go to CLI configuration mode: hostname > enable hostname # configure terminal 2. To upload the active log file to a specified network location using file transfer protocol (FTP), trivial file transfer protocol (TFTP), secure copy (SCP) or SSH file transfer protocol (SFTP), use the following command: hostname (config) # logging files upload current <uploadURL> The <uploadURL> parameter specifies the protocol and file location. l ftp://<domain>/<path>/<fileName> l tftp://<domain>/path>/<fileName> l scp://<username>[:<password>]@<hostname>/<path>/<fileName> l sftp://<domain>/<path>/<fileName> NOTE: For the SCP protocol, you also specify the credentials. You can enter the password in the command line, or you can enter it when you are prompted at the CLI. The following example uses SCP to upload the active log file to logs/FE_log.gz: hostname (config) # logging files upload current scp://it123@example.com/logs/FireEye_log.gz Password (if required): *********** 3. Verify your changes: hostname (config) # show log files 4. Save your changes. hostname (config) # write memory 244 © 2019 FireEye Central Management Administration Guide Database Backup and Restore Introduction CHAPTER 14: Database Backup and Restore This section describes how to back up and restore the appliance database and how to manage backup files on the appliance. It includes the following topics: l Database Backup and Restore Introduction below l Task List for Database Backup and Restore on the next page l Viewing the Last Backup and Restore Results on the next page l Estimating the Space Needed for the Backup File on page 248 l Backing Up the Database on page 249 l Scheduling Automatic Backups on page 253 l Downloading Backup Files on page 256 l Uploading Backup Files on page 257 l Restoring the Database from a Backup File on page 258 l Deleting Previous Backup Files on page 262 Database Backup and Restore Introduction You can back up, restore, upload, download, and delete the configuration database, which stores Central Management configuration settings. You can restore a database from a previous backup. Backup files can be deleted to free space for new backups. NOTE: License keys and guest images (applicable to offline Central Management appliances only) are not included in the backup. You must reinstall the license keys and guest images separately. Network settings can be restored. © 2019 FireEye 245 Central Management Administration Guide CHAPTER 14: Database Backup and Restore Task List for Database Backup and Restore Complete the steps for backing up and restoring the database in the following order: 1. Log in to the Web UI or CLI. 2. Verify the status of the last backup and restore operations. For details about how to view the last backup and restore operations, see Viewing the Last Backup and Restore Results below. 3. the config backup file. For details about how to estimate the space needed, see Estimating the Space Needed for the Backup File on page 248. 4. Specify a config backup profile and a location for the backup file. Decide whether to include public and private key encryption. Start the backup. For details about how to specify a backup profile, include encryption, and start or cancel the backup, see Backing Up the Database on page 249. To schedule how often you want the backup job to automatically run, see Scheduling Automatic Backups on page 253. 5. To restore the database, select the backup file. For details about how to restore the database, see Restoring the Database from a Backup File on page 258. 6. Monitor the status of the backup or restore operation. Viewing the Last Backup and Restore Results You can view the details for the last backup and restore operations. Details of the last backup or restore operation include the following: l Status of the backup or restore (such as "running") l Destination of the backup file or source of the restore file l Start time of the backup or restore operation l End time of the backup or restore operation l Result of the backup or restore operation (such as "success") After a backup or restore operation, the appliance marks the result as "success" or "failure." When a backup or restore operation is in process, the appliance displays the status as "running." 246 © 2019 FireEye Release 8.7 Viewing the Last Backup and Restore Results Prerequisites l Admin access Viewing the Last Backup and Restore Results Using the Web UI The Backup and Restore page displays the status details about the last backup and restore operation. Example status details are shown in the following illustration. Viewing the Last Backup and Restore Status Using the CLI Use the commands in this section to view the status for the last backup and restore operations. To view the details of the last backup operation: 1. Go to CLI enable mode. hostname > enable 2. View the details of the last backup operation. For example: hostname # show backup status Backup status: Last backup profile: Last backup destination: Last backup start time: Last backup end time: Last Backup result: not-running config local 2016/12/08 18:32:58.112 2016/12/08 18:34:26.301 success To view the details of the last restore operation: 1. Go to CLI enable mode. hostname > enable © 2019 FireEye 247 Central Management Administration Guide CHAPTER 14: Database Backup and Restore 2. View the details of the last restore operation. For example: hostname # show restore status Restore status: Last restore profile: Last restore source: Last restore start time: Last restore end time: Last restore result: not-running config usb 2016/12/08 21:13:53.151 2016/12/08 21:13:53.151 success Estimating the Space Needed for the Backup File The appliance estimates the size of the backup file and calculates the amount of space it needs. The available space must be greater than the estimated space required to perform the backup operation. The size depends on the profile you select (described in Database Backup and Restore Introduction on page 245). Details of the backup estimates for the configuration database include the following: l Size estimate of the database file based on the backup profile l Available space based on the backup profile l Whether the backup can be performed Prerequisites l l Admin access to run the estimate Monitor, Operator, or Admin access to view the backup estimate using the CLI. (In the Web UI, these roles can view only existing backup files, not the backup estimate.) Estimating the Space Needed for the Backup File Using the Web UI Use the Backup and Restore page to estimate the space needed for the backup file. To estimate the space needed for the backup file: 1. Click the Settings tab. 2. Click CM Backup & Restore on the sidebar. 3. Select the configuration backup file you want to estimate. (See Database Backup and Restore Introduction on page 245 for descriptions.) 248 © 2019 FireEye Release 8.7 Backing Up the Database 4. Click Estimate in the Estimate Backup column. Details of the backup estimates for the configuration database are displayed. Estimating the Space Needed for the Backup File Using the CLI Use the commands in this section to estimate the space needed for the backup file. To estimate the space needed for the backup file: 1. Go to CLI enable mode. hostname > enable 2. View the estimate for the configuration database: hostname # show backup estimate profile config Example The following example shows the estimated available space for a backup of the configuration database: hostname # show backup estimate profile config -----------------------------------------------# Estimates for config backup -----------------------------------------------Local space available : 599097 MB Space reserved for other purposes : 356220 MB Space available for backups : 242877 MB Estimated space required for backup : 8 MB Can perform local or remote backup : yes USB space available : 12808 MB Can perform USB backup : yes Backing Up the Database You can save the backup file three ways: l l l To a local destination on the appliance To a remote server (this first creates a local backup and then transfers it to the remote server) To a USB device connected to your local machine © 2019 FireEye 249 Central Management Administration Guide CHAPTER 14: Database Backup and Restore Use the media usb mount command to mount the USB device to the attached appliance. If the USB device is mounted, use the media usb eject command to unmount the USB device. For details about how to mount or unmount a USB device, see Mounting or Unmounting a USB Device Using the CLI on page 229. The appliance must have sufficient space to save one backup. You cannot proceed with a backup operation if there is not enough space on the requested backup destination. For information about estimating the amount of space, see Estimating the Space Needed for the Backup File on page 248. NOTE: The appliance is fully functional while the backup operation is in process. Prerequisites l Admin access Backing Up the Database Using the Web UI Use the Backup and Restore page to back up the database. To back up the database: 1. Click the Settings tab. 2. Click CM Backup & Restore on the sidebar. 3. Select the backup location from the drop-down list. l Local—Saves the backup file to a local destination on the appliance. l USB—Saves the backup file to a USB device connected to your local machine. l 250 Remote—Saves the backup file to a remote server. This first creates a local backup and then transfers it to the remote server. © 2019 FireEye Release 8.7 Backing Up the Database 4. If you selected Remote Server, enter the location of the remote backup file in the Remote URL or Server Location column: scp://<username>:<password>@<hostname>/<directory> where <username> and <password> are remote server admin credentials, <hostname> is the remote server, and <directory> is the directory in which to save the backup file. 5. Enter a custom prefix for the backup file name in the File Name Prefix column. You can use the prefix to sort the list of the backup files. 6. (Optional) Clear the Encrypt checkbox to disable public and private key encryption for the backup operation. Each backup file is signed by default using the public and private key pairs. By default, encryption is always included in the backup. NOTE: Encryption delays the backup operation. Backups are encrypted only using static keys. 7. Click Backup in the Action column. A progress bar indicates the status of the backup operation. NOTE: To cancel a database backup that is in progress, click the red X in the progress bar. Backing Up the Database Using the CLI Use the commands in this section to back up the configuration database. To back up the database: 1. Go to CLI configuration mode. hostname > enable hostname # configure terminal 2. Specify the configuration database for backup: hostname (config) # backup profile config © 2019 FireEye 251 Central Management Administration Guide CHAPTER 14: Database Backup and Restore 3. Specify the location for the backup file. l To save the configuration backup file to a local destination on the Central Management appliance: hostname (config) # backup profile config to local l To save the backup file on a remote server: hostname (config) # backup profile config to <url> where <url> specifies remote server admin credentials (<username> and <password>), the remote server( <hostname>), and the directory in which to save the backup file (<directory> )in the following format: scp://<username>[:<password>]@<hostname>/<directory> NOTE: If you do not specify the remote host administrator password in the backup profile command (where the password would be visible as clear text), the CLI prompts for the password and obfuscates the keyboard input as you type it. A remote backup first creates a local backup and then transfers it to the remote server. l To save the backup file to a USB drive on your local machine: hostname (config) # backup profile config to usb 4. Specify a custom prefix for the backup file name: hostname (config) # backup profile config to <backupLocation> prefix <prefix> 5. (Optional) Monitor the progress of the backup operation. l To disable progress tracking for the backup operation: hostname (config) # backup profile config to <backupLocation> progress no-track l To enable progress tracking for the backup operation: hostname (config) # backup profile config to <backupLocation> progress track By default, progress tracking is enabled. 252 © 2019 FireEye Release 8.7 Scheduling Automatic Backups 6. (Optional) Disable public and private key encryption for the backup operation. hostname (config) # backup profile config to <backupLocation> noencryption The following example backs up the configuration database to a local destination on the Central Management appliance without encryption: hostname (config) # backup profile config to local no-encryption NOTE: Encryption is enabled by default. Encryption delays the backup operation. Backups are encrypted only using static keys. NOTE: To cancel a backup that is in progress, enter the backup cancel command. When you cancel the backup operation that is in progress, the system finishes the current step before canceling the entire operation. Examples The following example backs up the configuration database to a local destination on the Central Management appliance: hostname (config) # backup profile config to local Step 1 of 3: Performing Sanity checks 100.0% [#################################################################] Step 2 of 3: Backing up config db 100.0% [#################################################################] Step 3 of 3: Generating Backup package 100.0% [#################################################################] The following example backs up the configuration database to a remote location: hostname (config) # backup profile config to scp://admin123@bkpFeb/IE-CM4400 Password (if required): ******** Step 1 of 4: Performing Sanity checks 100.0% [#################################################################] Step 2 of 4: Backing up config db 100.0% [#################################################################] Step 3 of 4: Generating Backup package 100.0% [#################################################################] Step 4 of 4: Transferring backup to remote loc 100.0% [#################################################################] Scheduling Automatic Backups You can configure and enable automatic backup jobs. You can specify how often you want the backup job to run automatically. NOTE: You can schedule automatic backup jobs only using the CLI. © 2019 FireEye 253 Central Management Administration Guide CHAPTER 14: Database Backup and Restore Prerequisites l Admin access l Sufficient storage for automatic backups IMPORTANT! Additional space is required when you schedule automatic backups to run frequently. You must monitor the generated backups and delete the unnecessary backups. Scheduling Automatic Backups Using the CLI Use the commands in this section to schedule automatic backups for the database. To configure the scheduled backup job: 1. Go to CLI configuration mode: hostname > enable hostname # configure terminal 2. Create the job by specifying the job ID. hostname (config) # job <jobID> 3. Schedule the backup job for the configuration database: hostname (config) # job <jobID> command <sequenceNumber> "backup profile config" 4. Use the backup profile command to specify the location for the backup file. hostname (config) # job <jobID> command <sequenceNumber> "backup profile config to <backupLocation>" l To schedule the backup job to a local destination on the Central Management platform: hostname (config) # job <jobID> command <sequenceNumber> "backup profile config to local" l To schedule the backup job on a remote server: hostname (config) # job <jobID> command <sequenceNumber> "backup profile config to <url>" where <url> is the specified remote location using the following format: scp://<username>:<password>@<hostname>/<remotePath> l To schedule the backup job to a USB drive on your local machine: hostname (config) # job <jobID> command <sequenceNumber> "backup profile config to usb" 5. Save your changes: hostname (config) # write memory 254 © 2019 FireEye Release 8.7 Scheduling Automatic Backups To schedule automatic backups for the database: 1. Specify how often you want the backup job to run automatically. l To schedule daily, enter the end date, start date, or time: hostname (config) # job <jobID> schedule daily end date <yyyy/mm/dd> hostname (config) # job <jobID> schedule daily start date <yyyy/mm/dd> hostname (config) # job <jobID> schedule daily time <hh:mm:ss> The parameter values are as follows: o <yyyy/mm/dd> specifies the end or start date for the backup job. o <hh:mm:ss> specifies the time to start the backup job based on a 24- hour clock. l To schedule monthly, enter: hostname (config) # job <jobID> schedule monthly day-of-month <day> where <day> is the day of the month the backup should occur. l To schedule once, enter: hostname (config) # job <jobID> schedule once time <hh:mm:ss> date <yyyy/mm/dd> The parameter values are as follows: o <hh:mm:ss> specifies the time to start the backup job based on a 24- hour clock. o l <yyyy/mm/dd> specifies the date to start the backup job. To schedule a backup that runs periodically on a schedule you define, enter the end and start date or time interval: hostname (config) # job <jobID> schedule periodic end date <yyyy/mm/dd> time <hh:mm:ss> hostname (config) # job <jobID> schedule periodic start date <yyyy/mm/dd> time <hh:mm:ss> hostname (config) # job <jobID> schedule periodic interval <timeInterval> The parameter values are as follows: o <yyyy/mm/dd> specifies the end or start date for the backup job. o <hh:mm:ss> specifies the end or start time for the backup job based on a 24-hour clock. o © 2019 FireEye <timeInterval> is specified in the format of "2h3m4s." 255 Central Management Administration Guide l CHAPTER 14: Database Backup and Restore To schedule weekly: hostname (config) # job <jobID> schedule <frequency> weekly dayof-week <day> The <day> parameter is the day of the week the backup job is scheduled to occur. Valid values are sun (Sunday), mon (Monday), tue (Tuesday), wed (Wednesday), thu (Thursday), fri (Friday), and sat (Saturday). l To specify a type of schedule, enter: hostname (config) # job <jobID> schedule <type> where <type> is the type of schedule for the backup job. Valid values are: Value Description once The backup runs only once daily The backup runs daily weekly The backup runs weekly monthly The backup runs monthly periodic The backup runs automatically on a schedule you define 2. Enable the configuration for the scheduled backup job. hostname (config) # job <jobID> enable 3. Save your changes: hostname (config) # write memory 4. Verify the status for the scheduled backup job. For example: hostname (config) # show job Job 333: Status: pending Enabled: yes Continue on failure: no Schedule type: Time and date: daily 2016/08/16 00:00:00 +0000 Last exec time: N/A Next exec time: Sun 2016/08/17 00:00:00 +0000 Commands: Command 1: backup profile config to local Downloading Backup Files You can download backup files from the appliance to your local machine. 256 © 2019 FireEye Release 8.7 Uploading Backup Files NOTE: A backup file is downloaded only using the Web UI. Prerequisites l Admin access Downloading Backup Files Using the Web UI Use the Backup and Restore page to download a backup file from the appliance to your local machine. To download a database backup file: 1. Click the Settings tab. 2. Click CM Backup & Restore on the sidebar. 3. In the Restore Available Backups section, locate the backup FEBKP file in the Backup name (Profile) column. 4. Click the green arrow in the Download column to download the backup. Uploading Backup Files You can upload backup files from your local machine to the appliance. One backup file is used to restore the database for multiple appliances. The uploaded backup files are stored in the same location where you saved the local backup files. NOTE: A backup file is uploaded only using the Web UI. Prerequisites l Admin access © 2019 FireEye 257 Central Management Administration Guide CHAPTER 14: Database Backup and Restore Uploading Backup Files Using the Web UI Use the Backup and Restore page to upload a backup file from your local machine to the appliance. To upload a backup file from your local machine: 1. Click the Settings tab. 2. Click CMS Backup & Restore on the sidebar. 3. In the Upload Backup File area, click Choose File, and then navigate to the backup file you want to upload. 4. Click Submit to upload the backup file from your local machine. An error occurs if an invalid backup file is uploaded. Restoring the Database from a Backup File You can restore the backup from three locations: l l l From your local appliance. From a remote server. Do not restore the current network settings while the appliance is performing a restore operation from a remote server. From a USB device connected to your local machine. Usage Guidelines Follow these usage guidelines when you are restoring the database from a backup file: l l l 258 The appliance will not be fully operational during the restore operation. For example, the alert detection process will stop during the restore operation. You cannot cancel the restore operation while it is in process. If the restore process fails, the Central Management platform will automatically revert back to the original configuration. © 2019 FireEye Release 8.7 l l l Restoring the Database from a Backup File The config backup profile can be restored from a software upgrade. You cannot restore the backup from a software downgrade. You cannot restore a backup from another product family. You cannot restore a backup from a release earlier than Central Management 7.5.0. You can restore a backup from Central Management 7.5.0 on a Central Management platform running release 7.6.0. Prerequisites l l l l Admin access Verify that you have a backup FEBKP file of the current database before you begin the restore operation. Locate the previous backup you want to restore. Verify the details for the appliance, backup profile, version, hostname, and date stamp. These details are validated while the restore operation is in process. Restoring the Database from a Backup File Using the Web UI Use the Backup and Restore page to restore the database from a backup file. NOTE: This illustration is from an Email Security — Server Edition appliance, but it is representative of CM appliances as well. To restore the database from a backup file: 1. Click the Settings tab. 2. Click CM Backup & Restore on the sidebar. 3. Locate the backup FEBKP file you want to restore in the Backup Name (Profile) column. You have the option to restore everything using a full profile or restore portions using one of the other profiles. © 2019 FireEye 259 Central Management Administration Guide CHAPTER 14: Database Backup and Restore 4. If you selected Remote Server, scroll down to enter the location of the remote backup file in the Remote URL or SCP box: {scp|sftp}://<username>:<password>@<hostname>/<filePath> where <username> and <password> are remote server Administrator credentials, <hostname> is the remote host, and <filepath> is the full path of the backup file. Then select the profile you want to restore from the drop-down list. 5. (Optional) Clear the Exclude Network Settings checkbox to include the network settings from the backup file. By default, the network settings are not included in the restore operation. CAUTION! Do not restore the current network settings while the appliance is performing a restore operation from a remote server. 6. Click Restore to restore the backup. 7. In the confirmation dialog box, click Yes. NOTE: The appliance will not be fully operational during the restore operation. You cannot cancel the restore operation while it is in process. You must reinstall the license keys separately. Restoring the Database from a Backup File Using the CLI Use the commands in this section to restore the database from a backup file. To restore the database from a backup file: 1. Go to CLI configuration mode. hostname > enable hostname # configure terminal 2. Locate the backup FEBKP file you want to restore. l To display a list of the backup files on the USB drive: hostname (config) # show backup available on-usb l To display a list of the backup files: hostname (config) # show backup available local 3. Specify the configuration database profile: hostname (config) # restore profile config 4. Specify the location of the backup file. l To restore the backup from the local destination on the Central Management appliance: hostname (config) # restore profile config from local 260 © 2019 FireEye Release 8.7 Restoring the Database from a Backup File l To restore the backup from a remote server: hostname (config) # restore profile config from <url> where <url> specifies remote server Administrator credentials (<username> and <password>), the remote server (<hostname>), and the full path of the backup file( <filepath>) in the following format: {scp|sftp}://<username>[:<password>]@<hostname>/<filepath> NOTE: If you do not specify the remote host administrator password in the restore profile command (where the password would be visible as clear text), the CLI prompts for the password and obfuscates the keyboard input as you type it. l To restore the backup from a USB drive on your local machine: hostname (config) # restore profile config from usb 5. Enter the name of the backup file. hostname (config) # restore profile config from <backupLocation> backup <name> 6. (Optional) Restore the network settings from the relevant backup: hostname (config) # restore profile config from <backupLocation> backup <name> include-network-config CAUTION! Do not restore the current network settings while the CM appliance is performing a restore operation from a remote server. 7. (Optional) Monitor the progress of the restore operation. Progress tracking is enabled by default. l To disable progress tracking for the restore operation: hostname (config) # restore profile config from <backupLocation> backup <name> progress no-track l To enable progress tracking for the restore operation: hostname (config) # restore profile config from <backupLocation> backup <name> progress track You can cancel progress tracking by using Ctrl+C. The restore operation still happens in the background. Use the show restore status command to find the status of the restore operation. Example The following example shows how to restore a configuration database backup from local on an appliance. hostname (config) # restore profile config from local backup vx-Config-7.9.0vx-2-20160802-239500.febkp © 2019 FireEye 261 Central Management Administration Guide CHAPTER 14: Database Backup and Restore Password (if required): ******** Step 1 of 4: Performing Sanity checks 100.0% [##################################################################] Step 2 of 4: Extracting backup package 100.0% [##################################################################] Step 3 of 4: Restoring config db 100.0% [##################################################################] Step 4 of 4: Restart system services 100.0% [##################################################################] NOTE: This example is from a VX Series appliance, but it is representative of CM appliances as well. Deleting Previous Backup Files You can delete previous backup files to free space for new backup files. Prerequisites l Admin access Deleting Previous Backup Files Using the Web UI Use the Backup and Restore page to delete a backup file. NOTE: This illustration is from an Email Security — Server Edition appliance, but it is representative of CM appliances as well. To delete a backup: 1. Click the Settings tab. 2. Click CMS Backup & Restore on the sidebar. 3. In the Restore Available Backups area, locate the backup FEBKP file you want to delete in the Backup Name (Profile) column. 4. Click the icon in the Delete column. 5. Click Yes to confirm the action. 262 © 2019 FireEye Release 8.7 Deleting Previous Backup Files Deleting Previous Backup Files Using the CLI Use the commands in this section to delete previous backup files. IMPORTANT! If you delete a backup file from a USB drive by using the backup delete from usb command, the deletion might take a few minutes. To delete a backup file: 1. Go to CLI configuration mode. hostname > enable hostname # configure terminal 2. Specify the location of the backup file. l To delete a file from the appliance, enter: hostname (config) # backup delete from local l To delete a file from a USB drive on your local machine, enter: hostname (config) # backup delete from usb NOTE: To delete a remote backup file, you must log in to the remote server and delete the file manually. 3. Specify the name of the backup file to delete from the backup location. hostname (config) # backup delete from <backupLocation> name <backupName> where <backupName> is the backup FEBKP file you want to delete. Example The following example shows how to delete a database backup that resides locally on an appliance. hostname (config) # backup delete from local name wMPS-Config-7.9.0-IE-NX90020160807-220207.febkp NOTE: This example is from an Network Security appliance, but it is representative of CM appliances as well. © 2019 FireEye 263 Central Management Administration Guide 264 CHAPTER 14: Database Backup and Restore © 2019 FireEye Central Management Administration Guide Viewing System Health and Performance Check Results CHAPTER 15: System Health and Performance The Central Management platform provides health and status information about itself and its managed appliances. l Checking Status and Health of Managed Appliances on page 489 For information about checking the status of an MVX cluster, see the FireEye Network Security Deployment Guide for MVX Smart Grid. Prerequisites l Monitor, Operator, Analyst, or Admin access Viewing System Health and Performance Check Results You can view overall status information about system health and appliance performance check results. Prerequisites l Admin, Operator, Monitor, or Analyst access © 2019 FireEye 265 Central Management Administration Guide CHAPTER 15: System Health and Performance Viewing System Health and Performance Check Results Using the Web UI Use the About > Summary page to view overall status information about the appliance components. The Summary page panels display a summary view of appliance health, appliance performance, and status. This example is from a SmartVision Edition sensor (which is an NX Series appliance with a SmartVision Edition FIREEYE_APPLIANCE license), but it is representative of CM appliances as well. The color of a display panel indicates the status of each appliance component: Color Gray Description A gray panel indicates the appliance component is in good condition. Yellow A yellow panel indicates the appliance component is in warning condition. Red A red panel indicates the appliance component is in critical condition. The following table describes each display panel on the Summary page. Panel Software Version 266 Description Compares the software version running on the system to the available software on the DTI network. A red panel indicates that your appliance is not running the current software version. To upgrade the software image, click Upgrade. The Web UI displays the About > Upgrade page, where you can upgrade to the latest software image. © 2019 FireEye Release 8.7 Viewing System Health and Performance Check Results Panel Description Licenses Displays the number of installed licenses that are valid and active. A red panel indicates that licenses have expired. A yellow panel indicates that licenses will expire within 30 days. DTI Displays whether the appliance can receive security content updates from and upload analysis statistics to the DTI network. A red panel indicates that services are not reachable. Backups Displays the status of the last backup operation. A red panel indicates that the last backup operation failed or data has never been backed up on the appliance. To back up the database, click Create Backup. The Web UI displays the Settings > Appliance Backup & Restore page, where you can back up the database. Global Cache Displays whether the global cache is enabled on the system. RAID Displays the overall status of RAID. An error message appears if a RAID error has occurred. A yellow panel indicates that a non-RAID disk was detected. Power Supply Displays the overall status of the power supply. A red panel indicates that the power supply is in critical condition. System Temperature Displays the current temperature and unit of measurement on the system. A red panel indicates that the temperature is below or exceeded a system-defined threshold. Paging Displays whether the system has started the paging activity. A yellow panel indicates that the paging activity is in progress. IPMI Compares the IPMI firmware version running on the system to the available version on the DTI network. A red panel indicates that a newer version exists. IP Displays IPv4, IPv6, or both. Network Deployment Displays the status of network information that might indicate appliance deployment problems. A red panel indicates that a network deployment problem was found. Filesystem Displays the status of the number of partitions that have free space. A yellow panel indicates that the amount of free space in one of the partitions dropped below 10 percent. © 2019 FireEye 267 Central Management Administration Guide Panel CHAPTER 15: System Health and Performance Description USB Displays whether a USB device is connected to the appliance. Timezone Displays the time zone for your appliance. The Timezone panel also displays the number of seconds since the appliance was synchronized with the DTI server. CMS Displays the status of whether an appliance is managed by the Central Management Management appliance. To display system health and performance check results: 1. Click the About tab. 2. Click Summary. 268 © 2019 FireEye Release 8.7 Checking System Health and Status Checking System Health and Status You can use the Web UI or CLI to view health and status information. Prerequisites l Monitor, Operator, Analyst, or Admin access Checking System Health Using the Web UI Use the Health Check page to check appliance health and status. To view health and status: 1. Click the About tab. 2. Click Health Check. The results of the last check are displayed. 3. Review the system information. 4. To update the results, click Refresh Health Check. The following sections contain descriptions of the information in each area of the page. Version Information The About > Health Check > Version Information section provides an up-to-date view of the software running on your appliance and compares that with the available software on the FireEye DTI network. © 2019 FireEye 269 Central Management Administration Guide CHAPTER 15: System Health and Performance Information about the IPMI version is not displayed for a user that is assigned an Analyst role. Information Description Software Version Compares the software version running on the system to the available software on the DTI network. If a newer version exists, administrators are prompted to upgrade the software. Installed Version Displays the current software version running on the system. Available Version Displays the current software version available on the DTI network. Content Version When the Central Management appliance is in "online" mode, it sends the request for security content updates to the DTI network on behalf of its managed appliances. The security content is downloaded to the managed appliances; it is not hosted on the Central Management appliance. When the Central Management appliance is in "offline" or "local" mode, the Central Management appliance downloads and hosts the security content for the appliances to download. IPMI Version Compares the IPMI firmware version running on the system to the available version on the DTI network. If a newer version exists, administrators are prompted to upgrade the firmware. Installed Version Displays the current IPMI firmware version. Available Version Displays the latest available IPMI firmware version. System Info The System Info status section provides an up-to-date status of your appliance hardware and alerts administrators when problems are found. 270 © 2019 FireEye Release 8.7 Checking System Health and Status Information Description Processing Load Provides analysis of the overall load the system is carrying. If it is nearing capacity, the administrator is alerted. Average Load The average processing load handled by the system. Elapsed The current uptime of the system in days, hours, minutes, and seconds. Services Health The About > Health Check > Services Health section provides an up-to-date status of your appliance’s system services and analysis engine services when problems are found. Information Description Service Name Displays the name of the system service or analysis engine service. Status Displays the health state of the system service or analysis engine service. Services can be healthy, disabled, degraded, or in the failed state. Recovery Steps Displays instructions for how to resolve the problem. Hardware The About > Health Check > Hardware section provides status on the appliance’s hardware components. Information about the disk, RAID, and chassis are not displayed for a user that is assigned an Analyst role. Information Description Disk Displays whether the hard disk is online. If a problem is found, the administrator is alerted. Device State Displays the current state of the hard disk. Device Support Displays the type of device available on the system. © 2019 FireEye 271 Central Management Administration Guide CHAPTER 15: System Health and Performance Information Description Self Assessment Indicates whether the disk passed its internal self-tests. User Capacity Shows the disk capacity on the disk. Chassis Displays status of the hardware chassis. If a problem is found, the administrator is alerted. Lock Provides the state of the chassis lock. Boot Up State Provides the boot up status. Power Supply State Provides the state of the power supply. RAID Provides the status of RAID. DTI Cloud The About > Health Check > DTI Cloud section displays the status of the connection between the appliance and the DTI network. This example is from an Network Security appliance, but is representative of other FireEye appliances as well. Information 272 Description DTI Client Shows whether the DTI client is running on the system. Username Displays the current user of the system. Support Updates Displays the status of the support license. Security Content Displays whether security content sharing is enabled on the system. Sharing Displays the type of content update license purchased. Content Updates Displays the status of the content update license. Download Compares the source for software updates (system images, guest images, and security content) to the available download source on the DTI network and displays the status. © 2019 FireEye Release 8.7 Checking System Health and Status Information Upload Description Compares the destination that is used for software uploads to the available upload destination on the DTI network and displays the status. Last Shows the last time software updates were downloaded and Communication uploaded. Time Interfaces The About > Health Check > Interfaces section displays information about each available Ethernet port on the CM appliance. The About > Health Check > Interfaces section is not displayed for a user that is assigned an Analyst role. Information Description Interface Whether the Ethernet port is up or down. Auto Negotiation Whether auto negotiation is enabled. Duplex The type of duplex communication used by the Ethernet port. Link Detected Whether the Ethernet port is currently linked to another port. Link Transceiver The location of the link transceiver used to generate Ethernet traffic. Link Speed The maximum data speed available on the Ethernet port. MAC Address The MAC address of the Ethernet port. RX Packet The number of packets received by the Ethernet port during the life of this connection. TX Packet The number of packets transmitted by the Ethernet port during the life of this connection. TX Packets Dropped The number of packets that were dropped through Ethernet traffic. © 2019 FireEye 273 Central Management Administration Guide CHAPTER 15: System Health and Performance Checking System Health Using the CLI Use the CLI commands in this topic to view health and status information about CM appliance components. This topic describes selected commands that return system, hardware status, DTI network, and interface information. For a full list of commands and details about their usage and parameters, see the CLI Command Reference. l Monitor, Operator, or Admin access l Admin access for the show ipmi command NOTE: The examples in this section are from an Network Security appliance, but they are representative of CM appliances as well. To check appliance health: 1. Go to CLI enable mode: hostname > enable 2. Display detailed information about the system and the software running on it. hostname # show version Product name: Web MPS [licensed] Product model: FireEyeNX9450 Product edition: Classic Bandwidth: 2000 Mb Product release: wMPS (wMPS) 7.7.0.433916 Build ID: #433916 Build date: 2015-12-29 17:21:57 Build arch: x86_64 Built by: root@vta114 Version summary: wmps wMPS (wMPS) 7.7.0.433916 #433916 2015-12-29 17:21:57 x86_64 build@vta108:FireEye (xxx) Content Version: 385.314 Appliance ID: XXXXXXXXXXXX 274 Product model: Host ID: System serial num: System UUID: FireEyeNX9450 XXXXXXXXXXX XXXXXXXXXX XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXX Uptime: CPU load averages: Number of CPUs: System memory: Swap: 3d 6h 34m 34.205s 0.36 / 0.40 / .38 32 9210 MB used / 119984 MB free / 129194 MB total 0 MB used / 65536 MB free / 65536 MB total © 2019 FireEye Release 8.7 Checking System Health and Status 3. Display the IPMI configuration: hostname # show ipmi IPMI LAN Settings ---------------------------------------Admin Shut Down : no Shut Down : no IP Address Source : Static Address IP Address : 192.168.42.27 Subnet Mask : 0 Default Gateway IP : 0 IPMI Firmware Installed ------------------------------Firmware Version: 2.67 Device: 1 IPMI Version: 2.0 IPMI Firmware Available For Update ----------------------------------New Firmware Version: 2.67 New Firmware Filename: FireEye_V267.bin Firmware Update Notice: Firmware is up to date for this release IPMI Firmware Availability Notice is enabled 4. Display overall system status: hostname * show system health Overall system feature status: Good © 2019 FireEye 275 Central Management Administration Guide CHAPTER 15: System Health and Performance 5. Display information about the Dynamic Threat Intelligence (DTI) network: hostname # show fenet status Dynamic Threat Intelligence Service: Update source Enabled Download Upload Mil : : : : : <online> yes DTIUser@cloud.fireeye.com DTIUser@up-cloud.fireeye.com DTIUser@mil-cloud.fireeye.com HTTP Proxy: Address Username User-agent : : : Request Session: Timeout Retries Speed Time Max Time Rate Limit : : : : : 30 3 60 14400 Speed Limit : 1 Dynamic Threat Intelligence Lockdown: Enabled Locked Lock After : no : no : 5 failed attempts UPDATES Enabled ------Security contents: yes Stats contents: yes 276 Notify -----no Scheduled --------every none Last Updated At ------------------2016/07/18 19:28:00 2016/07/18 15:55:00 © 2019 FireEye Release 8.7 Checking System Health and Status 6. Display status and traffic statistics for all interfaces: hostname # show interfaces Interface ether1 status: Comment: Admin up: yes Link up: yes DHCP running: no IP address: 172.00.00.00 Netmask: 255.000.0.0 IPV6 enabled: no Speed: 1000Mb/s (auto) Duplex: full (auto) Interface type: ethernet Interface ifindex: 12 Interface source: physical MTU: 1500 HW address: 00:25:90:D0:A3:76 RX RX RX RX RX RX RX bytes: 3114981133 packets: 31934013 mcast packets: 31564 discards: 296 errors: 1 overruns: 0 frame: 0 TX bytes: 227921679 TX packets: 367951 TX discards: 0 TX errors: 0 TX overruns: 0 TX carrier: 0 TX collisions: 0 TX queue len: 1000 Interface ether2 status: Comment: Admin up: yes Link up: no DHCP running: no IP address: Netmask: IPV6 enabled: no Speed: UNKNOWN Duplex: UNKNOWN Interface type: ethernet MTU: 1500 HW address: 00:25:90:D0:A3:77 RX RX RX RX RX RX RX bytes: packets: mcast packets: discards: errors: overruns: frame: 0 0 0 0 0 0 0 TX TX TX TX TX TX TX TX bytes: packets: discards: errors: overruns: carrier: collisions: queue len: 0 0 0 0 0 0 0 0 Interface pether2 status: Comment: Admin up: yes Link up: no DHCP running: no IP address: Netmask: IPV6 enabled: no Speed: UNKNOWN Duplex: UNKNOWN Interface type: ethernet Interface ifindex: 9 © 2019 FireEye 277 Central Management Administration Guide CHAPTER 15: System Health and Performance Interface source: Bridge group: MTU: HW address: physical ether2 1500 00:25:90:D0:A3:77 RX RX RX RX RX RX RX 0 0 0 0 0 0 0 bytes: packets: mcast packets: discards: errors: overruns: frame: TX TX TX TX TX TX TX TX bytes: packets: discards: errors: overruns: carrier: collisions: queue len: 0 0 0 0 0 0 0 1000 Interface pether3 status: Comment: Admin up: yes Link up: yes DHCP running: no IP address: 127.0.0.10 Netmask: 255.255.255.0 IPV6 enabled: no Speed: 1000 MB/s (auto) Duplex: full (auto) Interface type: ethernet Interface ifindex: 6 Interface source: physical MTU: 1500 HW address: 00:25:90:D0:A3:67 RX RX RX RX RX RX RX 278 bytes: packets: mcast packets: discards: errors: overruns: frame: 31628620500 46795 367056 212322 0 0 0 TX TX TX TX TX TX TX TX bytes: packets: discards: errors: overruns: carrier: collisions: queue len: 0 0 0 0 0 0 0 1000 © 2019 FireEye Central Management Administration Guide Retrieving SNMP Data CHAPTER 16: SNMP Data FireEye appliances send Simple Network Management Protocol (SNMP) data to convey abnormal conditions to administrative computers that monitor and control them. The administrative computers are called SNMP managers. SNMP data includes the following: l l Information that is retrieved (pulled) by the SNMP manager. This information is sent in response to requests the SNMP manager sends to the appliance. See Retrieving SNMP Data below. Events (known as traps) that are sent (pushed) by the appliance to the SNMP manager. Traps typically report alarm conditions such as a disk failure or excessive temperature. They are unsolicited; that is, they are not sent in response to requests from the SNMP manager. See Sending Traps on page 283. Retrieving SNMP Data This section describes how to retrieve SNMP information from the CM appliance. A Management Information Base (MIB) is a text file written in a specific format in which all of the manageable features of a device are arranged in a tree. Each branch of the tree contains a number and a name, and the complete path from the top of the tree down to the point of interest forms the Object Identifier, or OID. The OID is a string of values separated by periods, such as .1.3.6.1.2.1.1.3.0. You can send requests for data on an object using the OID, but it can be simpler to use the symbolic name for the object instead. A MIB allows SNMP tools to translate the symbolic names into OIDs before sending the requests to the managed device. Symbolic names for objects in the FireEye MIB include feSerialNumber.0, feHardwareModel.0, feProductLicenseActive0, feFanIsHealthy.1, and so on. The FireEye MIB, named FE-FIREEYE-MIB, needs to be downloaded from the CM appliance to the SNMP manager so it can be loaded into an SNMP browser or other tool. A typical SNMP browser can retrieve the values the appliance supports, and then display them in a hierarchy so you can navigate to the value you need to include in the request. © 2019 FireEye 279 Central Management Administration Guide CHAPTER 16: SNMP Data This section contains the following topics: l Providing Access to SNMP Data below l Downloading the MIB below l Sending Requests for SNMP Information on page 282 Providing Access to SNMP Data To allow access to SNMP v3 data, configure a username and password. Prerequisites l Operator or Admin access To enable access to SNMP data: 1. Go to CLI configuration mode: hostname > enable hostname # configure terminal 2. Verify that SNMP is enabled: hostname (config) # show snmp If the output shows SNMP enabled: no, enter the snmp-server enable command. 3. SNMP v3: Specify the SNMP user and password: hostname (config) # snmp-server user <username> v3 enable hostname (config) # snmp-server user <username> v3 auth sha <password> 4. Save your changes: hostname (config) # write memory Downloading the MIB You can download the MIB from the Web UI or from the command prompt. Prerequisites l Analyst, Operator, or Admin access Downloading the MIB Using the Web UI Use the Notification Settings page to download the MIB. 280 © 2019 FireEye Release 8.7 Retrieving SNMP Data To download the MIB: 1. Click the Settings tab. 2. Click Notifications on the sidebar. 3. Click the SNMP tab. 4. In the Define protocol settings section, click Download. Downloading the MIB Using the Command Prompt This section describes how to download the FE-FIREEYE-MIB to SNMP managers that run on Microsoft Windows, Linux, and Apple devices. The MIB file is retrieved using a program that connects using port 22, which is normally used for protocols such as SSH, SCP, and PSCP. Because file-level access is denied by policy, the direct path to the MIB file needs to be specified. To download the FireEye MIB to Windows devices: 1. Download the pscp.exe tool (available from PuTTY download page). 2. Navigate to a command prompt window. 3. Change to the directory in which you downloaded the pscp.exe tool: cd Downloads 4. Copy the MIB file from the appliance: pscp.exe -r -scp admin@<appliance><applianceIPAddress>:/usr/share/snmp/mibs \Temp\mibs\ 5. When prompted for the password, enter admin. The files are copied to the \Temp\mibs directory on the Windows device. 6. Change to the mibs directory: cd C:\Temp\mib © 2019 FireEye 281 Central Management Administration Guide CHAPTER 16: SNMP Data 7. Load the MIB into an SNMP browser or tool, or open the MIB file: vi FE-FIREEYE-MIB.txt To download the FireEye MIB to Linux devices: 1. Copy the MIB file from the appliance using the OpenSSH client: scp -r admin@<appliance><applianceIPAddress>:/usr/share/snmp/mibs /usr/<userDirectoryName> 2. When prompted for the password, type admin. The files are copied to the mibs directory that resides in the /usr/<userDirectoryName> directory. 3. Change to the mibs directory: cd mibs 4. Load the MIB into an SNMP browser or tool, or open the MIB file: vi FE-FIREEYE-MIB.txt To download the FireEye MIB to Apple devices: 1. Navigate to the terminal emulator. 2. Copy the MIB files from the appliance: scp -r admin@<applianceIPAddress>:/usr/share/snmp/mibs ~/ 3. When prompted for the password, type admin. The files are copied to the mibs directory that resides in the user directory. 4. Load the MIB into an SNMP browser or tool, or open the MIB file: vi FE-FIREEYE-MIB.txt Sending Requests for SNMP Information This topic describes two ways to retrieve SNMP information. l l The snmpget command retrieves the value of a specific object. The snmpwalk command walks through the object hierarchy, automatically retrieving the values of objects for the subtree or node that you specified. Examples of basic commands that retrieve SNMP data follow. The commands are entered from the SNMP manager application. The IP address in the commands is the appliance IP address. SNMP v3 commands: snmpmgr # snmpget -m +FE-FIREEYE-MIB -v 3 -u myname -a MD5 -A mypassword -l authNoPriv 172.0.0.0 feTemperatureValue.0 snmpmgr # snmpwalk -m +FE-FIREEYE-MIB -v 3 -u myname -a MD5 -A mypassword -l authNoPriv 172.0.0.0 enterprises.25597 282 © 2019 FireEye Release 8.7 Sending Traps SNMP v2c commands: snmpmgr # snmpget -m +FE-FIREEYE-MIB -v 2c -c public 172.0.0.0 feSupportLicenseActive.0 snmpmgr # snmpwalk -m +FE-FIREEYE-MIB -v 2c -c public 172.0.0.0 fireeye snmpmgr # snmpwalk -v 2c -c public 172.0.0.0 enterprises.25597 To retrieve license expiration dates formatted in a table, use a command similar to the following (different commands are required by different SNMP manager applications): snmpmgr # snmptable -c public -Of -v 2c localhost feLicenseFeatureTable Check the number of days in the rightmost column. If the value is less than 30, contact your system administrator. Sending Traps This section describes how to configure basic SNMP support on the CM appliance, enable and configure traps, and set up trap logging. For detailed information about SNMP commands and options for more advanced configurations, see the CLI Command Reference. Enabling and Configuring Traps Various events can trigger the appliance to send traps to the SNMP manager. Most of the events are enabled by default. This topic describes how to enable the appliance to send traps, configure the IP address of the SNMP manager that receives the traps, and disable and enable individual events. Prerequisites l Operator or Admin access To enable traps and events: 1. Go to CLI configuration mode: hostname > enable hostname # configure terminal 2. SNMP is enabled by default. Verify that it is enabled: hostname (config) # show snmp If the output shows SNMP enabled: no, enter the snmp-server enable command. 3. Enable the appliance to send notifications to the SNMP manager: hostname (config) # snmp-server enable notify © 2019 FireEye 283 Central Management Administration Guide CHAPTER 16: SNMP Data 4. Specify the IPv4 or IPv6 address of the SNMP manager: hostname (config) # snmp-server host <IPv4 or IPv6 address> traps public 5. Save your changes hostname (config) # write memory To view the events that can be enabled or are currently enabled: 1. Go to CLI configuration mode: hostname > enable hostname # configure terminal 2. View a list of all events that can be enabled: hostname (config) # snmp-server notify event ? 3. View the events that are currently enabled: hostname (config) # show snmp events To disable or enable specific events: 1. Go to CLI configuration mode: hostname > enable hostname # configure terminal 2. Disable an event: hostname (config) # no snmp-server notify event <event> For example, the following command stops a trap from being sent when the temperature of the appliance is normal: hostname (config) # no snmp-server notify event normal-temperature 3. Enable an event: hostname (config) # snmp-server notify event <event> For example, the following command enables the appliance to send a trap when there is a change in an interface link: hostname (config) # snmp-server notify event if-link-change 1. Save your changes: 4. hostname (config) # write memory Logging Trap Messages The snmptrapd service receives and logs trap messages. 284 © 2019 FireEye Release 8.7 Sending Traps To set up trap logging: 1. Log into the SNMP manager application. 2. Enable the snmptrapd service: snmptrapd 3. Specify the log location: /var/log/snmptrapd.log © 2019 FireEye 285 Central Management Administration Guide 286 CHAPTER 16: SNMP Data © 2019 FireEye Central Management Administration Guide About Login Banners and Messages CHAPTER 17: Login Banners and Messages This section covers the following information: l About Login Banners and Messages below l Customizing Login Banners and Messages Using the Web UI on page 289 l Customizing Login Banners and Messages Using the CLI on page 290 About Login Banners and Messages You can customize or remove the messages that appear when users log in to the CM appliance. You can configure three messages: l Remote Banner—Shown on the Web UI login page and SSH login page. l Local Banner—Shown after the username is entered in the CLI session. l Message of the Day—Shown after the user is authenticated and logged into the appliance CLI. The default remote banner is shown in the following illustration. © 2019 FireEye 287 Central Management Administration Guide CHAPTER 17: Login Banners and Messages The default local banner and message of the day are shown in the following illustration. 288 © 2019 FireEye Release 8.7 Customizing Login Banners and Messages Using the Web UI Customizing Login Banners and Messages Using the Web UI Use the Login Banner page to configure the messages users see when they log in to the CM appliance. Prerequisites l Operator or Admin access To configure login messages: 1. Click the Settings tab. 2. Click Login Banner on the sidebar. 3. In the Remote Banner Text box, clear any existing text, and then enter the message to be displayed in the Web UI and SSH login pages. You can enter up to 2000 characters. IMPORTANT! If you change the banner text later with the banner login CLI command, the new text will also appear in the Web UI login page and SSH login page, overwriting the text you specify here. 4. In the Local Banner Text box, clear any existing text, and then enter the message to be displayed in the CLI after the username is entered. You can enter up to 2000 characters. © 2019 FireEye 289 Central Management Administration Guide CHAPTER 17: Login Banners and Messages 5. In the Message of the Day Text box, clear any existing text, and then enter the message to be displayed in the CLI after the user is authenticated. You can enter up to 2000 characters. 6. Click Update. The messages will appear the next time the user logs in. Customizing Login Banners and Messages Using the CLI Use the CLI commands in this topic to configure the messages users see when they log in to the appliance. l The login message is shown after the username is entered. l The local login message is shown in the CLI login after the username is entered. l The remote login message is shown in the SSH login page. l The message of the day is shown after the password is entered and the user is authenticated. NOTE: Messages can be longer than one line. To add a new line, type >. Each message can contain up to 2000 characters. Prerequisites l Operator or Admin access To customize the messages: 1. Go to CLI configuration mode: hostname > enable hostname # configure terminal 2. Display the current banner text: hostname (config) # show banner 290 © 2019 FireEye Release 8.7 Customizing Login Banners and Messages Using the CLI 3. Perform the following tasks as needed. l To configure the same message for the local login message (that appears in the CLI login) and the remote login message (that appears in the Web UI login page and SSH login page), use the following command: hostname (config) # banner login "<text>" IMPORTANT! The login message you configure using the banner login "<text>" command also overwrites the remote message that is displayed on the Web UI login page and SSH login page. Use the Customizing Login Banners and Messages Using the Web UI on page 289 to specify a unique Web UI and SSH login message. l To change the local login message only, use the following command: hostname (config) # banner login-local "<text>" l To change the remote login message only, use the following command: hostname (config) # banner login-remote "<text>" l To change the message of the day, use the following command: hostname (config) # banner motd "<text>" l To clear the local login message, the remote login message, or both: hostname (config) # banner login "" hostname (config) # banner login-local "" hostname (config) # banner login-remote "" l To clear the message of the day: hostname (config) # banner motd "" l To restore the default messages: hostname (config) # no banner login hostname (config) # no banner motd 4. Save your changes. hostname (config) # write memory Examples The following example changes the message of the day. hostname (config) # banner motd “There are no maintenance activities scheduled for this week.” The following example changes the local and remote login messages: hostname (config) # banner login "This FireEye appliance is the property of Acme, Inc. > >Unauthorized access is prohibited and is punishable by law." © 2019 FireEye 291 Central Management Administration Guide CHAPTER 17: Login Banners and Messages The following example shows the current messages. hostname # show banner Banners: Message of the Day (MOTD): There are no maintenance activities scheduled for this week. Login: This FireEye appliance is the property of Acme, Inc. Unauthorized access is prohibited and is punishable by law. The following example shows the default messages: hostname # show banner Banners: Message of the Day (MOTD): FireEye Command Line Interface Local login: This system is for the use of authorized users only. > >Individuals using this computer system without authority, or in excess of their authority, are subject to having all of their activities on this system monitored and recorded by system personnel. Network login: This system is for the use of authorized users only. > >Individuals using this computer system without authority, or in excess of their authority, are subject to having all of their activities on this system monitored and recorded by system personnel. 292 © 2019 FireEye Central Management Administration Guide Viewing Supported Features Using the Web UI CHAPTER 18: Supported Features The Web UI Features page shows tiles for the features available for this appliance. Tiles for enabled features are marked with a checkmark and are outlined in green. Features introduced in the release of Central Management that you are viewing are labeled New. Prerequisites l Admin, Operator, Monitor, or Analyst access Viewing Supported Features Using the Web UI Use the Supported Features page to view the features available for an appliance. To view the supported features: 1. Click the Features tab or click About > Supported Features. 2. To filter by category, select one of the following from the selection box on the top left of the page: l Detection l Integration l Management 3. Click Enabled or Disabled to filter by enabled or disabled features. 4. Click New Features Only to view only new features. 5. Click i in a tile to view information about the feature, including the version in which it was released, the category of security it provides, and any additional requirements. © 2019 FireEye 293 Central Management Administration Guide 294 CHAPTER 18: Supported Features © 2019 FireEye Central Management Administration Guide Configuring Event Notifications Using the Web UI CHAPTER 19: Event Notifications As described in Managing the Distribution of Alert Notifications on page 421, you can configure alert notifications for the Central Management appliances, for managed appliances, or both. You can send a test-fire notification from the Central Management appliance or from managed appliances. There are the following differences: l l l l A test-fire notification sent from a managed appliance contains more information than one sent from the Central Management appliance. Notifications sent from the Central Management appliance do not appear in the Central Management database or Web UI. Notifications sent from a managed appliance do appear in the appliance database and Web UI; if they are aggregated up to the Central Management appliance, they also appear in the Central Management database and Web UI. After notifications are aggregated up to the Central Management appliance, another notification is sent from the Central Management appliance. NOTE: This section describes how to configure event (alert) notifications. See System Email Settings on page 163 for information about system email notifications. Configuring Event Notifications Using the Web UI Prerequisites l The appliance must have an established connection to the Internet. l Operator or Admin access. © 2019 FireEye 295 Central Management Administration Guide CHAPTER 19: Event Notifications Configuring Event Notifications Use the Notification Settings page to configure event notifications. To configure event notifications: 1. Click the Settings tab. 2. Click the Notifications on the side bar. The Summary tab opens. 3. In the Global column of the matrix, select the event types for which you want notifications. Selections in this column ensure notifications are sent for these event types. This selection does not affect the display of events in the Web UI. 4. In the Global row of the matrix, select the appropriate protocol for all events. Alternatively, select the appropriate protocol for each event type, in the appropriate event type row. 5. To configure a protocol, click the applicable column heading: o Configuring Email Notifications Using the Web UI on page 299 o Configuring HTTP Notifications Using the Web UI on page 301 o Configuring Rsyslog Notifications Using the Web UI on page 305 o Configuring SNMP Notifications Using the Web UI on page 309 6. Click Send Test Message to send a test notification to verify your settings for all enabled protocols. Recipients are specified in the Email Settings page; see Configuring Email Recipients on page 169. NOTE: Test-fire events generated for malware object event notifications disappear from the Alerts tab within five minutes. 296 © 2019 FireEye Release 8.7 Configuring Event Notifications Using the Web UI 7. To turn off daily digest notifications for all enabled protocols, clear the Daily digest at checkbox. To turn on daily digest notifications, select the checkbox. NOTE: FireEye recommends using Per Event notifications instead of Daily Digest notifications. 8. To change the time for the daily notification, specify the hour and minutes in the drop-down list boxes. 9. To apply your notification settings, click Update Digest. CSV Fields for Daily Digest Notifications The following table describes the fields included in the daily digest notifications for all protocols. Field Description alertType Type of alert. alertid FireEye internal alert ID (which is external for ArcSight). product Name of FireEye product. release FireEye software release. fileHash Checksum of the malware object from a managed FireEye appliance MVX engine. dvchost Hostname of a FireEye appliance performing the detection and sending the notification. sname FireEye-assigned signature name. dvc Device address of the detecting FireEye appliance MVX engine. locations Geographical location of the botnet CnC server, if known. malware_ type Type of malware. sev Severity level of the event. Range: 0 through 10. The highest event severity level is 10. occurred Time that the malware event occurred as detected by a managed FireEye appliance MVX engine. mwurl URL that triggered the malware event. © 2019 FireEye 297 Central Management Administration Guide Field CHAPTER 19: Event Notifications Description link URL of the infection or alert that is local to the detecting appliance. src IP address of the infected host. action Type of action (notified or blocked) that was taken by the managed FireEye appliance MVX engine. objurl Detailed information about the detected malware URL. sid FireEye internal alert signature ID that is assigned for malware detection. stype FireEye-assigned signature type that is used for malware detection. profile Guest image profile and version that is used for malware detection. malwarenote Notes about the malware. application Name of the target application that is running on the MVX engine during malware detection. 298 original_ name Original file name of the malware. header Protocol header. anomaly Attributes of operating system (OS) changes made by the malware, data theft, or miscellaneous anomaly. osinfo Information about the OS name and version. cnchost Hostname of the command and control (CnC) server, if known. This field will display the IP address if the managed appliance cannot determine the hostname. channel CnC channel. cncport Port number of the CnC listening server. os Application name of the target OS. app Name of the target application that is running on the MVX engine during malware detection. shost Hostname of the infected machine as detected by a managed FireEye appliance MVX engine, if available. © 2019 FireEye Release 8.7 Configuring Event Notifications Using the Web UI Field Description spt Source port number of the infected host as detected by a managed FireEye appliance MVX engine. smac Source MAC address of the infected host. dst IP address of the destination when any communication to an external host is observed within the MVX engine. dmac MAC address of the destination when any communication to an external host is observed within the MVX engine. dpt Port number of the destination when any communication to an external host is observed within the MVX engine. Configuring Email Notifications Using the Web UI Use the Notification Settings page to select who is sent email notifications when the specified events are detected. Prerequisites l The appliance must have an established connection to the Internet. l Operator or Admin access Configuring SMTP Settings Use the Define protocols section on the SMTP tab of the Notification Settings page to configure SMTP settings. © 2019 FireEye 299 Central Management Administration Guide CHAPTER 19: Event Notifications To configure the SMTP server: 1. Click the Settings tab. 2. Click Notifications on the side bar. 3. Click the SMTP tab. 4. Locate the Define protocol settings section. 5. Enter the domain that is used for email in the Domain field. 6. Enter the SMTP server that is used for mail delivery in the SMTP Server field. 7. Enter the SMTP server port that is used for mail delivery in the SMTP Server Port field. 8. (Optional) Select the Return hostname checkbox to use the local domain name. Clear this checkbox to use the value in the Return username box and the value in the Domain box. 9. Enter the user who is specified as the “from” user in the Return username box. 10. Verify that the value in the Return address box is correct. If it is not, change the values in the Domain box and Return username boxes. 11. Select XML, JSON, or Text as the default format and select which level of detail is provided in the Default format drop-down list box: o Normal—This format contains detailed information and abstracts, such as alert type, ID, source IP, malware name, hostname, and alert URL without redundant information. o Concise—This format contains basic information, such as alert type, ID, source IP, malware name, hostname, and alert URL. o Extended—This format contains detailed information and abstracts, including data-theft information (if any) and static-analysis details. This format provides all details about files and objects modified during analysis. 12. Select whether to send the notification as an inline message or an attachment in the Default send as drop-down list box. 13. Select the delivery frequency in the Default delivery drop-down list box: o Per Event (Recommended)—Send a notification each time an event of this type occurs. o Daily Digest—Send a daily notification of specified events detected in the past 24 hours. 14. Click Apply Settings. NOTE: If you do not click Apply Settings, your changes are lost. 300 © 2019 FireEye Release 8.7 Configuring Event Notifications Using the Web UI Setting Up the SMTP Recipients Use the View and add SMTP Recipients section of the Notification Settings page to add and configure SMTP recipients for email notifications. To add an SMTP recipient: 1. Select Notifications on the side bar. 2. Enter the email address to receive the notification in the Email Address box. For example, name@company.com 3. Select the Enabled checkbox to enable the recipient to receive email notifications. To update the SMTP recipient listing: 1. Select Notifications on the side bar. 2. Click the SMTP tab. 3. Click the recipient in the Name column. 4. Click the icon in the Edit column. 5. Make changes as needed. 6. Click Update Recipient. Configuring HTTP Notifications Using the Web UI Use the Notification Settings page to post HTTP notifications to one or more Web servers. Prerequisites l The appliance must have an established connection to the Internet. l Operator or Admin access. © 2019 FireEye 301 Central Management Administration Guide CHAPTER 19: Event Notifications Configuring HTTP Settings Use the Define protocol settings section on the HTTP tab of the Notification Settings page to configure default settings for HTTP notifications. To configure HTTP settings: 1. Click the Settings tab. 2. Select Notifications on the side bar. 3. Click the HTTP tab. 4. Select the delivery frequency in the Default delivery drop-down list box: o Daily Digest—Send a daily notification of specified events detected in the past 24 hours in the selected format and level of details (default is Concise). o Per Event (recommended)—Send a notification each time an event of this type occurs. 5. Select a service provider in the Default provider drop-down list box. The default service provider is Generic. NOTE: FireEye recommends using the Generic service provider. 6. Select XML, JSON, or Text as the default format and select which level of detail is provided in the Default format drop-down list box: o l l 302 Normal—This format contains detailed information and abstracts, such as alert type, ID, source IP, malware name, hostname, and alert URL without redundant information Concise—This format contains basic information, such as alert type, ID, source IP, malware name, hostname, and alert URL. Extended—This format contains detailed information and abstracts, including data-theft information (if any) and static-analysis details. This format provides all details about files and objects modified during analysis. © 2019 FireEye Release 8.7 Configuring Event Notifications Using the Web UI 7. To apply the HTTP settings, click Apply Settings. NOTE: If you do not click Apply Settings, your changes are lost. Setting Up HTTP Servers Use the View and add HTTP Servers section on the HTTP tab of the Notification Settings page to add and configure HTTP servers. To add an HTTP server: 1. Click the Settings tab. 2. Click Notifications on the side bar. 3. Click the HTTP tab and locate the View and add HTTP Servers section. 4. Click Add HTTP Server. The Add New HTTP Server dialog box opens. 5. Enter the name of the HTTP server that will post the notification (for example, NX7400 or HX4500) in the Server name box NOTE: Do not enter URLs and email addresses in the Server name box. 6. Select the Enabled checkbox to choose which servers will post HTTP notifications. 7. Enter the URL of the server to post the HTTP notification in the Server Url box. 8. Leave the User box blank. This option will be deprecated. 9. Select the Alerts Update Notification checkbox to choose which servers will post HTTP notifications when ATI alert updates are detected. 10. (Optional) If authentication is required for the server, select the Auth checkbox. If you checked the Auth checkbox, you must also enter a username and password. l Enter the user name for HTTP authentication in the Username box. l Enter the password for HTTP authentication in the Password box. 11. (Optional) If you want to use SSL for notifications, select the SSL Enable checkbox and SSL Verify checkboxes. © 2019 FireEye 303 Central Management Administration Guide CHAPTER 19: Event Notifications 12. Select the event type or All Events in the Events Notification drop-down list box to post HTTP notifications when the specified events are detected. NOTE: Selections on the Summary tab take precedence over your selection here. For example, if you globally disable an event type on the Summary tab, no alert notifications will be sent for that event type, regardless of your selection in this drop-down list box. 13. Select the delivery frequency in the Delivery drop-down list box: o Per Event (recommended)—Send a notification each time an event of this type occurs. o Default—Use the delivery frequency specified in the Default delivery box in the HTTP Settings area. o Daily Digest—Send a daily notification of specified events detected in the past 24 hours in the selected format and level of details (default is Concise). 14. Select a service provider in the Default provider drop-down list box. The default service provider is Generic. NOTE: FireEye recommends using the generic service provider. 15. Select XML, JSON, or Text as the notification format and select which level of detail is provided in the Message Format drop-down list box. Select Default to use the format specified in the Default format box in the HTTP Settings area. o Normal—This format contains detailed information and abstracts, such as alert type, ID, source IP, malware name, hostname, and alert URL without redundant information. o Concise—This format contains basic information, such as alert type, ID, source IP, malware name, hostname, and alert URL. o Extended—This format contains detailed information and abstracts, including data-theft information (if any) and static-analysis details. This format provides all details about files and objects modified during analysis. 16. Click Add New HTTP Server. To modify the HTTP server listing: 1. Click the Settings tab. 2. Click Notifications on the side bar. 3. Click the HTTP tab and locate the View and add HTTP Servers section. 4. Click the server in the Name column in the View and add HTTP Servers section. 5. Click the icon in the Edit column. 304 © 2019 FireEye Release 8.7 Configuring Event Notifications Using the Web UI 6. Update the settings as needed. 7. Click Update HTTP Server. To enable or disable an HTTP server: 1. Click the Settings tab. 2. Click Notifications on the side bar. 3. Click the HTTP tab and locate the View and add HTTP Servers section. 4. Select the checkbox next to the server. 5. Click Enable or Disable. 6. Click Yes to confirm the action. To remove an HTTP server: 1. Click the Settings tab. 2. Click Notifications on the side bar. 3. Click the HTTP tab and locate the View and add HTTP Servers section. 4. Select the checkbox next to the server. 5. Click Remove. 6. Click Yes to confirm the action. Configuring Rsyslog Notifications Using the Web UI Use the Notification Settings page to send notifications to one or more remote syslog servers. Prerequisites l l The Central Management appliance must have an established connection to the Internet. Operator or Admin access Configuring Rsyslog Settings Use the Define protocol settings section on the RSYSLOG tab of the Notification Settings page to configure default settings for rsyslog notifications. © 2019 FireEye 305 Central Management Administration Guide CHAPTER 19: Event Notifications To configure rsyslog settings: 1. Click the Settings tab. 2. Select Notifications on the side bar. 3. Click the RSYSLOG tab. 4. Select Common Event Format (CEF), Log Event Enhanced Format (LEEF), CommaSeparated Values (CSV), XML, JSON, or Text as the default format and select which level of detail (only for XML, JSON, or text) is provided in the Default format drop-down list box: o Normal—This format contains detailed information and abstracts, such as alert type, ID, source IP, malware name, hostname, and alert URL without redundant information. o Concise—This format contains basic information, such as alert type, ID, source IP, malware name, hostname, and alert URL. o Extended—This format contains detailed information and abstracts, including data-theft information (if any) and static-analysis details. This format provides all details about files and objects modified during analysis. 5. Per event is selected in the Default delivery drop-down list box. This sends a notification each time an event of this type occurs. 6. Select the severity classification for the rsyslog notification in the Default send as box: 306 o Alert—Action must be taken immediately (severity 1). o Critical—Critical conditions (severity 2). o Debug—Debug-level messages (severity 7). o Emergency—Emergency: system is unusable (severity 0). o Error—Error conditions (severity 3). o Informational—Informational messages (severity 6). o Notice—Normal but significant conditions (severity 5). o Warning—Warning conditions (severity 4). © 2019 FireEye Release 8.7 Configuring Event Notifications Using the Web UI 7. Click Apply Settings. NOTE: If you do not click Apply Settings, your changes are lost. Setting Up Rsyslog Servers Use the View and add Rsyslog Servers section on the RSYSLOG tab of the Notification Settings page to add and configure rsyslog servers. To add an rsyslog server: 1. Click the Settings tab. 2. Click Notifications on the side bar. 3. Click the RSYSLOG tab. 4. Click Add Rsyslog Server. The Add New Rsyslog Server dialog box opens. 5. Enter the name of the rsyslog server to receive the notifications (for example, NX7400) in the Server Name box. 6. Enter the IP address of the rsyslog server in the IP Address box. 7. Select the Enabled checkbox to choose which servers will receive rsyslog notifications. 8. Select the delivery frequency in the Delivery drop-down list box: o Default—Use the delivery frequency specified in the Default delivery box in the Rsyslog Settings area. o Per Event—Send a notification each time a malware object is detected. 9. Select the event type or All Events in the Notification drop-down list box to send rsyslog notifications when the specified events are detected. © 2019 FireEye 307 Central Management Administration Guide CHAPTER 19: Event Notifications 10. Select CEF, LEEF, CSV, XML, JSON, or Text as the default format and select which level of detail (only for XML, JSON, or text) is provided in the Format drop-down list box. Select Default to use the format specified in the Default format box in the Rsyslog Settings section. o Normal—This format contains detailed information and abstracts, such as alert type, ID, source IP, malware name, hostname, and alert URL without redundant information. o Concise—This format contains basic information, such as alert type, ID, source IP, malware name, hostname, and alert URL. o Extended—This format contains detailed information and abstracts, including data-theft information (if any) and static-analysis details. This format provides all details about files and objects modified during analysis. 11. Select the severity classification for the rsyslog notification in the Send as box: o Default—Use the value specified in the Default send as field in the Rsyslog Settings area. o Alert—Action must be taken immediately (severity 1). o Critical—Critical conditions (severity 2). o Debug—Debug-level messages (severity 7). o Emergency—Emergency: system is unusable (severity 0). o Error—Error conditions (severity 3). o Informational—Informational messages (severity 6). o Notice—Normal but significant conditions (severity 5). o Warning—Warning conditions (severity 4). 12. Select UDP or TCP in the Protocol drop-down list box. 13. Click Add new Rsyslog Server. To update the rsyslog servers: 1. Click the Settings tab. 2. Select Notifications on the side bar. 3. Click the RSYSLOG tab. 4. Click the server in the Name column of the View and add Rsyslog Servers section. 5. Click the icon in the Edit column. 6. Update settings as needed. 7. Click Update Rsyslog Server. 308 © 2019 FireEye Release 8.7 Configuring Event Notifications Using the Web UI To enable or disable an rsyslog server: 1. Click the Settings tab. 2. Select Notifications on the side bar. 3. Click the RSYSLOG tab. 4. Select the checkbox for the server. 5. Click Enable or Disable. 6. Click Yes to confirm the action. To remove an rsyslog server: 1. Click the Settings tab. 2. Select Notifications on the side bar. 3. Click the RSYSLOG tab. 4. Select the checkbox for the server. 5. Click Remove. 6. Click Yes to confirm the action. Configuring SNMP Notifications Using the Web UI NOTE: The following topics pertain to malware alert events. For information about SNMP notifications that pertain to system events such as low disk space, see SNMP Data on page 279. Use the Notification Settings page to send notifications to one or more Simple Network Management Protocol (SNMP) servers. Prerequisites l l The Central Management appliance must have an established connection to the Internet. Operator or Admin access. Configuring SNMP Settings Use the Define protocols section on the SNMP tab of the Notification Settings page to configure default SNMP settings. © 2019 FireEye 309 Central Management Administration Guide CHAPTER 19: Event Notifications To configure SNMP notifications: 1. Click Settings > CM Settings. 2. Click Notifications on the side bar. 3. Click the SNMP tab. 4. Locate the Define protocols settings section. 5. Per event is selected in the Default delivery drop-down list box. This sends a notification each time an event of this type occurs. 6. Select the SNMP version (1 or 2c) to use for the notification in the Version dropdown list box. 7. If you need the MIB file, click Download. 8. Click Apply Settings. NOTE: If you do not click Apply Settings, your changes are lost. Setting Up SNMP Servers Use the SNMP Trap Sink Listing section on the SNMP tab of the Notification Settings page to add and configure SNMP servers. To add an SNMP server: 1. Click Settings. 2. Click Notifications on the side bar. 3. Click the SNMP tab. 310 © 2019 FireEye Release 8.7 Configuring Event Notifications Using the CLI 4. Click Add SNMP Trap Sink. The Add new SNMP trap sink dialog box opens. 5. Enter the name of the SNMP server to receive the notifications in the Trap sink name box and click Add New SNMP Trap Sink. 6. Enter the IP address of the SNMP server in the IP Address box. 7. Enter the SNMP community string in the Community box. 8. Select the Enabled checkbox to enable the server to receive SNMP notifications. 9. Select the delivery frequency in the Delivery drop-down list box. o Default—Use the delivery frequency specified in the Default delivery box in the SNMP Settings area. o Per Event (recommended)—Send a notification each time an event of this type occurs. 10. Select the event type or All Events in the Notification drop-down list box to send SNMP notifications when the specified events are detected. 11. Select the SNMP version (1 or 2c) to use for the notification in the Version dropdown list box. Select Default to use the version specified in the Define protocol settings section. 12. Click Add New SNMP Trap Sink. To update SNMP server settings: 1. Click Settings. 2. Click Notifications on the side bar. 3. Click the SNMP tab. 4. Click the server in the Name column. 5. Click the icon in the Edit column. 6. Update settings as needed. 7. Click Update SNMP Trap Sink. Configuring Event Notifications Using the CLI Prerequisites l The appliance must have an established connection to the Internet. l Operator or Admin access. © 2019 FireEye 311 Central Management Administration Guide CHAPTER 19: Event Notifications Configuring Event Notifications Use the CLI commands in this topic to configure event notifications. To configure event notifications using the CLI: 1. Go to CLI configuration mode. hostname > enable hostname # configure terminal 2. Check which protocols are already enabled: hostname hostname hostname hostname (config) (config) (config) (config) # # # # show show show show fenotify fenotify fenotify fenotify email http rsyslog snmp 3. Configure the protocols that you want to use: o Configuring Email Notifications Using the CLI on the facing page o Configuring HTTP Notifications Using the CLI on page 321 o Configuring Rsyslog Notifications Using the CLI on page 328 o Configuring SNMP Notifications Using the CLI on page 335 4. Confirm that the protocols are configured correctly: hostname hostname hostname hostname (config) (config) (config) (config) # # # # show show show show fenotify fenotify fenotify fenotify email http rsyslog snmp 5. Enable the notifications. By default, notifications are enabled. This command only affects notifications for enabled protocols. If a protocol has been disabled, you must enable the protocol before enabling notifications. hostname (config) # fenotify enable 6. Select the event type: hostname hostname hostname hostname hostname hostname (config) (config) (config) (config) (config) (config) # # # # # # fenotify fenotify fenotify fenotify fenotify fenotify alert alert alert alert alert alert domain-match infection-match ips-event malware-callback malware-object web-infection 7. Send a test email message to all enabled recipients: hostname (config) # fenotify email send-test NOTE: Test-fire events generated for event notifications disappear from the Alerts tab within five minutes. 8. Save the configuration: hostname (config) # write memory 312 © 2019 FireEye Release 8.7 Configuring Event Notifications Using the CLI Configuring Email Notifications Using the CLI Use the CLI commands in this section to select who is notified by email when malware objects are detected. Prerequisites l The appliance must have an established connection to the Internet. l Operator or Admin access to the Central Management platform. NOTE: If email notifications are not being received, check that the following items are specified: l l l l Mail port used to send the email notifications (fenotify email mailhub port <port-number>) Mail relay address used to send the email notifications (fenotify email mailhub address <ip_address>) Email notification recipient (fenotify email recipient <rname>) Recipient address used to send the email notifications (fenotify email recipient <rname> email-address <email_address>) Configuring SMTP Settings To configure the SMTP settings, perform the following subtasks: l Specify the SMTP server. l Set the default SMTP notification settings. l (Optional) Set authentication for SMTP notification settings. l (Optional) Set preferences for SMTP notifications. To specify which SMTP server to use: 1. Go to CLI configuration mode: hostname > enable hostname # configure terminal 2. Enable email notifications: hostname (config) # fenotify email enable 3. Set the mail relay address used to send the email notifications: hostname (config) # fenotify email mailhub address <ip_address> 4. Set the mail port used to send the email notifications: hostname (config) # fenotify email mailhub port <port-number> © 2019 FireEye 313 Central Management Administration Guide CHAPTER 19: Event Notifications 5. Save the configuration: hostname (config) # write memory To configure the default settings for SMTP notifications: 1. Go to CLI configuration mode: hostname > enable hostname # configure terminal 2. Enable email notifications: hostname (config) # fenotify email enable 3. Set the domain from which emails appear to come: hostname (config) # fenotify email domain <email-domain> 4. (Optional) To include the hostname in the return address for email notifications: hostname (config) # fenotify email return host-name <host_name> 5. Set the user name in the return address for email notifications (the default is donot-reply): hostname (config) # fenotify email return user-name <user_name> 314 © 2019 FireEye Release 8.7 Configuring Event Notifications Using the CLI 6. Select one of the XML, JavaScript Object Notation (JSON), or Text options for the default format of the notification: The json_legacy-concise, json_legacy-extended, and json_legacy-normal formats are deprecated. o To send notifications in XML Concise format containing basic information such as alert type, ID, source IP, malware name, hostname, and alert URL, enter: hostname (config) # fenotify email default format xml-concise o To send notifications in XML Extended format containing detailed information and abstracts including data-theft information (if any) and staticanalysis details (XML Extended provides all details about files and objects modified during analysis.), enter: hostname (config) # fenotify email default format xml-extended o To send notifications in XML Normal format containing detailed information and abstracts such as alert type, ID, source IP, malware name, hostname, and alert URL without any redundant information, enter: hostname (config) # fenotify email default format xml-normal o To send notifications in JSON Concise format containing basic information such as alert type, ID, source IP, malware name, hostname, and alert URL, enter: hostname (config) # fenotify email default format json-concise o To send notifications in JSON Extended format containing detailed information and abstracts including data-theft information (if any) and staticanalysis details (JSON Extended provides all details about files and objects modified during analysis.), enter: hostname (config) # fenotify email default format json-extended o To send notifications in JSON Normal format containing detailed information and abstracts such as alert type, ID, source IP, malware name, hostname, and alert URL without any redundant information, enter: hostname (config) # fenotify email default format json-normal o To send notifications in Text Concise format containing basic information such as alert type, ID, source IP, malware name, hostname, and alert URL, enter: hostname (config) # fenotify email default format text-concise o To send notifications in Text Extended format containing detailed information and abstracts including data-theft information (if any) and staticanalysis details (Text Extended provides all details about files and objects modified during analysis.), enter: hostname (config) # fenotify email default format text-extended © 2019 FireEye 315 Central Management Administration Guide o CHAPTER 19: Event Notifications To send notifications in Text Normal format containing detailed information and abstracts such as alert type, ID, source IP, malware name, hostname, and alert URL without any redundant information, enter: hostname (config) # fenotify email default format text-normal 7. Specify how the notification is delivered by default: o To deliver the notification as an email attachment, enter: hostname (config) # fenotify email default send-as attachment o To deliver the notification in the email body (the default), enter: hostname (config) # fenotify email default send-as in-line 8. Specify the default delivery schedule for email notifications: FireEye recommends using per-event notifications. o To receive information about all events detected in the past 24 hours, enter: hostname (config) # fenotify email default delivery daily-digest o To receive a daily notification for each entity that was the source of the event, enter: hostname (config) # fenotify email default delivery daily-persource o To receive an hourly notification for each entity that was the source of the event, enter: hostname (config) # fenotify email default delivery hourly-persource o To receive a notification every minute for each entity that was the source of the event, enter: hostname (config) # fenotify email default delivery per-1min-persource o To receive a notification every 5 minutes for each entity that was the source of the event, enter: hostname (config) # fenotify email default delivery per-5min-persource o To receive information about each event, sent when the event is triggered, enter: hostname (config) # fenotify email default delivery per-event 9. Save the configuration: hostname (config) # write memory To configure authentication for SMTP notifications: 1. Go to CLI configuration mode: hostname > enable hostname # configure terminal 2. Enable email notifications: hostname (config) # fenotify email enable 3. Enable authentication for event mail notifications: 316 © 2019 FireEye Release 8.7 Configuring Event Notifications Using the CLI hostname (config) # fenotify email mailhub auth enable 4. Set the authentication method you want to use to send event mail notifications. Available methods include LOGIN or CRAM-MD5. hostname (config) # fenotify email mailhub auth auth-method <authmethod> 5. Set the username required to authenticate sending event email notifications: hostname (config) # fenotify email mailhub username <username> 6. Set the password required to authenticate sending event email notifications: hostname (config) # fenotify email mailhub password <password> To configure preferences for SMTP notifications: 1. Go to CLI configuration mode: hostname > enable hostname # configure terminal 2. Enable email notifications: hostname (config) # fenotify email enable 3. Enable From: line override for event mail notifications: hostname (config) # fenotify email mailhub preferences from-lineoverride enable 4. Set the minimum SSL protocol version required to send event mail notifications through SMTP. The following versions are supported: l ssl3: SSLv3 or higher is required. l tls1: TLSv1 or higher is required. l tls1.1: TLSv1.1 or higher is required. l tls1.2: TLSv1.2 or higher is required. hostname (config) # fenotify email mailhub preferences ssl-min-version <ssl-min-version> 5. (Optional) Set the TLS certificate authority file for event mail notifications going through SMTP. You can choose filenames under the /etc/pki/tls/certs/ directory. hostname (config) # fenotify email mailhub preferences tls-ca-file <tls-ca-file> The following example sets the TLS certificate authority file for event mail notifications to ca-bundle.crt: hostname (config) # fenotify email mailhub preferences tls-ca-file <cabundle.crt> 6. (Optional) Set the TLS certificate file for event email notifications going through SMTP. You can choose filenames under the /etc/pki/tls/ directory. hostname (config) # fenotify email mailhub preferences tls-cert-file <tls-cert-file> © 2019 FireEye 317 Central Management Administration Guide CHAPTER 19: Event Notifications The following example sets the TLS certificate file for event mail notifications to cert.pem: hostname (config) # fenotify email mailhub preferences tls-cert-file <cert.pem> 7. Enable TLS certificate verification for the SMTP relay used for event email notifications: hostname (config) # fenotify email mailhub preferences tls-cert-verify enable 8. Enable the TLS security protocol for the STMP relay used for event email notifications: hostname (config) # fenotify email mailhub preferences use-tls enable 9. Enable the STARTTLS security protocol for the SMTP relay used for event email notifications: hostname (config) # fenotify emadil mailhub preferences use-start_tls enable Setting Up the SMTP Recipients To set up the SMTP recipients, perform the following subtasks: l Add the SMTP recipients. l Configure the SMTP recipient listing for email notifications, To add an SMTP recipient: 1. Go to CLI configuration mode: hostname > enable hostname # configure terminal 2. Enable email notifications: hostname (config) # fenotify email enable 3. Add a recipient for email notifications: hostname (config) # fenotify email recipient <rname> 4. Select a recipient to receive email notifications (one recipient per command): hostname (config) # fenotify email recipient <rname> enable 5. Specify the email address for a recipient who will receive email notifications: hostname (config) # fenotify email recipient <rname> email-address <email_address> 6. Save the configuration: hostname (config) # write memory To configure the SMTP recipient listing for email notifications: 1. Go to CLI configuration mode: hostname > enable hostname # configure terminal 2. Enable email notifications: hostname (config) # fenotify email enable 318 © 2019 FireEye Release 8.7 Configuring Event Notifications Using the CLI 3. Select one of the XML, JavaScript Object Notation (JSON), or Text options for the format of the notifications received by a specified recipient: NOTE: The json_legacy-concise, json_legacy-extended, and json_legacynormal formats are deprecated. o To send notifications in XML Concise format containing basic information such as alert type, ID, source IP, malware name, hostname, and alert URL, enter: hostname (config) # fenotify email recipient <rname> prefer message format xml-concise o To send notifications in XML Extended format containing detailed information and abstracts including data-theft information (if any) and staticanalysis details (XML Extended provides all details about files and objects modified during analysis.), enter: hostname (config) # fenotify email recipient <rname> prefer message format xml-extended o To send notifications in XML Normal format containing detailed information and abstracts such as alert type, ID, source IP, malware name, hostname, and alert URL without any redundant information, enter: hostname (config) # fenotify email recipient <rname> prefer message format xml-normal o To send notifications in JSON Concise format containing basic information such as alert type, ID, source IP, malware name, hostname, and alert URL, enter: hostname (config) # fenotify email recipient <rname> prefer message format json-concise o To send notifications in JSON Extended format containing detailed information and abstracts including data-theft information (if any) and staticanalysis details (JSON Extended provides all details about files and objects modified during analysis.), enter: hostname (config) # fenotify email recipient <rname> prefer message format json-extended o To send notifications in JSON Normal format containing detailed information and abstracts such as alert type, ID, source IP, malware name, hostname, and alert URL without any redundant information, enter: hostname (config) # fenotify email recipient <rname> prefer message format json-normal o To send notifications in Text Concise format containing basic information such as alert type, ID, source IP, malware name, hostname, and alert URL, enter: hostname (config) # fenotify email recipient rname prefer message format text-concise © 2019 FireEye 319 Central Management Administration Guide o CHAPTER 19: Event Notifications To send notifications in Text Extended format containing detailed information and abstracts including data-theft information (if any) and staticanalysis details (Text Extended provides all details about files and objects modified during analysis.), enter: hostname (config) # fenotify email recipient rname prefer message format text-extended o To send notifications in Text Normal format containing detailed information and abstracts such as alert type, ID, source IP, malware name, hostname, and alert URL without any redundant information, enter: hostname (config) # fenotify email recipient rname prefer message format text-normal 4. Specify how email notifications are delivered to the specified recipient: o To deliver the notification as an email attachment, enter: hostname (config) # fenotify email recipient rname prefer message send-as attachment o To deliver the notification in the email body (the default), enter: hostname (config) # fenotify email recipient rname prefer message send-as in-line 5. Select the event type: hostname hostname hostname hostname hostname hostname (config) (config) (config) (config) (config) (config) # # # # # # fenotify fenotify fenotify fenotify fenotify fenotify email email email email email email alert alert alert alert alert alert domain-match infection-match ips-event malware-callback malware-object web-infection 6. Enable email notifications for specified recipients when ATI alert updates are detected: hostname (config) # fenotify email recipient <rname> alerts-update enable 320 © 2019 FireEye Release 8.7 Configuring Event Notifications Using the CLI 7. Specify the delivery frequency for email notifications: NOTE: FireEye recommends using per-event notifications. o To receive information about all events detected in the past 24 hours, enter: hostname (config) # fenotify email delivery daily-digest o To receive a daily notification for each entity that was the source of the event, enter: hostname (config) # fenotify email delivery daily-per-source o To receive an hourly notification for each entity that was the source of the event, enter: hostname (config) # fenotify email delivery hourly-per-source o To receive a notification every minute for each entity that was the source of the event, enter: hostname (config) # fenotify email delivery per-1min-per-source o To receive a notification every 5 minutes for each entity that was the source of the event, enter: hostname (config) # fenotify email delivery per-5min-per-source o To receive information about each event, sent when the event is triggered, enter: hostname (config) # fenotify email delivery per-event 8. Save the configuration: hostname (config) # write memory Configuring HTTP Notifications Using the CLI Use the CLI commands in this section to post HTTP notifications to one or more Web servers. Prerequisites l l The Central Management appliance must have an established connection to the Internet. Operator or Admin access Configuring HTTP Settings Use the CLI commands in this topic to set up the default configuration for HTTP notifications. To configure HTTP settings: 1. Go to CLI configuration mode: hostname > enable © 2019 FireEye 321 Central Management Administration Guide CHAPTER 19: Event Notifications hostname # configure terminal 2. Enable HTTP notifications: hostname (config) # fenotify http enable 3. Specify the default delivery schedule for HTTP notifications: NOTE: FireEye recommends using per-event notifications. o To receive information about all events detected in the past 24 hours, enter: hostname (config) # fenotify http default delivery daily-digest o To receive a daily notification for each entity that was the source of the event, enter: hostname (config) # fenotify http default delivery daily-persource o To receive an hourly notification for each entity that was the source of the event, enter: hostname (config) # fenotify http default delivery hourly-persource o To receive a notification every minute for each entity that was the source of the event, enter: hostname (config) # fenotify http default delivery per-1min-persource o To receive a notification every 5 minutes for each entity that was the source of the event, enter: hostname (config) # fenotify http default delivery per-5min-persource o To receive information about each event, sent when the event is triggered, enter: hostname (config) # fenotify http default delivery per-event 4. Specify the default service provider. The default service provider is generic. NOTE: FireEye recommends using the generic service provider. o To select Aruba as the provider, enter: hostname (config) # fenotify http default provider aruba o To select the generic provider, enter: hostname (config) # fenotify http default provider generic 322 © 2019 FireEye Release 8.7 Configuring Event Notifications Using the CLI 5. Select one of the XML, JavaScript Object Notation (JSON), or Text options for the default format of the notification where service_name is the name of the HTTP server that posts the notification: NOTE: The json_legacy-concise, json_legacy-extended, and json_legacynormal formats are deprecated. o To post notifications in JSON Concise format containing basic information such as alert type, ID, source IP, malware name, hostname, and alert URL, enter: hostname (config) # fenotify http service <service_name> provider generic message format json-concise o To post notifications in JSON Extended format containing detailed information and abstracts including data-theft information (if any) and staticanalysis details (JSON Extended provides all details about files and objects modified during analysis.), enter: hostname (config) # fenotify http service <service_name> provider generic message format json-extended o To post notifications in JSON Normal format containing detailed information and abstracts such as alert type, ID, source IP, malware name, hostname, and alert URL without any redundant information, enter: hostname (config) # fenotify http service <service_name> provider generic message format json-normal o To post notifications in Text Concise format containing basic information such as alert type, ID, source IP, malware name, hostname, and alert URL, enter: hostname (config) # fenotify http service <service_name> provider generic message format text-concise o To post notifications in Text Extended format containing detailed information and abstracts including data-theft information (if any) and static-analysis details (Text Extended provides all details about files and objects modified during analysis.), enter: hostname (config) # fenotify http service <service_name> provider generic message format text-extended o To post notifications in Text Normal format containing detailed information and abstracts such as alert type, ID, source IP, malware name, hostname, and alert URL without any redundant information, enter: hostname (config) # fenotify http service <service_name> provider generic message format text-normal o To post notifications in XML Concise format containing basic information such as alert type, ID, source IP, malware name, hostname, and alert URL, enter: hostname (config) # fenotify http service <service_name> provider generic message format xml-concise © 2019 FireEye 323 Central Management Administration Guide o CHAPTER 19: Event Notifications To post notifications in XML Extended format containing detailed information and abstracts including data-theft information (if any) and staticanalysis details (XML Extended provides all details about files and objects modified during analysis.), enter: hostname (config) # fenotify http service <service_name> provider generic message format xml-extended o To post notifications in XML Normal format containing detailed information and abstracts such as alert type, ID, source IP, malware name, hostname, and alert URL without any redundant information, enter: hostname (config) # fenotify http service <service_name> provider generic message format xml-normal 6. Save the configuration: hostname (config) # write memory Setting Up HTTP Servers To set up HTTP servers, perform the following subtasks: l Add the HTTP servers l Configure the HTTP server listing To add an HTTP server: 1. Go to CLI configuration mode: hostname > enable hostname # configure terminal 2. Enable HTTP notifications: hostname (config) # fenotify http enable 3. Specify the name of the HTTP server (for example, NX7400) to receive the notification. URLs and email addresses are not allowed. hostname (config) # fenotify http service <service-name> 4. Specify which servers will post HTTP notifications (one server per command): hostname (config) # fenotify http service <service_name> enable 5. Specify the URL for each HTTP server to receive the notification: hostname (config) # fenotify http service <service_name> server-url <url> 6. Save the configuration: hostname (config) # write memory To configure the HTTP server listing: 1. Go to CLI configuration mode: hostname > enable hostname # configure terminal 2. Enable HTTP notifications: hostname (config) # fenotify http enable 324 © 2019 FireEye Release 8.7 Configuring Event Notifications Using the CLI 3. (Optional) If authentication is required for the server, enable authentication and then specify the user name and password for HTTP authentication: hostname (config) # fenotify http service <service_name> auth enable hostname (config) # fenotify http service <service_name> auth username <user_name> hostname (config) # fenotify http service <service_name> auth password <password> 4. Select the event type: hostname hostname hostname hostname hostname hostname (config) (config) (config) (config) (config) (config) # # # # # # fenotify fenotify fenotify fenotify fenotify fenotify http http http http http http alert alert alert alert alert alert domain-match enable infection-match enable ips-event enable malware-callback enable malware-object enable web-infection enable 5. Enable the specified servers to post HTTP notifications when ATI alert updates are detected (one server per command): hostname (config) # fenotify http service <service_name> alerts-update enable 6. Specify the delivery frequency for HTTP notifications: NOTE: FireEye recommends using per-event notifications. o To receive information about all events detected in the past 24 hours, enter: hostname (config) # fenotify http service <service_name> prefer message delivery daily-digest o To receive a daily notification for each entity that was the source of the event, enter: hostname (config) # fenotify http service service_name prefer message delivery daily-per-source o To receive an hourly notification for each entity that was the source of the event, enter: hostname (config) # fenotify http service <service_name> prefer message delivery hourly-per-source o To receive a notification every minute for each entity that was the source of the event, enter: hostname (config) # fenotify http service <service_name> prefer message delivery per-1min-per-source o To receive a notification every 5 minutes for each entity that was the source of the event, enter: hostname (config) # fenotify http service <service_name> prefer message delivery per-5min-per-source o To receive information about each event, sent when the event is triggered, enter: hostname (config) # fenotify http service <service_name> prefer message delivery per-event 7. (Optional) If you want to use SSL for notifications: hostname (config) # fenotify http service <service_name> ssl enable hostname (config) # fenotify http service <service_name> ssl verify © 2019 FireEye 325 Central Management Administration Guide CHAPTER 19: Event Notifications 8. Specify the service provider. The default service provider is generic. NOTE: FireEye recommends using the generic service provider. o To select the currently active service provider, enter: hostname (config) # fenotify http service <service_name> provider default o To select the generic provider, enter: hostname (config) # fenotify http service <service_name> provider generic o To select Aruba as the provider, enter: hostname (config) # fenotify http service <service_name> provider aruba 326 © 2019 FireEye Release 8.7 Configuring Event Notifications Using the CLI 9. Select one of the XML, JavaScript Object Notation (JSON), or Text options for the format of the HTTP notifications: NOTE: The json_legacy-concise, json_legacy-extended, and json_legacynormal formats are deprecated. o To post notifications in XML Concise format containing basic information such as alert type, ID, source IP, malware name, hostname, and alert URL, enter: hostname (config) # fenotify http service <service_name> provider generic message format xml-concise o To post notifications in XML Extended format containing detailed information and abstracts including data-theft information (if any) and staticanalysis details (XML Extended provides all details about files and objects modified during analysis.), enter: hostname (config) # fenotify http service <service_name> provider generic message format xml-extended o To post notifications in XML Normal format containing detailed information and abstracts such as alert type, ID, source IP, malware name, hostname, and alert URL without any redundant information, enter: hostname (config) # fenotify http service <service_name> provider generic message format xml-normal o To post notifications in JSON Concise format containing basic information such as alert type, ID, source IP, malware name, hostname, and alert URL, enter: hostname (config) # fenotify http service <service_name> provider generic message format json-concise o To post notifications in JSON Extended format containing detailed information and abstracts including data-theft information (if any) and staticanalysis details (JSON Extended provides all details about files and objects modified during analysis.), enter: hostname (config) # fenotify http service <service_name> provider generic message format json-extended o To post notifications in JSON Normal format containing detailed information and abstracts such as alert type, ID, source IP, malware name, hostname, and alert URL without any redundant information, enter: hostname (config) # fenotify http service <service_name> provider generic message format json-normal o To post notifications in Text Concise format containing basic information such as alert type, ID, source IP, malware name, hostname, and alert URL, enter: hostname (config) # fenotify http service <service_name> provider generic message format text-concise © 2019 FireEye 327 Central Management Administration Guide o CHAPTER 19: Event Notifications To post notifications in Text Extended format containing detailed information and abstracts including data-theft information (if any) and static-analysis details (Text Extended provides all details about files and objects modified during analysis.), enter: hostname (config) # fenotify http service <service_name> provider generic message format text-extended o To post notifications in Text Normal format containing detailed information and abstracts such as alert type, ID, source IP, malware name, hostname, and alert URL without any redundant information, enter: hostname (config) # fenotify http service <service_name> provider generic message format text-normal 10. Save the configuration: hostname (config) # write memory Configuring Rsyslog Notifications Using the CLI Use the CLI commands in this section to send notifications to a remote syslog server. NOTE: You must use the CLI to configure whether there should be line breaks between notifications. Prerequisites l l The Central Management appliance must have an established connection to the Internet. Operator or Admin access. Configuring Rsyslog Settings Use the CLI commands in this topic to set up the default configuration for rsyslog notifications. To configure rsyslog settings: 1. Go to CLI configuration mode: hostname > enable hostname # configure terminal 2. Enable rsyslog notifications: hostname (config) # fenotify rsyslog enable 328 © 2019 FireEye Release 8.7 Configuring Event Notifications Using the CLI 3. Specify the default format for rsyslog notifications: NOTE: The json_legacy-concise, json_legacy-extended, and json_legacynormal formats are deprecated. o To send notifications in the Common Export Format (CEF), enter: hostname (config) # fenotify rsyslog default format cef o To send notifications in the comma-separated values (CSV) format, enter: hostname (config) # fenotify rsyslog default format csv o To send notifications in the Log Extended Event Format (LEEF) (default), enter: hostname (config) # fenotify rsyslog default format leef o To send notifications in XML Concise format containing basic information such as alert type, ID, source IP, malware name, hostname, and alert URL, enter: hostname (config) # fenotify rsyslog default format xml-concise o To send notifications in XML Extended format containing detailed information and abstracts including data-theft information (if any) and staticanalysis details (XML Extended provides all details about files and objects modified during analysis.), enter: hostname (config) # fenotify rsyslog default format xml-extended o To send notifications in XML Normal format containing detailed information and abstracts such as alert type, ID, source IP, malware name, hostname, and alert URL without any redundant information, enter: hostname (config) # fenotify rsyslog default format xml-normal o To send notifications in JSON Concise format containing basic information such as alert type, ID, source IP, malware name, hostname, and alert URL, enter: hostname (config) # fenotify rsyslog default format json-concise o To send notifications in JSON Extended format containing detailed information and abstracts including data-theft information (if any) and staticanalysis details (JSON Extended provides all details about files and objects modified during analysis.), enter: hostname (config) # fenotify rsyslog default format json-extended o To send notifications in JSON Normal format containing detailed information and abstracts such as alert type, ID, source IP, malware name, hostname, and alert URL without any redundant information, enter: hostname (config) # fenotify rsyslog default format json-normal o To send notifications in Text Concise format containing basic information such as alert type, ID, source IP, malware name, hostname, and alert URL, enter: hostname (config) # fenotify rsyslog default format text-concise © 2019 FireEye 329 Central Management Administration Guide o CHAPTER 19: Event Notifications To send notifications in Text Extended format containing detailed information and abstracts including data-theft information (if any) and staticanalysis details (Text Extended provides all details about files and objects modified during analysis.), enter: hostname (config) # fenotify rsyslog default format text-extended o To send notifications in Text Normal format containing detailed information and abstracts such as alert type, ID, source IP, malware name, hostname, and alert URL without any redundant information, enter: hostname (config) # fenotify rsyslog default format text-normal 4. Specify the default delivery schedule for email notifications: NOTE: FireEye recommends using per-event notifications. o To receive a daily notification for each entity that was the source of the event, enter: hostname (config) # fenotify rsyslog default delivery daily-persource o To receive an hourly notification for each entity that was the source of the event, enter: hostname (config) # fenotify rsyslog default delivery hourly-persource o To receive a notification every minute for each entity that was the source of the event, enter: hostname (config) # fenotify rsyslog default delivery per-1minper-source o To receive a notification every 5 minutes for each entity that was the source of the event, enter: hostname (config) # fenotify rsyslog default delivery per-5minper-source o To receive information about each event, sent when the event is triggered, enter: hostname (config) # fenotify rsyslog default delivery per-event 5. Specify the default severity classification for the rsyslog notification: NOTE: FireEye recommends setting the severity classification to alert. o To indicate that action must be taken immediately (severity 1), enter: hostname (config) # fenotify rsyslog default send-as alert o To indicate that the notification contains critical conditions (severity 2), enter: hostname (config) # fenotify rsyslog default send-as crit o To indicate that the notification contains debug-level messages (severity 7), enter: hostname (config) # fenotify rsyslog default send-as debug o To indicate an emergency (the system is unusable) (severity 0), enter: hostname (config) # fenotify rsyslog default send-as emerg 330 © 2019 FireEye Release 8.7 Configuring Event Notifications Using the CLI o To indicate that the notification contains error conditions (severity 3), enter: hostname (config) # fenotify rsyslog default send-as error o To indicate that the notification contains informational messages (severity 6), enter: hostname (config) # fenotify rsyslog default send-as info o To indicate normal but significant conditions (severity 5), enter: hostname (config) # fenotify rsyslog default send-as notice o To indicate that the notification contains warning conditions (severity 4), enter: hostname (config) # fenotify rsyslog default send-as warning 6. Save the configuration: hostname (config) # write memory Configuring Line Feedback for Rsyslog Notifications Use the CLI commands in this topic to configure whether to send notifications to a remote syslog server in a single line or with line breaks between each notification. The default is to send rsyslog notifications in a single line. To send rsyslog notifications in a single line: 1. Go to CLI configuration mode: hostname > enable hostname # configure terminal 2. Configure the single line option: hostname (config) # fenotify preferences rsyslog-strip-lnfb enable 3. Save the configuration: hostname (config) # write memory 4. Verify that rsyslog notifications will be sent in a single line: hostname (config) # show fenotify preferences IPS delivery mode: instant HTTP(s) notification using fenet proxy: yes Rsyslog notification Stripping off line feedback: yes To send rsyslog notifications with line breaks: 1. Go to CLI configuration mode: hostname > enable hostname # configure terminal 2. Configure the line break option: hostname (config) # no fenotify preferences rsyslog-strip-lnfb enable 3. Save the configuration: © 2019 FireEye 331 Central Management Administration Guide CHAPTER 19: Event Notifications hostname (config) # write memory 4. Verify that rsyslog notifications will be sent with line breaks: hostname (config) # show fenotify preferences IPS delivery mode: instant HTTP(s) notification using fenet proxy: yes Rsyslog notification Stripping off line feedback: no Setting Up Rsyslog Servers To set up rsyslog servers, perform the following subtasks: l Add the rsyslog servers l Configure the rsyslog servers To add an rsyslog server: 1. Go to CLI configuration mode: hostname > enable hostname # configure terminal 2. Enable rsyslog notifications: hostname (config) # fenotify rsyslog enable 3. Specify the name of the rsyslog server to receive the notification: hostname (config) # fenotify rsyslog trap-sink <sink_name> 4. Specify which servers will receive rsyslog notifications (one server per command): hostname (config) # fenotify rsyslog trap-sink <sink_name> enable 5. Specify the IP address or DNS address of the rsyslog server to send event logs to: hostname (config) # fenotify rsyslog trap-sink <sink_name> address <ip address> 6. Save the configuration: hostname (config) # write memory To configure the rsyslog servers: 1. Go to CLI configuration mode: hostname > enable hostname # configure terminal 2. Enable rsyslog notifications: hostname (config) # fenotify rsyslog enable 3. Specify the delivery frequency for rsyslog notifications: NOTE: FireEye recommends using per-event notifications. o To receive a daily notification for each entity that was the source of the event, enter: hostname (config) # fenotify rsyslog trap-sink <sink_name> prefer 332 © 2019 FireEye Release 8.7 Configuring Event Notifications Using the CLI message delivery daily-per-source o To receive an hourly notification for each entity that was the source of the event, enter: hostname (config) # fenotify rsyslog trap-sink <sink_name> prefer message delivery hourly-per-source o To receive a notification every minute for each entity that was the source of the event, enter: hostname (config) # fenotify rsyslog trap-sink <sink_name> prefer message delivery per-1min-per-source o To receive a notification every 5 minutes for each entity that was the source of the event, enter: hostname (config) # fenotify rsyslog trap-sink <sink_name> prefer message delivery per-5min-per-source o To receive information about each event, sent when the event is triggered, enter: hostname (config) # fenotify rsyslog trap-sink <sink_name> prefer message delivery per-event 4. Select the event type: hostname hostname hostname hostname hostname hostname (config) (config) (config) (config) (config) (config) # # # # # # fenotify fenotify fenotify fenotify fenotify fenotify rsyslog rsyslog rsyslog rsyslog rsyslog rsyslog alert alert alert alert alert alert domain-match infection-match ips-event malware-callback malware-object web-infection 5. Specify the format for rsyslog notifications: NOTE: The json_legacy-concise, json_legacy-extended, and json_legacynormal formats are deprecated. o To send notifications in the Common Export Format (CEF), enter: hostname (config) # fenotify rsyslog trap-sink <sink_name> prefer message format cef o To send notifications in the comma-separated values (CSV) format, enter: hostname (config) # fenotify rsyslog trap-sink <sink_name> prefer message format csv o To send notifications in the Log Extended Event Format (LEEF) (default), enter: hostname (config) # fenotify rsyslog trap-sink <sink_name> prefer message format leef o To send notifications in XML Concise format containing basic information such as alert type, ID, source IP, malware name, hostname, and alert URL, enter: hostname (config) # fenotify rsyslog trap-sink <sink_name> prefer message format xml-concise © 2019 FireEye 333 Central Management Administration Guide o CHAPTER 19: Event Notifications To send notifications in XML Extended format containing detailed information and abstracts including data-theft information (if any) and staticanalysis details (XML Extended provides all details about files and objects modified during analysis.), enter: hostname (config) # fenotify rsyslog trap-sink <sink_name> prefer message format xml-extended o To send notifications in XML Normal format containing detailed information and abstracts such as alert type, ID, source IP, malware name, hostname, and alert URL without any redundant information, enter: hostname (config) # fenotify rsyslog trap-sink <sink_name> prefer message format xml-normal o To send notifications in JSON Concise format containing basic information such as alert type, ID, source IP, malware name, hostname, and alert URL, enter: hostname (config) # fenotify rsyslog trap-sink <sink_name> prefer message format json-concise o To send notifications in JSON Extended format containing detailed information and abstracts including data-theft information (if any) and staticanalysis details (JSON Extended provides all details about files and objects modified during analysis.), enter: hostname (config) # fenotify rsyslog trap-sink <sink_name> prefer message format json-extended o To send notifications in JSON Normal format containing detailed information and abstracts such as alert type, ID, source IP, malware name, hostname, and alert URL without any redundant information, enter: hostname (config) # fenotify rsyslog trap-sink <sink_name> prefer message format json-normal o To send notifications in Text Concise format containing basic information such as alert type, ID, source IP, malware name, hostname, and alert URL, enter: hostname (config) # fenotify rsyslog trap-sink <sink_name> prefer message format text-concise o To send notifications in Text Extended format containing detailed information and abstracts including data-theft information (if any) and staticanalysis details (Text Extended provides all details about files and objects modified during analysis.), enter: hostname (config) # fenotify rsyslog trap-sink <sink_name> prefer message format text-extended o To send notifications in Text Normal format containing detailed information and abstracts such as alert type, ID, source IP, malware name, hostname, and alert URL without any redundant information, enter: hostname (config) # fenotify rsyslog trap-sink <sink_name> prefer message format text-normal 334 © 2019 FireEye Release 8.7 Configuring Event Notifications Using the CLI 6. Specify the severity classification for the rsyslog notification: NOTE: FireEye recommends setting the severity classification to alert. o To indicate that action must be taken immediately (severity 1), enter: hostname (config) # fenotify rsyslog trap-sink <sink_name> prefer message send-as alert o To indicate that the notification contains critical conditions (severity 2), enter: hostname (config) # fenotify rsyslog trap-sink <sink_name> prefer message send-as crit o To indicate that the notification contains debug-level messages (severity 7), enter: hostname (config) # fenotify rsyslog trap-sink <sink_name> prefer message send-as debug o To indicate an emergency (the system is unusable) (severity 0), enter: hostname (config) # fenotify rsyslog trap-sink <sink_name> prefer message send-as emerg o To indicate that the notification contains error conditions (severity 3), enter: hostname (config) # fenotify rsyslog trap-sink <sink_name> prefer message send-as error o To indicate that the notification contains informational messages (severity 6), enter: hostname (config) # fenotify rsyslog trap-sink <sink_name> prefer message send-as info o To indicate normal but significant conditions (severity 5), enter: hostname (config) # fenotify rsyslog trap-sink <sink_name> prefer message send-as notice o To indicate that the notification contains warning conditions (severity 4), enter: hostname (config) # fenotify rsyslog trap-sink <sink_name> prefer message send-as warning 7. Specify the protocol used to send rsyslog notifications (UDP is the default): l To select UDP, enter: hostname (config) # fenotify rsyslog trap-sink <sink_name> protocol UDP l To select TCP, enter: hostname (config) # fenotify rsyslog trap-sink <sink_name> protocol TCP 8. Save the configuration: hostname (config) # write memory Configuring SNMP Notifications Using the CLI NOTE: The following topics pertain to malware alert event notifications. For information about SNMP notifications that pertain to system events such as low disk space, see SNMP Data on page 279. © 2019 FireEye 335 Central Management Administration Guide CHAPTER 19: Event Notifications Use the CLI commands in this section to send notifications to one or more Simple Network Management Protocol (SNMP) servers. Prerequisites l l The Central Management appliance must have an established connection to the Internet. Operator or Admin access. Configuring SNMP Settings Use the CLI commands in this topic to set up the default configuration for SNMP notifications. To configure SNMP settings: 1. Go to CLI configuration mode: hostname > enable hostname # configure terminal 2. Enable SNMP notifications: hostname (config) # fenotify snmp enable 3. Specify the default delivery schedule for SNMP notifications: NOTE: FireEye recommends using per-event notifications. o To receive a daily notification for each entity that was the source of the event, enter: hostname (config) # fenotify snmp default delivery daily-persource o To receive an hourly notification for each entity that was the source of the event, enter: hostname (config) # fenotify snmp default delivery hourly-persource o To receive a notification every minute for each entity that was the source of the event, enter: hostname (config) # fenotify snmp default delivery per-1min-persource o To receive a notification every 5 minutes for each entity that was the source of the event, enter: hostname (config) # fenotify snmp default delivery per-5min-persource o To receive information about each event, sent when the event is triggered, enter: hostname (config) # fenotify snmp default delivery per-event 336 © 2019 FireEye Release 8.7 Configuring Event Notifications Using the CLI 4. Specify the SNMP version used for notifications: o To use SNMP version 1, enter: hostname (config) # fenotify snmp default version 1 o To use SNMP version 2c, enter: hostname (config) # fenotify snmp default version 2c 5. If you are going to download the MIB file, see the procedure that follows for Microsoft Windows, Linux, or Mac devices. The MIB file is retrieved using a program that connects using port 22, which is normally used for tools like SSH, SCP, and PSCP. Because file-level access is denied by policy, the direct path to the MIB file needs to be specified. 6. Save the configuration: hostname (config) # write memory To download the FireEye MIB for SNMP on Windows: 1. Download the pscp.exe tool (available from PuTTY download page). 2. Navigate to a command prompt window. 3. Change to the directory in which you downloaded the pscp.exe tool: cd Downloads 4. Copy the MIB file from the Central Management appliance: pscp.exe -r -scp admin@<CMSeriesIPaddress>:/usr/share/snmp/mibs \Temp\mibs\ 5. When prompted for the password, enter admin. The file is copied to the \Temp\mibs directory that resides on your desktop. 6. Change to the “mibs” directory: cd C:\Temp\mibs 7. Load the MIB file into an SNMP browser or tool or open the MIB file with the following command: FE-FIREEYE-MIB.txt To download the FireEye MIB for SNMP on Linux: 1. Using the OpenSSH client, copy the MIB file from the Central Management appliance: scp -r admin@<CMSeriesIPaddress>:/usr/share/snmp/mibs /usr/<userDirectoryName>/ 2. When prompted for the password, enter admin. The files are copied to the “mibs” directory that resides in the /usr/<userDirectoryName> directory. 3. Change to the “mibs” directory: cd mibs 4. Load the MIB file into an SNMP browser or tool or open the MIB file with the following command: vi FE-FIREEYE-MIB.txt © 2019 FireEye 337 Central Management Administration Guide CHAPTER 19: Event Notifications To download the FireEye MIB for SNMP on Mac OS X: 1. Navigate to the terminal emulator. 2. Copy the MIB file from the Central Management appliance: scp -r admin@<CMSeriesIPaddress>:/usr/share/snmp/mibs ~/ 3. When prompted for the password, enter admin. The files are copied to the “mibs” directory that resides in the user directory. 4. Load the MIB file into an SNMP browser or tool or open the MIB file with the following command: vi ~/mibs/FE-FIREEYE-MIB.txt Setting Up SNMP Servers To set up the SNMP servers, perform the following subtasks: l Add the SNMP servers l Configure the SNMP servers To add an SNMP server: 1. Go to CLI configuration mode: hostname > enable hostname # configure terminal 2. Enable SNMP notifications: hostname (config) # fenotify snmp enable 3. Specify the name of the SNMP server (for example, NX7400) for SNMP notifications: hostname (config) # fenotify snmp trap-sink <sink_name> 4. Specify which servers will receive SNMP notifications (one server per command): hostname (config) # fenotify snmp trap-sink <sink_name> enable 5. Specify the IP address or DNS address of the SNMP server to receive the notifications: hostname (config) # fenotify snmp trap-sink <sink_name> address <ip address> 6. Save the configuration: hostname (config) # write memory To configure the SNMP servers: 1. Go to CLI configuration mode: hostname > enable hostname # configure terminal 2. Enable SNMP notifications: hostname (config) # fenotify snmp enable 3. Specify the SNMP community string: hostname (config) # fenotify snmp trap-sink <sink_name> community <community_name> 338 © 2019 FireEye Release 8.7 Configuring Event Notifications Using the CLI 4. Specify the SNMP version used for notifications: o To use SNMP version 1, enter: hostname (config) # fenotify snmp trap-sink <sink_name> version 1 o To use SNMP version 2c, enter: hostname (config) # fenotify snmp trap-sink <sink_name> version 2c 5. Specify the delivery frequency for SNMP notifications: NOTE: FireEye recommends using per-event notifications. o To receive a daily notification for each entity that was the source of the event, enter: hostname (config) # fenotify snmp trap-sink <sink_name> prefer message delivery daily-per-source o To receive an hourly notification for each entity that was the source of the event, enter: hostname (config) # fenotify snmp trap-sink <sink_name> prefer message delivery hourly-per-source o To receive a notification every minute for each entity that was the source of the event, enter: hostname (config) # fenotify snmp trap-sink <sink_name> prefer message delivery per-1min-per-source o To receive a notification every 5 minutes for each entity that was the source of the event, enter: hostname (config) # fenotify snmp trap-sink <sink_name> prefer message delivery per-5min-per-source o To receive information about each event, sent when the event is triggered, enter: hostname (config) # fenotify snmp trap-sink <sink_name> prefer message delivery per-event 6. Select the event type: hostname (config) # fenotify snmp notification all-events hostname (config) # fenotify snmp notification domain-match hostname (config) # fenotify snmp notification infection-match hostname (config) # fenotify snmp notification ips-event hostname (config) # fenotify snmp notification malware-callback hostname (config) # fenotify snmp notification malware-object hostname (config) # fenotify snmp notification web-infection trap-sink <sink_name> prefer trap-sink <sink_name> prefer trap-sink <sink_name> prefer trap-sink <sink_name> prefer trap-sink <sink_name> prefer trap-sink <sink_name> prefer trap-sink <sink_name> prefer 7. Save the configuration: hostname (config) # write memory © 2019 FireEye 339 Central Management Administration Guide CHAPTER 19: Event Notifications Configuring the Proxy Server for Notifications You can enable or disable the proxy server for notifications. The proxy server is referred to as the FireEye network proxy server. HTTP notifications are currently sent through the FireEye network proxy server. This is the default setting. You can disable the proxy server for outgoing HTTP notifications, such as email reports or Splunk notifications. NOTE: Proxy server for notifications is configured only using the CLI. Prerequisites l The Central Management appliance must have an established connection to the Internet. l Operator or Admin access. l The proxy server must be explicitly disabled for outgoing HTTP notifications. Configuring the Proxy Server for Notifications Using the CLI Use the CLI commands in this topic to configure the proxy server for notifications using the CLI. To enable the proxy server for notifications: 1. Go to CLI configuration mode. hostname > enable hostname # configure terminal 2. Enable the proxy server for notifications. hostname (config) # fenotify preferences use-fenet-proxy enable 3. Verify that HTTP notifications are enabled for the proxy server. hostname (config) # show fenotify preferences Notification customized settings: IPS delivery mode: instant HTTP(s) notification using fenet proxy: yes 340 © 2019 FireEye Release 8.7 Configuring ATI Alert Updates for Notifications To disable the proxy server for notifications: 1. Go to CLI configuration mode. hostname > enable hostname # configure terminal 2. Disable the proxy server for notifications. hostname (config) # no fenotify preferences use-fenet-proxy enable 3. Verify that HTTP notifications are disabled for the proxy server. hostname (config) # show fenotify preferences Notification customized settings: IPS delivery mode: instant HTTP(s) notification using fenet proxy: no Configuring ATI Alert Updates for Notifications You can enable or disable Advanced Threat Intelligence (ATI) alert updates for notifications through HTTP and email protocols. NOTE: Rsyslog and SNMP protocols are not supported. You can configure Advanced Threat Intelligence (ATI) alert updates for notifications through HTTP and email protocols. When you enable ATI alert updates for notifications, notifications will be sent for events with threat intelligence on managed Network Security appliances running Release 7.7.0 or later. When you disable ATI alert updates for notifications, notifications will not be sent for events with threat intelligence on managed appliances. When ATI alert updates are enabled, notifications will not be sent for alerts with threat intelligence that were detected more than 90 days ago. If multiple alerts match the same ATI event triggered on the appliance, notifications will be sent only for the first three alerts per day. For detailed information about ATI, see the NX Series User Guide. NOTE: ATI alert updates for notifications are configured only using the CLI. This feature is disabled by default. Prerequisites l l The Central Management appliance must have an established connection to the Internet. Operator or Admin access to the Central Management appliance © 2019 FireEye 341 Central Management Administration Guide CHAPTER 19: Event Notifications Configuring ATI Alert Updates for Notifications Using the CLI Follow these steps to configure ATI alert updates for notifications using the CLI. To enable ATI alert updates for notifications: 1. Go to CLI configuration mode. hostname > enable hostname # configure terminal 2. Enable ATI alert update settings for notifications. hostname (config) # fenotify preferences alerts-update ati enable 3. Save your changes. hostname (config) # write memory 4. Verify the status for the ATI alert update settings. hostname (config) show fenotify preferences Notification customized settings: IPS delivery mode: instant HTTP(s) notification using fenet proxy: yes Rsyslog notification Stripping off line feedback: yes Notification timeout: 600 seconds SSL cipher list: compatible SSL minimum protocol version: tls1 Alert ATI Updates: yes CEF Compliance: yes To disable ATI alert updates for notifications: 1. Go to CLI configuration mode. hostname > enable hostname # configure terminal 2. Disable ATI alert update settings for notifications. hostname (config) # no fenotify preferences alerts-update ati enable 3. Save your changes. hostname (config) # write memory 4. Verify the status for the ATI alert update settings. hostname (config) # show fenotify preferences Notification customized settings: IPS delivery mode: instant HTTP(s) notification using fenet proxy: yes 342 © 2019 FireEye Release 8.7 Configuring ATI Alert Updates for Notifications Rsyslog notification Stripping off line feedback: yes Notification timeout: 600 seconds SSL cipher list: compatible SSL minimum protocol version: tls1 Alert ATI Updates: no CEF Compliance: yes © 2019 FireEye 343 Central Management Administration Guide 344 CHAPTER 19: Event Notifications © 2019 FireEye Central Management Administration Guide On-Demand Cleanup Using Profiles CHAPTER 20: Disk Space Management Some appliance processes require a specific amount of disk space to complete. If disk space is not available, the processes do not start. An error message describes the problem. For example, you may need to delete files and artifacts to free disk space if there is not enough room to do a database backup, to retrieve SNMP data, or to send system notifications. It may also be necessary to free disk space before upgrading the appliance. On-Demand Cleanup Using Profiles You can analyze disk space used by system files, such as backups, dumps, reports, log files, and some types of artifacts. Disk management profiles are defined for groups of system file types, and you can delete data using these profiles to free disk space. Some data, such as configuration data, cannot be deleted. Following are the profiles you can use for disk management: Profile Description backups Backup files created during user-initiated backup and restore procedures. fedb-backups Database backup files created during system image updates logs Log files malicious-artifacts Malicious artifact files generated on the appliance nonmaliciousartifacts Nonmalicious artifact files generated on the appliance reports Report files © 2019 FireEye 345 Central Management Administration Guide Profile CHAPTER 20: Disk Space Management Description snapshots System snapshots sysdumps System dumps tcpdumps TCP capture files For more information, see: l Viewing a Summary of Disk Space Use Using the CLI below l Viewing Disk Space Use By Profile Using the CLI on the facing page l Deleting Data to Free Disk Space Using the CLI on the facing page Viewing a Summary of Disk Space Use Using the CLI You can view a summary of disk space use for the /config, /var, and /data file systems and the associated profiles. You should run this command to analyze disk space use. NOTE: You cannot delete files from the /config file system. Space information for this file system is for information purposes only. To view a summary of disk space use: 1. Go to CLI configuration mode: hostname > enable hostname # configure terminal 2. Show the current disk space use summary: hostname (config) # show system cleanup summary Statistics for /config filesystem: Space Total 182 MB Space Used 7 MB Space Free 175 MB Space Available 166 MB Space Percent Free 96% Inodes Percent Free 99% Statistics for /var filesystem: Space Total 20031 MB Space Used 2682 MB Space Free 17348 MB Space Available 16324 MB Space Percent Free 86% Inodes Percent Free 99% Statistics for /data Space Total Space Used Space Free Space Available Space Percent Free Inodes Percent Free filesystem: 1068532 MB 126189 MB 942343 MB 888058 MB 88% 99% Profile Name ====================== backups fedb-backups logs malicious-artifacts nonmalicious-artifacts reports 346 | | | | | | | | Description | Occupied Space | Cleanable Space | Filesystems ================================|=============================================== Unified Backups | 0 MB | 0 MB | /data FEDB Backups | 6446 MB | 6446 MB | /data Application log files | 427 MB | 411 MB | /var Malicious Malware Artifacts | 0 MB | 0 MB | /data Non-malicious Malware Artifacts | 0 MB | 0 MB | /data Reports | 1 MB | 1 MB | /data © 2019 FireEye Release 8.7 On-Demand Cleanup Using Profiles snapshots sysdumps | System snapshots | System dumps | | 8 MB | 0 MB | 5 MB | /data 0 MB | /data tcpdumps | TCP capture files | 0 MB | 0 MB | /var Viewing Disk Space Use By Profile Using the CLI You can view disk space use by profile. You should run this command to determine the best data to delete for a specific profile. To view a summary of disk space use by profile: 1. Go to CLI configuration mode: hostname > enable hostname # configure terminal 2. Show the current disk space use for a profile: hostname (config) # show system cleanup profile [backups | fedb-backups | logs | malicious-artifacts | nonmalicious-artifacts | reports |snapshots | sysdumps | tcpdumps] For profile descriptions, see On-Demand Cleanup Using Profiles on page 345. For example, the following shows the disk space use for the logs profile: hostname (config) # show system cleanup profile logs Older than | Size ============|============= 365 days | 0 MB 180 days | 25 MB 90 days | 212 MB 30 days | 342 MB 7 days | 382 MB 1 day | 405 MB All | 411 MB Deleting Data to Free Disk Space Using the CLI After you have analyzed the disk space use, you can delete data to free the disk space you need. To delete data to free disk space: 1. Go to CLI configuration mode: hostname > enable hostname # configure terminal © 2019 FireEye 347 Central Management Administration Guide CHAPTER 20: Disk Space Management 2. Delete data: hostname (config) # system cleanup profile {backups | fedb-backups | logs | malicious-artifacts | nonmalicious-artifacts | reports |snapshots | sysdumps | tcpdumps} {all | older-than <no. of days>} [force] where: l l l all deletes all data that can be deleted for this profile older-than <no. of days> deletes data that is older than the specified number of days force deletes the data as requested without prompting for confirmation If you do not use the force option, the command prompts for confirmation. For example, the following deletes data that matches the logs profile. It deletes only data that can be deleted that is older than 180 days. hostname (config) # system cleanup profile logs older-than 180 This will remove cleanable files older than 180 days for the profile 'logs'. Do you want to continue? [y/n]: y 25 MB of disk space freed. 348 © 2019 FireEye Central Management Administration Guide CHAPTER 21: Boot Manager Utilities The Tools menu provides access to the boot manager utilities. In the console, the Tools menu is sometimes called Boot Menu. Reset admin Password Resets the factory default "admin" password. This password, which is typically "admin," is the password used to log into the physical or serial console. For security, the "admin" user cannot use this password to remotely log into the Web UI or CLI of the appliance, so the password must be changed in the console during the initial configuration of the appliance. This option is suitable if the configured "admin" password for remote access is lost or forgotten. The "admin" user can log into the physical or serial console using the default password, and then change it so the password can be used for remote access as well. Wipe Appliance Media Wipes the appliance media. The appliance will not be usable afterward. This option is suitable if you intend to use an RMA to replace the appliance, and have already saved customer data using the database backup feature. For more information, see Wiping Persistent Media on page 358. © 2019 FireEye 349 Central Management Administration Guide CHAPTER 21: Boot Manager Utilities Manufacture Appliance Manufactures the appliance to factory settings, including its original manufacturing parameters (such as hostname and DTI credentials.) This option is suitable if you need to do a more complete factory reset than is possible with the reset factory CLI commands. After you manufacture using this utility, only the original system image version and manufacture timestamps are preserved in the system log. Wipe Appliance Media and Manufacture Appliance Wipes the appliance media and manufactures the appliance to factory settings. This option is suitable if you are returning the appliance to FireEye at the end of an evaluation so it can be used for another evaluation. For more information, see Wiping Persistent Media on page 358. Return to Image Boot Menu Returns to the image boot menu, where you can boot an installed image from a particular boot location. This option is suitable if you install a new system image version but decide to use a previous version instead, or if you accidentally booted from the wrong boot location. IMPORTANT: After you select this option, pay close attention to the console so you do not miss a series of five periods (.) displayed one second apart. Before the console moves past the fifth period, press any key twice to return to the boot menu. Working with the Tools Menu The following topics describe how to access and use the Tools menu. l System Requirements below l Setting the Tools Menu Password on page 352 l Accessing the Tools Menu on page 354 l Disabling the Tools Menu on page 356 l Viewing Tools Menu Availability on page 357 System Requirements Make sure the following requirements are met. l Model numbers and system image versions: l 350 Malware Analysis Version 8.0.0 or later is running on one of the following appliance models: AX 5500, AX 5550. © 2019 FireEye Release 8.7 Working with the Tools Menu l l l l l l l l l Central Management Version 8.1.0 or later is running on one of the following appliance models: CM 4500, CM 7500, CM 9500. Email Security — Server Edition Version 8.0.0 or later is running on one of the following appliance models: EX 3500, EX 5500, EX 8500. File Security Version 8.0.0 or later is running on the FX 6500 model. Endpoint Security 4.0.0 is running on one of the following appliance models: HX 4000, HX 4400, HX 4402. Network Security Version 8.0.0 or later is running on one of the following appliance models: NX 1500, NX 2500, NX 2550, NX 3500, NX 4500, NX 5500, NX 7500, NX 10450, NX 10550. VX Series Version 8.0.0 or later is running on one of the following appliance models: VX 5500, VX 12500. You have access to the physical or serial console (see Accessing the Physical or Serial Console on page 69). The minimum system image version cited above is installed on both boot partitions on the appliance. If the appliance was not originally manufactured with that system image version, you must perform the Upgrade Steps below to meet this requirement. You obtained the appliance-specific preset Tools menu password from FireEye Technical Support, or you configured another password as described in Setting the Tools Menu Password on the next page. Limitations l l The Manufacture Appliance and Wipe Appliance Media and Manufacture Appliance options require that the appliance was originally manufactured with a system image that supports the Tools menu. All logging goes to the serial console. If you use the physical console to access the Tools menu, you will be unable to monitor the progress on the VGA monitor. Upgrade Steps The minimum system image version must be installed on both boot partitions before you can access the Tools menu. Perform the steps in this section if you are upgrading from an earlier version. NOTE: These steps are not required if your appliance was originally manufactured with the minimum system image version. The minimum versions are listed in System Requirements on the previous page. © 2019 FireEye 351 Central Management Administration Guide CHAPTER 21: Boot Manager Utilities To enable the Tools menu if you are upgrading from an earlier release: 1. Fetch and install a supported system image: hostname hostname hostname hostname hostname (config) (config) (config) (config) (config) # # # # # fenet image check show fenet image status fenet image fetch show fenet image status image install <image> This installs the system image in one of the boot partitions. 2. Verify the boot partition for the new system image: hostname (config) # show images For example, on a Network Security appliance: hostname (config) # show images Installed images: Partition 1: wmps wMPS (wMPS) 8.0.0 ... Partition 2: wmps wMPS (wMPS) 7.9.4 ... Last boot partition: 2 Next boot partition: 2 3. If necessary, change the Next boot partition so the appliance boots from the partition with the new system image when it reloads: hostname (config) # image boot next hostname (config) # write memory 4. Reload the appliance: hostname (config) # reload 5. Install the new system image again to put it on the other boot partition: hostname (config) # image install <image> 6. Change the next boot partition: hostname (config) # image boot next hostname (config) # write memory 7. Reload the appliance: hostname (config) # reload If you do not want to use the default Tools menu password, you can now configure one as described in Setting the Tools Menu Password below. Users who know the password can access the Tools menu on any subsequent appliance reload, as described in Accessing the Tools Menu on page 354. Setting the Tools Menu Password The Tools menu requires a password. There are two options: 352 © 2019 FireEye Release 8.7 l l Working with the Tools Menu Default Password. A unique password that is derived from the appliance ID is preset on the appliance and must be obtained from FireEye Technical Support. Configured Password. You can instead set another password in plain text or as a hashed string. A plain-text password is hashed before it is stored. Prerequisites l Admin access Setting the Tools Menu Password in Plain Text Using the CLI Use the commands in this section to set the Tools menu password in plain text. To set a plain-text password: 1. Log into the appliance CLI. 2. Go to CLI configuration mode: hostname > enable hostame # configure terminal 3. Set the password: hostname (config) # boot bootmgr tools password <password> 4. Save your change: hostname (config) # write memory NOTE: Alternatively, you can use the boot bootmgr tools password 0 <password> command to set the password in plain text, or use the boot bootmgr tools password command and enter the plain-text password at the prompt. Example The following example sets "fyd4k8q2" as the password for the Tools menu. hostname (config) # boot bootmgr tools password fyd4k8q2 Setting the Tools Menu Password with Encryption Using the CLI Use the commands in this section to set the Tools menu password with a hashed string. © 2019 FireEye 353 Central Management Administration Guide CHAPTER 21: Boot Manager Utilities To set an encrypted password: 1. Log into the appliance CLI. 2. Go to CLI configuration mode: hostname > enable hostame # configure terminal 3. Set the password: hostname (config) # boot bootmgr tools password 7 <password> 4. Save your change: hostname (config) # write memory Example The following example sets an encrypted password for the Tools menu. hostname (config) # boot bootmgr tools password 7 $6$xuQN2G3r$ufK5k8dUDdpp0hPETrtjBIDZ3f3PhCxGYagp2k0gvgv/YrD88GNIkUsaKRVDMsPAy QlcGuzhRXaBpCCVPeQd1 Restoring the Default Tools Menu Password Using the CLI Use the commands in this section to restore the default Tools menu password. You must obtain this password from FireEye Technical Support. To restore the default Tools menu password: 1. Log into the appliance CLI. 2. Go to CLI configuration mode: hostname > enable hostname # configure terminal 3. Restore the password: hostname (config) # no boot bootmgr tools password 4. Save your change: hostname (config) # write memory Accessing the Tools Menu Use the procedure in this section to access the Tools menu. To access the Tools menu: 1. Connect to the physical or serial console as described in Accessing the Physical or Serial Console on page 69. 354 © 2019 FireEye Release 8.7 Working with the Tools Menu NOTE: If you use the physical console to access the Tools menu, you will be unable to monitor the progress on the VGA monitor. 2. Log into the console using admin credentials. 3. Go to CLI configuration mode: hostname > enable hostname # configure terminal 4. Reload the appliance: hostname (config) # reload 5. Pay close attention to the console as it reloads so you do not miss the boot: prompt. 6. When you see the boot: prompt, press Enter. 7. Pay close attention to the console so you do not miss a series of five periods (.) displayed one second apart. 8. Before the console moves past the fifth period, press any key twice. An image boot menu such as the following on an Network Security appliance is displayed. Boot Menu --------------------------------------------------------------0: wmps wMPS (wMPS) 8.0.0... 1: wmps wMPS (wMPS) 8.0.0... 2: Tools Menu --------------------------------------------------------------- 9. Press the down arrow on your keyboard to select the 2. Tools Menu option. 10. Press Enter. 11. When prompted, enter the Tools menu password provided by your administrator. 12. The Tools menu (labeled "Boot Menu") is displayed. Boot Menu --------------------------------------------------------------0: Reset admin Password 1: Wipe Appliance Media 2: Manufacture Appliance 3: Wipe Appliance Media and Manufacture Appliance 4: Return to Image Boot Menu --------------------------------------------------------------- 13. Select an option (described in Boot Manager Utilities on page 349). NOTE: If you select option 4, pay attention to the console so you do not miss a series of five periods displayed one second apart, and then press any key twice to access the image boot menu. Example The following example from a Network Security appliance accesses the Tools menu. © 2019 FireEye 355 Central Management Administration Guide CHAPTER 21: Boot Manager Utilities nx-03 (config) # reload Configuration changed: save changes? Configuration changes saved. Rebooting... ... boot: Booting from local disk... PXE-MOF: Exiting Intel Boot Agent. Booting default image in 3 seconds. ... This terminal is not active or input for output while booting. Booting default image in 1 seconds. Boot Menu --------------------------------------------------------------0: wmps wMPS (wMPS) 8.0.0... 1: wmps wMPS (wMPS) 8.0.0... 2: Tools Menu --------------------------------------------------------------Use the ^ and v keys to select which entry is highlighted. Press enter to boot the selected image or 'p' to enter a password to unlock the next set of features. Highlighted entry is 2: Booting: 'Tools Menu' Password: ******** ....... Boot Menu --------------------------------------------------------------0: Reset admin Password 1: Wipe Appliance Media 2: Manufacture Appliance 3: Wipe Appliance Media and Manufacture Appliance 4: Return to Image Boot Menu --------------------------------------------------------------Use the ^ and v keys to select which entry is highlighted. Press enter to boot the selected image or 'p' to enter a password to unlock the next set of features. Highlighted entry is 0: NOTE: The 'p' option cited in the console instructions is not available. Disabling the Tools Menu To prevent users from accessing the Tools menu, disable the Tools menu password. 356 © 2019 FireEye Release 8.7 Working with the Tools Menu Prerequisites l Admin access Disabling the Tools Menu Using the CLI Use the commands in this section to disable the Tools menu password, which prevents users from accessing the Tools menu. To disable the Tools menu: 1. Log into the appliance CLI. 2. Go to CLI configuration mode: hostname > enable hostname # configure terminal 3. Disable the password: hostname (config) # boot bootmgr tools disable password 4. Save your change: hostname (config) # write memory Viewing Tools Menu Availability You can view whether the Tools menu is available on the appliance. Prerequisites l Monitor, Operator, or Admin access Viewing Tools Menu Availability Using the CLI Use either of the following commands to view whether users can access the Tools menu. l show bootvar l show images If a Tools menu password is set (either the default password or a configured password), users can access the Tools menu. If the Tools menu password is disabled, users cannot access the Tools menu. Examples The following example from a Network Security appliance shows that the Tools menu password is set, so users can access the Tools menu. © 2019 FireEye 357 Central Management Administration Guide CHAPTER 21: Boot Manager Utilities nx-05 > show bootvar Installed images: Partition 1: wmps wMPS (wMPS) 7.4.0 xxx Partition 2: wmps wMPS (wMPS) 8.0.0 xxx Last boot partition: 1 Next boot partition: 1 Boot manager admin password: undisclosed password set Boot manager tools menu password: undisclosed password set ... The following example shows that the Tools menu password is disabled, so users cannot access the Tools menu. nx-01 > show images Installed images: Partition 1: wmps wMPS (wMPS) 7.4.0 ... Partition 2: wmps wMPS (wMPS) 8.0.0 ... No image files are available to be installed. No image install currently in progress. Boot manager admin password: Boot manager tools menu password: undisclosed password set password disabled Wiping Persistent Media You can securely erase (wipe) proprietary and confidential data from the persistent media on an appliance before you return it to FireEye at the end of an evaluation or when you need to use a Return of Materials Authorization (RMA) to replace the appliance. The secure erase operation overwrites every addressable byte of the media device at least once, and then verifies that the operation succeeded. You use the Tools (also known as Boot) menu in the boot manager to perform these actions. The boot manager requires serial or physical console access and a password. You can either wipe the appliance media only or wipe the appliance media and manufacture the appliance. These options are described in Boot Manager Utilities on page 349. The media wipe operation could take from six to ten hours, depending on the disk size. The status of the current operation is displayed in the console so you can monitor the progress, which is refreshed periodically. 358 © 2019 FireEye Release 8.7 Wiping Persistent Media Prerequisites l Make sure the requirements for the Tools menu are met. See System Requirements on page 350. Wiping Persistent Media Using the Tools Menu Use the procedure in this section to wipe persistent media from the appliance. To wipe persistent media: 1. Go to the Tools (displayed as Boot) menu as described in Accessing the Tools Menu on page 354. Boot Menu --------------------------------------------------------------0: Reset admin Password 1: Wipe Appliance Media 2: Manufacture Appliance 3: Wipe Appliance Media and Manufacture Appliance 4: Return to Image Boot Menu --------------------------------------------------------------- 2. To only wipe the media, use the ^ and v keys to select 1: Wipe Appliance Media. CAUTION: This option will leave the appliance unusable. 3. To both wipe the media and then manufacture the appliance, select 3: Wipe Appliance Media and Manufacture Appliance. 4. Press Enter. Example The following example from an Network Security appliance accesses the Tools menu, and then wipes the appliance media and manufactures the appliance. For brevity, some console output is omitted. nx-03 (config) # reload Configuration changed: save changes? Configuration changes saved. Rebooting... ... boot: Booting from local disk... PXE-MOF: Exiting Intel Boot Agent. Booting default image in 3 seconds. ... This terminal is not active for input or output while booting. Booting default image in 1 seconds. © 2019 FireEye 359 Central Management Administration Guide CHAPTER 21: Boot Manager Utilities Boot Menu --------------------------------------------------------------0: wmps wMPS (wMPS) 8.0.0... 1: wmps wMPS (wMPS) 7.9.4... 2: Tools Menu --------------------------------------------------------------Use the ^ and v keys to select which entry is highlighted. Press enter to boot the selected image or 'p' to enter a password to unlock the next set of features. Highlighted entry is 2: Booting: 'Tools Menu' Password: ******** ....... Boot Menu --------------------------------------------------------------0: Reset admin Password 1: Wipe Appliance Media 2: Manufacture Appliance 3: Wipe Appliance Media and Manufacture Appliance 4: Return to Image Boot Menu --------------------------------------------------------------Use the ^ and v keys to select which entry is highlighted. Press enter to boot the selected image or 'p' to enter a password to unlock the next set of features. Highlighted entry is 3: Booting: 'Wipe Appliance Media and Manufacture Appliance' ... Running /etc/init.d/rcS.d/S33diskwipe - Preparing to run diskwipe... *** WARNING: DO NOT POWER OFF! *** == Detecting disks to wipe == Wiping system disks scrub: using NNSA NAP-14.1-C patterns scrub: please verify that device size below is correct! scrub: scrubbing /dev/sda 1919313510400 bytes (~1787GB) scrub: random |.......| .................. NOTE: The 'p' option cited in the console instructions is not available. 360 © 2019 FireEye Central Management Administration Guide PART IV: Appliances l Adding and Removing Appliances on page 363 l Viewing and Modifying Managed Appliance Information on page 373 l Configuring Managed Appliances on page 383 l Using Appliance Groups and Command Profiles on page 405 l Monitoring Aggregated Alert Data on page 421 l Working with Reports for Managed Appliances on page 443 l Checking Status and Health of Managed Appliances on page 489 l Updating Managed Appliances on page 499 l Configuring Custom IOC Feeds on page 505 l Filtering Alerts Using Tags and Rules on page 525 © 2019 FireEye 361 Central Management Administration Guide 362 PART IV: Appliances © 2019 FireEye Central Management Administration Guide Adding an Appliance (Using the Central Management Appliance) CHAPTER 22: Adding and Removing Appliances Appliances can be added to a Central Management network for management in two ways: l l A Central Management administrator can add an appliances directly from the Central Management appliance. This is a server-initiated connection. For details, see Adding an Appliance (Using the Central Management Appliance) below. An appliance administrator can send a request for management to the Central Management appliance, and a Central Management administrator can accept or reject the request. This is a client-initiated connection. For details, see Accepting a Management Request on page 366. For information about removing a managed appliance, see Removing a Managed Appliance from the Central Management Network on page 371. Adding an Appliance (Using the Central Management Appliance) A Central Management administrator can add an appliance to the Central Management appliance. IMPORTANT! See Adding an Appliance in a NAT Deployment (Using the Central Management Appliance) on page 584 for procedures to follow in a NAT deployment. Prerequisites l Admin access to the Central Management appliance l Unique hostname for each appliance being added © 2019 FireEye 363 Central Management Administration Guide l CHAPTER 22: Adding and Removing Appliances Remote user credentials. This is a managed appliance "admin" user that the Central Management appliance uses to log in to the appliance to establish the connection. See User Authentication on page 558 for details about configuring the remote user. Adding an Appliance Using the Central Management Web UI Use the Add New Sensor dialog box to add an appliance to the Central Management appliance. When you add an appliance, "password" is the initial authentication type, so a username and password must be provided for the remote user that logs in to the appliance to establish the connection. After the appliance is added, you can change the authentication type as described in Configuring User Authentication Using the Web UI on page 562. IMPORTANT! You can use the Web UI to add appliances with publicly accessible IP addresses only. For information about adding appliances with publicly inaccessible IP addresses, see Adding an Appliance in a NAT Deployment (Using the Central Management Appliance) on page 584. To add an appliance: 1. Click the Appliances tab. The Sensors tab should be selected. 2. Click Actions > Add Sensor. The Add New Sensor dialog box opens. 3. In the Sensor Name box, enter a unique name that identifies the appliance. 4. In the IP Address box, enter the appliance IP address. 364 © 2019 FireEye Release 8.7 Adding an Appliance (Using the Central Management Appliance) 5. In the Username and Password boxes, enter the credentials for the remote user. These are the credentials for an existing user on the appliance you are adding. 6. (Optional) In the Comments box, enter explanatory information about the appliance. 7. (Required for compliance mode; optional for non-compliance mode) Enter the appliance host key (beginning with the appliance IP address) in the Host Key box. For details, see Importing a Host Key into the Global Host-Keys Database Using the Web UI on page 568. 8. Click Add. The appliance is added to the list on the page, and it becomes a member of the system group for that appliance type. You can add the appliance to a different group or create a new group for the appliance as described in Grouping Appliances on page 405. NOTE: See Viewing Managed Appliance Information Using the Web UI on page 375 for information about the status indicators and the actions you can take from this page. Adding an Appliance Using the Central Management CLI Use the commands in this section to add an appliance to the Central Management appliance. NOTE: The procedure in this section includes the basic steps for adding an appliance. Additional options are available. See Configuring Secure Shell (SSH) Authentication on page 557 for information about public key and host authentication. See the CLI Command Reference for a full list of the cmc... commands and details about their parameters and usage. To add an appliance: 1. Log in to the Central Management CLI. 2. Enable the CLI configuration mode: cm-hostname > enable cm-hostname # configure terminal 3. Specify the appliance IP address: cm-hostname (config) # cmc appliance <applianceID> address <IPaddress> where applianceID is the appliance record name and IPaddress is its IP address. IMPORTANT: Specify the IP address, not the hostname. Otherwise, if the hostname changes later, the connection will be broken and the appliance will need to be added again. © 2019 FireEye 365 Central Management Administration Guide CHAPTER 22: Adding and Removing Appliances 4. (Optional) Specify the appliance port: cm-hostname (config) # cmc appliance <applianceID> port <port> The port defaults to 22 if it is not specified. 5. Configure authentication for the remote user (an existing user on the appliance you are adding): cm-hostname (config) # cmc appliance <applianceID> authtype <authtype> cm-hostname (config) # cmc appliance <applianceID> auth <authtype> username <username> cm-hostname (config) # cmc appliance <applianceID> auth <authtype> password <password> | identity <identity> where authtype can be password, ssh-dsa2, or ssh-rsa2. (See Configuring User Authentication Using the CLI on page 563 for details.) 6. (Optional) Add a comment describing the appliance: cm-hostname (config) # cmc appliance <applianceID> comment <comment> 7. (Required for compliance mode; optional for non-compliance mode) Configure the appliance host key (beginning with the appliance IP address). For details, see Importing a Host Key into the Global Host-Keys Database Using the CLI on page 570. 8. Save your changes: cm-hostname (config) # write memory Example cm-hostname cm-hostname cm-hostname cm-hostname cm-hostname (config) (config) (config) (config) (config) # # # # # cmc cmc cmc cmc cmc appliance appliance appliance appliance appliance Acme-NX Acme-NX Acme-NX Acme-NX Acme-NX address 172.00.00.00 authtype password password username admin3 password password 12345abcde comment New York NX Series Accepting a Management Request A Central Management administrator can view a list of appliances that requested to be added for management, and accept or reject them. After a request is accepted, the appliance is added to the Central Management appliance. Requirements for Establishing a Successful Connection To accept a management request and successfully establish and maintain the connection, the following must be in place: 366 © 2019 FireEye Release 8.7 l l l Accepting a Management Request The rendezvous process enabled on the Central Management appliance (enabled by default). To verify and enable the process, see Preparing the Central Management to Accept a Management Request below. The appliance has a permanent hostname. If the hostname is changed, the connection will be broken and cannot be reset. If this happens, the appliance must be removed from the Central Management appliance and then added again using the new hostname. The Central Management appliance and the requesting appliance have the same service name. The rendezvous process has an identifier (known as service name) that is set to "cmc" by default. The Central Management appliance and the requesting appliance must have the same service name; if you change the service name on one, you must change it on the other as well. The cmc rendezvous service-namehostname command changes the service name; the no cmc rendezvous service-name command restores the default value. For details, see the CLI Command Reference. The auto-connect feature must be enabled on the requesting appliance. To prevent future connection issues, do not enable the auto-connect feature from the Central Management appliance on behalf of a managed appliance that was added using a client-initiated connection. The value of the Auto-connect field in the output of the show cmc client command on the managed appliance is yes. The value of the Auto-connect field in the output of the show cmc appliance <appliance ID> command on the Central Management appliance is no. See Accepting a Management Request in a NAT Deployment on page 586 for procedures to follow in a NAT deployment. Prerequisites l Admin access Preparing the Central Management to Accept a Management Request Use the commands in this section to prepare the Central Management appliance to accept or reject a request by an appliance to be added for management. To prepare to accept a request to be managed: 1. Log in to the Central Management CLI. 2. Verify that the rendezvous process is enabled: cm-hostname > enable cm-hostname # show cmc rendezvous © 2019 FireEye 367 Central Management Administration Guide CHAPTER 22: Adding and Removing Appliances 3. If Server rendezvous enabled: no is shown: a. Enable the rendezvous process: cm-hostname # configure terminal cm-hostname (config) # cmc rendezvous server enable b. Save your changes: cm-hostname (config) # write memory Accepting a Management Request Using the Central Management Web UI Use the Connection Requests dialog box to accept (or reject) a request to be managed. NOTE: If any requests from appliances are waiting for approval, a message is displayed in the notification bell at the top right of the Central Management Web UI. To accept a request to be managed from an appliance: 1. If the Central Management appliance has never accepted a request for management, ensure that it meets the requirements described in Preparing the Central Management to Accept a Management Request on the previous page. 368 © 2019 FireEye Release 8.7 Accepting a Management Request 2. Log in to the Central Management Web UI. 3. Do one of the following to open the Connection Requests dialog box: l l Click the button in the Dashboard message. Click the Appliances tab. The Sensors tab should be selected. Click Actions > Waiting Connection Requests. The IP address and hostname of the requesting appliance are displayed. 4. To approve the request and add the appliance: a. Select its checkbox and then click Accept. b. When prompted, confirm your action. The appliance is added to the list on the page, and it becomes a member of the system group for that appliance type. The appliance hostname becomes the display name shown in the Sensor column. You can add the appliance to a different group or create a new group for the appliance as described in Grouping Appliances on page 405. 5. To reject the request (for example, if you do not recognize the appliance): a. Select its checkbox and then click Reject. b. When prompted, confirm your action. NOTE: See Viewing Managed Appliance Information Using the Web UI on page 375 for information about the status indicators and the actions you can take from this page. Accepting a Management Request Using the Central Management CLI Use the commands in this section to accept or reject a request by an appliance to be added to the Central Management appliance for management. To accept a request to be managed: 1. If the Central Management appliance has never accepted a request for management, ensure that it meets the requirements described in Preparing the Central Management to Accept a Management Request on page 367. 2. Log in to the Central Management CLI. 3. Go to CLI configuration mode: hostname > enable hostname # configure terminal © 2019 FireEye 369 Central Management Administration Guide CHAPTER 22: Adding and Removing Appliances 4. View the list of requests: cm-hostname (config) show cmc rendezvous 5. Accept one or more requests. l To accept a specific appliance: cm-hostname (config) # cmc rendezvous server accept client <hostname> where <hostname> is the hostname of the requesting appliance. l To accept all appliances in the list: cm-hostname (config) # cmc rendezvous server accept all 6. Save your changes. hostname (config) # write memory To reject a request to be managed: 1. Go to CLI configuration mode: hostname > enable hostname # configure terminal 2. View the list of requests: cm-hostname (config) # show cmc rendezvous 3. Reject one or more requests: l To reject a specific appliance: cm-hostname (config) # no cmc rendezvous server accept client <hostname> where <hostname> is the hostname of the requesting appliance. l To reject all appliances in the list: cm-hostname (config) # no cmc rendezvous server accept all 4. Save your changes. hostname (config) # write memory Example In this example, the request from the nx-02 appliance is accepted and the request from the nx-04 appliance is rejected. hostname (config) # show cmc rendezvous CMC rendezvous service name: cmc CMC server: Server rendezvous enabled: yes Auto-accept enabled: no Clients waiting approval: nx-02 (172.14.10.00) 370 © 2019 FireEye Release 8.7 Removing a Managed Appliance from the Central Management Network nx-04 (172.14.20.00) ... hostname (config) # cmc rendezvous server accept client nx-02 hostname (config) # no cmc rendezvous server accept client nx-04 hostname (config) # write memory Removing a Managed Appliance from the Central Management Network When you remove a managed appliance from the Central Management network, all aggregated data (including alert information) associated with the appliance is also removed. When you subsequently add back the appliance, the data is restored, but all alerts generated by the appliance are assigned new IDs. IMPORTANT! Because the alerts have new IDs when an appliance is added back to the Central Management appliance, Endpoint Security links for alerts will break if the alerts were generated by the appliance before it was removed from the Central Management appliance. Prerequisites l Admin access Removing a Managed Appliance from the Central Management Network Using the Web UI Use the Sensors page to remove an appliance from the Central Management network. NOTE: The Un-Enroll And Delete link is used to remove an Network Security sensor from an MVX cluster and then remove it from the Central Management appliance. For details, refer to the MVX Smart Grid Administration Guide or the Cloud MVX Administration Guide. © 2019 FireEye 371 Central Management Administration Guide CHAPTER 22: Adding and Removing Appliances To remove an appliance: 1. Click the Appliances tab. The Sensors tab should be selected. 2. Click Select > Delete in the row for the appliance you to want to remove. 3. If the Network Security sensor is enrolled with the MVX cluster, click Un-Enroll And Delete in the row for the sensor you want to remove. 4. When prompted, click OK to confirm your action. NOTE: Removing an appliance can take a long time if the Central Management appliance is busy aggregating data. Removing a Managed Appliance from the Central Management Network Using the CLI Use the commands in this section to remove an appliance from the Central Management network. To remove an appliance: 1. Go to CLI configuration mode: hostname > enable hostname # configure terminal 2. Remove the appliance: hostname (config) # no cmc appliance <applianceName> 3. Save your changes: hostname (config) # write memory NOTE: Removing an appliance can take a long time if the Central Management appliance is busy aggregating data. Example This example removes the FX-03 appliance from management. hostname (config) # no cmc appliance FX-03 372 © 2019 FireEye Central Management Administration Guide CHAPTER 23: Viewing and Modifying Managed Appliance Information You can view information about managed appliances in the Central Management Web UI or CLI. You might need to modify information about a managed appliance. Reasons for doing so include: l The password for the remote user changes due to password change policies. (This is the user that logs in to the appliance to establish the connection.) l You need to change the remote user authentication type to SSH-DSA2 or SSH-RSA2. l The appliance IP address changes. l You need to provide the global host-key for a managed appliance because global host-key authentication is enforced. The following table describes the managed appliance information. Appliance Information Field Description Sensor The unique name that identifies the appliance. Product The appliance type (for example, AX, EX, FX, HX, NX, NX - IPS, Network Security [SmartVision Edition]). IP The IP address of the appliance's management interface. Sensor ID The unique sensor ID of the appliance. Model Number The model number of the appliance. © 2019 FireEye 373 Central Management Administration Guide Field 374 CHAPTER 23: Viewing and Modifying Managed Appliance Information Description Cluster Enrollment The MVX cluster with which the sensor is enrolled and the broker to which it is connected. For details about cluster enrollment, refer to the MVX Smart Grid Administration Guide or the Cloud MVX Administration Guide. Connection The status of the connection between the Central Management appliance and the managed appliance. Public Key Used The SSH-DSA2 or SSH-RSA2 key used to authenticate the remote user the Central Management appliance uses to log in to the appliance for management. This field is empty if password authentication is being used. Health The status of the appliance health. Last Contact The last time the Central Management appliance contacted the managed appliance to get its status and health check data. Last Connected The last time the Central Management appliance and the managed appliance connected to each other, either initially or after a broken connection was restored. Last Broken The last time the Central Management appliance and the managed appliance lost their connection. Member Groups The groups of which the appliance is a member, including the reserved system group. EULA Whether the terms of the FireEye End User License Agreement (EULA) were accepted when the appliance was first configured. Version The version of the appliance's software image. Security Content Version The version of the security content installed on the appliance. Timestamp (UTC) The last time security content was generated for the appliance. Guest Image Version The guest images profiles installed on the appliance. © 2019 FireEye Release 8.7 Viewing Managed Appliance Information Using the Web UI Field Description Enabled (CLI only) Whether the appliance can be managed by the Central Management appliance . Version compatible Whether the Central Management appliance supports this version of the appliance. Prerequisites l Monitor, Operator, or Admin access Viewing Managed Appliance Information Using the Web UI Use the Sensors page to view information about managed appliances. For information about tasks you can perform from this page, see: l l Configuring User Authentication Using the Web UI on page 562 Importing a Host Key into the Global Host-Keys Database Using the Web UI on page 568 l Creating and Managing Groups Using the Web UI on page 406 l Adding Appliances to Groups Using the Web UI on page 410 l Modifying Managed Appliance Information Using the Web UI on page 379 l Checking Status and Health of Managed Appliances Using the Web UI on page 490 l Removing a Managed Appliance from the Central Management Network Using the Web UI on page 371 See Appliance Information on page 373 for a description of the fields on the page. © 2019 FireEye 375 Central Management Administration Guide CHAPTER 23: Viewing and Modifying Managed Appliance Information NOTE: The Create HA Pair link is used to create an NX Series high availability (HA) pair. For details, see the NX Series High Availability Guide. To view appliance information: 1. Click the Appliances tab. The Sensors tab should be selected. 2. By default, appliances in all groups are displayed. To filter by appliance group, select a group in the Sensor Group list. 3. By default, ten appliances are displayed on each page. To show all appliances on one page, click Show All. To return to the paginated view, click paginate. 4. To view detailed information about an appliance, click the appliance name in the Sensor column. 376 © 2019 FireEye Release 8.7 Viewing Managed Appliance Information Using the Web UI 5. To determine how the connection between the Central Management appliance and the managed appliance was initiated, rest your cursor over the icon in the Connection column. If the Central Management appliance initiated the connection, server-initiated is displayed. If the appliance initiated the connection, clientinitiated is displayed. © 2019 FireEye 377 Central Management Administration Guide CHAPTER 23: Viewing and Modifying Managed Appliance Information Viewing Managed Appliance Information Using the CLI Use the commands in this section to view information about managed appliances. NOTE: See Appliance Information on page 373 for a description of the command output. To view appliance information: 1. Go to CLI enable mode: hostname > enable 2. View basic appliance information: hostname # show cmc appliances 3. View the groups to which the appliances belong: hostname # show cmc groups 4. View detailed information about a specific appliance: hostname # show cmc appliances <applianceName> Example This example shows basic information about the three appliances this Central Management appliance manages. hostname # show cmc appliances Appliance FX-03: Address: 172.16.109.163 Enabled: yes Connected: yes (server-initiated) Status check OK: no Version compatible: yes Appliance HX-05: Address: Enabled: Connected: 378 10.2.201.20 yes yes (server-initiated) © 2019 FireEye Release 8.7 Modifying Managed Appliance Information Using the Web UI Status check OK: Version compatible: Appliance NX-04: Address: Enabled: Connected: Status check OK: Version compatible: yes no 172.16.74.50 yes yes (server-initiated) yes yes NOTE: For an example of the show cmc groups command output, see Adding Appliances to Groups Using the CLI on page 410. For an example of the show cmc appliances <applianceName> command output, see Checking Status and Health of Managed Appliances Using the CLI on page 492. Modifying Managed Appliance Information Using the Web UI Use the Edit Sensor page to modify information about a managed appliance. To modify appliance information: 1. Click the Appliances tab. The Sensors tab should be selected. 2. Click Select > Edit in the row for the appliance you need to modify. The Edit Sensor dialog box opens. 3. Edit the fields as needed and then click Update. 4. Verify that the updated information is displayed in the row for the appliance. IMPORTANT! The Edit menu item is not available if the managed appliance initiated the connection to the Central Management appliance, as described in Accepting a Management Request on page 366 and the System Administration Guide or Administration Guide for the appliance. © 2019 FireEye 379 Central Management Administration Guide CHAPTER 23: Viewing and Modifying Managed Appliance Information Modifying Managed Appliance Information Using the CLI Use the commands in this section to modify information about managed appliances. CAUTION! Do not change an appliance's hostname if the appliance initiated the connection to the Central Management appliance. NOTE: This section does not include all appliance modification commands. For a full list of commands, see the cmc appliance <applianceName> commands in the CLI Command Reference. To modify appliance information: 1. Go to CLI configuration mode: hostname > enable hostname # configure terminal 2. To change the appliance IP address: hostname (config) # cmc appliance <applianceName> address <ipAddress> | <hostname> 3. To rename the appliance: hostname (config) # cmc appliance <applianceName> rename <newName> 4. To add or modify a comment about the appliance: hostname (config) # cmc appliance <applianceName> comment "<comment>" where commentText must be enclosed in double quotation marks. 5. To change the remote user: hostname (config) # cmc appliance <applianceName> auth password username <username> 6. To change the password: hostname (config) # cmc appliance <applianceName> auth password password <password> 7. Verify your changes: hostname (config) # show cmc appliance <applianceName> 8. Save your changes: hostname (config) # write memory 380 © 2019 FireEye Release 8.7 Modifying Managed Appliance Information Using the CLI NOTE: This procedure shows how to change the credentials for password authentication. For information about changing ssh-dsa2 and ssh-rsa2 authentication credentials, see Configuring User Authentication Using the CLI on page 563. To configure a host key for global host-key authentication, see Importing a Host Key into the Global Host-Keys Database Using the CLI on page 570. Example This example changes the NX-04 appliance name and comment. hostname (config) # cmc appliance NX-04 rename NX-07 hostname (config) # cmc appliance NX-07 comment "NX Series appliance" © 2019 FireEye 381 Central Management Administration Guide 382 CHAPTER 23: Viewing and Modifying Managed Appliance Information © 2019 FireEye Central Management Administration Guide CHAPTER 24: Configuring Managed Appliances When an appliance is under the management of the Central Management appliance, appliance configuration tasks can be performed from either the Central Management appliance or the managed appliances. However, FireEye recommends making configuration changes centrally from the Central Management appliance instead of from the managed appliances for the following reasons: l l It is more efficient because the tasks can be performed from a single interface—the Central Management Web UI or CLI. Changes you make on individual appliances could inadvertently override global settings for managed appliances. (By default, you cannot enter configuration mode in the CLI of a managed appliance until you confirm that you understand that this could happen.) You can centrally configure settings for managed appliances using the Central Management Web UI (primarily under the Appliance Settings tab) or by using the cmc execute commands in the Central Management CLI. Prerequisites l l Admin access to use the cmc execute commands Admin access to most Appliance Settings pages, such as User Accounts and Appliance Licenses. Admin or Operator access to some Appliance Settings pages, such as Network, Login Banner, and YARA Rules. © 2019 FireEye 383 Central Management Administration Guide CHAPTER 24: Configuring Managed Appliances Configuring Managed Appliances Using the Web UI Use the Appliance Settings pages to configure managed appliances. Only appliance setting options specific to the appliances currently being managed by the Central Management appliance are displayed on the sidebar under the Appliance Settings tab. For example, in the following illustration, the Inline Operational Modes tab is only displayed for managed Network Security appliances. On the individual settings pages, only information specific to the appliances currently being managed is displayed. For example, only license notifications specific to those appliances are displayed in the Appliance Settings: Appliance Licenses page. When a single appliance is selected on a common settings page, the Write to group control is displayed at the top of the page. If the control is set to On when you apply a change, the change is pushed to all appliances in the group selection. For example, in the following illustration, after you click Add User, Jim will be added to all appliances being managed by the Central Management appliance because All Groups is selected as the group. (If a specific group were selected, he would be added to all of the appliances in that group.) NOTE: If a change is related to a new feature, the change will only be applied to those appliances running the minimum required version. 384 © 2019 FireEye Release 8.7 Configuring Managed Appliances Using the Web UI Configuring Network Settings for Managed Appliances Using the Web UI Use the Appliance Settings: Network page to configure network settings on managed appliances. To configure network settings: 1. Click Settings and then select Appliance Settings. 2. Click Network in the sidebar. 3. (Optional) Use the controls at the top of the page to define the scope of the changes. 4. Configure settings as described in the System Administration Guide or Administration Guide for the managed appliance. Setting the Appliance Date and Time Manually on Managed Appliances Using the Web UI Use the Appliance Settings: Date and Time page to set the date and time manually on managed appliances. To set the date and time: 1. Click Settings and then select Appliance Settings. 2. Click Date and Time in the sidebar. 3. (Optional) Use the controls at the top of the page to define the scope of the changes. 4. Configure settings as described in the System Administration Guide or Administration Guide for the managed appliance. Managing Licenses for Managed Appliances Using the Web UI Use the Appliance Settings: Appliance Licenses page to manage licenses on managed appliances. To manage licenses: 1. Click Settings and then select Appliance Settings. 2. Click Appliance Licenses in the sidebar. 3. (Optional) Use the controls at the top of the page to define the scope of the changes. 4. Configure settings as described in the System Administration Guide or Administration Guide for the managed appliance. © 2019 FireEye 385 Central Management Administration Guide CHAPTER 24: Configuring Managed Appliances Configuring NTP Servers for Managed Appliances Using the Web UI Use the Appliance Settings: Date and Time page to configure NTP servers on managed appliances. To configure NTP servers: 1. Click Settings and then select Appliance Settings. 2. Click Date and Time in the sidebar. 3. (Optional) Use the controls at the top of the page to define the scope of the changes. 4. Configure settings as described in the System Administration Guide or Administration Guide for the managed appliance. Configuring System Email Settings for Managed Appliances Using the Web UI Use the Appliance Settings: Email page to configure system email settings on managed appliances. To configure system email settings: 1. Click Settings and then select Appliance Settings. 2. Click Email in the sidebar. 3. (Optional) Use the controls at the top of the page to define the scope of the changes. 4. Configure settings as described in the System Administration Guide or Administration Guide for the managed appliance. Configuring DTI Network Settings for Managed Appliances Using the Web UI Use the Appliance Settings: DTI Network page to configure DTI network settings on managed appliances. To configure DTI network settings: 1. Click Settings and then select Appliance Settings. 2. Click DTI Network in the sidebar. 3. (Optional) Use the controls at the top of the page to define the scope of the changes. 4. Configure settings as described in the System Administration Guide or Administration Guide for the managed appliance. 386 © 2019 FireEye Release 8.7 Configuring Managed Appliances Using the Web UI Customizing Appliance Login Messages for Managed Appliances Using the Web UI Use the Appliance Settings: Login Banner page to customize the messages users see when they log in to managed appliances. To customize login messages: 1. Click Settings and then select Appliance Settings. 2. Click Login Banner in the sidebar. 3. (Optional) Use the controls at the top of the page to define the scope of the changes. 4. Configure settings as described in the System Administration Guide or Administration Guide for the managed appliance. Configuring Guest Images for Managed Appliances Using the Web UI NOTE: Guest images will not be available on an Network Security or File Security sensor or sensor-enabled Network Security integrated appliance. Use the Appliance Settings: Guest Images page to view guest images on managed appliances. To view guest images: 1. Click Settings and then select Appliance Settings. 2. Click Guest Images in the sidebar. 3. (Optional) Use the controls at the top of the page to filter the results. 4. Configure settings as described in the User Guide for the managed appliance. Uploading Certificates to Managed Appliances Using the Web UI Use the Appliance Settings: Certificates/Keys page to upload certificates to managed appliances. To upload certificates: 1. Click Settings and then select Appliance Settings. 2. Click Certificates/Keys in the sidebar. 3. (Optional) Use the controls at the top of the page to define the scope of the changes. 4. Configure settings as described in the System Security Guide. © 2019 FireEye 387 Central Management Administration Guide CHAPTER 24: Configuring Managed Appliances Managing Users on Managed Appliances Using the Web UI Use the Appliance Settings: User Accounts page to manage users on managed appliances. To manage user accounts: 1. Click Settings and then select Appliance Settings. 2. Click User Accounts in the sidebar. 3. (Optional) Use the controls at the top of the page to define the scope of the changes. 4. Configure settings as described in the System Security Guide. Configuring Event Notifications for Managed Appliances Using the Web UI IMPORTANT! Do not configure notifications for managed appliances (and remove any existing notifications) if you are using centralized alert management as described in Centralized Notifications on page 421. Use the Appliance Settings: Notifications page to configure event notifications on managed appliances. To configure event notifications: 1. Click Settings and then select Appliance Settings. 2. Click Notifications in the sidebar. 3. (Optional) Use the controls at the top of the page to define the scope of the changes. 4. Configure settings as described in the User Guide for the managed appliance. For IPS-enabled Network Security appliances, configure settings as described in the IPS Feature Guide. Configuring File Types for Managed Malware Analysis Appliances to Analyze Using the Web UI Use the Appliance Settings: Malware File Assoc. page to configure the file types managed Malware Analysis appliances should analyze. NOTE: You must explicitly enable the display of this page. To do so, use the cmc execute appliance <applianceID> command "guest-images fileassociation display on" command in the CLI configuration mode. 388 © 2019 FireEye Release 8.7 Configuring Managed Appliances Using the Web UI To configure file types for analysis: 1. Click Settings and then select Appliance Settings. 2. Click Malware File Association in the sidebar. 3. (Optional) Use the controls at the top of the page to define the scope of the changes. 4. Configure settings as described in the AX Series User Guide. Generating Reports for Managed Appliances Using the Web UI Use the Generate Report page to generate static reports for managed appliances. To generate static reports: 1. In the Web UI, choose Reports > Static Reports. 2. Generate the static reports as described in the User Guide for the managed appliance. For information about generating a SmartVision alerts report, see the NX Series SmartVision Feature Guide. For SmartVision appliances, generate the SmartVision Alert static report as described in the NX Series SmartVision Feature Guide. A SmartVision appliance can be any of the following: o SmartVision Edition sensor o SmartVision-enabled NX Series sensor o SmartVision-enabled NX Series integrated appliance You can generate a SmartVision Alerts report from the Web UI only. A SmartVision Alerts report cannot be customized. For IPS-enabled Network Security appliances, generate the static reports as described in the IPS Feature Guide. Scheduling Reports for Managed Appliances Using the Web UI Use the Schedule Report page to schedule static or custom reports for managed appliances. You can schedule custom reports that have been generated for managed Email Security — Server Edition, Network Security, and File Security appliances if you select the Make Schedulable checkbox in the Reports > Custom Reports page on the Central Management appliance. © 2019 FireEye 389 Central Management Administration Guide CHAPTER 24: Configuring Managed Appliances To schedule static reports: 1. In the Web UI, choose Reports > Schedule Reports. 2. Schedule the static reports as described in the User Guide for the managed appliance. For IPS-enabled Network Security appliances, schedule the static reports as described in the IPS Feature Guide. You can schedule a SmartVision Alerts report from the Web UI only. A SmartVision Alerts report cannot be customized. To schedule custom reports: 1. In the Central Management appliance Web UI, choose Reports > Schedule Reports. 2. In the Report Type drop-down menu under "Custom Reports", select the custom report that has been generated for managed Email Security — Server Edition, Network Security, and File Security appliances. 3. In the Scheduled drop-down menu, set the time frequency: l hourly l daily l weekly l monthly 4. In the Time drop-down menu, set the time of day in hours and minutes (00:00). 5. If you selected a weekly report, specify the report day of the week in the WeekDay field. 6. If you selected a monthly report, specify the report day of the month in the MonthDay field. 7. In the Delivery drop-down menu, specify the delivery method. The default delivery is email. l email—Deliver the custom report as a file attached to email. l file—Deliver the custom report as a file linked from the Web UI. 8. In the Time Frame drop-down menu, select the time period for this custom report: l past day—Report covers analysis generated during the past 24 hours. l past week—Report covers analysis generated during the past 7 days. l past month—Report covers analysis generated during the past 1 month. l past 3 months—Report covers analysis generated during the past 3 months. 9. Click Schedule Report. The scheduled report is added to the top of the scheduling list. 390 © 2019 FireEye Release 8.7 Configuring Managed Appliances Using the Web UI Enabling or Disabling Riskware Detection Custom Policy Rules for Managed Appliances Using the Web UI When riskware detection is enabled on a managed Network Security or Email Security — Server Edition appliance, you can use the Appliance Settings > Riskware Policy page to enable or disable a particular policy rule. When you enable at least one matched policy rule on a managed Network Security or Email Security — Server Edition appliance, you can have the managed appliance generate a riskware alert on a nonmalicious submission. For managed Email Security — Server Edition appliances, you can also choose to block an email from being delivered to the intended recipient. For more information about this feature, see the Network Security Guide or Email Security — Server Edition User Guide. To enable or disable riskware detection custom policy rules: 1. Click the Settings and then select Appliance Settings. 2. Click Riskware Policy in the sidebar. 3. Configure settings as described in the Network Security Guide or Email Security — Server Edition User Guide. Configuring Inline Operational Modes for Managed NX Series Appliances Using the Web UI Use the Appliance Settings: Interfaces - Operational Modes page to configure inline operational modes for managed NX Series appliances. NOTE: SmartVision Edition sensors and SmartVision-enabled Network Security sensors and integrated appliances are not supported in inline deployments. These appliances must be deployed out-of-band using a TAP device. For more information, see “SmartVision Appliance Placement and Operational Mode” in the Network Security SmartVision Feature Guide. To configure operational modes: 1. Click Settings and then select Appliance Settings. 2. Click Inline Operational Modes in the sidebar. 3. (Optional) Use controls at the top of the page to define the scope of the changes. 4. Configure settings as described in the NX Series User Guide. © 2019 FireEye 391 Central Management Administration Guide CHAPTER 24: Configuring Managed Appliances Configuring Inline Policy Exceptions for Managed NX Series Appliances Using the Web UI Use the Appliance Settings: Interfaces - User-specified Policy Exceptions page to configure policy exceptions that customize inline operations on managed Network Security appliances. To configure policy exceptions: 1. Click Settings and then select Appliance Settings. 2. Click Inline Policy Exceptions in the sidebar. 3. (Optional) Use controls at the top of the page to define the scope of the changes. 4. Configure settings as described in the NX Series User Guide. Configuring Whitelists for Managed NX Series Appliances Using the Web UI Use the Appliance Settings: Whitelists page to configure whitelists for inline operation on managed Network Security appliances. To configure inline whitelists: 1. Click Settings and then select Appliance Settings. 2. Click Whitelists in the sidebar. 3. (Optional) Use the controls at the top of the page to define the scope of the changes. 4. Configure settings as described in the NX Series User Guide. Defining Filters for Managed NX Series Appliances Using the Web UI Use the Filters page to define filters for events on managed Network Security appliances. To define filters: 1. Click Alerts and then select NX. 2. Click Filters. 3. Configure settings as described in the NX Series User Guide. 392 © 2019 FireEye Release 8.7 Configuring Managed Appliances Using the Web UI Uploading YARA Rules to Managed Appliances Using the Web UI IMPORTANT! YARA rules are not supported on an Network Security or File Security sensor or sensor-enabled Network Security integrated appliance. Use the Appliance Settings: YARA Rules page to upload YARA rules for malware analysis to managed Network Security appliances running Release 7.7.0 or later, managed Email Security — Server Edition appliances running release 7.9.0 or later, managed VX Series appliances, and managed File Security appliances running Release 8.0.0 or later. To upload YARA rules: 1. Click Settings and then select Appliance Settings. 2. Click YARA Rules in the sidebar. 3. (Optional) Use the controls at the top of the page to define the scope of the changes. IMPORTANT! If the scope includes appliances that are not running the minimum supported release, a message informs you that the changes were not applied to those appliances. 4. Configure and upload YARA rules as described in the Network Security User Guide, the Email Security — Server Edition User Guide, VX Series Administration Guide, or File Security User Guide. Uploading Custom Rules to Managed NX Series Appliances Using the Web UI Use the Appliance Settings: Custom Rules page to upload custom rules for malware analysis to managed Network Security appliances. IMPORTANT: This page is displayed only when the custom rules feature is enabled using the Network Security CLI. To enable the feature, enter the fenet security-content custom rule enable command in the CLI configuration mode. To upload custom rules: 1. Click Settings and then select Appliance Settings. 2. Click Custom Rules in the sidebar. 3. (Optional) Use the controls at the top of the page to define the scope of the changes. IMPORTANT! If the scope includes appliances that are not running the minimum supported release, a message informs you that the changes were not applied to those appliances. © 2019 FireEye 393 Central Management Administration Guide CHAPTER 24: Configuring Managed Appliances 4. Upload custom rules as described in the NX Series User Guide. Configuring Forensic Analysis Integration on Managed NX Series Appliances Using the Web UI Use the Appliance Settings: Forensics page to integrate with packet analyzer applications that perform full packet capture and analysis for specific target and source IP addresses. Integrations with Solera Networks, RSA NetWitness, and PX Technology are supported. This page is displayed only when the integrations are enabled using CLI commands from both the Network Security CLI and the Central Management CLI. l Solera Networks—Use the forensic analysis enable command. l RSA NetWitness—Use the netwitness analysis enable command. l PX Technology—Use the npulse analysis enable command. To configure forensic analysis integration: 1. Click Settings and then select Appliance Settings. 2. Click Forensics in the sidebar. 3. (Optional) Use the controls at the top of the page to define the scope of the changes. 4. Configure the integration as described in the NX Series User Guide. Configuring IPS Settings for Managed NX Series Appliances Using the Web UI Use the IPS page on managed IPS-enabled NX Series appliances to view IPS events, enable and disable IPS-related features, manage policies and monitoring interfaces, and define custom IPS rules. To configure IPS settings: 1. Click the IPS tab at the top of the page. 2. Configure settings as described in the IPS Feature Guide. 3. (Optional) Use the controls at the top of the page to define the scope of the changes. Configuring SSL Interception for Managed NX Series Appliances Using the Web UI Use the Appliance Settings: SSL Intercept page to configure SSL interception. SSL/TLS protocols provide a secure communication between clients and servers. SSL/TLS traffic (also referred to as HTTPS) can be a security risk that can hide malicious traffic and 394 © 2019 FireEye Release 8.7 Configuring Managed Appliances Using the Web UI user activity. Without SSL interception, the NX Series appliance cannot inspect encrypted traffic for indicators of malicious activity. The SSL interception feature enables decryption and inspection of HTTPS traffic. The SSL interception feature allows the NX Series appliance to act as a proxy to intercept and to decrypt HTTPS traffic. The NX Series appliance uses certificates to establish a trusted thirdparty (man in the middle, or MitM) connection between the client and server. To configure SSL interception: 1. Click Settings and then select Appliance Settings. 2. Click SSL Intercept in the sidebar. 3. (Optional) Use the controls at the top of the page to define the scope of the changes. 4. Configure settings as described in the NX Series User Guide. Allowing Increased Detection for Managed Appliances Using the Web UI Use the Appliance Settings: Increased Detection page to select options for sending additional information to FireEye for analysis to increase detection rates. These options, which FireEye recommends, are disabled by default. The settings are applied globally to managed appliances running Release 7.8.0 or later. NOTE: See your FireEye sales representative for more information. To allow increased detection: 1. Click Settings and then select Appliance Settings. 2. Click Increased Detection. 3. Select the Suspicious metadata checkbox to send metadata your appliance flags as "likely suspicious" to FireEye for analysis. This may result in more false positives, but will also increase detection rates for actual malware. If you do not select this option, then only metadata flagged as "malicious" will be sent to FireEye. © 2019 FireEye 395 Central Management Administration Guide CHAPTER 24: Configuring Managed Appliances 4. Select the Suspicious file checkbox to send files that your appliance flags as "likely malicious" to FireEye for analysis. This may result in more false positives being sent to FireEye for analysis, but will also increase detection rates for actual malware. 5. Click Apply. NOTE: Alternatively, you can click a link on the Central Management Dashboard to open a dialog box with the same options. After you select the options, the link is no longer displayed. Enabling Advanced URL Defense on Managed CM Appliances Using the Web UI Use the Appliance Settings: Advanced URL Defense page to globally enable or disable the Advanced URL Defense feature on all qualified managed Email Security — Server Edition appliances that are connected or will be connected to this Central Management appliance. This feature sends URLs in emails to FireEye for analysis to increase detection rates. An Email Security — Server Edition appliance is qualified if it has a two-way sharing CONTENT_UPDATES license and is running Release 7.8.0 or later. (For more information about this feature, see the Email Security — Server Edition User Guide. ) IMPORTANT! This feature is disabled by default, even on Email Security — Server Edition appliances that had the feature enabled before upgrading to Release 7.8.0. NOTE: If you enable or disable this feature on a standalone Email Security — Server Edition appliance, and then add that appliance to the Central Management appliance, the global Central Management setting will override the standalone Email Security — Server Edition setting. To enable Advanced URL Defense: 1. Click Settings and then select Appliance Settings. 2. Click Advanced URL Defense in the sidebar. 3. Select the Enable Advanced URL Defense checkbox. 4. Click Apply to All. 396 © 2019 FireEye Release 8.7 Configuring Managed Appliances Using the Web UI NOTE: Alternatively, you can click a link on the Central Management Dashboard to navigate to this page. After you enable the feature, the link is no longer displayed. Configuring Email MTA Settings for Managed CM Appliances Using the Web UI Use the Appliance Settings: Email MTA page to configure an MTA (Mail Transfer Agent) so email can pass through and be analyzed by managed Email Security — Server Edition appliances. To configure email MTA settings: 1. Click Settings and then select Appliance Settings. 2. Click Email MTA in the sidebar. 3. (Optional) Use the section at the top of the page to define the scope of the changes. 4. Configure settings as described in the Email Security — Server Edition User Guide. Configuring Email Policy Using the Web UI Use the Appliance Settings: Email Policy page to configure analysis and post-analysis policies for managed Email Security — Server Edition appliances. To configure quarantine settings for the managing Central Management appliance, use the CM Settings: Email Quarantine Policy page. To configure email policy: 1. Do one of the following: l Click Settings and then select Appliance Settings. l Click Settings and then select CM Settings. 2. Click Email Policy (for managed appliance settings) or Email Quarantine Policy (for CM settings) in the sidebar. 3. (Optional) Use section at the top of the page to define the scope of the changes. 4. Configure settings as described in the Email Security — Server Edition User Guide. Configuring Impersonation Rules Using the Web UI Use the Appliance Settings: Impersonation page to configure impersonation rules on managed appliances. © 2019 FireEye 397 Central Management Administration Guide CHAPTER 24: Configuring Managed Appliances To configure impersonation rules: 1. Click Settings and then select Appliance Settings. 2. Click Impersonation in the sidebar. 3. Click Add. 4. Specify all valid names and email addresses for an individual, separating multiple entries with commas. 5. Click Add. Configuring Rules on an Allowed List for Managed CM Appliances Using the Web UI Use the Appliance Settings: Allowed List page to configured rules on an allowed list, which allows you to control which messages can be bypassed based on the matched email entries. IMPORTANT! FireEye recommends that you apply the same configuration changes on all managed appliances. If you edit a rule that is not common to all appliances and then apply the rule to the appliance group, the edited rule will be applied to all appliances in that group, including those appliances that did not have the rule. To configure rules: 1. Click Settings and then select Appliance Settings. 2. Click Allowed List in the sidebar. 3. (Optional) Use the controls at the top of the page to define the scope of the changes. 4. Configure settings as described in the Email Security — Server Edition User Guide. Configuring Rules on a Blocked List for Managed CM Appliances Using the Web UI Use the Appliance Settings: Blocked List page to configured rules on a blocked list, which allows you to control which messages must be considered as malicious based on the matched email entries. IMPORTANT! FireEye recommends that you apply the same configuration changes on all managed appliances. If you edit a rule that is not common to all appliances and then apply the rule to the appliance group, the edited rule will be applied to all appliances in that group, including those appliances that did not have the rule. 398 © 2019 FireEye Release 8.7 Configuring Managed Appliances Using the Web UI To configure rules: 1. Click Settings and then select Appliance Settings. 2. Click Blocked List in the sidebar. 3. (Optional) Use the controls at the top of the page to define the scope of the changes. 4. Configure settings as described in the Email Security — Server Edition User Guide. Configuring Attachment Decryption Settings for Managed CM Appliances Using the Web UI Use the Appliance Settings: Attachment decryption page to configure a list of password candidates, list of keyword candidates, and a list of ignored word candidates the Email Security — Server Edition appliance can use to decrypt password-encrypted malware objects. To configure attachment decryption settings: 1. Click Settings and then select Appliance Settings. 2. Click Attachment decryption in the sidebar. 3. (Optional) Use the controls at the top of the page to define the scope of the changes. 4. Configure settings as described in the Email Security — Server Edition User Guide. Configuring Malware Analysis Settings for Managed AX Series Appliances Using the Web UI Use the Appliance Settings: Malware Analysis page to configure malware analysis settings on managed Malware Analysis appliances. To configure malware analysis settings: 1. Click Settings and then select Appliance Settings. 2. Click Malware Analysis in the sidebar. 3. (Optional) Use the controls at the top of the page to define the scope of the changes. 4. Configure settings as described in the AX Series User Guide. Configuring File Types for Managed Malware Analysis Appliances to Analyze Using the Web UI Use the Appliance Settings: Malware File Assoc. page to configure the file types managed Malware Analysis appliances should analyze. © 2019 FireEye 399 Central Management Administration Guide CHAPTER 24: Configuring Managed Appliances NOTE: You must explicitly enable the display of this page. To do so, use the cmc execute appliance <applianceID> command "guest-images fileassociation display on" command in the CLI configuration mode. To configure file types for analysis: 1. Click Settings and then select Appliance Settings. 2. Click Malware File Association in the sidebar. 3. (Optional) Use the controls at the top of the page to define the scope of the changes. 4. Configure settings as described in the AX Series User Guide. Configuring Malware Repository Settings for Managed AX Series Appliances Using the Web UI Use the Appliance Settings: Malware Repository page to configure the malware repository network share and the repository paths for guest images on managed Malware Analysis appliances. To configure malware repository settings: 1. Click Settings and then select Appliance Settings. 2. Click Malware Repository in the sidebar. 3. (Optional) Use controls at the top of the page to define the scope of the changes. 4. Configure settings as described in the AX Series User Guide. Configuring and Managing Scans for Managed FX Series Appliances Using the Web UI Use the CMS Scans page to configure and manage scans on managed FX Series appliances. To configure and manage scans: 1. Click Alerts and then select FX. 2. Click Configured & Recent Scans. 3. (Optional) Use controls at the top of the page to define the scope of the changes and filter the results. 4. Configure and manage scans as described in the FX Series User Guide. 400 © 2019 FireEye Release 8.7 Configuring Managed Appliances Using the CLI Configuring and Managing Storage for Managed FX Series Appliances Using the Web UI Use the CMS Storage page to configure and manage file shares on managed FX Series appliances. To configure and manage storage: 1. Click Alerts and then select FX. 2. Click Storage. 3. (Optional) Use the appliance list to specify the scope of the changes and filter the results. 4. Configure and manage storage as described in the FX Series User Guide. Configuring Managed Appliances Using the CLI Use the commands in this section to configure managed appliances by executing individual commands on behalf of them. The commands are executed once; they are not stored. NOTE: For comprehensive information about the configuration commands, see the System Administration Guide, Administration Guide, or User Guide for your appliance. NOTE: If you omit the command parameter from these commands, you will be prompted for it, and the characters you enter will be masked for confidentiality. NOTE: This topic describes how to execute a single command. You can also define a profile of commands that run in sequence unattended. See Working with Command Profiles on page 412. To execute a command on an appliance: 1. Go to CLI configuration mode: hostname > enable hostname # configure terminal 2. Execute the command: hostname (config) # cmc execute appliance <applianceName> command "<command>" where command must be enclosed in double quotation marks. © 2019 FireEye 401 Central Management Administration Guide CHAPTER 24: Configuring Managed Appliances 3. Save your changes: hostname (config) # cmc execute appliance <applianceName> command "write memory" To execute a command on a group of appliances: 1. Go to CLI configuration mode: hostname > enable hostname # configure terminal 2. Execute the command: hostname (config) # cmc execute group <groupName> command "<command>" where command must be enclosed in double quotation marks. 3. Save your changes: hostname (config) # cmc execute group <groupName> command "write memory" IMPORTANT! You can cancel the execution of outstanding commands, as described in Canceling Outstanding Commands on the facing page. Example This example executes the aaa authentication password local no-userid and show aaa authentication password commands on behalf of the NX-04 appliance. hostname (config) # cmc execute appliance NX-04 command "aaa authentication password local no-userid" ============ Appliance NX-04 ============ Execution was successful. Execution output: (none) hostname (config) # cmc execute appliance NX-04 command "show aaa authentication password" ============ Appliance NX-04 ============ Execution was successful. Execution output: Local password requirements: Minimum length: 5 Maximum length: 32 Maximum character repeats: no limit Minimum lower case characters: 0 Minimum upper case characters: 0 Minimum special characters: 0 Minimum numeric characters: 0 Recent passwords to check against: Allowed password to match userid: no ... 402 © 2019 FireEye Release 8.7 Canceling Outstanding Commands Canceling Outstanding Commands Use the commands in this section to cancel commands that were issued but have not yet been executed. NOTE: You can cancel both commands issued using the cmc execute command, and commands in a profile. To cancel all outstanding commands on an appliance: 1. Go to CLI configuration mode: hostname > enable hostname # configure terminal 2. Cancel the commands: hostname (config) # cmc cancel appliance <applianceName> all To cancel all outstanding commands on a group of appliances: 1. Go to CLI configuration mode: hostname > enable hostname # configure terminal 2. Cancel the commands: hostname (config) # cmc cancel group <groupName> all Example This command cancels all outstanding commands on the EX-03 appliance. hostname (config) # cmc cancel appliance EX-03 all © 2019 FireEye 403 Central Management Administration Guide 404 CHAPTER 24: Configuring Managed Appliances © 2019 FireEye Central Management Administration Guide Grouping Appliances CHAPTER 25: Using Appliance Groups and Command Profiles You can use appliance groups and command profiles to manage the appliances in your network more efficiently. For details, see: l Grouping Appliances below l Working with Command Profiles on page 412 Grouping Appliances Appliance groups allow you to push configuration changes to multiple appliances at the same time, and to limit the displayed event data to specific appliances. IMPORTANT! Each appliance type has a reserved system group; appliances cannot be removed from their respective system groups. For example, all Network Security appliances are permanent members of the sysgroup.Web_MPS group, all Email Security — Server Edition appliances are permanent members of the sysgroup.Email_MPS, all Malware Analysis group appliances are permanent members of the sysgroup.MAS group, and so on. All managed appliances are members of the All group. You cannot add or delete appliances from reserved groups. You can create custom groups to which you can add or delete appliances as desired. You can create additional custom groups as needed. A group can have any number of appliances, and an appliance can be a member of any number of groups. Reasons for creating groups include: l Dividing appliances of the same type into smaller groups. For example, you could group your Network Security appliances by region. © 2019 FireEye 405 Central Management Administration Guide l CHAPTER 25: Using Appliance Groups and Command Profiles Combining different appliance types into the same group. For example, you could put all of your Network Security appliances and Email Security — Server Edition appliances into the same group so you can push the same user accounts or password security policies to all of them. Group Information The settings for groups are shown in the following table. Field Description Name The group name. Comment An optional comment about the group. Created (UTC) The date and time the group was created. Action Links to edit or delete a group. These links are not provided for the reserved system groups. Sensors The number of appliances that are members of the group. For more information, see: l Creating and Managing Groups Using the Web UI below l Creating and Managing Groups Using the CLI on page 408 l Adding Appliances to Groups Using the Web UI on page 410 l Adding Appliances to Groups Using the CLI on page 410 l Removing Appliances from Groups Using the Web UI on page 411 l Removing Appliances from Groups Using the CLI on page 412 Prerequisites l Operator or Admin access Creating and Managing Groups Using the Web UI Use the Create New Group dialog box to create groups, and the Groups dialog box to manage groups. 406 © 2019 FireEye Release 8.7 Grouping Appliances To add a new group: 1. Click the Appliances tab. The Sensors tab should be selected. 2. Click Actions > New Group. 3. Enter the name of the group and an optional comment. 4. Click Create Group. The Groups dialog box opens. 5. Verify that the new group was added. To edit an existing group: 1. Click Show All Groups to open the Groups dialog box. 2. Locate the group in the list. © 2019 FireEye 407 Central Management Administration Guide CHAPTER 25: Using Appliance Groups and Command Profiles 3. Click Select > Edit. 4. Edit the name and comment as needed. 5. Click Edit Group. To delete a group: 1. Click Show All Groups to open the Groups dialog box. 2. Locate the group in the list. 3. Click Select > Delete. 4. When prompted, click OK to confirm that you want to delete the group. Creating and Managing Groups Using the CLI Use the commands in this section to create and manage appliance groups. To add a new group: 1. Go to CLI configuration mode: hostname > enable hostname # configure terminal 2. Add a new group: hostname (config) # cmc group <groupName> 3. (Optional) Add a comment about the group: hostname (config) # cmc group <groupName> comment "<comment>" where commentText must be enclosed in double quotation marks. 4. Verify your changes: hostname (config) # show cmc groups 5. Save your changes: hostname (config) # write memory To rename a group: 1. Go to CLI configuration mode: hostname > enable hostname # configure terminal 2. Rename the group: hostname (config) # cmc group <groupName> rename <newGroupName> 3. Verify your change: hostname (config) # show cmc groups <newGroupName> 408 © 2019 FireEye Release 8.7 Grouping Appliances 4. Save your change: hostname (config) # write memory To delete a comment: 1. Go to CLI configuration mode: hostname > enable hostname # configure terminal 2. Delete the comment: hostname (config) # no cmc group <groupName> comment 3. Verify your change: hostname (config) # show cmc groups <groupName> 4. Save your change: hostname (config) # write memory To delete a group: 1. Go to CLI configuration mode: hostname > enable hostname # configure terminal 2. Delete the group: hostname (config) # no cmc group groupName 3. Verify your change: hostname (config) # show cmc groups 4. Save your change: hostname (config) # write memory Example This example creates a "Milan" appliance group, deletes the "Sydney" group, renames the "Milan" group to "Venice," and adds a comment to the group. hostname (config) # cmc group Milan hostname (config) # show cmc groups Group Milan Comment: No members. Group Sydney Comment: Appliances: NX-01 Group sysgroup.Email_MPS Comment: System Group: eMPS Appliances: EX-02 . . . © 2019 FireEye 409 Central Management Administration Guide hostname (config) # hostname (config) # % Unknown group. hostname (config) # hostname (config) # hostname (config) # Group Venice Comment: Italian No members. CHAPTER 25: Using Appliance Groups and Command Profiles no cmc group Sydney show cmc groups Sydney cmc group Milan rename Venice cmc group Venice comment "Italian region appliances" show cmc groups Venice region appliances Adding Appliances to Groups Using the Web UI Use the Appliance/Sensor display to add appliances to groups. Tip: Select the group in the Sensor Group to see a full list of the appliances currently in a particular group. To add an appliance to a custom group: 1. Click Appliances > Sensors. 2. Click Show All Groups. The Groups dialog appears. 3. Click the Select button for the desired group. 4. Click Add/Remove Sensors. The Add/Remove Sensors dialog appears. 5. Click the checkbox for the sensor to be added. 6. Click the Add/Remove Selected Sensors button to add the sensor. Adding Appliances to Groups Using the CLI Use the commands in this section to add appliances to groups. To add an appliance to a group: 1. Enable the CLI configuration mode: hostname > enable hostname # configure terminal 410 © 2019 FireEye Release 8.7 Grouping Appliances 2. Add an appliance to a group: hostname (config) # cmc group <groupName> appliance <applianceName> 3. Verify that the appliance was added: hostname (config) # show cmc group <groupName> 4. Save your change: hostname (config) # write memory Example This example add the FX-06 appliance to the Acme group. hostname (config) # cmc group Acme appliance FX-06 hostname (config) # show cmc groups Acme Group Acme Comment: Acme division appliances Appliances; FX-06 Removing Appliances from Groups Using the Web UI Use the Add/Remove Sensors from <Group> dialog box to remove appliances from groups. Tip: Select the group in the Sensor Group list to see a full list of the appliances currently in the group. To remove appliances from a group: 1. Click Appliances > Sensors. 2. Select the group in the Sensor Group dropdown.. 3. Click Select in the Action column for the sensor to be removed. 4. Click Delete. A confirmation prompt appears. 5. Click OK. 6. Repeat the Select> Delete > OK sequence for each sensor to be removed from the group. © 2019 FireEye 411 Central Management Administration Guide CHAPTER 25: Using Appliance Groups and Command Profiles Removing Appliances from Groups Using the CLI Use the commands in this section to remove appliances from groups. To remove an appliance from a group: 1. Go to CLI configuration mode: hostname > enable hostname # configure terminal 2. Remove an appliance from a group: hostname (config) # no cmc group <groupName> appliance <applianceName> 3. Verify that the appliance was removed: hostname (config) # show cmc group <groupName> 4. Save your change:hostname (config) # write memory Example This example removes the EX-03 appliance from the London group. hostname (config) # cmc group London appliance EX-03 show cmc groups London Group Acme Comment: UK region appliances Appliances; AX-05 Working with Command Profiles A profile is a set of CLI commands that can be applied to an appliance or appliance group. Each command is assigned a sequence number. When the profile is applied, the commands are executed in the order defined by that sequence, starting with the command with the smallest number. The benefits of using profiles include: l l Automation—Multiple configuration settings can be applied at the same time with little user intervention. Reuse—A profile consisting of common configuration commands can be used on different appliances and appliance types. You can use the following methods to add commands to profiles: 412 © 2019 FireEye Release 8.7 l l Working with Command Profiles Manually, where you define each command and its sequence number one at a time. Extracting commands from a running configuration. The show configuration running command displays commands that can be used to recreate the current running configuration. You can extract these commands from an appliance and put them into an empty profile. The commands will automatically be executed in the correct order. Commands that configure local, appliance-specific settings (such as routing, licensing, and time zone settings) will be omitted from the target profile. IMPORTANT! Some commands in the running configuration may be incompatible with a different product type or appliance model. Review the commands to determine if they are compatible before you apply a profile using this method. l Duplicating a profile. There are two options you can use when applying a profile. Profile Options Option Description no-save Prevents the configuration set by the commands in the profile from being saved to memory after the profile is applied. Otherwise, the write memory command is run in the background after the profile is applied. failcontinue Allows command execution to continue, even if one or more commands in the profile fail. Otherwise, none of the remaining commands in the profile are executed after a single command fails. Prerequisites l Admin access Creating and Managing Profiles Using the CLI Use the commands in this section to create and manage command profiles. To create a profile: 1. Go to CLI configuration mode: hostname > enable hostname # configure terminal 2. Create the profile: hostname (config) # cmc profile <profileName> © 2019 FireEye 413 Central Management Administration Guide CHAPTER 25: Using Appliance Groups and Command Profiles 3. (Optional) Add a comment about the profile: hostname (config) # cmc profile <profileName> comment "<comment>" where comment must be enclosed in double quotation marks. 4. Verify your change: hostname (config) # show cmc profiles 5. Save your changes: hostname (config) # write memory To rename a profile: 1. Go to CLI configuration mode: hostname > enable hostname # configure terminal 2. Rename the profile: hostname (config) # cmc profile <profileName> rename <newProfileName> 3. Verify your change: hostname (config) # show cmc profiles <newProfileName> 4. Save your change: hostname (config) # write memory To remove a comment: 1. Go to CLI configuration mode: hostname > enable hostname # configure terminal 2. Remove the comment: hostname (config) # no cmc profile <profileName> comment 3. Verify your change: hostname (config) # show cmc profiles <profileName> 4. Save your change: hostname (config) # write memory To delete a profile: 1. Go to CLI configuration mode: hostname > enable hostname # configure terminal 2. Delete the profile: hostname (config) # no cmc profile <profileName> 414 © 2019 FireEye Release 8.7 Working with Command Profiles 3. Verify that the profile was deleted: hostname (config) # show cmc profiles 4. Save your change: hostname (config) # write memory Example This example creates an "acctmgt" profile with a comment and deletes the "PswdPolicy" profile. hostname (config) # cmc profile acctmgt hostname (config) # cmc profile acctmgt comment "Adds operator user account." hostname (config) # no cmc profile PswdPolicy hostname (config) # show cmc profiles Profile acctmgt Comment: Adds operator user account. Commands: No commands. ... Adding Commands to Profiles Using the CLI Use the commands in this section to add commands to a profile. To add individual commands to a profile: 1. Enable the CLI configuration mode. hostname > enable hostname # configure terminal 2. Add a command and specify its sequence: hostname (config) # cmc profile <profileName> command <sequenceNumber> "<command>" where: l profileName is the name of an existing or new profile. (If the profile does not exist, it will be created.) l sequenceNumber is an integer that controls the order in which the commands within the profile will be executed. The command with the smallest sequence number is executed first. l command is the CLI command. It must be enclosed in double quotation marks. 3. Repeat the previous step for each command you want to include. 4. Verify your changes: hostname (config) # show cmc profiles <profileName> 5. Save your changes: hostname (config) # write memory © 2019 FireEye 415 Central Management Administration Guide CHAPTER 25: Using Appliance Groups and Command Profiles To extract commands from a running configuration and add them to a profile: IMPORTANT: Some commands in the running configuration may be incompatible with a different product type or appliance model. Review the commands to determine if they are compatible before you apply a profile using this command. 1. Enable the CLI configuration mode: hostname > enable hostname # configure terminal 2. Specify the empty profile and the appliance from which to extract the commands: hostname (config) # cmc profile <profileName> extract-from-appliance <applianceName> where profileName is the name of an empty profile, and applianceName is the name of the appliance from which the commands from the running configuration will be extracted. 3. Verify your change: hostname (config) # show cmc profiles <profileName> 4. Save your change: hostname (config) # write memory To copy a profile: 1. Enable the CLI configuration mode: hostname > enable hostname # configure terminal 2. Specify the names of the source profile and the target (new) profile: hostname (config) # cmc profile <sourceProfileName> copy <targetProfileName> where sourceProfileName is the original profile and targetProfileName is the new profile. 3. Verify your change: hostname (config) # show cmc profiles 4. Save your change: hostname (config) # write memory 416 © 2019 FireEye Release 8.7 Working with Command Profiles Examples Manually Adding Commands This example populates the "acctmgt" profile with commands that will add an Operator3 user account to the appliances to which it is applied. hostname (config) # cmc profile acctmgt command 1 "username Operator3 role operator" hostname (config) # cmc profile acctmgt command 2 "username Operator3 password evtk*643U" hostname (config) # show cmc profiles acctmgt Profile acctmgt Comment: Commands: 1. username Operator3 role operator 2. username Operator 3 password evtk*643U Adding Commands Extracted from the Configuration of Another Appliance This example extracts commands from the EX-03 appliance running configuration, populates the "general" profile with them, and applies them to the EX-05 appliance. The output indicates that the no fenet check-certificate command could not be executed. hostname (config) # cmc profile extract extract-from appliance EX-03 hostname (config) # cmc profile general apply appliance EX-05 ====================Appliance EX-05========================== Execution was successful. Execution output: %Disabling certificate checking is not allowed. Saving configuration file...Done! Removing Commands from Profiles Using the CLI Use the commands in this section to remove commands from a profile. To remove a single command: 1. Go to CLI configuration mode: hostname > enable hostname # configure terminal © 2019 FireEye 417 Central Management Administration Guide CHAPTER 25: Using Appliance Groups and Command Profiles 2. Remove the command: hostname (config) # no cmc profile <profileName> command <sequenceNumber> where sequenceNumber is the number assigned to the command. 3. Verify your changes: hostname (config) # show cmc profiles <profileName> 4. Save your changes:hostname (config) # write memory To remove all commands: 1. Go to CLI configuration mode: hostname > enable hostname # configure terminal 2. Remove all commands: hostname (config) # no cmc profile <profileName> command 3. Verify your change: hostname (config) # show cmc profiles <profileName> 4. Save your change: hostname (config) # write memory Applying Profiles Using the CLI Use the commands in this section to apply profiles to a specific appliance or to an appliance group. For a description of the optional parameters, see Profile Options on page 413. IMPORTANT! Unless you use the no-save parameter, the configuration changes set by the commands in the profile are written to memory. IMPORTANT! You can cancel the execution of outstanding commands in a profile, as described in Canceling Outstanding Commands on page 403. To apply a profile to a specific appliance: 1. Go to CLI configuration mode: hostname > enable hostname # configure terminal 418 © 2019 FireEye Release 8.7 Working with Command Profiles 2. Apply the profile: l To apply the profile normally: hostname (config) # cmc profile <profileName> apply appliance <applianceName> l To prevent the configuration changes from being written to memory after the profile is applied: hostname (config) # cmc profile <profileName> apply appliance <applianceName> no-save l To continue executing commands after one command fails: hostname (config) # cmc profile <profileName> apply appliance <applianceName> fail-continue 3. View the command output to determine whether the profile was applied successfully. 4. Save your changes: hostname (config) # write memory To apply a profile to a group of appliances: 1. Enable the CLI configuration mode: hostname > enable hostname # configure terminal 2. Apply the profile: l To apply the profile normally: hostname (config) # cmc profile <profileName> apply group <groupName> l To prevent the configuration changes from being written to memory after the profile is applied: hostname (config) # cmc profile <profileName> apply group <groupName> no-save l To continue executing commands on the appliances in the group after one command fails: hostname (config) # cmc profile <profileName> apply group <groupName> fail-continue 3. View the command output to determine whether the profile was applied successfully. 4. Save your changes: hostname (config) # write memory © 2019 FireEye 419 Central Management Administration Guide CHAPTER 25: Using Appliance Groups and Command Profiles Examples Successful Profile Application This example applies the "acctmgt" profile to the NX-04 appliance, which succeeds. hostname (config) # cmc profile acctmgt apply appliance NX-04 =================Appliance NX-04============================= Execution was successful. Execution output: Saving configuration file...Done! Failed Profile Application This example attempts to apply the "DateTimeJpn" profile to the Tokyo group, but fails because manual time and date settings are not permitted when NTP is enabled. hostname (config) # cmc profile DateTimeJpn apply group Tokyo =================Appliance FX-03 ============================= Error code 6 (CLI command execution failure) Error output: %NTP enabled, clock adjustment not allowed Execution output: (none) 420 © 2019 FireEye Central Management Administration Guide Managing the Distribution of Alert Notifications CHAPTER 26: Monitoring Aggregated Alert Data The Central Management appliance aggregates events from all managed appliances. You can use appliance groups to limit the displayed event data to specific appliances. (For information about groups, see Grouping Appliances on page 405.) You can centrally view detection and analysis results for managed appliances using the Dashboard and the Alerts sub-menus in the Central Management Web UI or by using the cmc execute commands in the Central Management CLI. Managing the Distribution of Alert Notifications You can send alert notifications from the Central Management appliance, from managed appliances, or from both the Central Management appliance and managed appliances to different servers. The following options are available: Centralized Notifications—All notifications come from the Central Management appliance. Mixed Notifications—Notifications come from both the Central Management appliance and managed appliances. Decentralized Notifications—Notifications come from managed appliances only. Centralized Notifications Use centralized notifications if you want all your alert notifications to come from the Central Management appliance. The advantage of using centralized notifications is that you only have to configure settings once, and the alerts are tracked in the same place. A disadvantage is that you have fewer delivery options. For example, for email notifications configured on the Network Security appliance, the delivery options are "Daily digest," "Per event," "Daily per source," "Hourly per source," "1 min per source," and "5 mins per © 2019 FireEye 421 Central Management Administration Guide CHAPTER 26: Monitoring Aggregated Alert Data source." On the Central Management appliance the only options are "Daily digest" and "Per event." After Central Management notifications are enabled, all notification alerts are sent to the notification servers you configure for the Central Management appliance. Centralized notifications start immediately after you configure a protocol and add notification server details, and they stop if you remove the notification servers or the protocols. The Central Management appliance sends notifications in the order they are received. Perform the following tasks to set up centralized notifications: 1. Remove the notification settings for each managed appliance, as described in the User Guide for the managed appliance. 2. Enable notification settings for the Central Management appliance, as described in Event Notifications on page 295. Mixed Notifications Use mixed notifications when you want to send centralized notifications to one notification server, and individual appliance notifications to other servers. One advantage of mixed notifications is that you can track notifications from individual appliances separately on a separate notifications server, while still aggregating notifications from all managed appliances on the Central Management appliance. Another advantage is the additional delivery options on the individual appliances, as described in Centralized Notifications on the previous page. NOTE: If you disconnect an appliance from the Central Management appliance, notifications will be sent to the server configured for that appliance, if one is configured. 422 © 2019 FireEye Release 8.7 Managing the Distribution of Alert Notifications Perform the following tasks to set up mixed notifications: 1. Enable notification settings for the Central Management appliance, as described in Event Notifications on page 295. 2. Enable notification settings for each managed appliance you want to track separately, as described in the User Guide for the managed appliance. Decentralized Notifications Use decentralized notifications if you want notifications to be sent only from individual managed appliances, and not from the Central Management appliance. This was the notification delivery method in previous versions of the Central Management appliance (Release 6.4.1 and earlier), so no configuration changes are needed for backward compatibility. Perform the following tasks to set up decentralized notifications: © 2019 FireEye 423 Central Management Administration Guide CHAPTER 26: Monitoring Aggregated Alert Data 1. Remove all notification settings for the Central Management appliance, as described in Event Notifications on page 295. 2. Enable notification settings for each managed appliance, as described in the User Guide for the managed appliance. Monitoring Appliances Using the Web UI Alert and analysis results are specific to appliance types. You can filter some results based on appliance group or a specific appliance, as shown in the following illustration. Data is displayed only if you select a group or appliance to which the page applies. For example, no data would be displayed if you select an Network Security appliance on the Email Alerts page, because that page applies only to the Email Security — Server Edition appliance. Viewing Alerts and Events for Managed NX Series Appliances Using the Web UI Use the Alerts page to view information about Network Security alerts and events. To view alerts and events: 1. On the Alerts tab, click NX > Alerts. 2. (Optional) Use the controls at the top of the page to filter the results. 3. View the results as described in the NX Series User Guide. For IPS-enabled NX Series appliances, see the IPS Feature Guide. NOTE: See Managing Suppressed Alerts on Managed NX Series Appliances Using the Web UI on the facing page. 424 © 2019 FireEye Release 8.7 Monitoring Appliances Using the Web UI Managing Suppressed Alerts on Managed NX Series Appliances Using the Web UI Use the Appliance Settings: Suppressed Alerts page to view and manage suppressed alerts on managed Network Security appliances. When an alert is suppressed, the suppression total is pushed to all managed Network Security appliances. The maximum number of suppressed alerts is 15 for all managed appliances combined. For example, suppose the Central Management appliance manages an Network Security appliance that already has the maximum number of suppressed alerts. If you add another Network Security appliance with suppressed MD5s or URLs to the Central Management appliance, a notice at the top of the page advises you to suppress or resolve alerts until the number is brought down to 15. After you suppress or resolve these extra alerts, the suppressed alerts on the Network Security appliances become out-of-sync. A warning with a link to synchronize them is displayed at the top of the Appliance Settings: Suppressed Alerts page. NOTE: For detailed information about the alert suppression feature, see the NX Series User Guide. To view and manage suppressed alerts: 1. Click Settings and then select Appliance Settings. 2. Click Suppressed Alerts in the sidebar. 3. Manage the suppressed alerts as described in the NX Series User Guide. To reduce an excess of aggregated suppressed alerts: 1. Open the Appliance Settings: Suppressed Alerts page. A notice at the top of the page advises that too many alerts are suppressed. 2. Select the checkboxes for the MD5s and URLs with the least impact, and then click Unsuppress or Resolve. CAUTION: Do not resolve alerts until the FireEye Security Content team determines that they are false positives and updates its security content. Apply the latest security content update to your appliance, and then resolve the alerts. 3. Refresh the page. The MD5s and URLs you selected are removed from the page, and a warning at the top of the page informs you about an out-of-sync condition on the managed appliances. 4. Click the SYNC link in the warning to synchronize alert suppression. © 2019 FireEye 425 Central Management Administration Guide CHAPTER 26: Monitoring Aggregated Alert Data Monitoring Malware and Callback Activity for Managed NX Series Appliances Using the Web UI Use the Hosts and Callback Activity pages to view information about malware and CnC callback server activity on managed NX Series appliances. To view malware and callback activity: 1. Click Alerts and then select NX. 2. Click Alerts. 3. Click the Hosts or Callback Activity link. 4. (Optional) Use the controls at the top of the page to filter the results. 5. View the results as described in the NX Series User Guide. Viewing Malware Summaries for Managed NX Series Appliances Using the Web UI Use the Summaries page to view summary information about malware detected by managed Network Security appliances. To view malware summaries: 1. Click Alerts and then select NX. 2. Click Summaries. 3. Select one of the following tabs at the top of the page: l Malware—Displays the information in a table. l Charts—Displays the information in bar charts. l Treemaps—Displays the information in a treemap. 4. (Optional) Use the controls at the top of the page to filter the results. 5. View the results as described in the NX Series User Guide. Viewing Riskware for Managed Appliances Using the Web UI In the Riskware Alerts page of a managed Network Security or the Riskware Emails page of a managed Email Security — Server Edition appliance, you can identify the matched alerts that are detected as nonmalicious for a riskware event. On the Dashboard What's Happening panel, you can track the number of Web and email riskware alerts. For more information about riskware, see the Network Security Guide or Email Security — Server Edition User Guide. 426 © 2019 FireEye Release 8.7 Monitoring Appliances Using the Web UI To view riskware alerts: 1. (NX Series) Select Alerts > NX > Riskware or on the Dashboard What's Happening panel, click the Web Riskware Alerts link. 2. (CM) Select Alerts > Email > Riskware or on the Dashboard What's Happening panel, click the Email Riskware Alerts link. 3. (Optional) Use the controls at the top of the page to filter the results. Viewing SmartVision Alerts on SmartVision Appliances Using the Web UI Use the FireEye Network SmartVision page to view SmartVision alerts and associated forensic data on a SmartVision appliance. A SmartVision appliance can be any of the following l SmartVision Edition sensor l SmartVision-enabled NX Series sensor l SmartVision-enabled NX Series integrated appliance To view SmartVision alerts: 1. Select Alerts > NX > SmartVision. 2. (Optional) Use the page controls at the top of the page to define the number of alerts per page and to select a page of alerts in the list. 3. (Optional) Click the funnel icon to expand the Filter panel at the left edge of the page. Use filter options to define the match criteria for alerts that are displayed. 4. View and investigate SmartVision alerts as described in the NX Series SmartVision Feature Guide. Viewing the Campaigns for Managed CM Appliances Using the Web UI In the eAlerts > Campaigns page of a managed Email Security — Server Edition appliance, you can track the total number of infected emails that are part of a campaign. A red status indicates that the campaign is not verified. A blue status indicates that the campaign is verified. You can generate and download the list of campaigns as an Email Campaign List report in XML format, PDF format, CSV format, or JSON format from the appliance to your local desktop. © 2019 FireEye 427 Central Management Administration Guide CHAPTER 26: Monitoring Aggregated Alert Data To view the campaigns: 1. Click eAlerts > Campaigns. 2. (Optional) Use the page controls at the top of the page to define the number of campaigns per page and to select a page of campaigns in the list. 3. (Optional) Click the funnel icon to expand the Filter panel at the left edge of the page. Use filter options to define the match criteria for campaigns that are displayed. 4. View the analysis results that have been identified as a campaign as described in the Email Security — Server Edition User Guide. Managing Quarantined Emails for Managed CM Appliances Using the Web UI Use the Email Quarantine page to view and manage quarantined emails on managed Email Security — Server Edition appliances. To manage quarantined emails: 1. Click Alerts and then select Email. 2. Click eQuarantine. 3. (Optional) Use the controls at the top of the page to filter the results. 4. Manage the quarantine as described in the Email Security — Server Edition User Guide. Viewing Email Analysis Results for Managed CM Appliances Using the Web UI Use the Email Alerts page to view information about infected emails observed by managed Email Security — Server Edition appliances. To view email analysis results: 1. Click Alerts and then select Email. 2. Click eAlerts. 3. (Optional) Use the controls at the top of the page to filter the results. 4. View the information as described in the Email Security — Server Edition User Guide. 428 © 2019 FireEye Release 8.7 Monitoring Appliances Using the Web UI Viewing and Exporting the Results of Processed Emails on a Managed CM Appliance Using the Web UI Use the Processed Emails page to view the list of malicious and nonmalicious emails that have been processed by the Email Security — Server Edition appliance based on the type of fields (Message ID, Sender, Recipient, Subject Line, URL, and Attachment). The Processed Emails page also displays the status and state of the scanned emails with an associated verdict based on the results of the scan. You can display up to 100 emails per page. You can also export a filtered list of processed emails from the appliance. To view and export the status of processed emails: 1. Click the Search Emails tab and then click Processed Emails. 2. (Optional) Use the controls at the top of the page to filter the results. 3. View and export the status of processed emails as described in the Email Security — Server Edition User Guide. Viewing the Messages in the Email Queue on a Managed CM Appliance Using the Web UI Use the Queued Emails page to view the list of messages that are queued for dynamic analysis. You can filter the specific search criteria based on the sender, recipient, or queue type. You can monitor your emails while they are being processed and held in the email queue. To view the messages in the email queue: 1. Click the Search Emails tab and then click Queued Emails. 2. (Optional) Use the controls at the top of the page to define the scope of the changes. 3. View messages in the email queue as described in the Email Security — Server Edition User Guide. Viewing URL Click Reports for Managed EX Series Appliances Using the Web UI Use the Dashboard page to view the total number of missed and blocked URL click events. In this example, the following URL click events were reported for the week: l l 2 URLs were reported missed and 5 click timestamps were reported for these URLs. 5 URLs were reported blocked and 18 click timestamps were reported for these URLs. © 2019 FireEye 429 Central Management Administration Guide CHAPTER 26: Monitoring Aggregated Alert Data To view the URL click event details: 1. Click URL Click Missed or URL Click Blocked. The eAlerts > Alerts page is displayed. This example is displayed after URL Click Missed is selected. This example, displays the URL click badges for the alerts. 2. Click on an alert to display a summary of the alert details along with a table itemizing the URL clicks, the URL click time stamp, and the missed or blocked URL click status. 430 © 2019 FireEye Release 8.7 Monitoring Appliances Using the Web UI For detailed information about the URL click reporting feature, see the Email Security — Server Edition User Guide Viewing Malware Analysis Results for Managed AX Series Appliances Using the Web UI Use the Analysis page to view information about the malware analysis jobs run on managed Malware Analysis appliances. To view malware analysis results: 1. Click Alerts and then select AX. 2. Click Analysis. 3. (Optional) Use the controls at the top of the page to filter the results. 4. View results as described in the AX Series User Guide. Managing File Quarantines for Managed FX Series Appliances Using the Web UI Use the CM: Quarantined Files page to view and manage quarantined files on managed File Security appliance. To manage quarantined files: 1. Click Alerts and then select FX. 2. Click Quarantined Files. 3. (Optional) Use the controls at the top of the page to filter the results. 4. Manage the quarantine as described in the FX Series User Guide. © 2019 FireEye 431 Central Management Administration Guide CHAPTER 26: Monitoring Aggregated Alert Data Managing File Alerts for Managed FX Series Appliances Using the Web UI Use the CM: File Alerts page to to view and drill into details about malicious files on managed File Security appliance. To manage quarantined files: 1. Click Alerts and then select FX. 2. Click Alerts. 3. (Optional) Use the controls at the top of the page to filter the results. 4. Manage the alerts as described in the FX Series User Guide. Monitoring Appliances Using the CLI Use the commands in this section to view detection and analysis results on managed appliances by executing individual commands on behalf of them. The commands are executed once; they are not stored. NOTE: For comprehensive information about the detection and analysis commands, see the User Guide for your appliance. NOTE: If you omit the command parameter from these commands, you will be prompted for it, and the characters you enter will be masked for confidentiality. NOTE: This topic describes how to execute a single command. You can also define a profile of commands that run in sequence unattended. See Working with Command Profiles on page 412. To execute a command on a managed appliance: 1. Go to CLI configuration mode: hostname > enable hostname # configure terminal 2. Execute the command: hostname (config) # cmc execute appliance <applianceName> command ["<command>"] where command must be enclosed in double quotation marks. To execute a command on a group of appliances: 1. Go to CLI configuration mode: hostname > enable hostname # configure terminal 432 © 2019 FireEye Release 8.7 NX Series and CM Event Correlation 2. Execute the command: hostname (config) # cmc execute group <groupName> command ["<command>"] where command must be enclosed in double quotation marks. IMPORTANT! You can cancel the execution of outstanding commands, as described in Canceling Outstanding Commands on page 403. Example This example executes the show alerts summary command on behalf of the NX-04 appliance. hostname (config) # cmc execute appliance NX-04 command "show alerts summary" ============ Appliance NX-04 ============ Execution was successful. Execution output: Domain Match : 2182 Web Infection : 6133 Malware Callback : 27273 Infection Match : 4035 Malware Object : 12564 Total Alerts : 52187 NX Series and CM Event Correlation When the Central Management appliance manages both Network Security appliances and Email Security — Server Edition appliances, malicious Web events detected by the Network Security appliances are correlated with email events detected by the Email Security — Server Edition appliances, and malicious email events detected by the Email Security — Server Edition appliances are correlated with Web events detected by the Network Security appliances. NOTE: For information about allowing two Central Management networks to share information about malicious events, see CM Peer Distributed Correlation on page 603. Correlated events are displayed with the following icons in the Web UI: Web Correlation — This icon in an email alert indicates that the alert is l correlated with a Web alert. It is typically in the URL column, depending on the tab selected in Alerts > Email > eAlerts. l Email Correlation — This icon in a Web alert indicates that the alert is correlated with an email alert. It is in the Total column or the Alert Type column, depending on the tab selected in Alerts > NX > Alerts. Correlated events are displayed with the following badges: © 2019 FireEye 433 Central Management Administration Guide l l CHAPTER 26: Monitoring Aggregated Alert Data Correlated NX Alert — This badge in an email alert indicates that the alert is correlated with a Web alert. It is shown in the Badges column in the Alerts > Email > eAlerts page. You can select it as a filter to find correlated Network Security events. Correlated EX Alert — This badge in a Web alert indicates that the alert is correlated with an email alert. It is shown in the Badges column in Alerts > NX > Alerts page. You can select it as a filter to find correlated Email Security — Server Edition events. Reviewing Email Alerts Correlated with Web Events You can view the combined alert information or navigate to the list of correlated Network Security alerts from the Email Security — Server Edition alerts. Prerequisites l l One or more Network Security appliances managed by the Central Management appliance. One or more Email Security — Server Edition appliances managed by the Central Management appliance. NOTE: By default, alert correlation is enabled on any Central Management appliance that manages one or more Network Security appliances and one or more Email Security — Server Edition appliances. For details, see: l Reviewing Correlated Email and Web Alert Information in a Combined View below l Viewing Web Alerts for Correlated Malicious Behavior on page 436 Reviewing Correlated Email and Web Alert Information in a Combined View The combined view shows the high-level details of correlated Email Security — Server Edition and Network Security alerts. To review the combined view of correlated email and Web alerts: 1. On the Alerts tab, select Email > eAlerts. 2. If there are many alerts, use the Filters panel on the left edge of the page to filter by the Correlated NX Alert badge. 434 © 2019 FireEye Release 8.7 NX Series and CM Event Correlation 3. In the Recipient tab, click the number link beside the Web icon in the URL column. The Network Security alerts correlated with the Email Security — Server Edition alert are displayed. 4. In the list of correlated alerts in the Alerts tab, click a URL in the URL column. The combined view displays the email details in the top section and the Web event details in the bottom section. © 2019 FireEye 435 Central Management Administration Guide CHAPTER 26: Monitoring Aggregated Alert Data Viewing Web Alerts for Correlated Malicious Behavior From an email alert that has a malicious URL or attachment, you can navigate to the list of Network Security alerts for the source IP addresses on which the same malicious URL or attachment was identified. This view shows all malware objects and other events that affected the source IP address for this email alert in the selected time period, including those from other URLs or attachments, other Email Security — Server Edition alerts, and other affected source IP addresses. To review the list of Web alerts correlated with an email alert: 1. On the Alerts tab, select Email > eAlerts. 2. Select the Malicious Emails tab. 3. If there are many alerts, use the Filters panel on the left edge of the page to filter by the Correlated NX Alert badge. 4. In the URL or Attachment column of an email alert, click the Web icon link ( ). The NX > Alerts > Alerts tab displays the list of Network Security alerts from all source IP addresses on which the same malicious URL or attachment was identified. The Network Security alerts marked with the email icon link ( ) are correlated with Email Security — Server Edition alerts. The following example includes a malware object and callbacks for multiple malware types. 436 © 2019 FireEye Release 8.7 NX Series and CM Event Correlation Reviewing Web Alerts Correlated with Email Events Follow these steps to review the malicious objects found by the Network Security appliance and correlated to events on the Email Security — Server Edition appliance. Prerequisites l l One or more Network Security appliances managed by the Central Management appliance. One or more Email Security — Server Edition appliances managed by the Central Management appliance. NOTE: By default, alert correlation is enabled on any Central Management appliance that manages one or more Network Security appliances and one or more Email Security — Server Edition appliances. To review Web alerts correlated with email events: 1. On the Alerts tab, click NX > Alerts. 2. If there are many alerts, use the Filters panel on the left edge of the page to filter by the Correlated EX Alert badge. © 2019 FireEye 437 Central Management Administration Guide CHAPTER 26: Monitoring Aggregated Alert Data 3. On the Hosts tab, click the number link beside the email correlation icon ( ) in the Total column. The list of correlated Email Security — Server Edition alerts is displayed in the Alerts tab. 4. In the correlated alerts, click an email correlation icon with the link superimposed on it ( ). The correlated Email Security — Server Edition alert is displayed on the eAlerts > Malicious Emails tab. 438 © 2019 FireEye Release 8.7 NX Series and CM Event Correlation Enabling Remote CM Appliance Event Correlation Follow these steps to enable remote Email Security — Server Edition appliance event correlation on the Central Management appliance. When this is enabled, the Central Management appliance will distribute the set of malicious URLs collected from the Network Security appliances to all eligible managed Email Security — Server Edition appliances. Prerequisites l l l One or more Network Security appliances managed by the Central Management appliance One or more Email Security — Server Edition appliances managed by the Central Management appliance The managed Email Security — Server Edition appliances are release 7.9.x or later NOTE: By default, alert correlation and remote correlation are enabled on any Central Management appliance that manages one or more Network Security appliances and one or more Email Security — Server Edition appliances of release 7.9.x or later. To enable remote Email Security — Server Edition appliance alert correlation on the Central Management appliance: 1. Log in to the Central Management CLI. 2. Go to CLI configuration mode: hostname > enable hostname # configure terminal 3. Enable remote Email Security — Server Edition alert correlation: hostname # (config) remote-correlation enable © 2019 FireEye 439 Central Management Administration Guide CHAPTER 26: Monitoring Aggregated Alert Data 4. Review the remote Email Security — Server Edition alert correlation configuration settings: hostname # (config) # show remote-correlation status 5. Save your changes: hostname (config) # write memory Endpoint Security Event Correlation The Central Management appliance correlates Endpoint Security alerts with managed appliance alerts and creates badges for the appropriate alerts. Correlated Network Security alerts may have Endpoint Compromised, Endpoint Contained, and Containment Requested badges. Correlated Email Security — Server Edition alerts may have a Related Endpoint badge. Endpoints Compromised, Related Endpoints, and Endpoints Contained links appear on the Central Management Dashboard What's Happening panel if there are alerts with the associated badges. Click a link to view the Alerts page with the list of alerts labeled with the associated badge. If available, you can download triage collections from the Central Management for alerts that have endpoints that are compromised. Click the Endpoint Compromised badge or Endpoints Compromised link, expand an alert and click the Download package link. For details about how a managed appliance alert becomes an Endpoint Security alert and a Central Management badge, see the Endpoint Security System Administration Guide. For details on endpoint containment and triage collections, see the Endpoint Security User Guide. Sending Alerts to the Helix Web UI Using the CLI Use the commands in this section to configure the alert settings that are pushed from all appliances managed by the Central Management appliance to the Helix Web UI when the appliances are deployed in Helix cloud mode or Helix on-premises mode. You can send alerts from all appliances managed by the Central Management appliance to the Helix Web UI using HTTPS. 440 © 2019 FireEye Release 8.7 Sending Alerts to the Helix Web UI Using the CLI To send alerts to the Helix Web UI when the appliances are deployed in Helix cloud mode: 1. Go to CLI configuration mode: hostname > enable hostname # configure terminal 2. Specify the number of days that the managed appliance managed can send alerts to the Helix Web UI: hostname (config) # helix mode cloud push-alerts-from <days> The range is from 0 to 30 days. 3. (Optional) Specify the maximum number of alerts that the managed appliance can send to the Helix Web UI: hostname (config) # helix mode cloud push-alerts-from <days> max-alerts <count> You can send up to 10,000 alerts from all managed appliances to the Helix Web UI. 4. Verify the alert settings for the Helix Web UI configuration: hostname (config) # show helix Helix Configurations: Enabled : yes Mode : cloud Single Sign-On : allowed Console URL : https://my.fireeye.com/helix/id/900151200/ Alert Sync Enabled : yes Alert Sync From : 0 days old Alert Sync Max Count : 10000 The "Alert Sync From" and "Alert Sync Max Count" lines display the alert settings configuration to send the alerts to the Helix Web UI. 5. Save your changes: hostname (config) # write memory To send alerts to the Helix Web UI when the appliances are deployed in Helix onpremises mode: 1. Go to CLI configuration mode: hostname > enable hostname # configure terminal © 2019 FireEye 441 Central Management Administration Guide CHAPTER 26: Monitoring Aggregated Alert Data 2. Specify the number of days that the managed appliance can send alerts to the Helix Web UI: hostname (config) # helix mode on-premises push-alerts-from <days> The range is from 0 to 30 days. 3. (Optional) Specify the maximum number of alerts that the managed appliance can send to the Helix Web UI: hostname (config) # helix mode on-premises push-alerts-from <days> maxalerts <count> You can send up to 10,000 alerts from all managed appliances to the Helix Web UI. 4. Verify the alert settings for the Helix Web UI configuration: hostname (config) # show helix Helix Configurations: Enabled : yes Mode : on-premises Single Sign-On : required Console URL : https://my.fireeye.com/helix/id/900151200/ Alert Sync Enabled : yes Alert Sync From : 0 days old Alert Sync Max Count : 10000 The "Alert Sync From" and "Alert Sync Max Count" lines display the alert settings configuration to send the alerts to the Helix Web UI. 5. Save your changes: hostname (config) # write memory 442 © 2019 FireEye Release 8.7 About Reports CHAPTER 27: Working with Reports for Managed Appliances This section covers the following information: l About Reports below l Customizing Reports for Managed Appliances on the next page l Generating and Scheduling Reports for Managed Appliances on page 485 About Reports Reports can be customized only on managed Email Security — Server Edition, Network Security, and File Security appliances. The Central Management allows you to generate reports about malicious behavior on the network from all managed Email Security — Server Edition, Network Security, and File Security appliances. Reports include data accumulated from all appliances of the same type. For example, if you specify the "Alert Details" report, the report will contain all data from all Network Security appliances that are managed or have been managed during the specified report time frame. You can create your own custom reports from scratch, use the predefined reports, or clone a predefined report and use it as a template for a custom report. You can also control access to the content of the report using roles. This content includes the appropriate fields and filters that you want to include in each report. Predefined Report Templates Each predefined report template defines the individual sections in the report and the presentation format (table or graph). You can choose the format (table or graph) for each section individually. Custom Reports You can configure any number of sections for a custom report on the Central Management appliance. You can generate a custom report on the Central Management appliance to help you retrieve and analyze the traffic pattern, appliance health, appliance performance, user actions, or alert details about malware and infection trends for all managed appliances. A custom report allows you to define the content and format of the data in each section of the © 2019 FireEye 443 Central Management Administration Guide CHAPTER 27: Working with Reports for Managed Appliances report and the attributes of the report such as the logo. You can configure the Central Management appliance to send the generated custom report by email to the intended recipients. You can schedule reports to be generated automatically. Customizing Reports for Managed Appliances This section covers the following information about customizing reports for managed appliances: l Task List for Customizing Reports for Managed Appliances below l Creating and Configuring Settings for a Custom Report on the facing page l Configuring Graphs for Custom Reports on page 450 l Configuring Tables for Custom Reports on page 460 l Creating a Custom Report from a Predefined Report Template on page 471 l Editing and Cloning Reports That Have Been Generated on page 475 l Sending, Downloading, and Deleting Custom Reports on page 481 You cannot customize a SmartVision Alerts report. Task List for Customizing Reports for Managed Appliances Complete the steps for customizing reports for managed appliances in the following order: 1. Log in to the Central Management Web UI. 2. (Optional) Clone a predefined report template and edit its attributes to generate a custom report. See Creating a Custom Report from a Predefined Report Template on page 471. 3. Define the settings in a custom report. See Defining Settings in a Custom Report Using the Web UI on the facing page. If desired, associate one logo with a PDF formatted custom report. See Adding or Deleting a Logo Using the Web UI on page 449. 4. Determine the type of graphs that you want to define in a custom report. See Configuring Graphs for Custom Reports on page 450. 444 © 2019 FireEye Release 8.7 Customizing Reports for Managed Appliances 5. Determine the type of tables and attributes that are the table columns that you want to define in a custom report. See Configuring Tables for Custom Reports on page 460. If desired, define the match criteria for attributes that are the table columns displayed in each section of the custom report. See Defining Filters for Table Attributes on a Custom Report Section Using the Web UI on page 464. Creating and Configuring Settings for a Custom Report You can create and configure the report settings for your custom reports by using the Central Management appliance Web UI: l Defining Settings in a Custom Report Using the Web UI below l Editing Settings in a Custom Report Using the Web UI on page 447 l Adding or Deleting a Logo Using the Web UI on page 449 Follow these usage guidelines when you configure the report settings for your custom reports: l Output the report in XML, PDF, CSV, or JSON format l Associate only one logo with a PDF-formatted custom report l l l Specify a title and description that can include letters (a–z, A–Z), numbers, dashes (-), underscores (_), and commas (,). Set the time period the report covers. By default, the custom report display time zone is UTC and is set for the past 24 hours. Automatically generate reports on a schedule and email them to designated recipients Prerequisites l Access to the Web UI of the Central Management appliance as Admin or Analyst Defining Settings in a Custom Report Using the Web UI Use the Custom Reports section to define settings in a new custom report for managed appliances using the Central Management appliance Web UI. © 2019 FireEye 445 Central Management Administration Guide CHAPTER 27: Working with Reports for Managed Appliances You can define settings in a custom report only using the Web UI. Prerequisites l Access to the Web UI of the Central Management appliance as Admin or Analyst To define the settings in a custom report: 1. In the Web UI, choose Reports > Custom Reports. 2. In the Report Title field, enter a name for your custom report. 3. In the Report Format drop-down menu, select the output format for the custom report: l xml—Generate the report in XML format. l pdf—Generate the report in PDF format. l csv—Generate the report in CSV format. l json—Generate the report in JSON format. 4. (Optional) In the Description field, enter a description of your custom report. You can specify any number of characters. 5. In the Time Zone to Convert Report Data to drop-down menu, select the time zone for the custom report. 6. In the Date Range drop-down menu, select the time period for this custom report: 446 l past hour—Report covers analysis generated during the past 1 hour. l past 7 hours—Report covers analysis generated during the past 7 hours. l past 12 hours—Report covers analysis generated during the past 12 hours. l past 7 days—Report covers analysis generated during the past 7 days. l past 30 days—Report covers analysis during the past 30 days. © 2019 FireEye Release 8.7 Customizing Reports for Managed Appliances l custom—Report covers analysis generated for a custom time period that ranges from the last 15 minutes to the past 1 year. Click Apply. 7. In the Report Recipients field, enter the email address of the report recipient. To add multiple recipients, press Enter for each additional email address. To delete a recipient, click X next to the email address you want to delete. 8. (Optional) If you want to schedule the generated custom report in the Reports > Schedule Reports page, select the Make Schedulable checkbox. The custom report that has been generated appears under "Custom Reports" in the Report Type dropdown menu. For details about how to schedule a generated custom report, see Scheduling Reports for Managed Appliances Using the Web UI on page 486. 9. Click Next Step to add a table or graph, or click Save if you are finished configuring the custom report. To add a table to a section of a custom report, see Adding Tables to a Custom Report Using the Web UI on page 460. To add a graph to a section of a custom report, see Adding Graphs to a Custom Report Using the Web UI on page 451. Editing Settings in a Custom Report Using the Web UI Follow these steps to edit settings in a new custom report for managed appliances using the Central Management appliance Web UI. You can edit settings in a custom report only using the Web UI. To preview your report, click the toggle button ( ) in the custom report configuration page. Click the button again to return to edit mode. Prerequisites l l Access to the Web UI of the Central Management appliance as Admin or Analyst You have defined the settings in a custom report using the Central Management Web UI. For details about how to define the settings in a custom report, see Defining Settings in a Custom Report Using the Web UI on page 445. To edit the settings in a custom report: 1. Click Reports > Custom Reports. 2. In the Generated Custom Reports section, click the action icon ( © 2019 FireEye ). 447 Central Management Administration Guide CHAPTER 27: Working with Reports for Managed Appliances 3. Clixk Edit. 4. In the Custom Reports page, click the action icon ( ). 5. Click Edit. 6. Modify the report setting you want to edit. l Report Title l Report Format l Description l Time Zone to Convert Report Data to l Date Range l Report Recipients 7. To enable or disable automatically generating a custom report on schedule, select or clear the Make Schedulable checkbox. 8. Click Save. 448 © 2019 FireEye Release 8.7 Customizing Reports for Managed Appliances To add a table to a section of a custom report for managed appliances, see Adding Tables to a Custom Report Using the Web UI on page 460. To add a graph to a section of a custom report for managed appliances, see Adding Graphs to a Custom Report Using the Web UI on page 451. Adding or Deleting a Logo Using the Web UI Follow these steps to add a logo to a custom report or to delete a logo from a custom report for managed appliances using the Central Management appliance Web UI. You can associate only one logo with a PDF-formatted custom report. When you upload a logo, the new logo overwrites the existing logo. The maximum size of the logo you upload is 128 x 128 pixels. You can add or delete a logo for a custom report only using the Web UI. Prerequisites l Access to the Web UI of the Central Management appliance as Admin or Analyst To add a logo to a custom report: 1. In the Web UI, choose Reports > Custom Reports. 2. In the Logo field, click Choose File. 3. Select the logo file you want to add. The image is uploaded to the Central Management appliance and it appears in the Custom Reports page. © 2019 FireEye 449 Central Management Administration Guide CHAPTER 27: Working with Reports for Managed Appliances To delete a logo from a custom report: 1. In the Web UI, choose Reports > Custom Reports. 2. In the Logo field, click the X icon next to the logo. A dialog box prompts you to confirm the changes. 3. Click Yes. The following message appears: The logo is removed from the Custom Reports page. Configuring Graphs for Custom Reports You can configure any number of graph sections for your custom reports from scratch for managed appliances by using the Central Management appliance Web UI: l Adding Graphs to a Custom Report Using the Web UI on the facing page l Editing the Graph Section of a Custom Report Using the Web UI on page 454 l Cloning a Graph Section of a Custom Report Using the Web UI on page 456 l Deleting a Graph Section From a Custom Report Using the Web UI on page 459 A custom report can contain one or more graph sections. You can choose the format of the graph (line chart, pie chart, or bar chart) for each section individually. 450 © 2019 FireEye Release 8.7 Customizing Reports for Managed Appliances Prerequisites l l Access to the Web UI of the Central Management appliance as Admin or Analyst You have defined the settings for the custom report. For details about how to define the settings for the custom report, see Defining Settings in a Custom Report Using the Web UI on page 445. Adding Graphs to a Custom Report Using the Web UI Follow these steps to add a graph to a section of a custom report for managed appliances using the Central Management appliance Web UI. You can add a graph to a section of a custom report only using the Web UI. If you want to completely delete a section of a custom report, click Delete in the Configure Section page. To preview your report, click the toggle button ( ) in the custom report configuration page. Click the button again to return to edit mode. Prerequisites l l Access to the Web UI of the Central Management appliance as Admin or Analyst You have defined the settings for the custom report. For details about how to define the settings for the custom report, see Defining Settings in a Custom Report Using the Web UI on page 445. To add a graph to a section of a custom report: 1. In the Custom Reports page, enter the report title of the report to be modified. 2. Click Next Step. 3. In the next page, click Add Section. The Configure Section window opens. 4. Click the Graph icon. In the Visualization Type area, a green check mark indicates that a graph is selected. © 2019 FireEye 451 Central Management Administration Guide CHAPTER 27: Working with Reports for Managed Appliances 5. Click Next. The graph section details and settings are displayed. 6. In the Section Details area: 452 © 2019 FireEye Release 8.7 Customizing Reports for Managed Appliances l Enter the name of the graph for your custom report section. l (Optional) Enter a description to define the report section. 7. In the Graph Settings area, choose the type of graph you want from the Graph Type drop-down menu. The available graph options depend on the appliance that is connected to your Central Management appliance. 8. (Optional) To preview the graph settings, select the Preview checkbox. The graph (such as a pie chart) that you selected is displayed. If you need to refresh the content, click the refresh icon ( ). 9. Click Save. 10. (Optional) If you want to delete the graph section completely, click Delete. Click Yes. You have the option to generate the report by clicking Generate Report. The following message appears: © 2019 FireEye 453 Central Management Administration Guide CHAPTER 27: Working with Reports for Managed Appliances The custom report is added to the top of the generated custom report list. The report status is displayed as "In progress" in the Generated Custom Reports table. The status is updated as soon as the generated report is available. Editing the Graph Section of a Custom Report Using the Web UI Follow these steps to edit the graph section of a new custom report for managed appliances using the Central Management appliance Web UI. You can change the graph characteristics that you want displayed in the section of a custom report. When you change characteristics of the graph section of a new custom report, the updated report section overwrites the existing report section. You can edit the graph section of a new custom report only using the Web UI. If you want to completely delete a section of a custom report, click Delete in the Configure Section page. To preview your report, click the toggle button ( ) in the custom report configuration page. Click the button again to return to edit mode. Prerequisites l l l 454 Access to the Web UI of the Central Management appliance as Admin or Analyst You have defined the settings for the custom report using the Central Management Web UI. For details about how to define the settings for the custom report, see Defining Settings in a Custom Report Using the Web UI on page 445. You have added one or more graph sections to the custom report using the Central Management Web UI. For details about how to add a graph to a section of a custom report, see Adding Graphs to a Custom Report Using the Web UI on page 451. © 2019 FireEye Release 8.7 Customizing Reports for Managed Appliances To edit the graph section of a new custom report: 1. In the Custom Reports page, locate the report section whose graph you want to edit. 2. Click the action icon ( ). 3. Click Edit. The Configure Section window opens. 4. Click the Graph icon. In the Visualization Type area, a green check mark indicates that a graph is selected. 5. Click Next. The graph section details and settings are displayed. 6. In the Section Details area, change the name of the graph for your custom report section. 7. In the Graph Type drop-down menu, change the graph selection you want to view for the custom report. The available graph options depend on the appliance that is connected to your Central Management appliance. 8. (Optional) To preview the graph settings, select the Preview checkbox. The characteristics of the graph (such as a bar graph) that you changed is displayed. If you need to refresh the content, click the refresh icon ( ). 9. Click Save. 10. Drag the graph section to the intended position on the custom report. You have the option to generate the report by clicking Generate Report. The following message appears: © 2019 FireEye 455 Central Management Administration Guide CHAPTER 27: Working with Reports for Managed Appliances The custom report is added to the top of the generated custom report list. The report status is displayed as "In progress" in the Generated Custom Reports table. The status is updated as soon as the generated report is available. Cloning a Graph Section of a Custom Report Using the Web UI Follow these steps to clone a graph section of a custom report and save it as a new section using the Central Management appliance Web UI. The new graph section inherits the characteristics from the existing graph section. When you clone the characteristics of an existing report, the updated report will not overwrite the existing section. You can clone a graph section of a new custom report only using the Web UI. If you want to completely delete a section of a custom report, click Delete in the Configure Section page. A dialog box prompts you to confirm your changes. To preview your report, click the toggle button ( ) in the custom report configuration page. Click the button again to return to edit mode. Prerequisites l l l Access to the Web UI of the Central Management appliance as Admin or Analyst You have defined the settings for the custom report using the Central Management Web UI. For details about how to define the settings for the custom report, see Defining Settings in a Custom Report Using the Web UI on page 445. You have generated one or more custom reports for a managed appliance using the Central Management Web UI. To clone a graph section of a custom report: 1. In the Generated Custom Reports portion of the Custom Reportspage, locate the report whose section or characteristics you want to clone. 2. Click the action icon ( 456 ). © 2019 FireEye Release 8.7 Customizing Reports for Managed Appliances 3. Click Clone. The graph characteristics of the existing report section are copied as a new section. © 2019 FireEye 457 Central Management Administration Guide CHAPTER 27: Working with Reports for Managed Appliances 4. Click Edit. The Configure Section window opens for the relevant report section. In the Visualization Type area, a green check mark indicates that a graph is selected. 5. Click Next. The graph section details and settings are displayed. 6. Change the data you want displayed. 7. Click Save. 8. Drag the section to the intended position in the custom report. You have the option to generate the report by clicking Generate Report. The following message appears: The custom report is added to the top of the generated custom report list. The report status is displayed as "In progress" in the Generated Custom Reports table. The status is updated as soon as the generated report is available. 458 © 2019 FireEye Release 8.7 Customizing Reports for Managed Appliances Deleting a Graph Section From a Custom Report Using the Web UI Follow these steps to delete a graph section from a custom report for managed appliances using the Central Management appliance Web UI. You can delete a graph section from a custom report only using the Web UI. Prerequisites l l Access to the Web UI of the Central Management appliance as Admin or Analyst You have added one or more graph sections to a new custom report for a managed appliance using the Central Management Web UI. For details about how to add a graph to a section of a custom report, see Adding Graphs to a Custom Report Using the Web UI on page 451. To delete a graph section from a custom report: 1. In the Custom Reports page, locate the graph section you want to delete. 2. Click the action icon ( © 2019 FireEye ). 459 Central Management Administration Guide CHAPTER 27: Working with Reports for Managed Appliances 3. Click Delete. The graph section is removed from the custom report. You must generate the report for the changes to take effect. Configuring Tables for Custom Reports You can configure any number of table sections for your custom reports from scratch for managed appliances by using the Central Management appliance Web UI: l l Adding Tables to a Custom Report Using the Web UI below Defining Filters for Table Attributes on a Custom Report Section Using the Web UI on page 464 l Editing the Table Section of a Custom Report Using the Web UI on page 466 l Cloning a Table Section of a Custom Report Using the Web UI on page 478 l Deleting a Table Section From a Custom Report Using the Web UI on page 470 A custom report can contain one or more table sections. You can choose the attributes for each section individually. The attributes are the table columns that you can select in a custom report. You can use filter options to define the match criteria for table columns that are displayed in each section of the custom report. For details about how to define filters for table attributes in a custom report section, see Defining Filters for Table Attributes on a Custom Report Section Using the Web UI on page 464. When you select the csv output format, xml output format, or json output format to write the custom report to a CSV file, XML file, or JSON file, you can preview only 5 rows. When you select the pdf output format to write the custom report to an Adobe PDF file, you can preview 5, 25, 50, or 100 rows. Prerequisites l l Access to the Web UI of the Central Management appliance as Admin or Analyst You have defined the settings for the custom report. For details about how to define the settings for the custom report, see Defining Settings in a Custom Report Using the Web UI on page 445. Adding Tables to a Custom Report Using the Web UI Follow these steps to add a table to a section of a custom report for managed appliances using the Central Management appliance Web UI. You can modify the table settings to change the content in the custom report. 460 © 2019 FireEye Release 8.7 Customizing Reports for Managed Appliances You can add a table to a section of a custom report only using the Web UI. If you want to completely delete a section of a custom report, click Delete in the Configure Section page. To preview your report, click the toggle button ( ) in the custom report configuration page. Click the button again to return to edit mode. Prerequisites l l Access to the Web UI of the Central Management appliance as Admin or Analyst You have defined the settings for the custom report using the Central Management Web UI. For details about how to define the settings for the custom report, see Defining Settings in a Custom Report Using the Web UI on page 445. To add a table to a section of a custom report section: 1. In the Custom Reports page, enter the report title of the report to be modified. 2. Click Next Step. 3. In the next page, click Add Section. The Configure Section window opens. 4. Click the Table icon. In the Visualization Type area, a green check mark indicates that a table is selected. 5. Click Next. The table section details and settings are displayed. © 2019 FireEye 461 Central Management Administration Guide CHAPTER 27: Working with Reports for Managed Appliances 6. In the Section Details area: l Enter the name of the table for your custom report section. l (Optional) Enter a description to define the report section. 7. In the Table Settings area: l l Choose the type of data and table from the Table Type drop-down menu. The available table options depend on the appliance that is connected to your Central Management appliance. In the Select Table Columns area, select the columns you want to view for the custom report. The available column options are based on the table option you selected. You cannot select the columns to view for the following table types: l Appliance Status Report l Sensor Status Report l Email Counters Hourly Stats l URL Counters in Email Hourly Stats 8. (Optional) To preview the table settings, select the Preview checkbox. The table columns that you selected are displayed. 462 © 2019 FireEye Release 8.7 Customizing Reports for Managed Appliances If you need to refresh the content, click the refresh icon ( ). This icon also allows you to preview the new settings while the Preview checkbox is selected. 9. Click Save. If you want to define the filter selection criteria of a table, click Next. For details about how to filter table attributes on a report section, see Defining Filters for Table Attributes on a Custom Report Section Using the Web UI on the next page. 10. (Optional) If you want to delete the table section completely, click Delete. Click Yes. You have the option to generate the report by clicking Generate Report. The following message appears: The custom report is added to the top of the generated custom report list. The report status is displayed as "In progress" in the Generated Custom Reports table. The status is updated as soon as the generated report is available. © 2019 FireEye 463 Central Management Administration Guide CHAPTER 27: Working with Reports for Managed Appliances Defining Filters for Table Attributes on a Custom Report Section Using the Web UI Follow these steps to define filters for table attributes on a custom report section for managed appliances using the Central Management appliance Web UI. You can use filter options to define the match criteria for attributes that are the table columns displayed in each section of the custom report. You can define filters for table attributes on a custom report section only using the Web UI. You cannot define filters for the following table types: l Appliance Status Report l Sensor Status Report l Email Counters Hourly Stats l URL Counters in Email Hourly Stats If you want to completely delete a section of a custom report, click Delete in the Configure Section page. Prerequisites l l l 464 Access to the Web UI of the Central Management appliance as Admin or Analyst You have defined the settings for the custom report using the Central Management Web UI. For details about how to define the settings for the custom report, see Defining Settings in a Custom Report Using the Web UI on page 445. You have added one or more table sections to a custom report using the Central Management Web UI. For details about how to add a table to a section of a custom reports, see Adding Tables to a Custom Report Using the Web UI on page 460. © 2019 FireEye Release 8.7 Customizing Reports for Managed Appliances To define filters for table attributes on a custom report section: 1. In the Settings page, click Next. The filter selection area is displayed. 2. In the Add Filters area: l l Choose an attribute. The available options depend on the table option you selected. Choose the operation (for example, In, Not In, Like, or =) to match the particular attribute. The available operations depend on the attribute you selected. l Enter any value you want to associate with the attribute. l Choose And or Or as the logical operation to associate with the attribute. l Click Add Filter. You can add multiple filters at one time. l To delete a filter, click the Delete (trash can) icon. 3. Repeat the previous step for each filter you want to define. 4. In the Additional Filters area: l l © 2019 FireEye Select either Not Acknowledged, Acknowledged, or Both. The default value is Not Acknowledged. (Optional) In the Limit field, enter the number of rows that you want displayed in the output. 465 Central Management Administration Guide l CHAPTER 27: Working with Reports for Managed Appliances Choose All Sensors or the applicable sensor or sensor-enabled integrated appliance that is connected to this Central Management appliance. The options in the Additional Filters area are based on the table option you selected. 5. (Optional) To preview the table settings, select the Preview checkbox. The table columns that you selected are displayed. If you need to refresh the content, click the refresh icon ( ). This icon also allows you to preview the new settings while the Preview checkbox is selected. 6. Click Save. If there is a problem with the filter criteria that you defined, the following message appears. Correct the filter definition. Editing the Table Section of a Custom Report Using the Web UI Follow these steps to edit the table section in a custom report for managed appliances using the Central Management appliance Web UI. You can change the table columns that you want displayed in the section of a custom report. When you change attributes of the table section of a custom report, the updated report section overwrites the existing report section. You can edit the table section of a custom report only using the Web UI. If you want to completely delete a section of a custom report, click Delete in the Configure Section page. To preview your report, click the toggle button ( ) in the custom report configuration page. Click the button again to return to edit mode. 466 © 2019 FireEye Release 8.7 Customizing Reports for Managed Appliances Prerequisites l l l Access to the Web UI of the Central Management appliance as Admin or Analyst You have defined the settings for the custom report using the Central Management Web UI. For details about how to define the settings for the custom report, see Defining Settings in a Custom Report Using the Web UI on page 445. You have added one or more table sections to a new custom report for a managed appliance using the Central Management Web UI. For details about how to add a table to a section of a custom report, see Adding Tables to a Custom Report Using the Web UI on page 460. To edit the table section of a custom report: 1. In the Custom Reports page, locate the report section whose attribute you want to edit. 2. Click Edit. The Configure Section window opens for the relevant report section. In the Visualization Type area, a green check mark indicates that a table is selected. 3. Click Next. The table section details and settings are displayed. 4. In the Section Details area: l l Change the name of the table for your custom report section. (Optional) In the Description field, enter a description to define the report section. 5. In the Table Settings area: l © 2019 FireEye Change the table type and data from the Table Type drop-down menu. The available table options depend on the appliance that is connected to your 467 Central Management Administration Guide CHAPTER 27: Working with Reports for Managed Appliances Central Management appliance. l In the Select Table Columns area, select the columns you want to view for the custom report. The available column options are based on the table option you selected. 6. (Optional) To preview the graph settings, select the Preview checkbox. The table attributes that you changed are displayed. If you need to refresh the content, click the refresh icon ( ). 7. Click Save. 8. Drag the table section to the intended position in the custom report. You have the option to generate the report by clicking Generate Report. The following message appears: The custom report is added to the top of the generated custom report list. The report status is displayed as "In progress" in the Generated Custom Reports table. The status is updated as soon as the generated report is available. Cloning a Table Section of a Custom Report Using the Web UI Follow these steps to clone a table section of a custom report and save it as a new table section using the Central Management appliance Web UI. The new table section inherits the attributes from the existing table section. When you clone the attributes of an existing report, the updated report will not overwrite the existing section. You can clone a table section of a new custom report only using the Web UI. If you want to completely delete a section of a custom report, click Delete in the Configure Section page. To preview your report, click the toggle button ( ) in the custom report configuration page. Click the button again to return to edit mode. 468 © 2019 FireEye Release 8.7 Customizing Reports for Managed Appliances Prerequisites l l l Access to the Web UI of the Central Management appliance as Admin or Analyst You have defined the settings for the custom report using the Central Management Web UI. For details about how to define the settings for the custom report, see Defining Settings in a Custom Report Using the Web UI on page 445. You have generated one or more custom reports for a managed appliance using the Central Management Web UI. To clone a table section of a custom report: 1. In the Generated Custom Reports portion of the Custom Reportspage, locate the report whose section or characteristics you want to clone. 2. Click the action icon ( ). 3. Click Clone. The table attributes of the existing report section are copied as a new section. 4. Click Edit. The Configure Section window opens for the relevant report section. In the Visualization Type area, a green check mark indicates that a table is selected. © 2019 FireEye 469 Central Management Administration Guide CHAPTER 27: Working with Reports for Managed Appliances 5. Click Next. The table section details and settings are displayed. 6. Change the data you want displayed. 7. Click Save. 8. Drag the section to the intended position in the custom report. You have the option to generate the report by clicking Generate Report. The following message appears: The custom report is added to the top of the generated custom report list. The report status is displayed as "In progress" in the Generated Custom Reports table. The status is updated as soon as the generated report is available. Deleting a Table Section From a Custom Report Using the Web UI Follow these steps to delete a table section from a custom report for managed appliances using the Central Management appliance Web UI. You can delete a section from a custom report only using the Web UI. Prerequisites l l 470 Access to the Web UI of the Central Management appliance as Admin or Analyst You have added one or more table sections to a new custom report for a managed appliance using the Central Management Web UI. For details about how to add a table to a section of a custom report, see Adding Tables to a Custom Report Using the Web UI on page 460. © 2019 FireEye Release 8.7 Customizing Reports for Managed Appliances To delete a table section from a custom report: 1. In the Custom Reports page, locate the table section you want to delete. 2. Click the action icon ( ). 3. Click Delete. The table section is removed from the custom report. You must generate the report for the changes to take effect. Creating a Custom Report from a Predefined Report Template You can clone a predefined report template and edit its attributes to generate a custom report. When you select the Show Pre-populated Reports checkbox in the Generated Custom Reports table, you can view all the available static reports as predefined report templates. The available predefined report templates depend on the appliance that is connected to your Central Management appliance. The predefined report template shows data generated during the past 3 months by default. After you clone a predefined report template, you can change the report settings, add sections, edit sections, clone sections, or delete sections. If your Central Management appliance is connected to an Email Security — Server Edition appliance, you can create a custom report based on a clone of the following predefined report templates: l Email Executive Summary l Email Activity l Email Hourly Stat © 2019 FireEye 471 Central Management Administration Guide CHAPTER 27: Working with Reports for Managed Appliances For detailed information about reports on the Email Security — Server Edition appliance, refer to the "Reports" chapter of the Email Security — Server Edition User Guide. If your Central Management appliance is connected to an File Security appliance, you can create a custom report based on a clone of the File Executive Summary predefined report template. For detailed information about reports on the File Security appliance, refer to the "Reports" chapter of the File Security User Guide. If your Central Management appliance is connected to an Network Security appliance, you can create a custom report based on a clone of the following predefined report templates: l Executive Summary l Callback Server l Infected Hosts Trend l Malware Activity For detailed information about reports on the Network Security appliance, refer to the "Reports" chapter of the Network Security User Guide. If your Central Management appliance is connected to an IPS-enabled Network Security appliance, you can create a custom report based on a clone of the following predefined report templates as a PDF file or as a CSV file: l IPS Executive Summary l IPS Top N Attacks l IPS Top N Attackers l IPS Top N MVX-Correlated l IPS Top N Victims For detailed information about IPS-specific reports, refer to the "IPS Reports" chapter of the Network Security IPS Feature Guide. You can clone a predefined report template only using the Web UI. Prerequisites l Access to the Web UI of the Central Management appliance as Admin or Analyst Creating a Custom Report from a Predefined Report Template Using the Web UI Follow these steps to create a custom report from a predefined report template using the Central Management appliance Web UI. 472 © 2019 FireEye Release 8.7 Customizing Reports for Managed Appliances To preview your report, click the toggle button ( ) in the custom report configuration page. Click the button again to return to edit mode. To create a clone of a predefined report template: 1. In the Web UI, choose Reports > Custom Reports. 2. Select the Show Pre-populated Reports checkbox. All the available static reports are displayed as predefined report templates. 3. In the Generated Custom Reports table, locate the report template you want to clone. 4. Click the action icon ( ) in the Action column. 5. Click Clone. The attributes or characteristics for each section of the report template appear. © 2019 FireEye 473 Central Management Administration Guide CHAPTER 27: Working with Reports for Managed Appliances 6. Drag the section to the intended position in the custom report. 7. To edit the table attributes or graph characteristics of a section and save it as part of a new report, click Edit. For details about how to edit a graph section, see Editing the Graph Section of a Custom Report Using the Web UI on page 454. For details about how to edit a table section, see Editing the Table Section of a Custom Report Using the Web UI on page 466. 8. To create a clone of a section, click Clone. The attributes of the existing report section are copied as a new section. 9. If you want to delete a clone of the applicable section from the report, click Delete. You have the option to generate the report by clicking Generate Report. The following message appears: The custom report is added to the top of the generated custom report list. The report status is displayed as "In progress" in the Generated Custom Reports table. The status is updated as soon as the generated report is available. 474 © 2019 FireEye Release 8.7 Customizing Reports for Managed Appliances Editing and Cloning Reports That Have Been Generated You can edit and clone reports that have been generated by using the Central Management appliance Web UI: l l l l Editing the Table Attributes of a Generated Custom Report Using the Web UI below Editing the Graph Sections of a Generated Custom Report Using the Web UI on the next page Cloning a Table Section of a Custom Report Using the Web UI on page 478 Cloning a Graph Section of a Generated Custom Report Using the Web UI on page 479 Prerequisites l l l Access to the Web UI of the Central Management appliance as Admin or Analyst You have defined the settings for the custom report using the Central Management Web UI. For details about how to define the settings for the custom report, see Defining Settings in a Custom Report Using the Web UI on page 445. You have generated one or more custom reports for a managed appliance using the Central Management Web UI. Editing the Table Attributes of a Generated Custom Report Using the Web UI Follow these steps to edit the attributes that are the table columns of a custom report that have been generated for managed appliances using the Central Management appliance Web UI. When you change the table attributes of a custom report that has been generated, the updated report overwrites the existing report. You can edit the table attributes of a custom report only using the Web UI. If you want to completely delete a section of a custom report, click Delete in the Configure Section page. To preview your report, click the toggle button ( ) in the custom report configuration page. Click the button again to return to edit mode. © 2019 FireEye 475 Central Management Administration Guide CHAPTER 27: Working with Reports for Managed Appliances Prerequisites l l Access to the Web UI of the Central Management appliance as Admin or Analyst You have generated one or more custom reports for a managed appliance using the Central Management Web UI. To edit the table attributes of a generated custom report: 1. In the Web UI, choose Reports > Custom Reports. 2. In the Generated Custom Reports table, locate the custom report you want to edit. 3. Click the action icon ( ) in the Action column. 4. Click Edit. Each section of the report appears in the custom report section configuration page. For details about how to edit the table section in a custom report, see Editing the Table Section of a Custom Report Using the Web UI on page 466. Editing the Graph Sections of a Generated Custom Report Using the Web UI Follow these steps to edit the graph sections of a custom report that have been generated for managed appliances using the Central Management appliance Web UI. You can change the graph characteristics that you want displayed in the report section of a custom report that has been generated. When you change characteristics of the graph section of a new custom report, the updated report overwrites the existing report. You can edit the graph section of a generated custom report only using the Web UI. 476 © 2019 FireEye Release 8.7 Customizing Reports for Managed Appliances If you want to completely delete a section of a custom report, click Delete in the Configure Section page. To preview your report, click the toggle button ( ) in the custom report configuration page. Click the button again to return to edit mode. Prerequisites l l l Access to the Web UI of the Central Management appliance as Admin or Analyst You have defined the settings for the custom report using the Central Management Web UI. For details about how to define the settings for the custom report, see Defining Settings in a Custom Report Using the Web UI on page 445. You have generated one or more custom reports for a managed appliance using the Central Management Web UI. To edit the graph sections of a generated custom report: 1. In the Web UI, choose Reports > Custom Reports. 2. In the Generated Custom Reports table, locate the custom report you want to edit. 3. Click the action icon ( ) in the Action column. 4. Click Edit. Each section of the report appears in the custom report section configuration page. For details about how to edit the graph section in a custom report, see Editing the Graph Section of a Custom Report Using the Web UI on page 454. © 2019 FireEye 477 Central Management Administration Guide CHAPTER 27: Working with Reports for Managed Appliances Cloning a Table Section of a Custom Report Using the Web UI Follow these steps to clone a table section of a custom report and save it as a new table section using the Central Management appliance Web UI. The new table section inherits the attributes from the existing table section. When you clone the attributes of an existing report, the updated report will not overwrite the existing section. You can clone a table section of a new custom report only using the Web UI. If you want to completely delete a section of a custom report, click Delete in the Configure Section page. To preview your report, click the toggle button ( ) in the custom report configuration page. Click the button again to return to edit mode. Prerequisites l l l Access to the Web UI of the Central Management appliance as Admin or Analyst You have defined the settings for the custom report using the Central Management Web UI. For details about how to define the settings for the custom report, see Defining Settings in a Custom Report Using the Web UI on page 445. You have generated one or more custom reports for a managed appliance using the Central Management Web UI. To clone a table section of a custom report: 1. In the Generated Custom Reports portion of the Custom Reportspage, locate the report whose section or characteristics you want to clone. 2. Click the action icon ( 478 ). © 2019 FireEye Release 8.7 Customizing Reports for Managed Appliances 3. Click Clone. The table attributes of the existing report section are copied as a new section. 4. Click Edit. The Configure Section window opens for the relevant report section. In the Visualization Type area, a green check mark indicates that a table is selected. 5. Click Next. The table section details and settings are displayed. 6. Change the data you want displayed. 7. Click Save. 8. Drag the section to the intended position in the custom report. You have the option to generate the report by clicking Generate Report. The following message appears: The custom report is added to the top of the generated custom report list. The report status is displayed as "In progress" in the Generated Custom Reports table. The status is updated as soon as the generated report is available. Cloning a Graph Section of a Generated Custom Report Using the Web UI Follow these steps to clone a graph section of an existing custom report and save it as a new section for managed appliances using the Central Management appliance Web UI. You can create a new graph section based on a clone of an existing section. The new graph section inherits the match characteristics from the graph section of the existing report. © 2019 FireEye 479 Central Management Administration Guide CHAPTER 27: Working with Reports for Managed Appliances When you clone the characteristics of an existing report, the updated report will not overwrite the existing section. You can clone a graph section of a generated custom report only using the Web UI. If you want to completely delete a section of a custom report, click Delete in the Configure Section page. To preview your report, click the toggle button ( ) in the custom report configuration page. Click the button again to return to edit mode. Prerequisites l l l Access to the Web UI of the Central Management appliance as Admin or Analyst You have defined the settings for the custom report. For details about how to define the settings for the custom report, see Defining Settings in a Custom Report Using the Web UI on page 445. You have generated one or more custom reports for a managed appliance using the Central Management Web UI. To clone a graph section of a generated custom report: 1. In the Web UI, choose Reports > Custom Reports. 2. In the Generated Custom Reports table, locate the custom report you want to clone. 3. Click the action icon ( ) in the Action column. 4. Click Clone. The characteristics for each section of the report appears. For details about how to clone a graph section in a custom report, see Cloning a Graph Section of a Custom Report Using the Web UI on page 456. 480 © 2019 FireEye Release 8.7 Customizing Reports for Managed Appliances Sending, Downloading, and Deleting Custom Reports You can send, download, and delete custom reports that have been generated by using the Central Management appliance Web UI: l Sending Generated Custom Reports by Email Using the Web UI below l Downloading a Generated Custom Report Using the Web UI on page 483 l Deleting a Generated Custom Report Using the Web UI on page 484 Prerequisites l l l Access to the Web UI of the Central Management appliance as Admin or Analyst You have defined the settings for the custom report using the Central Management Web UI. For details about how to define the settings for the custom report, see Defining Settings in a Custom Report Using the Web UI on page 445. You have generated one or more custom reports for a managed appliance using the Central Management Web UI. Sending Generated Custom Reports by Email Using the Web UI Use the Generated Custom Reports table to automatically send a generated custom report as an email attachment to a list of recipients for managed appliances using the Central Management appliance Web UI. You can send generated custom reports by email only using the Web UI. Prerequisites l l l Access to the Web UI of the Central Management appliance as Admin or Analyst You have defined the settings for the custom report using the Central Management Web UI. For details about how to define the settings for the custom report, see Defining Settings in a Custom Report Using the Web UI on page 445. You have generated one or more custom reports for a managed appliance using the Central Management Web UI. To send a generated custom report by email: 1. In the Web UI, choose Reports > Custom Reports. The page lists the custom reports for a managed appliance that have already been generated in the custom reports database. 2. In the Generated Custom Reports table, select the generated custom report. © 2019 FireEye 481 Central Management Administration Guide 3. Click the action icon ( CHAPTER 27: Working with Reports for Managed Appliances ) in the Action column. 4. Click Email. The Email Report window opens. 5. In the Recipients field, enter the email address of the report recipient. To add multiple recipients, press Enter for each additional email address. To delete a recipient, click X next to the email address you want to delete. 482 © 2019 FireEye Release 8.7 Customizing Reports for Managed Appliances 6. Click Send. The Central Management appliance sends the generated custom report by email to the intended recipients. The following message appears: Downloading a Generated Custom Report Using the Web UI Follow these steps to download a generated custom report from the Central Management appliance to your local desktop using the Central Management appliance Web UI. You can download a generated custom report only using the Web UI. Prerequisites l l Access to the Web UI of the Central Management appliance as Admin or Analyst You have generated one or more custom reports for a managed appliance using the Central Management Web UI. To download a generated custom report: 1. In the Web UI, choose Reports > Custom Reports. The page lists the custom reports for a managed appliance that have already been generated. 2. In the Generated Custom Reports table, locate the custom report you want to download to your desktop. © 2019 FireEye 483 Central Management Administration Guide 3. Click the action icon ( CHAPTER 27: Working with Reports for Managed Appliances ) in the Action column. 4. Click Download. Deleting a Generated Custom Report Using the Web UI Use the Generated Custom Reports table to delete a custom report that has been generated from the custom reports database for managed appliances using the Central Management appliance Web UI. You can delete a generated custom report only using the Web UI. Prerequisites l l l Access to the Web UI of the Central Management appliance as Admin or Analyst You have defined the settings for the custom report. For details about how to define the settings for the custom report, see Defining Settings in a Custom Report Using the Web UI on page 445. You have generated one or more custom reports for a managed appliance using the Central Management Web UI. To delete a generated custom report from the custom reports database: 1. In the Web UI, choose Reports > Custom Reports. The page lists the custom reports for a managed appliance that have already been generated in the custom reports database. 2. In the Generated Custom Reports table, select one or more custom reports to delete from the custom reports database. 3. Click the action icon ( ) in the Action column. 4. Click Delete. A dialog box prompts you to confirm your changes. 484 © 2019 FireEye Release 8.7 Generating and Scheduling Reports for Managed Appliances 5. Click Yes. The reports you selected are removed from the custom reports database. Generating and Scheduling Reports for Managed Appliances All static reports that are available to all managed appliances can be generated or scheduled. You also have the option to schedule a custom report that has been generated on managed Email Security — Server Edition, Network Security, and File Security appliances. For example, the following illustration is from a Central Management appliance that manages one or more IPS-enabled Network Security appliances. All IPSenabled Network Security static report types are included in the Report Type drop-down list. Generating Reports for Managed Appliances Using the Web UI Use the Generate Report page to generate static reports for managed appliances. © 2019 FireEye 485 Central Management Administration Guide CHAPTER 27: Working with Reports for Managed Appliances To generate static reports: 1. In the Web UI, choose Reports > Static Reports. 2. Generate the static reports as described in the User Guide for the managed appliance. For information about generating a SmartVision alerts report, see the NX Series SmartVision Feature Guide. For SmartVision appliances, generate the SmartVision Alert static report as described in the NX Series SmartVision Feature Guide. A SmartVision appliance can be any of the following: o SmartVision Edition sensor o SmartVision-enabled NX Series sensor o SmartVision-enabled NX Series integrated appliance You can generate a SmartVision Alerts report from the Web UI only. A SmartVision Alerts report cannot be customized. For IPS-enabled Network Security appliances, generate the static reports as described in the IPS Feature Guide. Scheduling Reports for Managed Appliances Using the Web UI Use the Schedule Report page to schedule static or custom reports for managed appliances. You can schedule custom reports that have been generated for managed Email Security — Server Edition, Network Security, and File Security appliances if you select the Make Schedulable checkbox in the Reports > Custom Reports page on the Central Management appliance. To schedule static reports: 1. In the Web UI, choose Reports > Schedule Reports. 2. Schedule the static reports as described in the User Guide for the managed appliance. For IPS-enabled Network Security appliances, schedule the static reports as described in the IPS Feature Guide. You can schedule a SmartVision Alerts report from the Web UI only. A SmartVision Alerts report cannot be customized. 486 © 2019 FireEye Release 8.7 Generating and Scheduling Reports for Managed Appliances To schedule custom reports: 1. In the Central Management appliance Web UI, choose Reports > Schedule Reports. 2. In the Report Type drop-down menu under "Custom Reports", select the custom report that has been generated for managed Email Security — Server Edition, Network Security, and File Security appliances. 3. In the Scheduled drop-down menu, set the time frequency: l hourly l daily l weekly l monthly 4. In the Time drop-down menu, set the time of day in hours and minutes (00:00). 5. If you selected a weekly report, specify the report day of the week in the WeekDay field. 6. If you selected a monthly report, specify the report day of the month in the MonthDay field. 7. In the Delivery drop-down menu, specify the delivery method. The default delivery is email. l email—Deliver the custom report as a file attached to email. l file—Deliver the custom report as a file linked from the Web UI. 8. In the Time Frame drop-down menu, select the time period for this custom report: l past day—Report covers analysis generated during the past 24 hours. l past week—Report covers analysis generated during the past 7 days. l past month—Report covers analysis generated during the past 1 month. l past 3 months—Report covers analysis generated during the past 3 months. 9. Click Schedule Report. The scheduled report is added to the top of the scheduling list. Generating and Scheduling Reports for Managed Appliances Using the CLI Use the commands in this section to generate and schedule static reports for managed appliances. The commands are executed once; they are not stored. NOTE: For comprehensive information about the reporting commands, see the User Guide for the managed appliance. © 2019 FireEye 487 Central Management Administration Guide CHAPTER 27: Working with Reports for Managed Appliances NOTE: If you omit the command parameter from these commands, you will be prompted for it, and the characters you enter will be masked for confidentiality. NOTE: This topic describes how to execute a single command. You can also define a profile of commands that run in sequence unattended. See Working with Command Profiles on page 412. To execute a command on an appliance: 1. Enable the CLI configuration mode: hostname > enable hostname # configure terminal 2. Execute the command: hostname (config) # cmc execute appliance <applianceName> command ["<command>"] where command is a form of the report generate or report schedule command and must be enclosed in double quotation marks. To execute a command on a group of appliances: 1. Enable the CLI configuration mode: hostname > enable hostname # configure terminal 2. Execute the command: hostname (config) # cmc execute group <groupName> command ["<command>"] where command is a form of the report generate or report schedule command and must be enclosed in double quotation marks. IMPORTANT: You can cancel the execution of outstanding commands, as described in Canceling Outstanding Commands on page 403. Example This example generates an Alert Details report on behalf of the NX-04 appliance. hostname (config) # cmc execute appliance NX-04 command "report generate type Alert_Details report_format csv report_detail normal alert_type malwareobject time_frame past_month transport file" Execute report command. Check email or WebUI for report. 488 © 2019 FireEye Central Management Administration Guide CHAPTER 28: Checking Status and Health of Managed Appliances There are several ways to view the status and health of managed appliances. An administrator can recheck the status and reset the connection status from the Central Management Web UI. From the Central Management CLI, an administrator can define the following settings for status and health checks on managed appliances: l l l l l Enable/Disable—Whether status checks will be performed on all managed appliances or specific managed appliances. By default, status checks are enabled. Interval—Time delay between the start of one check and the next check. The default is 60 seconds. Timeout—The amount of time to wait for an appliance to send its status to Central Management appliance. If a timeout occurs, a status failure is logged and the connection between the appliance and the Central Management appliance is broken. The default is 30 seconds. Force Check—Forces an immediate status check of all managed appliances, even if checking is disabled overall with the no cmc status enable command. Status Test Criteria—Enable or disable testing the status of a specific criterion (such as the fan, support key, and so on) on all managed appliances. NOTE: Forced checking and status tests are not performed on a specific appliance if status checks are disabled for that appliance. NOTE: See Defining Status and Health Check Settings for Managed Appliances Using the CLI on page 496 for information about changing these settings. © 2019 FireEye 489 Central Management Administration Guide CHAPTER 28: Checking Status and Health of Managed Appliances Prerequisites l Monitor, Operator, or Admin access to view status and health l Admin access to recheck and reset status and configure status check criteria Checking Status and Health of Managed Appliances Using the Web UI Use the Sensors page to check the status and health of managed appliances. The Connection and Health columns provide high-level information. Additional information is displayed if you hover over an icon in the columns, as shown in the following examples. Detailed information is displayed when you click the appliance name in the Sensor column, as shown in the following example and described in Appliance Information on page 373. 490 © 2019 FireEye Release 8.7 Checking Status and Health of Managed Appliances Using the Web UI Refreshing the Status Information An administrator can do the following when there are connectivity or health warnings: l l Recheck collects the appliance details and health status, and updates the information in the Connection and Health columns and the expanded section. Reset checks the connection status when the Central Management appliance has no connectivity to the appliance. Reset also restores the connectivity if the underlying cause is removed. Connectivity loss can happen for the following reasons: l l The appliance is offline. The appliance is online but there is a serious issue (for example, the database or a process is down, an out-of-memory condition exists, or an incorrect IP address was configured for the appliance). To check status and health: 1. Click the Appliances tab. The Sensors tab should be selected. 2. Hover over icons in the Connection and Health columns to view additional information. 3. Click the appliance name in the Sensor column to view appliance details. To recheck the status: l Click Select > Recheck in the Action column in the row for the appliance you want to recheck. © 2019 FireEye 491 Central Management Administration Guide CHAPTER 28: Checking Status and Health of Managed Appliances IMPORTANT! The Recheck option is not available if the managed appliance initiated the connection to the Central Management appliance, as described in the System Administration Guide or Administration Guide for the managed appliance. To reset connectivity: l Click Reset in the Connection column for the appliance. Checking Status and Health of Managed Appliances Using the CLI Use the commands in this section to check the status and health of managed appliances. To view status: 1. Go to CLI enable mode: hostname > enable 2. View status: l To view high-level status of all appliances: hostname # show cmc appliances brief l To view health check criteria and detailed status information: hostname # show cmc status l To view the connection status of all appliances: hostname # show cmc appliances l To view comprehensive information about a specific appliance: hostname # show cmc appliances <applianceName> l To view comprehensive information about all appliances: hostname # show cmc appliances detail NOTE: You can also run Network Security network deployment checks using the cmc execute appliance <NXApplianceName> command deployment check commands. For details, see the NX Series System Administration Guide. 492 © 2019 FireEye Release 8.7 Checking Status and Health of Managed Appliances Using the CLI Examples show cmc appliances brief This example shows that three appliances are enabled for Central Management management, one appliance is disconnected, and two appliances failed status checks. hostname # show cmc appliances brief Appliance Address Enabled --------------------ex-03 172.30.1.1 yes nx-02 172.70.1.1 yes fx-04 172.20.1.1 yes nx-01 172.70.2.1 yes nx-05 172.40.1.1 yes Connected --------no yes yes yes yes Health -----CRIT ok WARN ok ok Product ------eMPS wMPS fMPS wMPS wMPS show cmc status This example shows the status check settings and criteria, and then shows the status of each appliance that can be managed by this Central Management appliance. hostname-01 # show cmc status Status checking enabled: yes Check interval: 60 seconds Timeout: 30 seconds Status criteria: "alive" test enabled: "content-key" test enabled: "disk_space" test enabled: "eula" test enabled: "fan" test enabled: "feature: test enabled: "power_supply" test enabled: "product_key" test enabled: "raid" test enabled: "support_key" test enabled: "temperature" test enabled: "user_role" test enabled: Appliance ex-03: Last checked: Connected at last check: Replied to last check: Last check succeeded: Failed checks: alive failed content_key failed disk_space failed eula failed fan failed feature failed power_supply failed product_key failed raid failed support_key failed temperature failed user_role failed © 2019 FireEye yes yes yes yes yes yes yes yes yes yes yes yes 2014/12/23 21:28:02 no no no 493 Central Management Administration Guide Appliance nx-02: Last checked: Connected at last check: Replied to last check: Last check succeeded: Appliance fx-04: Last checked: Connected at last check: Replied to last check: Last check succeeded: Failed checks: content_key failed CHAPTER 28: Checking Status and Health of Managed Appliances 2014/12/23 21:28:02 yes yes yes 2014/12/23 21:28:02 yes yes no show cmc appliances This example displays the status of each appliance that can be managed by this Central Management appliance. In this case, the Network Security appliance initiated the request to be managed, the Email Security — Server Edition appliance is not currently connected, and the Central Management appliance initiated the connection between itself and the File Security appliance. hostname # show cmc appliances Appliance nx-02: Address: Enabled: Connected: Status check OK: Version compatible: 172.70.1.1 yes yes (client-initiated) yes yes Appliance ex-03: Address: Enabled: Connected: Status check OK: Version compatible: 172.30.1.1 yes no no unknown Appliance fx-04: Address: Enabled: Connected: Status check OK: Version compatible: 172.20.1.1 yes yes (server-initiated) no yes show cmc appliances <applianceName> This example displays the status and settings for the nx-02 appliance. The Central Management appliance initiated the connection with the appliance. hostname # show cmc appliances nx-02 Appliance nx-02 Connection status: Connected: Connection failure reason: Connection last formed: 494 yes (server-initiated) None 2014/12/23 21:13:37 © 2019 FireEye Release 8.7 Checking Status and Health of Managed Appliances Using the CLI Connection last broken: Last connection attempt: Next connection attempt: Current time: Status check OK: Server username on client: Client username on server: Appliance Client Client Client Client Status: software version: product name: software match: software compatible: Appliance ID: Product model: Content version: Content channel: Content sharing type: Configuration: Enabled: Address: SSH port: Web UI protocol: Web UI HTTP port: Web UI HTTPS port: Auto-connect: Status check enabled: Client requests enabled: Comment: Authentication: Authentication type: password username: password password: ssh-dsa2 username: ssh-dsa2 identity: ssh-rsa2 username: ssh-rsa2 identity: 2014/12/23 21:13:36 2014/12/23 21:13:36 2014/12/23 21:25:36 yes admin cmcclient wMPS (wMPS) 7.7.0.420682 wMPS Power no yes 002590AEE884 FireEyeNX900 432-lb.198 stable all yes 172.10.0.0 22 http 9023 (active) 443 yes yes yes password admin ******** admin admin Validation for client-initiated connections: Source address: (same as main address) Source port: (no restriction) show cmc appliances detail The show cmc appliances detail command output is the same as the show cmc appliances <applianceID> command output, except it displays information about all managed appliances, not just one. © 2019 FireEye 495 Central Management Administration Guide CHAPTER 28: Checking Status and Health of Managed Appliances Defining Status and Health Check Settings for Managed Appliances Using the CLI Use the commands in this section to define status and health check settings for managed appliances. To define status check settings: 1. Enable the CLI configuration mode: hostname > enable hostname # configure terminal 2. Define settings: l To enable status checking on all managed appliances: hostname (config) # cmc status enable l To disable status checking on all managed appliances: hostname (config) # no cmc status enable l To enable status checking on a specific managed appliance: hostname (config) # cmc appliance <applianceName> check-status l To disable status checking on a specific managed appliance: hostname (config) # no cmc appliance <applianceName> check-status l To set the interval between status checks: hostname (config) # cmc status check-interval <seconds> l To specify the amount of time to wait for an appliance to send its status: hostname (config) # cmc status timeout <seconds> l To force an immediate check of all managed appliances: hostname (config) # cmc status force-check 3. Save your changes: hostname (config) # write memory To define the status check criteria to include: 1. Go to CLI configuration mode: hostname > enable hostname # configure terminal 2. Display the current criteria status: hostname (config) # show cmc status 496 © 2019 FireEye Release 8.7 Defining Status and Health Check Settings for Managed Appliances Using the CLI 3. Specify the criteria to include: l To enable status checking of a specific criterion: hostname (config) # cmc status criteria <criterionName> enable l To disable status checking of a specific criterion: hostname (config) # no cmc status criteria <criterionName> enable 4. Repeat the previous step for each test you want to enable or disable. 5. Save your changes: hostname (config) # write memory Example This example increases the time period between status checks to 90 seconds, and disables the temperature and raid criteria. hostname (config) cmc status check-interval 90 hostname (config) # no cmc status criteria temperature enable hostname (config) # no cmc status criteria raid enable © 2019 FireEye 497 Central Management Administration Guide 498 CHAPTER 28: Checking Status and Health of Managed Appliances © 2019 FireEye Central Management Administration Guide CHAPTER 29: Updating Managed Appliances You can update managed appliances with the latest appliance system image and guest images from the Central Management Web UI or CLI. When the Central Management appliance is in "online" mode (that is, connected to the DTI network), checks for newer available versions are automatically performed for managed appliances that have the appropriate licenses installed. In online mode, the Central Management appliance stores the images in a DTI cache on the Central Management appliance. If an update is requested, and the requested image is not already in the cache, the Central Management appliance downloads it. A Central Management administrator can manually download images to the cache when it is convenient instead of waiting for an update request. This can save bandwidth and shorten the maintenance window for updating appliances. For details, see Understanding the DTI Cache on page 137 and Downloading Software Updates to the DTI Cache on page 139. You can update multiple appliances at the same time. Each appliance is updated independently and does not depend on updates being completed on other appliances. However, if the images are not already in the cache, and if the DTI source server is very busy or if the connection to it is slow, the update could time out. System images should be updated before you install guest images. If you request system image and guest images updates at the same time, the system image is updated first. However, if the appliance is rebooted before the guest images are downloaded (for example, if you choose to automatically reboot the appliance after the system image update), the request to download guest images is lost, so you must request it again. You could instead stagger the updates to minimize the impact to the system. For example, you could update the appliance software images, but then wait until off-hours or a maintenance window to update the guest images, because guest images take longer to download and install. © 2019 FireEye 499 Central Management Administration Guide CHAPTER 29: Updating Managed Appliances IMPORTANT! If an appliance is running a system image version that your Central Management appliance no longer supports, a message is displayed on the Central Management Dashboard, and you should update the appliance immediately. Data will not be aggregated from that appliance to the Central Management appliance until you update, and you will be unable to make configuration changes on behalf of the appliance. NOTE: These procedures show how to update managed appliances when the Central Management appliance is in "online" mode and connected to the DTI network. When the Central Management appliance is not connected to the DTI network, it can be in "local" or "URL" mode, in which it downloads the updates from a file that is either stored locally or hosted on a local site identified by a URL. For details, see the FireEye DTI Offline Update Portal Guide. NOTE: These procedures show how to update software images and guest images. By default, security content is automatically downloaded to the cache and updated on managed appliances. For details about changing the update settings, see the System Administration Guide or Administration Guide for the managed appliance. Prerequisites l Admin access l DTI network access l FIREEYE_SUPPORT license on each managed appliance for system image updates l CONTENT_UPDATES license on each managed appliance for security content updates Updating Managed Appliances Using the Web UI Use the appliance update page to determine whether the latest appliance system image and guest images are installed, and to update them as needed. You can also use this page to view the installed security content version. NOTE: You can perform this procedure whether the managed appliance uses CMS, CDN, or DTI as its DTI source server. (See Changing the Active Setting for a DTI Service on page 131 for details about these options.) 500 © 2019 FireEye Release 8.7 Updating Managed Appliances Using the Web UI This page contains the information described in the following table. Field Description Sensor (hostname) The display name of the appliance. Connection The status of the connection between the Central Management appliance and the managed appliance. The connection is established. The connection failed; the appliance cannot be updated until the connection is reestablished. Product The type of appliance. System Software Status The installed appliance software version. If other versions are available, you can select a version or select none to do this later. Detection Engine Status Whether the latest guest images are installed. If not, you can select latest to install them or select none to do this later. NOTE: This column is empty for an appliance in MVX sensor mode. Sensor Update Status Info Indicators and information about current and available versions or the update being performed. All available guest images and patches have been updated. An error occurred, such as the update timing out. New updates are available. The installed appliance software version is not supported by the Central Management appliance. An immediate reload is required to complete the upgrade. If updates are available for an appliance, the checkbox in the Sensor (hostname) column can be selected, and a message is displayed in the column. For example: © 2019 FireEye 501 Central Management Administration Guide CHAPTER 29: Updating Managed Appliances To update an appliance: 1. Click the Appliances tab. The Sensors tab should be selected. 2. On the Sensors page, click Actions > Update Sensors. 3. If you want to filter by appliance group, select the group in the Sensor Group dropdown list. 4. Select the checkbox for each appliance you want to update. 5. To update the system image: a. Select the version from the drop-down list in the System Software Status column. For example: If you want to postpone this update, select none. b. The appliance must be rebooted after the upgrade. If you want this to happen automatically, select the Auto Reboot checkbox. 6. If the guest images need to be updated, select latest in the Detection Engine Status column. (If you want to postpone this update, select none.) NOTE: Appliances in MVX sensor mode do not have guest images, so the Detection Engine Status column is empty. 7. Click Update Selected Sensors. Status messages will be displayed in the Sensor Update Status Info column. For example: 502 © 2019 FireEye Release 8.7 Updating Managed Appliances Using the CLI 8. If you did not select auto reboot, the following message is displayed after the update is done: Click the Reload checkbox, and then click OK when prompted to confirm the action. Updating Managed Appliances Using the CLI Use the commands in this section to update the system image and guest images for managed appliances. NOTE: This section provides basic commands used to update software images and download and install default guest images. For comprehensive information about using the CLI to update appliances, see the System Administration Guide or Administration Guide for your appliance or the CLI Command Reference. NOTE: To update VX Series appliances, use the fenet update appliance commands, as described in the MVX Smart Grid Administration Guide. To install the latest system image and reboot the appliance: 1. Go to CLI configuration mode: hostname > enable hostname # configure terminal 2. Initiate the update process: hostname (config) # fenet appliance manage <applianceName> upgrade 3. View the progress: hostname (config) # cmc execute appliance <applianceName> command "show fenet image status" © 2019 FireEye 503 Central Management Administration Guide CHAPTER 29: Updating Managed Appliances 4. Save your changes: hostname (config) # cmc execute appliance <applianceName> command "write memory" To download and install guest images: 1. Go to CLI configuration mode: hostname > enable hostname # configure terminal 2. Download the latest guest images: hostname (config) # cmc execute appliance <applianceName> command "guest-images download" 3. Verify that the guest images download is complete: hostname (config) # cmc execute appliance <applianceName> command "show guest-images download" 4. Install the guest images hostname (config) # cmc execute appliance <applianceName> command "guest-images install" 5. Verify that the guest images are installed properly: hostname (config) # cmc execute appliance <applianceName> command "show guest-images" 6. Save your changes: hostname (config) # cmc execute appliance <applianceName> command "write memory" NOTE: It can take a long time to download guest images. If you need to cancel the download, use the cmc execute appliance <applianceName> command "guest-images download cancel" command. To resume the download, use cmc execute appliance <applianceName> command "guest-images download resume" command. Example This example installs the latest guest images on the FX-05 appliance. hostname (config) # cmc execute appliance FX-05 command "guest-images install" ===========Appliance FX-05========== Execution was successful. Execution output: Found guest-images that can be installed Installing guest-images Terminating running work orders and virtual analysis subsystem ........ Restarting WebUI .... Installation complete! 504 © 2019 FireEye Release 8.7 About Custom IOC Feeds CHAPTER 30: Configuring Custom IOC Feeds This chapter covers the following information: l About Custom IOC Feeds below l Enabling or Disabling Custom IOC Feeds on page 507 l Creating a Custom Blacklist from Third-Party Feeds on page 514 l Uploading a Third-Party Feed on page 516 l Viewing Custom Feed Details on page 518 l Deleting Third-Party IOC Feeds Using the Web UI on page 521 l Downloading a Third-Party Feed Using the Web UI on page 523 About Custom IOC Feeds The Central Management appliance can receive indicators of compromise (IOCs) from the following custom feeds. l l l Third-party feeds send IOCs to the Central Management appliance from a thirdparty (non-FireEye) product. DTI feeds provide files from FireEye's Dynamic Threat Intelligence (DTI) cloud. A single local feed sends IOCs to the Central Management appliance from NX, EX, FX, and AX Series appliances. A local feed is a system-generated feed that is managed by the Central Management appliance. You cannot upload, delete, edit, or download a local feed. The IOCs from custom feeds are distributed to managed Network Security appliances in a standard format. You can create customized lists of IOCs received from these feeds and use them as a custom blacklist on the Central Management appliance. The types of IOCs are URL indicators, IP address indicators, domain indicators, and indicators with hashes of malicious files. You can create a list of for each type of indicator, or you can combine them into a standard format called STIX (Structured Threat Information Expression). You configure the managed Network Security appliances to block or allow traffic that matches the custom blacklist. If traffic is blocked, you are notified that a block occurred. If traffic is not blocked, an alert is created and you are notified that a match occurred. © 2019 FireEye 505 Central Management Administration Guide CHAPTER 30: Configuring Custom IOC Feeds Only one master custom blacklist is created from all the feeds. This master blacklist is maintained on the Central Management appliance and is copied to all the managed Network Security appliances. IMPORTANT! Enabling third-party feeds or the local feed on the Central Management appliance can negatively impact the performance of the appliance. Task List for Managing Custom IOC Feeds Complete the steps for managing custom IOC feeds in the following order: 1. Verify that the managed Network Security appliances are deployed in TAP mode or inline mode. 2. On the Central Management appliance, enable custom IOC feeds. For details, see Enabling or Disabling Custom IOC Feeds on the facing page. 3. Create a flat file or XML-based file in STIX format that contains custom blacklist entries. Verify the file is accessible from the local desktop from which you access the Central Management Web UI. For details about how to create a custom blacklist from a third-party feed, see Creating a Custom Blacklist from Third-Party Feeds on page 514. 4. Upload the third-party feed blacklist to a Central Management appliance. For details about how to upload a third-party feed, see Uploading a Third-Party Feed on page 516. 5. View the details of the malware events that matched the name of the custom blacklist feed. For details, see Viewing Custom Feed Details Grouped by Alert Using the Web UI on page 520. 506 © 2019 FireEye Release 8.7 Enabling or Disabling Custom IOC Feeds Enabling or Disabling Custom IOC Feeds This section describes how to enable or disable a Central Management appliance to receive indicators (IOCs) from a custom feed and distribute them to all managed Network Security appliances or a specific managed Network Security appliance. When the custom IOC feed feature is disabled, DTI feeds are not pushed to all managed Network Security appliances or a specific managed Network Security appliance. A Central Management appliance cannot distribute indicators of compromise (IOCs) to managed SmartVision Edition sensors. You can enable or disable the custom IOC feed features only using the CLI. Thirdparty feeds are enabled by default when you add the Network Security appliance to the Central Management appliance. The local feed is disabled by default. DTI feeds are automatically pushed to the managed Network Security appliance. Enabling third-party feeds or the local feed on the Central Management appliance can negatively impact the performance of the appliance. IMPORTANT! IOC feeds are not supported on integrated FireEye NX 300 models that are managed by the Central Management appliance. Prerequisites l Admin access to the Central Management appliance. l A connection to the Dynamic Threat Intelligence (DTI) Cloud. l Managed Network Security appliance deployed in TAP mode or inline mode. © 2019 FireEye 507 Central Management Administration Guide CHAPTER 30: Configuring Custom IOC Feeds Enabling or Disabling Third-Party IOC Feeds on All Appliances Using the CLI These procedures describe how to enable or disable a Central Management appliance to receive indicators (IOC) from a third-party feed and distribute them to all managed Network Security appliances. A Central Management appliance cannot distribute indicators of compromise (IOCs) to managed SmartVision Edition sensors. To enable a third-party feed for all managed Network Security appliances: 1. Log in to the Central Management CLI. 2. Enable CLI configuration mode. cm-hostname > enable cm-hostname # configure terminal 3. Enable IOCs from a third-party feed for all managed Network Security appliances. cm-hostname (config) # custom content enable 4. Verify the status of third-party IOC feeds. cm-hostname (config) # show custom content enable status CMS status CM-1 : enabled LMS status B9-vNX2500-1 : enabled B9-vNX6500-1 : enabled Bolt : enabled SystemVX12500-1 : enabled SystemVX12500-2 : enabled 5. Save your changes. cm-hostname (config) # write memory To disable a third-party feed for all managed Network Security appliances: 1. Log in to the Central Management CLI. 2. Enable CLI configuration mode. cm-hostname > enable cm-hostname # configure terminal 3. Disable IOCs from all third-party feeds on the CM. cm-hostname (config) # no custom content enable 508 © 2019 FireEye Release 8.7 Enabling or Disabling Custom IOC Feeds 4. Verify the status of IOC customizations. cm-hostname (config) # show custom content enable status CMS status CM-1 : disabled LMS status B9-vNX2500-1 : enabled B9-vNX6500-1 : enabled Bolt : enabled SystemVX12500-1 : enabled SystemVX12500-2 : enabled 5. Save your changes. cm-hostname (config) # write memory Enabling or Disabling the Local Feed on All Appliances Using the CLI These procedures describe how to to enable and disable a Central Management appliance to receive indicators (IOCs) from the local feed and distribute them to all managed Network Security appliances. A Central Management appliance cannot distribute indicators of compromise (IOCs) to managed SmartVision Edition sensors. Enabling the local feed on the Central Management appliance can negatively impact the performance of the appliance. The local feed only provides data when there are actual alerts. To enable the local feed for all managed Network Security appliances: 1. Log in to the Central Management CLI. 2. Enable CLI configuration mode. cm-hostname > enable cm-hostname # configure terminal 3. Enable local signature generation settings. The local feed does not work if this is not enabled. By default, local signature generation is already enabled. cm-hostname (config) # localsig enable 4. Enable IOCs from a third-party feed for all managed Network Security appliances. The local feed does not work if third-party feeds are not enabled. cm-hostname (config) # custom content enable 5. Enable IOCs from the local feed. cm-hostname (config) # localsig localfeed enable © 2019 FireEye 509 Central Management Administration Guide CHAPTER 30: Configuring Custom IOC Feeds 6. Verify the status of third-party IOC feeds. cm-hostname (config) # show custom content enable status CMS status CM-1 : enabled LMS status B9-vNX2500-1 : enabled B9-vNX6500-1 : enabled Bolt : enabled SystemVX12500-1 : enabled SystemVX12500-2 : enabled 7. Verify the status of the local feed. CMS1 > show localsig LocalSig Generator Enabled : YES Running : running Rule Versions : 1 Active rules : 1337 LocalFeed : Enabled 8. Save your changes. cm-hostname (config) # write memory To disable the local feed for all managed Network Security appliances: 1. Log in to the Central Management CLI. 2. Enable CLI configuration mode. cm-hostname > enable cm-hostname # configure terminal 3. You can disable IOCs from the local feed in a number of ways: l Disable IOCs from the local feed on the CM. cm-hostname (config) # no localsig localfeed enable l Disable IOCs from all third-party feeds on the CM. When you disable IOCs from the third-party feeds, the IOCs from the local feed are also disabled. cm-hostname (config) # no custom content enable l Disable local signature generation settings. When you disable local signature generation settings, the IOCs from the local feed are also disabled. cm-hostname (config) # no localsig enable 510 © 2019 FireEye Release 8.7 Enabling or Disabling Custom IOC Feeds 4. Verify the status of third-party IOC feeds. cm-hostname (config) # show custom content enable status CMS status CM-1 : disabled LMS status B9-vNX2500-1 : enabled B9-vNX6500-1 : enabled Bolt : enabled SystemVX12500-1 : enabled SystemVX12500-2 : enabled 5. Verify the status of the local IOC feed. CMS1 > show localsig LocalSig Generator Enabled : YES Running : running Rule Versions : 1 Active rules : 1337 LocalFeed : Disabled 6. Save your changes. cm-hostname (config) # write memory Enabling or Disabling Third-Party IOC Feeds on a Specific Appliance Using the CLI These procedures describe how to enable or disable a Central Management appliance to receive indicators (IOC) from a third-party feed and distribute them to a specific managed Network Security appliance. A Central Management appliance cannot distribute indicators of compromise (IOCs) to managed SmartVision Edition sensors. You can verify that this feature is disabled when you log in to the managed Network Security appliance. To enable a third-party feed for a specific managed Network Security appliance: 1. Log in to the Central Management CLI. 2. Enable CLI configuration mode. cm-hostname > enable cm-hostname # configure terminal 3. Enable IOCs from a third-party feed for a managed Network Security appliance. cm-hostname (config) # custom content enable on lms <applianceID> where applianceID is the Network Security appliance record name. © 2019 FireEye 511 Central Management Administration Guide CHAPTER 30: Configuring Custom IOC Feeds 4. Verify the status of IOC customizations. cm-hostname (config) # show custom content enable status CMS status CM-1 : enabled LMS status B9-vNX2500-1 : enabled 5. Save your changes. cm-hostname (config) # write memory To disable a third-party feed for a specific managed Network Security appliance: 1. Log in to the Central Management CLI. 2. Enable CLI configuration mode. cm-hostname > enable cm-hostname # configure terminal 3. Disable IOCs from a third-party feed for a specific managed Network Security appliance. cm-hostname (config) # no custom content enable on lms <applianceID> where applianceID is the Network Security appliance record name. 4. Save your changes. cm-hostname (config) # write memory 5. Log in to the CLI on the managed Network Security appliance. 6. Enable CLI configuration mode. nx-hostname > enable nx-hostname # configure terminal 7. Verify the status of third-party IOC feeds. nx-hostname (config) # show custom content enable status Custom content : disabled 512 © 2019 FireEye Release 8.7 Enabling or Disabling Custom IOC Feeds Enabling or Disabling the Local IOC Feed on a Specific Appliance Using the CLI The local feed is enabled or disabled for a specific managed appliance only by enabling or disabling the third-party feed for the specific appliance. A Central Management appliance cannot distribute indicators of compromise (IOCs) to managed SmartVision Edition sensors. To enable the local feed for a specific managed Network Security appliance: 1. Log in to the Central Management CLI. 2. Enable CLI configuration mode. cm-hostname > enable cm-hostname # configure terminal 3. Enable local signature generation settings. The local feed does not work if this is not enabled. By default, local signature generation is already enabled. cm-hostname (config) # localsig enable 4. Enable IOCs from a third-party feed for a managed Network Security appliance. cm-hostname (config) # custom content enable on lms <applianceID> where <applianceID> is the Network Security appliance record name. This thirdparty feed identifies the managed appliance for the local feed. The local feed does not work if this third-party feed is not enabled. 5. Enable IOCs from the local feed. cm-hostname (config) # localsig localfeed enable 6. Verify the status of IOC customizations. cm-hostname (config) # show custom content enable status CMS status CM-1 : enabled LMS status B9-vNX2500-1 : enabled 7. Verify the status of the local IOC feed. CMS1 > show localsig LocalSig Generator Enabled : YES Running : running Rule Versions : 1 Active rules : 1337 LocalFeed : Enabled 8. Save your changes. cm-hostname (config) # write memory © 2019 FireEye 513 Central Management Administration Guide CHAPTER 30: Configuring Custom IOC Feeds To disable the local feed for a specific managed Network Security appliance: 1. Log in to the Central Management CLI. 2. Enable CLI configuration mode. cm-hostname > enable cm-hostname # configure terminal 3. Disable IOCs from a third-party feed for a specific managed Network Security appliance. When you disable IOCs from a third-party feed for a managed appliance, the IOCs from the local feed for the appliance are also disabled. cm-hostname (config) # no custom content enable on lms <applianceID> where applianceID is the Network Security appliance record name. 4. Save your changes. cm-hostname (config) # write memory 5. Log in to the CLI on the managed Network Security appliance. 6. Enable CLI configuration mode. nx-hostname > enable nx-hostname # configure terminal 7. Verify the status of third-party IOC feeds. nx-hostname (config) # show custom content enable status Custom content : disabled Creating a Custom Blacklist from ThirdParty Feeds You can upload up to 30 unique feeds to the Central Management appliance from a flat file or an XML-based file in STIX 1.2 format. Configure a combined maximum of 25,000 custom blacklist entries on all of the feeds by specifying each blacklist entry on a separate line. A unique name is required for each feed. The feed name that you specify appears as the malware name in the Alerts > Alerts > Alerts page on the managed Network Security appliance. For details about how to view the details of a custom feed, see Viewing Custom Feed Details on page 518. FireEye recommends that you make sure that there are no invalid or duplicate blacklist entries so that you do not reach the allotted limit. Follow these guidelines when you create a blacklist: l 514 FireEye recommends that you specify only public IP addresses in the custom blacklist. © 2019 FireEye Release 8.7 l l l l Creating a Custom Blacklist from Third-Party Feeds FireEye recommends that you create the list of URLs in an ASCII text file. The maximum number of characters is 2500 for all URLs. Import STIX 1.2 files. The domain entries in STIX 1.0.1 are not supported. FireEye recommends that you upload third-party feeds that contain only a .txt file extension because incorrect file extensions can cause problems when creating a feed. Specify URL entries in the custom blacklist at the subdirectory level (for example, http://test.com/testfolder1/1.html). Malicious URLs are not blocked if they are specified at the directory level (for example, http://test.com/testfolder1/). To include an optional comment string as part of your feed entry, follow these guidelines: l Begin the comment with <feed># l No spaces are allowed before the hash sign. l ASCII characters only. l Maximum characters of 62. l Comments are not supported in STIX files. Use the Upload Feed page to import a custom blacklist specific to the following types of content: l l l l IP addresses—A custom list of remote addresses. You can specify the list of IP addresses in a flat file. The IP address feed file is used as a flat file and provides the same functionality as the corresponding XML-based file in STIX format. Domain Names—A custom list that contains the entries of known suspicious or malicious domains. You can specify the list of domains in a flat file. The domain feed file is used as a flat file and provides the same functionality as the corresponding XML-based file in STIX format. URLs—A custom list that contains entries of known suspicious or malicious URLs. You can specify the list of URLs in a flat file. The URL feed file is used as a flat file and provides the same functionality as the corresponding XML-based file in STIX format. Hash Files—A custom list that contains entries of known suspicious or malicious files that are represented as a list of MD5 or SHA-256 hashes in a flat file. The hash feed file is used as a flat file and provides the same functionality as the corresponding XML-based file in STIX format. IMPORTANT! You cannot import hash files on FireEye NX 10000 models that are managed by the Central Management appliance. l STIX—A shared list of suspected malicious URL indicators, list of IP address indicators, list of domain indicators, and list of indicators with MD5 and SHA-256 hashes of malicious files. You can upload a standard STIX 1.2 file in place of the other four feed files. © 2019 FireEye 515 Central Management Administration Guide CHAPTER 30: Configuring Custom IOC Feeds Uploading a Third-Party Feed In the following example of the Appliance Settings: Third Party Feeds page, the managed Network Security appliance does not yet contain third-party feeds. NOTE: You can upload a third-party feed only using the Web UI. The local feed is managed (uploaded and deleted) automatically by the Central Management appliance. You cannot upload it. Prerequisites l Log in to the Web UI of the Central Management appliance as Admin. l A connection to the Dynamic Threat Intelligence (DTI) Cloud. l A managed Network Security appliance is deployed in TAP mode or inline mode. l l Enable IOCs from third-party feeds. For details, see Enabling or Disabling Custom IOC Feeds on page 507. Create a flat file or an XML-based file in STIX 1.2 format that contains custom blacklist entries. Verify that the file is accessible from the local desktop from which you access the Web UI. For details, see Creating a Custom Blacklist from Third-Party Feeds on page 514. Uploading a Third-Party Feed Using the Web UI Follow these steps to upload a third-party feed to the Central Management appliance using the Web UI. 516 © 2019 FireEye Release 8.7 Uploading a Third-Party Feed To upload a third-party feed to a Central Management appliance: 1. Log in to the Central Management appliance as an administrator. 2. In the Web UI, choose Settings > Appliance Settings. 3. Select the managed Network Security appliance and then select 3rd Party Feeds. The page lists the custom feeds that are uploaded. 4. Click Upload New Feed. 5. Enter the name of the feed in the Feed Name field. 6. If you want to override an existing feed with an updated flat file, select the Override checkbox. 7. Click Choose File to select the flat file or STIX file you want to import. 8. Choose content type from the Type drop-down menu. © 2019 FireEye l IP l URL l Hash MD5 517 Central Management Administration Guide l Hash SHA-256 l Domain l STIX CHAPTER 30: Configuring Custom IOC Feeds 9. Choose the feed action from the Action drop-down menu. l Alert l Block 10. (Optional) Enter explanatory information about the intelligence feed in the Comment field. 11. Click Upload to upload the feed. l l The system checks the entries in the custom blacklist file. A progress message appears: If there is a problem with the feed that you imported (for example, invalid entries or the wrong format), the following message appears: Viewing Custom Feed Details View details about the status of custom IOC feeds, the total number of custom IOC feeds, and the total number of all the custom blacklist entries that you configured on managed Network Security appliances from the Central Management appliance. View the local feed status using the CLI. Track the number of blacklist entries that were configured for each third-party feed using the CLI. Prerequisites l Admin access to the Central Management appliance. l A connection to the Dynamic Threat Intelligence (DTI) Cloud. l A managed Network Security appliance is deployed in TAP mode or inline mode. l 518 Enable IOCs from custom feeds. For details, see Enabling or Disabling Custom IOC Feeds on page 507. © 2019 FireEye Release 8.7 l l Viewing Custom Feed Details Create a flat file or an XML-based file in STIX 1.2 format that contains custom blacklist entries. Verify that the file is accessible from the local desktop from which you access the Web UI. For details, see Creating a Custom Blacklist from Third-Party Feeds on page 514. Upload one or more third-party feeds to a managed Network Security appliance from a flat file or an XML-based file in STIX 1.2 format. For details about how to upload a feed, see Uploading a Third-Party Feed on page 516. Viewing Custom Feed Details Using the Web UI In the following example of the Appliance Settings: Third Party Feeds page, the managed Network Security appliance contains five custom feeds. To view custom feed details: 1. In the Web UI, choose Settings > Appliance Settings. 2. Select the managed Network Security appliance and then select 3rd Party Feeds. The page lists the custom feeds that are uploaded. 3. In the table, view the details of each type of custom blacklist entry that was configured for a custom feed. Viewing Custom Feed Details Using the CLI Follow these steps to view custom feed details and to track the number of blacklist entries that were configured for each third-party feed using the CLI. You can view the status of the local feed in the CLI, but not local feed details. To view the custom feed details in the CLI: 1. Log in to the Central Management CLI. 2. Enable CLI configuration mode. cm-hostname > enable cm-hostname # configure terminal © 2019 FireEye 519 Central Management Administration Guide CHAPTER 30: Configuring Custom IOC Feeds 3. View the details for each type of blacklist entry that was configured for a third-party feed. cm-hostname (config) # show custom content feed status Total no. of feeds: 5 Total count of all entries in feeds : 22 custom_feed_1 source: custom feed test action: alert type : url url count : 6 update_date : 2017/07/06 22:38:26 custom_feed_2 source: IP feed action: alert type : ip ip count : 4 update_date : 2017/07/06 22:24:25 custom_feed_3 source: URL flat file action: alert type : url url count : 6 update_date : 2017/07/06 22:26:15 custom_feed_4 source: STIX domain watchlist action: block type : stix domain count : 3 update_date : 2017/07/06 22:32:45 custom_feed_5 source: STIX URL watchlist action: alert type : stix url count : 3 update_date : 2017/07/06 22:34:03 4. View the status of the local feed. cm-hostname (config) # show localsig LocalSig Generator Enabled : YES Running : running Rule Versions : Active rules : 0 LocalFeed : Enabled Viewing Custom Feed Details Grouped by Alert Using the Web UI The Alerts > Alerts > Alerts page lists the details of the event results table, grouped by alert, of the malware events that matched the name of the custom blacklist feed that you imported on a managed Network Security appliance from the Central Management appliance. You can drill down to identify matched traffic that was either blocked or not blocked for the following types of malware: 520 © 2019 FireEye Release 8.7 l l l Deleting Third-Party IOC Feeds Using the Web UI Domain Match—Domain that matches the name of the feed that contains the entries of known suspicious or malicious domains that you imported. Infection Match—Pattern that matches the name of the feed that contains entries of known suspicious or malicious URLs or IP addresses that you imported. Malware Object—Hash that matches the name of the feed that contains entries of MD5 or SHA-256 file types that you imported. To view the custom feed details grouped by alert on a managed Network Security appliance: 1. Log in to the managed Network Security Web UI. 2. Choose Alerts > Alerts > Alerts. 3. To expand an entry, click the alert type in the Alert Type column. Local feed data is automatically removed when the corresponding locally generated rules (localsig rules) expire. You cannot delete local feed data. Deleting Third-Party IOC Feeds Using the Web UI Follow these steps to delete third-party feeds from the Central Management appliance using the Web UI. NOTE: You can delete a third-party feed only using the Web UI. The local feed is managed (uploaded and deleted) automatically by the Central Management appliance. Local feed data is automatically removed when the corresponding locally generated rules (localsig rules) expire. You cannot delete local feed data. © 2019 FireEye 521 Central Management Administration Guide CHAPTER 30: Configuring Custom IOC Feeds IMPORTANT: When a file hash feed is added on the Central Management appliance and you do not want to impact appliance performance, choose one of the following options to stop calculating the MD5 or SHA-256 hashes that are detected in network traffic: l l Log in locally to each managed Network Security appliance to disable the file inspection feature. Use the no bottracker fi-md5 enable command to disable calculating MD5 hashes. Use the no bottracker fi-sha256 enable command to disable calculating SHA-256 hashes. Delete all the hash MD5 or SHA-256 feed files on the Central Management appliance Web UI. However, all the hash MD5 or SHA-256 feed files will be deleted from all the managed Network Security appliances that are connected to this Central Management appliance. For details about how to enable or disable the option to inspect and calculate MD5 or SHA-256 hash files, refer to the Network Security User Guide. Prerequisites l l Log in to the Web UI of the Central Management appliance as Admin. Upload one or more feeds to a managed Network Security appliance from a flat file or an XML-based file in STIX 1.2 format. For details about how to upload a feed, see Uploading a Third-Party Feed on page 516. To delete a third-party IOC feed: 1. In the Web UI, choose Settings > Appliance Settings. 2. Select the managed Network Security appliance and then select 3rd Party Feeds. The page lists the custom feeds that are uploaded. 3. In the table, select the check box next to the third-party feed you want to delete. You can select multiple feeds at one time. 4. Click Delete Feed. A dialog box prompts you to confirm your changes. 5. Click Yes. The feed is removed from the table. The following message appears: 6. Close the message. 522 © 2019 FireEye Release 8.7 Downloading a Third-Party Feed Using the Web UI Downloading a Third-Party Feed Using the Web UI Follow these steps to download a third-party IOC feed from the Central Management appliance using the Web UI. NOTE: You can download a custom IOC feed only using the Web UI. You cannot download the local feed. Prerequisites l l Log in to the Web UI of the Central Management appliance as Admin. Upload one or more third-party feeds to a managed Network Security appliance from a flat file or an XML-based file in STIX 1.2 format. For details about how to upload a feed, see Uploading a Third-Party Feed on page 516. To download a third-party IOC feed: 1. In the Web UI, choose Settings > Appliance Settings. 2. Select the managed Network Security appliance and then select 3rd Party Feeds. The page lists the custom feeds that are uploaded. 3. In the table, locate the third-party feed you want to download to your local desktop. 4. In the Download column, click the download icon. © 2019 FireEye 523 Central Management Administration Guide 524 CHAPTER 30: Configuring Custom IOC Feeds © 2019 FireEye Release 8.7 Overview of Filtering Alerts Using Tags and Rules CHAPTER 31: Filtering Alerts Using Tags and Rules This chapter covers the following information: l Overview of Filtering Alerts Using Tags and Rules below l Configuring Tags and Values on the next page l Configuring Rules to Manage Alert Tags on page 534 l l l Viewing Tags for an Alert for Managed Email Security — Server Edition Appliances Using the Web UI on page 549 Viewing Tags for an Alert for Managed Network Security Appliances Using the Web UI on page 550 Adding Tags to Alerts Manually for Managed Appliances Using the Web UI on page 550 Overview of Filtering Alerts Using Tags and Rules NOTE: Alerts can be filtered using tags and rules only on managed Email Security — Server Edition and Network Security appliances. The Central Management appliance allows you to define tags and rules so that they can be used to filter alerts on managed appliances. You can define a number of tags to filter out alerts that you want to retain on managed appliances. A tag can be used to filter related alerts that contain the same tag name or value. For example, alerts can be tagged to identify traffic that contains the specified virtual local area network (VLAN) or subnet on managed appliances. Tags are automatically added to the database on the Central Management appliance. A rule can be used to manage alert tags on managed appliances. A rule can be configured based on different alert attributes (for example, source IP address, target IP address, or severity type). Each rule can be associated with a relevant action and applied to all incoming alerts that contain the matched alert attributes. Task List for Filtering Alerts Using Tags and Rules Complete the steps for filtering alerts using tags and rules in the following order: © 2019 FireEye 525 Central Management Administration Guide CHAPTER 31: Filtering Alerts Using Tags and Rules 1. Log in to the Central Management Web UI. 2. Add tags and values to the tag configuration table. See Adding Tags Using the Web UI on the facing page and Adding Values to a Tag Using the Web UI on page 530. 3. Configure rules to manage alert tags on managed appliances. See Configuring Rules to Manage Alert Tags on page 534. 4. View tags that are associated with an alert in the managed appliance Web UI. See Viewing Tags for an Alert for Managed Email Security — Server Edition Appliances Using the Web UI on page 549 and Viewing Tags for an Alert for Managed Network Security Appliances Using the Web UI on page 550. 5. If desired, manually add tags to an alert in the Alerts page on a managed Network Security appliance. See Adding a Tag to an Alert for Managed Appliances Using the Web UI on page 551. Configuring Tags and Values You can configure tags and values that you associate with an alert on managed appliances by using the Central Management appliance Web UI: l Adding Tags Using the Web UI on the facing page l Editing Tags Using the Web UI on page 528 l Deleting Tags Using the Web UI on page 529 l Adding Values to a Tag Using the Web UI on page 530 l Editing Values for a Tag Using the Web UI on page 531 l Deleting Values From a Tag Using the Web UI on page 533 You can configure restricted or unrestricted tags and associate them to filter incoming alerts on the managed appliances. A restricted tag can be modified, deleted, or changed to an unrestricted tag by a user that is assigned an Admin role. An unrestricted tag can be modified or deleted by a user that is assigned an Admin role or Analyst role. The total number of alerts and values are associated with a tag name. For example, you can define a tag with the name "Region" and the value "US". All the incoming alerts are filtered by "Region" as the tag name in the Alerts page on the managed appliances. Tags are automatically added to the database on the Central Management appliance. In the following example, the Central Management appliance does not yet contain tags. 526 © 2019 FireEye Release 8.7 Configuring Tags and Values Usage Guidelines Follow these usage guidelines when you create tags and values to associate with an alert: l The name and value of the tag can contain alphanumeric characters only. Tag names and values are case-sensitive. UTF-8 is also supported. l The name of the tag can contain up to 100 characters. l Only a user that is assigned an Admin role can restrict a tag from other users. l l Only an Admin user can modify, delete, and change a restricted tag to an unrestricted tag. A restricted tag can be added only from the Settings > CM Settings > Alert Management > Tags page on the Central Management appliance. Prerequisites l Access to the Web UI of the Central Management appliance as Admin or Analyst l Admin, Analyst, or Monitor access to view restricted and unrestricted tags Adding Tags Using the Web UI Follow these steps to add tags to the tag configuration table that are associated with an alert on managed appliances using the Central Management appliance Web UI. NOTE: You can add tags to the table only using the Web UI. To add a tag: 1. In the Web UI, choose Settings > CM Settings > Alert Management > Tags. 2. Click Create Tag. The Create Tag window opens. 3. In the Name field, enter the name of the tag. © 2019 FireEye 527 Central Management Administration Guide CHAPTER 31: Filtering Alerts Using Tags and Rules 4. (Optional) Select the Restricted checkbox to restrict the tag only to users that are assigned an Admin role. 5. Click Apply. The following message appears: Editing Tags Using the Web UI Follow these steps to edit tags on the tag configuration table that are associated with alerts on managed appliances using the Central Management appliance Web UI. NOTE: You can edit tags on the table only using the Web UI. NOTE: If you change the name of an existing tag, the renamed tag retains all its tag values and alerts. Prerequisites l Access to the Web UI of the Central Management appliance as Admin or Analyst l Admin access to edit a restricted tag l Admin or Analyst access to edit an unrestricted tag l You have added one or more tags to a database on managed appliances using the Central Management Web UI. For details about how to add a tag to an alert, see Adding Tags Using the Web UI on the previous page. To edit a tag: 1. In the Web UI, choose Settings > CM Settings > Alert Management > Tags. 2. In the table, locate the tag you want to edit. 528 © 2019 FireEye Release 8.7 Configuring Tags and Values 3. Click the action icon ( ) in the Actions column. 4. Click Edit. The Edit Tag window opens. 5. In the Name field, edit the name of the tag. 6. (Optional) Select the Restricted checkbox to restrict the tag only to users that are assigned an Admin role. 7. Click Apply. The following message appears: Deleting Tags Using the Web UI Follow these steps to delete tags and all the associated values from the tag configuration table using the Central Management appliance Web UI. All the tags and the associated values are automatically removed from the associated alerts on the managed appliances. NOTE: You can delete tags and all the associated values from the table only using the Web UI. Prerequisites l Access to the Web UI of the Central Management appliance as Admin or Analyst l Admin access to delete a restricted tag l Admin or Analyst access to delete an unrestricted tag © 2019 FireEye 529 Central Management Administration Guide l CHAPTER 31: Filtering Alerts Using Tags and Rules You have added one or more tags to a database on managed appliances using the Central Management Web UI. For details about how to add a tag to an alert, see Adding Tags Using the Web UI on page 527. To delete a tag: 1. In the Web UI, choose Settings > CM Settings > Alert Management > Tags. 2. In the table, locate the tag you want to delete. 3. Click the action icon ( ) in the Actions column. 4. Click Delete. A dialog box prompts you to confirm your changes. 5. Click Yes. The tag is removed from the table. The following message appears: Adding Values to a Tag Using the Web UI Use the Settings > CM Settings > Alert Management > Tags page to add values to a tag using the Central Management appliance Web UI. Click the plus icon ( ) to expand the tag entry. The drill-down view displays the values that have already been added to a tag and the number of alerts associated with a tag. You can add multiple values to an alert tag. An alert can be matched with any value that you configured. The default value is an empty string that is associated with a tag. 530 © 2019 FireEye Release 8.7 Configuring Tags and Values NOTE: You can add values to a tag only using the Web UI. Prerequisites l l Access to the Web UI of the Central Management appliance as Admin or Analyst You have added one or more tags to a database on managed appliances using the Central Management Web UI. For details about how to add a tag, see Adding Tags Using the Web UI on page 527. To add a value to a tag: 1. In the Web UI, choose Settings > CM Settings > Alert Management > Tags. 2. In the table, locate the tag to which you want to add a value. 3. Click the plus icon ( ) to expand the tag entry. 4. Click Add Value. The Add Value window opens. 5. In the Value field, enter the value you want to associate with a tag. 6. Click Apply. The following message appears: 7. Repeat the previous steps to configure additional values. Editing Values for a Tag Using the Web UI Follow these steps to edit values that are associated with a tag on the managed appliances using the Central Management appliance Web UI. © 2019 FireEye 531 Central Management Administration Guide CHAPTER 31: Filtering Alerts Using Tags and Rules NOTE: You can edit values to a tag only using the Web UI. Prerequisites l Log in to the Web UI of the Central Management appliance as Admin or Analyst l Admin access to edit a value for a restricted tag l Admin or Analyst access to edit a value for an unrestricted tag l l You have added one or more tags using the Central Management Web UI. For details about how to add a tag, see Adding Tags Using the Web UI on page 527. You have added one or more values to a tag. For details about how to add a value to a tag, see Adding Values to a Tag Using the Web UI on page 530. To edit the values for a tag: 1. In the Web UI, choose Settings > CM Settings > Alert Management > Tags. 2. In the table, locate the tag whose value you want to edit. 3. Click the plus icon ( ) to expand the tag entry. 4. In the table, locate the value you want to edit. 5. Click the action icon ( ) in the Actions column. 6. Click Edit. The Edit Value window opens. If a value has not yet been assigned, the Current Value line does not appear. 7. In the Value field, modify the value you want to associate with a tag. 8. Click Apply. 532 © 2019 FireEye Release 8.7 Configuring Tags and Values The following message appears: Click Cancel to cancel the entry. Deleting Values From a Tag Using the Web UI Follow these steps to delete values from a tag and all associated alerts on the managed appliances using the Central Management appliance Web UI. NOTE: You can delete values from a tag only using the Web UI. Prerequisites l Admin access to delete a value from a restricted tag l Admin or Analyst access to delete a value from an unrestricted tag l l You have added one or more tags to a database on managed appliances using the Central Management Web UI. For details about how to add a tag, see Adding Tags Using the Web UI on page 527. You have added one or more values to associate with a tag to a managed appliance using the Central Management Web UI. For details about how to add a value to a tag, see Adding Values to a Tag Using the Web UI on page 530. To delete a value from a tag: 1. In the Web UI, choose Settings > CM Settings > Alert Management > Tags. 2. Click the plus icon ( ) to expand the tag entry. 3. In the table, locate the value you want to delete. 4. Click the action icon ( ) in the Actions column. 5. Click Delete. A dialog box prompts you to confirm your changes. 6. Click Yes. © 2019 FireEye 533 Central Management Administration Guide CHAPTER 31: Filtering Alerts Using Tags and Rules The value is removed from the tag entry. The following message appears: Configuring Rules to Manage Alert Tags You can configure rules that are used to manage alert tags on managed appliances by using the Central Management appliance Web UI. You can configure rules that match criteria and perform certain actions that are associated with the user-defined tags to filter incoming alerts on the managed appliances. Each rule can be associated with multiple actions. If the rule condition is matched, a tag will either be added to an alert to include the matched condition or deleted from an alert to exclude the matched condition. Each rule is carried out based on the priority order that you specified in the rules configuration table. In the following example, the Central Management appliance does not yet contain rules. This section covers the following information: l l l l l l 534 Adding a Rule to Match a Condition for a Particular IP Address Using the Web UI on the facing page Adding a Rule to Match a Condition for a Particular VLAN Using the Web UI on page 537 Adding a Rule to Match a Condition for a Particular Appliance Using the Web UI on page 538 Adding a Rule to Match a Condition for a Particular Product Type Using the Web UI on page 540 Adding a Rule to Match a Condition for a Particular Severity Type Using the Web UI on page 542 Adding a Rule to Match a Condition for a Particular Email Using the Web UI on page 543 l Editing a Rule Using the Web UI on page 545 l Deleting a Rule for an Alert Tag Using the Web UI on page 547 l Setting or Changing the Priority of Rules Using the Web UI on page 548 © 2019 FireEye Release 8.7 Configuring Rules to Manage Alert Tags Usage Guidelines Follow these usage guidelines when you configure rules that are used to manage tags on managed appliances: l The name of the rule can contain alphanumeric characters. l Only unrestricted tags can be created by using rules. l A rule must contain at least one condition and one action. l A rule cannot contain multiple values for a single condition. l A single rule can contain different criteria entries (but not duplicate entries). l A single rule can contain multiple actions. Prerequisites l Access to the Web UI of the Central Management appliance as Admin or Analyst Adding a Rule to Match a Condition for a Particular IP Address Using the Web UI Follow these steps to add a rule to match a condition for a particular IP address using the Central Management appliance Web UI. You can configure a rule to match traffic from a particular target, identified by the victim IP address. You can also configure a rule to match traffic from a particular source, identified by an attacker appliance. You can add the relevant tag to this rule for all incoming alerts that contain the specified source IP address or target IP address. NOTE: You can add rules to match a condition for a particular IP address only using the Web UI. To add a rule to match a condition for a particular IP address: 1. In the Web UI, choose Settings > CM Settings > Alert Management > Rules. 2. Click Create Rule. The Create Rule window opens. © 2019 FireEye 535 Central Management Administration Guide CHAPTER 31: Filtering Alerts Using Tags and Rules 3. In the Rule Name field, enter the name of the rule. 4. In the Matching Criteria area: l l l l Choose Source IP or Target IP. Choose in prefix, not in prefix, present, not present, equal to, or not equal to as the operation to match the particular IP address. Enter the IP address of the source or target. Click Add Condition. The source IP address or target IP address condition is added to the match criteria table. 5. In the Associated Actions area: l l l Choose Alert Tag Add to add a tag to an alert that includes the rule that contains the matched condition. Or choose Alert Tag Delete to delete a tag from an alert that includes the rule that contains the matched condition. Enter any value you want to associate with the tag. Select an existing tag or tag/value pair, or enter a new tag or tag/value pair. Click Add Action. The rule action is added to the associated tag table. 6. Click Apply. The following message appears: 536 © 2019 FireEye Release 8.7 Configuring Rules to Manage Alert Tags Adding a Rule to Match a Condition for a Particular VLAN Using the Web UI Follow these steps to add a rule to match a condition for a particular VLAN using the Central Management appliance Web UI. You can configure a rule to match traffic from a particular VLAN. You can add the relevant tag to this rule for all incoming alerts that contain the specified VLAN identification value. NOTE: You can add or delete rules to match a condition for a particular VLAN only using the Web UI. To add a rule to match a condition for a particular VLAN: 1. In the Web UI, choose Settings > CM Settings > Alert Management > Rules. 2. Click Create Rule. The Create Rule window opens. 3. In the Rule Name field, enter the name of the rule. 4. In the Matching Criteria area: l l l © 2019 FireEye Choose VLAN. Choose equal to, not equal to, greater than, less than, less than or equal to, or greater than or equal to as the operation to match the particular VLAN. Enter the VLAN ID. Valid characters are alphanumeric characters. 537 Central Management Administration Guide l CHAPTER 31: Filtering Alerts Using Tags and Rules Click Add Condition. The VLAN condition is added to the match criteria table. 5. In the Associated Actions area: l l l Choose Alert Tag Add to add a tag to an alert that includes the rule that contains the matched condition. Or choose Alert Tag Delete to delete a tag from an alert that includes the rule that contains the matched condition. Enter any value you want to associate with the tag. Select an existing tag or tag/value pair, or enter a new tag or tag/value pair. Click Add Action. The rule action configuration is added to the associated tag table. 6. Click Apply. The following message appears: Adding a Rule to Match a Condition for a Particular Appliance Using the Web UI Follow these steps to add a rule to match a condition for a particular appliance using the Central Management appliance Web UI. You can configure a rule to match traffic from a particular appliance that generated the alerts. You can add the relevant tag to this rule for all incoming alerts that contain the specified appliance record name. NOTE: You can add or delete rules to match a condition for a particular appliance only using the Web UI. To add a rule to match a condition for a particular appliance: 1. In the Web UI, choose Settings > CM Settings > Alert Management > Rules. 2. Click Create Rule. The Create Rule window opens. 538 © 2019 FireEye Release 8.7 Configuring Rules to Manage Alert Tags 3. In the Rule Name field, enter the name of the rule. 4. In the Matching Criteria area: l l l l Choose Appliance ID. Choose equal to or not equal to as the operation to match the particular appliance ID. Enter the appliance ID. Choose Appliances > Sensors to obtain the appliance ID of the managed Network Security appliance or the managed Email Security — Server Edition appliance. The appliance ID is displayed in the Sensor ID column. Click Add Condition. The appliance ID condition is added to the match criteria table. 5. In the Associated Actions area: l l l © 2019 FireEye Choose Alert Tag Add to add a tag to an alert that includes the rule that contains the matched condition. Or choose Alert Tag Delete to delete a tag from an alert that includes the rule that contains the matched condition. Enter any value you want to associate with the tag. Select an existing tag or tag/value pair, or enter a new tag or tag/value pair. Click Add Action. The rule action configuration is added to the associated tag table. 539 Central Management Administration Guide CHAPTER 31: Filtering Alerts Using Tags and Rules 6. Click Apply. The following message appears: Adding a Rule to Match a Condition for a Particular Product Type Using the Web UI Follow these steps to add a rule to match a condition for a particular product type that is connected to this Central Management appliance using the Central Management appliance Web UI. You can configure a rule to match traffic from a particular product type. You can add the relevant tag to this rule for all incoming alerts that contain the specified product type that is connected to this Central Management appliance. NOTE: You can add or delete rules to match a condition for a particular product type only using the Web UI. To add a rule to match a condition for a particular product type: 1. In the Web UI, choose Settings > CM Settings > Alert Management > Rules. 2. Click Create Rule. The Create Rule window opens. 540 © 2019 FireEye Release 8.7 Configuring Rules to Manage Alert Tags 3. In the Rule Name field, enter the name of the rule. 4. In the Matching Criteria area: l l l l Choose Product Type. Choose equal to or not equal to as the operation to match the particular product type. Choose a product type from the drop-down list. Click Add Condition. The product type condition is added to the match criteria table. 5. In the Associated Actions area: l l l Choose Alert Tag Add to add a tag to an alert that includes the rule that contains the matched condition. Or choose Alert Tag Delete to delete a tag from an alert that includes the rule that contains the matched condition. Enter any value you want to associate with the tag. Select an existing tag or tag/value pair, or enter a new tag or tag/value pair. Click Add Action. The rule action configuration is added to the associated tag table. 6. Click Apply. The following message appears: © 2019 FireEye 541 Central Management Administration Guide CHAPTER 31: Filtering Alerts Using Tags and Rules Adding a Rule to Match a Condition for a Particular Severity Type Using the Web UI Follow these steps to add a rule to match a condition for a particular severity type using the Central Management appliance Web UI. You can configure a rule to match traffic from a particular severity type. You can add the relevant tag to this rule for all incoming alerts that contain the specified severity type. NOTE: You can add or delete rules to match a condition for a particular severity type only using the Web UI. To add a rule to match a condition for a particular severity type: 1. In the Web UI, choose Settings > CM Settings > Alert Management > Rules. 2. Click Create Rule. The Create Rule window opens. 3. In the Rule Name field, enter the name of the rule. 4. In the Matching Criteria area: 542 © 2019 FireEye Release 8.7 Configuring Rules to Manage Alert Tags l l l l Choose Severity. Choose equal to, not equal to, greater than, less than, less than or equal to, or greater than or equal to as the operation to match the particular severity type. Depending on the operation for the severity criteria, choose critical, major, or minor as the severity type. Click Add Condition. The severity condition is added to the match criteria table. 5. In the Associated Actions area: l l l Choose Alert Tag Add to add a tag to an alert that includes the rule that contains the matched condition. Or choose Alert Tag Delete to delete a tag from an alert that includes the rule that contains the matched condition. Enter any value you want to associate with the tag. Select an existing tag or tag/value pair, or enter a new tag or tag/value pair. Click Add Action. The rule action configuration is added to the associated tag table. 6. Click Apply. The following message appears: Adding a Rule to Match a Condition for a Particular Email Using the Web UI Follow these steps to add a rule to match a condition for a particular email address using the Central Management appliance Web UI. You can configure a rule to match traffic sent from a particular sender email address or sent to a recipient email address. You can add the relevant tag to this rule for all incoming alerts that contain the specified sender email address or recipient email address. NOTE: You can add or delete rules to match a condition for a particular email only using the appliance Web UI. To add a rule to match a condition for a particular email: 1. In the Web UI, choose Settings > CM Settings > Alert Management > Rules. 2. Click Create Rule. The Create Rule window opens. © 2019 FireEye 543 Central Management Administration Guide CHAPTER 31: Filtering Alerts Using Tags and Rules 3. In the Rule Name field, enter the name of the rule. 4. In the Matching Criteria area: l l l l Choose Email Sender or Email Recipient. Choose equal to, not equal to, present, or not present as the operation to match the particular email. Enter the email address of the sender or recipient. Click Add Condition. The sender email or recipient email condition is added to the match criteria table. 5. In the Associated Actions area: l l l Choose Alert Tag Add to add a tag to an alert that includes the rule that contains the matched condition. Or choose Alert Tag Delete to delete a tag from an alert that includes the rule that contains the matched condition. Enter any value you want to associate with the tag. Select an existing tag or tag/value pair, or enter a new tag or tag/value pair. Click Add Action. The rule action configuration is added to the associated tag table. 6. Click Apply. The following message appears: 544 © 2019 FireEye Release 8.7 Configuring Rules to Manage Alert Tags Editing a Rule Using the Web UI Follow these steps to edit a rule that is used to manage an alert tag on a managed appliance using the Central Management appliance Web UI. NOTE: You can edit rules for an alert tag only using the Web UI. Usage Guidelines Follow these usage guidelines when you edit a rule to manage an alert tag on a managed appliance: l l l A rule must contain at least one condition and one action. If you want to delete a condition or action, you must delete a rule. A rule can contain one condition and multiple actions. If you want to delete an action, you must delete the action. If you want to delete a condition, you must delete a rule. A rule can contain multiple conditions and one action. If you want to delete a condition, you must delete the condition. If you want to delete an action, you must delete a rule. Prerequisites l l l Access to the Web UI of the Central Management appliance as Admin or Analyst You have added one or more tags to a database on a managed appliance. For details about how to add a tag to an alert, see Adding Tags Using the Web UI on page 527. You have added one or more rules to a managed appliance. For details about how to configure rules to manage a tag, see Configuring Rules to Manage Alert Tags on page 534. To edit a rule for an alert tag: 1. In the Web UI, choose Settings > CM Settings > Alert Management > Rules. 2. In the table, locate the rule you want to edit. © 2019 FireEye 545 Central Management Administration Guide 3. Click the action icon ( CHAPTER 31: Filtering Alerts Using Tags and Rules ) in the Actions column. 4. Click Edit. The Edit Rule window opens. 5. In the Rule Name field, edit the name of the rule. 6. In the Matching Criteria area: 546 l Choose the relevant match criteria and operation from the drop-down list. l Enter the relevant value. l Click Add Condition. The condition is added to the match criteria table. l Locate the condition you want to delete in the table. © 2019 FireEye Release 8.7 Configuring Rules to Manage Alert Tags l Click the Delete (trash can) icon. The condition that was previously used in the rule is deleted. 7. In the Associated Actions area: l l l l Choose Alert Tag Add to add a tag to an alert that includes the rule that contains the matched condition. Or choose Alert Tag Delete to delete a tag from an alert that includes the rule that contains the matched condition. Enter any value you want to associate with the tag. Select an existing tag or tag/value pair, or enter a new tag or tag/value pair. Click Add Action. The rule action configuration is added to the associated tag table. Click the Delete (trash can) icon. The tag that was previously used in the rule is deleted. 8. Click Apply. The following message appears: Deleting a Rule for an Alert Tag Using the Web UI Follow these steps to delete a rule completely for an alert tag on a managed appliance using the Central Management appliance Web UI. NOTE: You can delete rules for an alert tag only using the Web UI. Prerequisites l l l Log in to the Web UI of the Central Management appliance as Admin or Analyst You have added one or more tags to a database on a managed appliance. For details about how to add a tag to an alert, see Adding Tags Using the Web UI on page 527. You have added one or more rules to a managed appliance. For details about how to configure rules to manage a tag, see Configuring Rules to Manage Alert Tags on page 534. © 2019 FireEye 547 Central Management Administration Guide CHAPTER 31: Filtering Alerts Using Tags and Rules To delete a rule for an alert tag: 1. In the Web UI, choose Settings > CM Settings > Alert Management > Rules. 2. In the table, locate the rule you want to delete. 3. Click the action icon ( ) in the Actions column. 4. Click Delete. A dialog box prompts you to confirm your changes. 5. Click Yes. The applicable rule is removed from the table. The following message appears: Setting or Changing the Priority of Rules Using the Web UI Follow these steps to set or change the priority order of the rules to filter incoming alerts on managed appliances using the Central Management appliance Web UI. NOTE: You can change the priority of the rules only using the Web UI. Prerequisites l l l 548 Access to the Web UI of the Central Management appliance as Admin or Analyst You have added one or more tags to a managed appliance. For details about how to add a tag to an alert, see Adding Tags Using the Web UI on page 527. You have added one or more rules to a managed appliance. For details about how to configure rules to manage a tag, see Configuring Rules to Manage Alert Tags on page 534. © 2019 FireEye Release 8.7 Viewing Tags for an Alert for Managed Email Security — Server Edition Appliances Using the Web UI To set or change the priority of the rules: 1. In the Web UI, choose Settings > CM Settings > Alert Management > Rules. 2. In the Order column, enter the priority for the rule you want to change. Then press Enter. Each rule priority can be changed one at a time. The priority order for this rule is changed and the priority order for all the rules affected by the change is changed. The following message appears: Viewing Tags for an Alert for Managed Email Security — Server Edition Appliances Using the Web UI The Email Alerts page on the Central Management appliance lists the tags associated with an email alert that is tagged based on the matched criteria that you defined in the tags and rules. If an alert contains a restricted tag, the letter "[R]" is displayed next to the tag entry. © 2019 FireEye 549 Central Management Administration Guide CHAPTER 31: Filtering Alerts Using Tags and Rules Prerequisites l Access to the Web UI of the Central Management appliance as Admin, Analyst, or Monitor. Viewing Tags for an Alert for Managed Network Security Appliances Using the Web UI The Alerts > NX > Alerts page on the Central Management appliance lists the tags associated with an alert based on the matched criteria that you defined in the tags and rules. If an alert contains a restricted tag, the letter "[R]" is displayed next to the tag entry. Prerequisites l Access to the Web UI of the Central Management appliance as Admin, Analyst, or Monitor Adding Tags to Alerts Manually for Managed Appliances Using the Web UI You can manually add tags to associate with an Network Security alert on the Alerts page by using the Central Management appliance Web UI. The tags that you add manually affect only the alert to which they were added. This section covers the following information: 550 © 2019 FireEye Release 8.7 l l l Adding Tags to Alerts Manually for Managed Appliances Using the Web UI Adding a Tag to an Alert for Managed Appliances Using the Web UI below Editing a Tag for an Alert for Managed Appliances Using the Web UI on the next page Deleting a Tag From an Alert for Managed Appliances Using the Web UI on page 553 NOTE: You cannot manually add, edit, or delete tags for an alert in the Email Alerts page using the Central Management appliance Web UI. Adding a Tag to an Alert for Managed Appliances Using the Web UI Follow these steps to manually add a tag to an Network Security alert in the Alerts page on a Central Management appliance using the Web UI. NOTE: You can manually add tags to an Network Security alert in the Alerts page only using the Central Management appliance Web UI. NOTE: You can manually add only unrestricted tags to an Network Security alert in the Alerts page on the Central Management appliance. Prerequisites l Access to the Web UI of the Central Management appliance as Admin or Analyst To add tags to alerts for a managed Network Security appliance: 1. In the Central Management appliance Web UI, choose Alerts > NX > Alerts. 2. In the table on the NX: Alerts page, locate the alert you want to tag. 3. Click the action icon ( ) in the Actions column. 4. Click Add Tag. The Add Tag window opens. © 2019 FireEye 551 Central Management Administration Guide CHAPTER 31: Filtering Alerts Using Tags and Rules 5. In the field, enter the tag. You can enter multiple tags at one time. The list of existing tags is also displayed when you create a new tag. You can select multiple existing tags. NOTE: A user that is assigned an Analyst role can view only unrestricted tags in the list. 6. If you want to save your changes, click Apply. Otherwise, click Cancel. The following message appears: Editing a Tag for an Alert for Managed Appliances Using the Web UI Follow these steps to manually edit a tag that is associated with an Network Security alert in the Alerts page on a Central Management appliance using the Web UI. NOTE: You can manually edit tags in the Alerts page only using the Central Management appliance Web UI. NOTE: You can manually edit only unrestricted tags in the Alerts page on the Central Management appliance. NOTE: A user that is assigned an Admin Role can edit a restricted tag. Prerequisites 552 l Access to the Web UI of the Central Management appliance as Admin or Analyst l Admin access to edit a restricted tag © 2019 FireEye Release 8.7 Adding Tags to Alerts Manually for Managed Appliances Using the Web UI To edit tags for an alert for a managed Network Security appliance: 1. In the Central Management appliance Web UI, choose Alerts > NX > Alerts. 2. In the table on the NX: Alerts page, locate the tag you want to edit for an alert. 3. Click the edit icon (blue pencil) next to the tag you want to edit. The Edit Tag window opens. 4. In the Name field, modify the name of the tag that is associated with an alert. 5. In the Value field, modify the name of the value that is associated with a tag. 6. Click Apply. The following message appears: Deleting a Tag From an Alert for Managed Appliances Using the Web UI Follow these steps to manually delete a tag from an Network Security alert in the Alerts page on a Central Management appliance using the Web UI. NOTE: You can delete tags in the Alerts page only using the Central Management appliance Web UI. © 2019 FireEye 553 Central Management Administration Guide CHAPTER 31: Filtering Alerts Using Tags and Rules Prerequisites l Access to the Web UI of the Central Management appliance as Admin or Analyst l Admin access to delete a restricted tag To delete a tag from an alert for a managed Network Security appliance: 1. In the Central Management appliance Web UI, choose Alerts > NX > Alerts. 2. In the table on the NX: Alerts page, locate the tag you want to delete from an alert. 3. Click the delete icon (blue trash can) next to the tag you want to delete. A dialog box prompts you to confirm your changes. 4. Click Yes. The tag is removed from the alert on the event results table. The following message appears: 554 © 2019 FireEye Central Management Administration Guide PART V: Appendices l Configuring Secure Shell (SSH) Authentication on page 557 l Configuring Network Address Translation (NAT) on page 575 l Configuring the CM Peer Service on page 591 l Monitoring Email Alerts from the Email Security - Cloud Edition. on page 613 © 2019 FireEye 555 Central Management Administration Guide 556 PART V: Appendices © 2019 FireEye Central Management Administration Guide About SSH Authentication APPENDIX A: Configuring Secure Shell (SSH) Authentication This section covers the following information: l About SSH Authentication below l User Authentication on the next page l Host-Key Authentication on page 565 About SSH Authentication The Secure Shell (SSH) protocol is used for secure communication between the Central Management appliance and the appliances it manages. When the Central Management appliance initiates the connection, it logs in as a remote "admin" user on the managed appliance. When the managed appliance initiates the connection, it logs in as a remote "admin" user on the Central Management appliance. SSH user authentication verifies the identity of the remote user attempting the connection. SSH host authentication verifies the identity of the Central Management appliance to the managed appliance and verifies the identity of the managed appliance to the Central Management appliance. NOTE: The topics in this section describe how to configure SSH authentication for a server-initiated connection (where the Central Management administrator adds an appliance directly from the Central Management Web UI or CLI). For information about a client-initiated connection (where a managed appliance administrator sends a request for management to the Central Management appliance, and a Central Management administrator accepts or rejects the request), see the System Administration Guide or Administration Guide for the managed appliance. © 2019 FireEye 557 Central Management Administration Guide APPENDIX A: Configuring Secure Shell (SSH) Authentication User Authentication The remote user can authenticate using either a password or a public key. After the connection is established, it is controlled by the configured password or the public key. Password Authentication With password authentication, a password is configured for the remote user. This is the initial authentication type for an appliance that is added to the Central Management appliance using the Web UI. Public Key Authentication Public key authentication uses a pair of keys—a public key and a private key. With public key authentication, an SSH-DSA2 or SSH-RSA2 identity is configured for the remote user and is pushed to the managed appliance. Benefits of public key authentication include: l l The private key remains on the CM appliance and cannot be computed from the public key. This is an advantage over password authentication, where the password could be cracked. If you use password authentication, password change policies can break the connection between the Central Management platform and the managed appliance. For example, suppose users on a managed Email Security — Server Edition appliance must change their passwords every 90 days. As a Central Management administrator, you might be unaware of this policy. After the password for the remote user changes, the connection to the Email Security — Server Edition appliance will be broken until you change the password on the Central Management appliance. Best Practice: Because password change policies apply only to password authentication, FireEye recommends using public key authentication for this connection. For details, see the following topics: 558 l Creating a Public Key Using the CLI on the facing page l Configuring User Authentication Using the Web UI on page 562 l Configuring User Authentication Using the CLI on page 563 © 2019 FireEye Release 8.7 User Authentication Creating a Public Key Using the CLI Use the commands in this section to create a new public key for SSH user authentication. You can use this key instead of the password to authenticate the remote user. NOTE: If no SSH-DSA2 or SSH-RSA2 public keys exist, you can use the Web UI to create an "admin" SSH-DSA2 key and an "admin" SSH-RSA2 key. For details, see Importing a Host Key into the Global Host-Keys Database Using the Web UI on page 568. To create a public key: 1. Go to CLI configuration mode: hostname > enable hostname # configure terminal 2. Create the public key: hostname (config) # cmc auth <keyType> identity <identityName> generate where <keyType> can be ssh-dsa2 or ssh-rsa2 and <identityName> is a userfriendly name. 3. Verify your changes: hostname (config) # show cmc auth identities 4. Save your changes: hostname (config) # write memory 5. Push the key to the managed appliance as described in Pushing a Public Key Using the CLI on the next page. To remove a public key: 1. Go to CLI configuration mode: hostname > enable hostname # configure terminal 2. Remove the public key: hostname (config) # no cmc auth <keyType> identity <identityName> 3. Verify your change: hostname (config) # show cmc auth identities 4. Save your changes: hostname (config) # write memory Example The following example creates an SSH-DSA2 identity named "admin4" on the NX-04 appliance. © 2019 FireEye 559 Central Management Administration Guide APPENDIX A: Configuring Secure Shell (SSH) Authentication NX-04 (config) # cmc auth ssh-dsa2 identity admin4 NX-04 (config) # show cmc auth identities DSA2 identity admin4: Public Key: ssh-dss AAA3NzaC1kc3MAAACBAJl3PisWNnz/gYLvL4JC7xFMoq3HE89rai7trnJmpxjylArYhf MzaGndFA4qGRZMFzhiz9Jhi/+W1ufIrXLGzakC0lAAAAFQCuMCsMwMGN9zT5w2JCiDt7D6orNwAA . . . NOTE: This example is from an Network Security appliance, but it is representative of CM appliances as well. Pushing a Public Key Using the CLI Use the commands in this section to push the public key of an SSH-DSA2 or SSH-RSA2 identity to the managed appliance. When a remote Central Management user and this identity are used to authenticate against the appliance, the connection is established only if the appliance already has this key. NOTE: You can also use the Central Management Web UI to push the key. For details, see Importing a Host Key into the Global Host-Keys Database Using the Web UI on page 568. To push a public key: 1. Log in to the Central Management CLI. 2. Go to CLI configuration mode: cm-hostname > enable cm-hostname # configure terminal 3. Push the key to the appliance: cm-hostname (config) # cmc appliance <applianceID> auth <keyType> identity <identityName> push [username <username> password <password>] where the username and password options allow the remote user to log in to the appliance to push the public key before the appliance is connected. 4. Verify your change: a. Log in to the managed appliance CLI. b. Go to CLI enable mode: appl-hostname > enable c. Verify that the key is present: appl-hostname # show ssh client 560 © 2019 FireEye Release 8.7 User Authentication Examples Pushing an SSH-DSA2 Public Key The following example displays the public key string of the Central Management SSHDSA2 identity named "admin4," and then pushes it to the Email Security — Server Edition appliance. It then displays the SSH authorized keys on the Email Security — Server Edition appliance to verify that the key was pushed. CM-08 (config) # cmc auth ssh-dsa2 identity admin4 CM-08 (config) # show cmc auth identities DSA2 identity admin4: Public Key: ssh-dss AAA3NzaC1kc3MAAACBAJl3PisWNnz/gYLvL4JC7xFMoq3HE89rai7trnJmpxjylArYhf MzaGndFA4qGRZMFzhiz9Jhi/+W1ufIrXLGzakC0lAAAAFQCuMCsMwMGN9zT5w2JCiDt7D6orNwAA . . CM-08 (config) # cmc appliance EX-03 auth ssh-dsa2 identity admin4 push Push of identity for user admin onto EX-03 succeeded. EX-03 # show ssh client . . SSH authorized keys: User admin: Key 1: ssh-dss AAA3NzaC1kc3MAAACBAJl3PisWNnz/gYLvL4JC7xFMoq3HE89rai7trnJmpxjylArYhf MzaGndFA4qGRZMFzhiz9Jhi/+W1ufIrXLGzakC0lAAAAFQCuMCsMwMGN9zT5w2JCiDt7D6orNwAA . . . Pushing an SSH-RSA2 Public Key and Establishing a Connection The following example logs the remote user into the Email Security — Server Edition appliance to push the Central Management SSH-RSA2 identity named "admin6" to the Email Security — Server Edition appliance. It then establishes the connection between the Central Management platform and the Email Security — Server Edition appliance. CM-02 (config) # cmc appliance EX-05 CM-02 (config) # cmc appliance EX-05 username admin password admin CM-02 (config) # cmc appliance EX-05 CM-02 (config) # cmc appliance EX-05 CM-02 (config) # show cmc appliances Appliance EX-05: address 172.17.74.54 auth ssh-rsa2 identity admin6 push authtype ssh-rsa2 auth ssh-rsa2 identity admin6 EX-05 Connection status: Connected: yes (server-initiated) . . . Authentication: Authentication type: ssh-rsa2 password username: admin password password: ******** ssh-dsa2 username: admin ssh-dsa2 identity: © 2019 FireEye 561 Central Management Administration Guide ssh-rsa2 username: ssh-rsa2 identity: APPENDIX A: Configuring Secure Shell (SSH) Authentication admin admin6 Configuring User Authentication Using the Web UI Use the Sensors page to configure authentication parameters for the remote user the Central Management appliance uses to log in to an appliance to establish the connection. This is an existing "admin" user on the managed appliance. When you add an appliance using the Web UI, you must configure a username and password, so the Central Management appliance initially uses password authentication. After the appliance is connected, you can select an SSH-DSA2 or SSH-RSA2 key, which changes the authentication type accordingly. IMPORTANT! After you configure SSH-DSA2 or SSH-RSA2 authentication, the only way to return to password authentication using the Web UI is to delete the appliance and then add it again. To configure SSH-RSA2 or SSH-DSA2 authentication: 1. In the appliance row, click Select > Use CMS Public Key to Connect. The Password field is replaced by the CMS Public Key field. 2. Click the Select a key drop-down list. 562 © 2019 FireEye Release 8.7 User Authentication 3. To configure SSH-RSA2 authentication, do one of the following: l l Select an existing key. Select No RSA keys. Create one, and then select the rsa-admin key that is created. 4. To configure SSH-DSA2 authentication, do one of the following: l l Select an existing key. Select No DSA keys. Create One, and then select the dsa-admin key that is created. 5. Click Update. NOTE: The connection will be interrupted briefly. Error messages and indicators will be displayed, but they will clear as soon as the connection is reestablished. 6. Verify that the key is displayed in the Public Key Used column for the appliance. Configuring User Authentication Using the CLI Use the commands in this section to configure authentication parameters for the remote user the Central Management appliance uses to log in to a managed appliance to establish the connection. This is an existing "admin" user on the managed appliance. NOTE: See the ssh and cmc commands in the CLI Command Reference for advanced authentication options. To configure password authentication: 1. Go to CLI configuration mode: hostname > enable hostname # configure terminal 2. Specify the "password" authentication type: hostname (config) # cmc appliance <identityID> authtype password 3. Specify the remote user to log in to the managed appliance: hostname (config) # cmc appliance <applianceID> auth password username <username> 4. Specify the password used to authenticate the remote user: hostname (config) # cmc appliance <applianceID> auth password password <password> 5. Save your changes: hostname (config) # write memory © 2019 FireEye 563 Central Management Administration Guide APPENDIX A: Configuring Secure Shell (SSH) Authentication To configure SSH-DSA2 authentication: 1. Go to CLI configuration mode: hostname > enable hostname # configure terminal 2. Specify the SSH-DSA2 authentication type: hostname (config) # cmc appliance <applicationID> authtype ssh-dsa2 3. Specify the remote user to log in to the managed appliance: hostname (config) # cmc appliance <applianceID> auth ssh-dsa2 username <username> 4. Specify the named identity used to authenticate the remote user: hostname (config) # cmc appliance <applianceID> auth ssh-dsa2 identity <identityName> where <identityName> is the name of an existing identity. 5. Save your changes: hostname (config) # write memory To configure SSH-RSA2 authentication: 1. Go to CLI configuration mode: hostname > enable hostname # configure terminal 2. Specify the SSH-RSA2 authentication type: hostname (config) # cmc appliance <applianceID> authtype ssh-rsa2 3. Specify the remote user to log in to the managed appliance: hostname (config) # cmc appliance <applianceID> auth ssh-rsa2 username <username> 4. Specify the named identity used to authenticate the remote user: hostname (config) # cmc appliance <applianceID> auth ssh-rsa2 identity <identityName> where <identityName> is the name of an existing identity. 5. Save your changes: hostname (config) # write memory Example The following example configures SSH-RSA2 authentication parameters used to log in to the NX-04 appliance. hostname (config) # cmc appliance NX-04 auth authtype ssh-rsa2 hostname (config) # cmc appliance NX-04 auth ssh-rsa2 username cmcadmin2 hostname (config) # cmc appliance NX-04 auth ssh-rsa2 identity admin2 564 © 2019 FireEye Release 8.7 Host-Key Authentication Host-Key Authentication Host-key authentication can be used to prevent man-in-the-middle attacks, in which another server poses as the managed appliance or the Central Management appliance and intercepts the traffic between them. When the Central Management appliance and the managed appliance connect the first time using a server-initiated connection, a key exchange takes place. The managed appliance sends a copy of its host key to the Central Management appliance, where it is compared to the keys in the Central Management hostkeys database. If strict host-key checking is enabled, the connection can be established only if the key that is sent matches an entry in the local host-keys database for the Central Management remote user. If global host-key checking is enabled, the connection can be established only if the key that is sent matches an entry in the Central Management global host-keys database. You can enforce strict host-key checking, global host-key checking, or both. IMPORTANT: Host keys are stored in the configuration database, so they are included in the backup file. NOTE: In compliance mode, both strict and global host-key checking is enforced. For details, see the FIPS 140-2 and Common Criteria Addendum. NOTE: The same scenario pertains to the primary and secondary Central Management platforms in a Central Management High-Availability (HA) deployment. In this case, the two Central Management platforms exchange keys, and the connection is established if the keys match. For details, see the Central Management High Availability Guide. For details, see the following topics: l Obtaining a Host Key Using the Web UI on the next page l Obtaining a Host Key Using the CLI on page 567 l l l Importing a Host Key into the Global Host-Keys Database Using the Web UI on page 568 Importing a Host Key into the Global Host-Keys Database Using the CLI on page 570 Enabling Strict and Global Host-Key Checking Using the CLI on page 572 Prerequisites l Admin access to configure authentication and create keys. l Monitor, Operator, or Admin access to obtain managed appliance host keys. © 2019 FireEye 565 Central Management Administration Guide l APPENDIX A: Configuring Secure Shell (SSH) Authentication The private key remains on the Central Management appliance and cannot be computed from the public key. Obtaining a Host Key Using the Web UI Use the Certificate Management page to obtain the host key of the managed appliance. This is the key that you will import into the global host-keys database of the Central Management appliance. NOTE: This procedure applies to managed appliances running Release 7.6.0 or later. If the appliance is running an earlier release, see Obtaining a Host Key Using the CLI on the facing page. NOTE: You must use the CLI to obtain the host key of a managed VX Series appliance. IMPORTANT! The host-key string may need to be modified in a Network Address Translation (NAT) deployment. For details, see Configuring Global HostKey Authentication in a NAT Deployment on page 590. To obtain a host key: 1. Log in to the managed appliance Web UI. 2. Click the Settings tab. 3. Click Certificates/Keys on the sidebar. 4. Copy the string starting with the IP address. 5. Do one of the following: l l l 566 Paste the key into the Central Management CLI, as described in Importing a Host Key into the Global Host-Keys Database Using the CLI on page 570. Paste the key into the Central Management Web UI, as described in Importing a Host Key into the Global Host-Keys Database Using the Web UI on page 568. Paste the key into a text file and save it for later. © 2019 FireEye Release 8.7 Host-Key Authentication Obtaining a Host Key Using the CLI Use the command in this section to obtain the host key of the managed appliance. This is the key that you will import into the global host-keys database of the Central Management appliance. IMPORTANT! You must obtain the RSA v2 key. IMPORTANT! The host-key string may need to be modified in Network Address Translation (NAT) deployments. For details, see Configuring Global Host-Key Authentication in a NAT Deployment on page 590. To obtain the host key: 1. Log in to the managed appliance CLI. 2. View the keys: l If the appliance is running Release 7.6.0 or later: hostname > show ssh server host-keys interface ether1 l If the appliance is running an earlier release: hostname > show ssh server host-keys 3. Locate the RSA v2 host key entry. 4. Do one of the following, depending on whether you will add the key using the Central Management Web UI or CLI: l l Web UI: Copy the key string, starting with the IP address and ending with the last character. Omit the double quotation marks at the beginning and end of the host key entry. CLI: Copy the key string as described above, but include the double quotation marks. 5. Do one of the following: l l l Paste the key into the Central Management Web UI, as described in Importing a Host Key into the Global Host-Keys Database Using the Web UI on the next page. Paste the key into the Central Management CLI, as described in Importing a Host Key into the Global Host-Keys Database Using the CLI on page 570. Paste the key into a text file and save it for later. Example This example displays the host keys for a managed appliance. The RSA v2 key is highlighted for illustration. © 2019 FireEye 567 Central Management Administration Guide APPENDIX A: Configuring Secure Shell (SSH) Authentication Acme-05 > show ssh server host-keys interface ether1 SSH server configuration: SSH server enabled: yes . . . Interface listen enabled: yes Listen Interfaces: Interface: ether1 Host Key Finger RSA v1 host RSA v2 host DSA v2 host Prints and Key Lengths: key: 33:20:5f:af:65:33:e8:62:26:3c:25:d0:1f:2d:8a:54 (2048) key: 54:fa:10:2a:f4:c2:cf:3a:46:b1:a4:ed:72:78:b8:22 (2048) key: 99:59:a8:a1:d8:3e:df:2e:74:fc:6a:be:be:d2:62:32 (1024) Host Keys: RSA v1 host key: "172.17.74.40 2048 65537 2767892723557105143394492343612763 94200729942394341979526174787907308831935615818924165744283828800766510523178479 02037474895252247975570054315595358600142845914848782710493540937857691486699538 04205200729560274476403668156602030333253822356382587237819555941646603447324517 63747513796533041848893042157553987170029619742182277730552872281173097286794724 22744200184844597327452806661880313000836518022137675657765205670872217927843062 15703217249958957713631587970078908302914798758861955796169110420493384623007632 35665546051494669314340340626018765311569680255688151929860734984461083957535425 72032093143856912019598" RSA v2 host key : "172.17.74.40 ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCzd5JwK BjHLe/jxkF0JzWcXOTw9l0bz2SctkQrihkqg/zXqrmxAfgbzYulDSIxOKZTh2VBnKsy0qRWrCps64Itl h6iRlr7Jxa+jAtTAGsygD0GsSKy13wfsJDhMfWk/nrEqicQ4BJN4M/8AzP+0ATQ2QeZ3nGRRzAiyqkn4 K8cRLJ1E80SnLrwElvw805LZWqNLSQwz6tF+8L1vrmr1kzutl082NBV548AU0wptE6Z2f2oxUobcax+e qS6QMp5nnbPTDLJTbHChsVVrchTCwfGdNnjkawdDC6IhLk0BdncChpTS9E+ZF/F67YwpuIpgraWcoXuZ xZDTwHDYPZfNtk5" DSA v2 host key: "172.17.74.40 ssh-dss AAAAB3NzaC1kc3MAAACBAMY7tSZt46Qrv/hqL 1tazYjXNzkyLTWp54DjfkxzE//+qjE0AUr9hTU3ZmHYChzUVTEKj7syaxd+4Y+8IZ94eRVcnrH/jrqtE aJ64SvoUqGkbKKezUbCVfSrzGgTV/A0dUzLYMLbOEMrTMcXki+DnaUSd80PCWLvq0Mcg0IpXAAAAFQDI tRIv/iH3AAy23h3cnWzp3dpOXQAAAIAS0AONTi0O8A+f1HNOm3PzS02ZQ9ittHxA1ISs7yE6dcbj9JrW Vf1w2lJTEZAJPQz/c9NysGVJusll6Aj1aqQ6EKuhKlPcpY0PyCVKT3TGgY93i648umYZSs9+HzoLY1/a TnnkBGDQ8mFbjhyw3UdeiFjamVVr+4o8QwMbDXAfXAAAAIEAjBMXsp4gK5yvsAgBqcZeZm3vW4zYUpZZ 374A3ANXENWTh2yyQd8Ig1gB0YKDBhSHD6sZpPg88WSDxK3IAdifYGx+FAhowiuWcI+kA0UeiAb9/C+A 653zii1Nc85/fsIwl3GIjmp/xO23b+9YmHY8V5CsT+mmSIYQutCIzUVWbcYvEc=" Importing a Host Key into the Global Host-Keys Database Using the Web UI Use the Add Sensor Host Key dialog box to import the host keys of managed appliances into the Central Management global host-key database. You can import keys from managed appliances and appliances that are not currently being managed by the Central Management appliance. IMPORTANT: The key you import must start with the appliance IP address and it must not be enclosed in double quotation marks. If the key starts with the hostname, replace the hostname with the IP address. 568 © 2019 FireEye Release 8.7 Host-Key Authentication Alternatively, you can import the key for a specific appliance as part of the connection settings. You can edit the settings of an existing managed appliance in the Edit Sensor dialog box, or import the key while you are configuring the initial connection with an appliance in the Add New Sensor dialog box. (See Adding an Appliance Using the Central Management Web UI on page 364 and Modifying Managed Appliance Information Using the Web UI on page 379 for instructions.) CAUTION! If compliance mode is not enabled, global host-key authentication is optional. If you choose to use global host-key authentication, you must explicitly enable it in addition to importing the global host key. For details, see Enabling Strict and Global Host-Key Checking Using the CLI on page 572. IMPORTANT: Before you perform this procedure, you must obtain the host key from the managed appliance. For appliances running Release 7.6.0 or later, you can obtain this key from the appliance Web UI or CLI. For appliances running an earlier release, you must obtain this key from the CLI. For details, see Obtaining a Host Key Using the Web UI on page 566 or Obtaining a Host Key Using the CLI on page 567. To import a host key: 1. Click the Appliances tab. The Sensors tab should be selected. 2. Click Actions > Sensor Host Keys. The Add Sensor Host Key dialog box opens. 3. Paste the key into the Host Key field. 4. Click Add Key. To remove a host key: 1. Click the Appliances tab. The Sensors tab should be selected. 2. Click Actions > Sensor Host Keys. © 2019 FireEye 569 Central Management Administration Guide APPENDIX A: Configuring Secure Shell (SSH) Authentication 3. Locate the key in the Sensor Host Key section of the Add Sensor Host Key dialog box. 4. Click Remove. 5. Click OK to confirm the action. CAUTION! If you remove a host key that is in use, the connection between the Central Management appliance and the managed appliance is broken. Importing a Host Key into the Global Host-Keys Database Using the CLI Use the commands in this section to import the host key from an appliance into the Central Management global host-keys database. This procedure is required for global hostkey authentication, in which the connection will be allowed only if the host key the appliance sends is already in this database. CAUTION! If you choose to use global host-key authentication, you must explicitly enable the feature in addition to importing the host key. For details, see Enabling Strict and Global Host-Key Checking Using the CLI on page 572. IMPORTANT! Before you perform this procedure, you must obtain the host key from the managed appliance. You can obtain this key from the appliance Web UI or CLI. For details, see Obtaining a Host Key Using the Web UI on page 566 or Obtaining a Host Key Using the CLI on page 567. IMPORTANT! The host-key string may need to be modified in a Network Address Translation (NAT) deployment. For details, see Configuring Global HostKey Authentication in a NAT Deployment on page 590. NOTE: See the ssh commands in the CLI Command Reference for advanced authentication options. To import a host key: 1. Log in to the Central Management CLI. 2. Go to CLI configuration mode: hostname > enable hostname # configure terminal 570 © 2019 FireEye Release 8.7 Host-Key Authentication 3. Import the key into the global host-keys database: hostname (config) # ssh client global known-host "<keyString>" IMPORTANT! The key must start with the managed appliance IP address, and it must be enclosed in double quotation marks. If the key starts with the hostname, replace the hostname with the IP address. 4. Verify your change: hostname (config) # show ssh client 5. Save your changes: hostname (config) # write memory To remove a host key: 1. Log in to the Central Management CLI. 2. Go to CLI configuration mode: hostname > enable hostname # configure terminal 3. Remove the key: hostname (config) # no ssh client global known-host "<keyString>" 4. Verify your change: hostname (config) # show ssh client 5. Save your changes: hostname (config) # write memory CAUTION! If you delete a host key that is in use, the connection between the Central Management appliance and the managed appliance is broken. Example This example imports the host key from a managed appliance into the Central Management platform global host-key database. hostname (config) # ssh client global known-host "172.17.74.54 ssh-rsa AAAAB3 NAfgbzYulDSIxOKZTh2VBnKsy0qRWrCps64Itlh6iRlr7JxazaC1yc2EAAAADAQABAAABAQCzd5Jw Ktk5BjHLe/jxkF0JzWcXOTw9l0bz2SctkQrihkqg/zXqrmxtE6Z2f2oxUobcax+eqS6QMp5nnbPTD LJTbHCNnjkawdDC6IhLk0BdncChpTS9E+ZF/F67YwpuIpgraWrchTCwfG+jAtTAGsygD0VVrchTCc ncChpTS9E+ZF/F67YwpuIpgraWcoXuZxZKy13wfsJDhMfWk/nrEqicQ4BJN4M/8AzP+fd9sda3li" hostname (config) # show ssh client SSH client Strict Hostkey Checking: ask Minimum protocol version: 2 Cipher list: compatible Minimum key length: 1024 bits SSH Global Known Hosts: Entry 1: Host: © 2019 FireEye 172.17.74.54 571 Central Management Administration Guide APPENDIX A: Configuring Secure Shell (SSH) Authentication Finger Print: 54:fa:10:2a:f4:c2:cf:3a:46:b1:a4:ed:72:78:b8:22 Key Length (bits): 2048 ... Enabling Strict and Global Host-Key Checking Using the CLI Use the commands in this section to enable strict host-key checking, global host-key checking, or both. l l With strict host-key checking, the connection will be allowed only if the local hostkeys database for the Central Management remote user already has an entry that matches the key the managed appliance sends. With global host-key checking, the connection will be allowed only if the Central Management global host-keys database already has an entry that matches the key the managed appliance sends. CAUTION! When you enable global host-key authentication, any established connections will be broken until you explicitly add the host key to the global hostkeys database. See Importing a Host Key into the Global Host-Keys Database Using the Web UI on page 568 or Importing a Host Key into the Global HostKeys Database Using the CLI on page 570 for instructions. NOTE: See the ssh and cmc commands in the CLI Command Reference for advanced authentication options. To enable strict host-key checking: 1. Log in to the CM CLI. 2. Go to CLI configuration mode: hostname > enable hostname # configure terminal 3. Enable strict host-key checking: hostname (config) # cmc auth ssh host-key strict 4. Verify your changes: hostname (config) # show cmc auth ssh 5. Save your changes: hostname (config) # write memory 572 © 2019 FireEye Release 8.7 Host-Key Authentication To enable global host-key checking: 1. Log in to the CM CLI. 2. Go to CLI configuration mode: hostname > enable hostname # configure terminal 3. Enable global host-key checking: hostname (config) # cmc auth ssh host-key global-only 4. Verify your changes: hostname (config) # show cmc auth ssh 5. Save your changes: hostname (config) # write memory To disable strict or global host-key authentication: 1. Log in to the CM CLI. 2. Go to CLI configuration mode: hostname > enable hostname # configure terminal 3. Perform the following steps as needed. l To disable strict host-key checking: hostname (config) # no cmc auth ssh host-key strict l To disable global host-key checking: hostname (config) # no cmc auth ssh host-key global 4. Verify your changes: hostname (config) # show cmc auth ssh 5. Save your changes: hostname (config) # write memory Example This example enforces both strict and global host-key checking on a Central Management appliance. hostname (config) # cmc auth ssh host-key strict hostname (config) # cmc auth ssh host-key global-only hostname (config) # show cmc auth ssh CMC SSH configuration: Strict host key checking enabled: Global only known hosts enabled: Minimum protocol version: Cipher list: Minimum key length: © 2019 FireEye yes yes 2 compatible 1024 bits 573 Central Management Administration Guide 574 APPENDIX A: Configuring Secure Shell (SSH) Authentication © 2019 FireEye Central Management Administration Guide About NAT Address Mapping APPENDIX B: Configuring Network Address Translation (NAT) The following sections describe how to add an appliance to the Central Management platform for management in a deployment in which the Central Management platform, the appliance, or both are behind a NAT gateway. l l About NAT Address Mapping below Mappings Used When the Central Management Appliance Initiates the Connection on the next page l Mappings Used When the Managed Appliance Initiates the Connection on page 580 l Configuring Global Host-Key Authentication in a NAT Deployment on page 590 l l Adding an Appliance in a NAT Deployment (Using the Central Management Appliance) on page 584 Accepting a Management Request in a NAT Deployment on page 586 IMPORTANT! Network address translation (NAT) is not supported in Central Management high availability (HA) deployments. About NAT Address Mapping To implement NAT deployment in a Central Management network, a network administrator needs to map source-to-destination IP address and port pairs so a connection to the managed appliance behind the NAT gateway can be established. Managed appliances can use either one or two ports for the connection and for the management and DTI network traffic. By default, one port is used. The steps for switching between single-port and dual-port communication in a NAT deployment are described in the System Administration Guide or Administration Guide for the managed appliance. © 2019 FireEye 575 Central Management Administration Guide APPENDIX B: Configuring Network Address Translation (NAT) Port Accessibility for Single-Port Communication For a single-port configuration, the remote management (SSH) port needs to be accessible. This port is used to initiate the connection, to configure and monitor the appliance, and to request software updates (such as security content, guest images, and system images) from the DTI source server. Port 22 is the default. Port Accessibility for Dual-Port Communication For a dual-port configuration, the following ports need to be accessible: l l l Remote management (SSH) port—The management port used to initiate the connection, and for the Central Management appliance to use to configure and monitor the appliance. Port 22 is the default. DTI network service (HTTPS) port—The port used to request software updates (such as security content, guest images, and system images) from the DTI source server. Port 443 is the default. DTI address for the Central Management platform—If the Central Management appliance is behind a NAT gateway, the network administrator must map an accessible DTI server IP address and HTTPS port. For details, see the System Administration Guide or Administration Guide for the managed appliance. Mappings Used When the Central Management Appliance Initiates the Connection This topic shows the NAT address mapping required for each supported topology in which the Central Management appliance initiates the process of adding an appliance for management. l Central Management Appliance Is Behind a NAT Gateway on the facing page l Managed Appliance Is Behind a NAT Gateway on page 578 l l Central Management and Managed Appliance Are Behind Different NAT Gateways on page 579 Central Management and Managed Appliance Are In an External Network on page 580 Some topologies use virtual IP addresses. These addresses are mapped on the NAT gateway to reach a Central Management platform or managed device that is in an internal network behind the gateway. 576 © 2019 FireEye Release 8.7 Mappings Used When the Central Management Appliance Initiates the Connection NOTE: Only those addresses that need mapping are shown. If no mapping is indicated, the default IP addresses and default ports (22, or 22 and 443) will be used. Central Management Appliance Is Behind a NAT Gateway This section describes the mappings required for deployments in which the Central Management platform is behind the NAT gateway and initiates the connection to configure and manage the appliance. NOTE: The following single-port diagrams use the Email Security — Server Edition appliance as the managed appliance, and the dual-port diagrams use the Network Security appliance as the managed appliance. However, they are representative of other managed appliances as well. Single-Port Communication No NAT address mapping is required if the Central Management appliance initiates the connection and the managed appliance is in an external network and configured for single-port communication. © 2019 FireEye 577 Central Management Administration Guide APPENDIX B: Configuring Network Address Translation (NAT) Dual-Port Communication No NAT address mapping is required if the Central Management appliance initiates the connection and the managed appliance is in an external network and configured for dualport communication. However, because the Central Management platform is in an internal network, the accessible DTI server IP address and HTTPS port must be mapped to the Central Management internal IP address and port 443 so that the managed appliance can request software updates. Managed Appliance Is Behind a NAT Gateway NAT address mapping is required for deployments in which the Central Management appliance initiates the connection to configure and manage the managed appliance that is behind a NAT gateway. The mapping details depend on whether the managed appliance is configured for single-port or dual-port communication. Single-Port Communication If the Central Management appliance initiates the connection to the managed appliance that is behind a NAT gateway and configured for single-port communication, a virtual NAT IP address and port must be mapped to the managed appliance internal IP address and port 22. The mapping enables the Central Management appliance to initiate the connection and then configure and monitor the managed appliance. The managed appliance uses the mapping to request software updates. 578 © 2019 FireEye Release 8.7 Mappings Used When the Central Management Appliance Initiates the Connection Dual-Port Communication If the Central Management appliance initiates the connection to the managed appliance that is behind a NAT gateway and configured for dual-port communication, a virtual NAT IP address and port must be mapped to the managed appliance internal IP address and port 22. The Central Management appliance uses the mapping to initiate the connection and then configure and manage the managed appliance. Because the Central Management appliance is in an external network, no mapping is required for the managed appliance to request software updates. Central Management and Managed Appliance Are Behind Different NAT Gateways NAT address mappings are required for deployments in which the Central Management appliance initiates the connection to the managed appliance and where the two devices are behind different NAT gateways. The mapping details depend on whether the managed appliance is configured for single-port or dual-port communication. Single-Port Communication If the Central Management appliance initiates the connection, the managed appliance is configured for single-port communication, and the two devices are behind different NAT gateways, the virtual IP address and port of NAT gateway 2 must be mapped to the internal IP address and port 22 of the managed appliance. The mapping enables the Central Management appliance to initiate a connection and then configure and monitor the managed appliance, and for the managed appliance to request software updates. © 2019 FireEye 579 Central Management Administration Guide APPENDIX B: Configuring Network Address Translation (NAT) Dual-Port Communication If the managed appliance is configured for dual-port communication and if the managed appliance and the Central Management appliance are behind different NAT gateways, the following NAT address mappings are required: l l A virtual NAT gateway 2 IP address and port must be mapped to the managed appliance internal IP address and port 22. The mapping enables the Central Management appliance to initiate the connection and then configure and monitor the appliance. The accessible DTI server IP address and HTTPS port must be mapped to a virtual NAT gateway 1 IP address and port, and the virtual NAT gateway 1 IP address and port must be mapped to the Central Management internal IP address and port 443. These mappings enable the managed appliance to request software updates. Central Management and Managed Appliance Are In an External Network No NAT address mapping is required if the Central Management appliance initiates the connection and the managed appliance is in an external network. Mappings Used When the Managed Appliance Initiates the Connection This section shows the NAT address mapping required for each supported topology in which the managed appliance initiates the connection with the Central Management appliance: l l l l 580 Central Management Appliance Is Behind a NAT Gateway on the facing page Managed Appliance Is Behind a NAT Gateway on page 582 Central Management and Managed Appliance Are Behind Different NAT Gateways on page 582 Central Management and Managed Appliance Are in External Networks on page 584 © 2019 FireEye Release 8.7 Mappings Used When the Managed Appliance Initiates the Connection Some topologies use virtual IP addresses. These addresses are mapped on the NAT gateway to reach a Central Management appliance or managed device that is in an internal network behind the gateway. NOTE: Only those addresses that need mapping are shown. If no mapping is indicated, the default IP addresses and default ports (22, or 22 and 443) will be used. Central Management Appliance Is Behind a NAT Gateway NAT address mappings are required for deployments in which the managed appliance initiates a connection to the Central Management appliance behind a NAT gateway. The mapping details depend on whether the managed appliance is configured for single-port or dual-port communication. Single-Port Communication If the managed appliance is configured for single-point communication and initiates a connection with the Central Management appliance behind a NAT gateway, a virtual NAT IP address and port must be mapped to the internal Central Management IP address and port 22. The managed appliance uses the mapping to send a request to be added to the Central Management appliance for management and also to request software updates. © 2019 FireEye 581 Central Management Administration Guide APPENDIX B: Configuring Network Address Translation (NAT) Dual-Port Communication If the managed appliance is configured for dual-port communication and initiates a connection with the Central Management appliance behind a NAT gateway, a virtual NAT IP address and port must be mapped to the internal Central Management IP address and port 22. The managed appliance uses the mapping in order to send a request to be added to the Central Management appliance for management and also to request software updates. However, because the Central Management appliance is in an internal network, the accessible DTI server IP address and HTTPS port must be mapped to the Central Management internal IP address and port 443 so that the managed appliance can request software updates. Managed Appliance Is Behind a NAT Gateway No mapping is required because the Central Management appliance is in an external network and the managed appliance can access it. Central Management and Managed Appliance Are Behind Different NAT Gateways NAT address mappings are required for deployments in which the managed appliance initiates a connection to the Central Management appliance and where the two devices are behind different NAT gateways. The mapping details depend on whether the managed appliance is configured for single-port or dual-port communication. 582 © 2019 FireEye Release 8.7 Mappings Used When the Managed Appliance Initiates the Connection Single-Port Communication If the managed appliance is configured for single-port communication and if the managed appliance and the Central Management appliance are behind different NAT gateways, the virtual NAT gateway 1 IP address and port must be mapped to the Central Management internal IP address and port 22. The Central Management appliance uses the mapping to configure and monitor the appliance. The managed appliance uses the mapping to send a request to be added to the Central Management appliance for management and also to request software updates. Dual-Port Communication If the managed appliance is configured for dual-port communication and if the managed appliance and the Central Management appliance are behind different NAT gateways, the following NAT address mappings are required: l l The virtual NAT gateway 1 IP address and port must be mapped to the Central Management internal IP address and port 22. The mapping enables the managed appliance to send a request to be added to the Central Management appliance for management and for the Central Management appliance to configure and manage the appliance. The managed appliance internal IP address and port 443 must be mapped to a virtual NAT gateway 2 IP address and port. The virtual NAT gateway 1 IP address and port must be mapped to the Central Management internal IP address and port 443 for the appliance. The mappings enable the appliance to request software updates. © 2019 FireEye 583 Central Management Administration Guide APPENDIX B: Configuring Network Address Translation (NAT) Central Management and Managed Appliance Are in External Networks No NAT address mapping is required if the two devices are in external networks and the managed appliance initiates the connection. Adding an Appliance in a NAT Deployment (Using the Central Management Appliance) A Central Management administrator can add an appliance that is behind a NAT gateway to the Central Management appliance. NOTE: This procedure must be performed using the Central Management CLI, not the Web UI. Prerequisites l l l l Operator or Admin access Network address translation (NAT) mapping as described in About NAT Address Mapping on page 575. The virtual NAT IP address and port that map to the appliance internal IP address and SSH port Unique hostname for each appliance being added Adding an Appliance in a NAT Deployment Using the Central Management CLI Use the commands in this section to add an appliance that is behind a NAT gateway to the Central Management appliance. NOTE: The procedure in this section includes the basic steps for adding an appliance. Additional options are available. See the CLI Command Reference for a full list of the cmc commands and details about their parameters and usage. 584 © 2019 FireEye Release 8.7 Adding an Appliance in a NAT Deployment (Using the Central Management Appliance) To add an appliance: 1. Log in to the Central Management CLI. 2. Go to CLI configuration mode: cm-hostname > enable cm-hostname # configure terminal 3. Specify the virtual NAT IP address that is mapped to the appliance internal IP address: cm-hostname (config) # cmc appliance <applianceID> address where applianceID is the appliance record name. IMPORTANT: Specify the IP address, not the hostname. Otherwise, if the hostname changes later, the connection will be broken and the appliance will need to be added again. 4. (Optional) Specify the virtual NAT port that is mapped to the appliance internal SSH port: cm-hostname (config) # cmc appliance port <port> The port defaults to 22 if it is not specified. 5. Configure authentication: cm-hostname (config) # cmc appliance <applianceID> authtype <authtype> cm-hostname (config) # cmc appliance <applianceID> auth <authtype> username <username> cm-hostname (config) # cmc appliance <applianceID> auth <authtype> password <password> | identity <identity> where authtype can be password, ssh-dsa2, or ssh-rsa-2. (See Configuring User Authentication Using the CLI on page 563 for details.) 6. (Optional) Add a comment describing the appliance: cm-hostname (config) # cmc appliance <applianceID> comment <comment> 7. Save your changes: cm-hostname (config) # write memory Example The following example adds Acme-NX to the Central Management appliance and configures password authentication. cm-hostname cm-hostname cm-hostname cm-hostname cm-hostname cm-hostname © 2019 FireEye (config) (config) (config) (config) (config) (config) # # # # # # cmc cmc cmc cmc cmc cmc appliance appliance appliance appliance appliance appliance Acme-NX Acme-NX Acme-NX Acme-NX Acme-NX Acme-NX address 10.3.3.6 port 1000 authtype password password username admin3 password password 12345abcde comment New York NX Series 585 Central Management Administration Guide APPENDIX B: Configuring Network Address Translation (NAT) Accepting a Management Request in a NAT Deployment A Central Management administrator can view a list of appliances that requested to be added for management, and accept or reject them. After a request is accepted, the appliance is added to the Central Management appliance. Requirements for Establishing a Successful Connection To accept a management request and successfully establish and maintain the connection, the following must be in place: l l l The rendezvous process is enabled on the Central Management appliance (enabled by default). To verify and enable the process, see Preparing the Central Management to Accept a Management Request on page 367. The appliance has a permanent hostname. If the hostname is changed, the connection will be broken and cannot be reset. If this happens, the appliance must be removed from the Central Management appliance and then added again using the new hostname. The Central Management appliance and the requesting appliance have the same rendezvous service name. The rendezvous process has an identifier (known as service name) that is set to "cmc" by default. The Central Management appliance and the requesting appliance must have the same service name; if you change the service name on one, you must change it on the other as well. The cmc rendezvous service-namehostname command changes the service name; the no cmc rendezvous service-name command restores the default value. For details, see the CLI Command Reference. The auto-connect feature must be enabled on the requesting appliance. To prevent future connection issues, do not enable the auto-connect feature from the Central Management appliance on behalf of a managed appliance that was added using a client-initiated connection. The value of the Auto-connect field in the output of the show cmc client command on the managed appliance is yes. The value of the Auto-connect field in the output of the show cmc appliance <appliance ID> command on the Central Management appliance is no. Prerequisites l 586 Operator or Admin access © 2019 FireEye Release 8.7 Accepting a Management Request in a NAT Deployment Accepting a Management Request in a NAT Deployment Using the Central Management Web UI Use the Connection Requests dialog box to accept or reject a request to be managed. NOTE: If requests from appliances are waiting for approval., a message is displayed in the notification bell at the top right of the Central Management Web UI. To accept a request to be managed from an appliance: 1. If the Central Management appliance has never accepted a request for management, ensure that it meets the requirements described in Preparing the Central Management to Accept a Management Request on page 367. 2. Log in to the Central Management Web UI. 3. Do one of the following to open the Connection Requests dialog box: l l Click the button in the notification bell message. Click the Appliances tab. The Sensors tab should be selected. Click Actions > Waiting Connection Requests. The IP address and hostname of the requesting appliances are displayed. © 2019 FireEye 587 Central Management Administration Guide APPENDIX B: Configuring Network Address Translation (NAT) 4. To approve the request and add the appliance: a. Select its checkbox and then click Accept. b. When prompted, confirm your action. The appliance is added to the list on the page, and it becomes a member of the system group for that appliance type. The appliance hostname becomes the display name shown in the Sensor column. You can add the appliance to a different group or create a new group for the appliance as described in Grouping Appliances on page 405. 5. To reject the request (for example, if you do not recognize the appliance): a. Select its checkbox and then click Reject. b. When prompted, confirm your action. NOTE: See Viewing Managed Appliance Information Using the Web UI on page 375 for information about the status indicators and the actions you can take from this page. Accepting a Management Request in a NAT Deployment Using the Central Management CLI Use the commands in this section to accept or reject a request by an appliance to be added to the Central Management appliance for management. To accept a request to be managed: 1. If the Central Management appliance has never accepted a request for management, ensure that it meets the requirements described in Preparing the Central Management to Accept a Management Request on page 367. 2. Log in to the Central Management CLI. 3. Go to CLI configuration mode: hostname > enable hostname # configure terminal 588 © 2019 FireEye Release 8.7 Accepting a Management Request in a NAT Deployment 4. Accept one or more requests. l To accept a specific appliance: cm-hostname (config) # cmc rendezvous server accept client <hostname> where <hostname> is the hostname of the requesting appliance. Do not specify the IP address, because multiple appliances behind the same NAT gateway have the same IP address. l To accept all appliances in the list: cm-hostname (config) # cmc rendezvous server accept all 5. Save your changes. hostname (config) # write memory To reject a request from an appliance to be managed: 1. Go to CLI configuration mode: hostname > enable hostname # configure terminal 2. View the list of requests: cm-hostname (config) # show cmc rendezvous 3. Reject one or more requests: l To reject a specific appliance: cm-hostname (config) # no cmc rendezvous server accept client <hostname> where <hostname> is the hostname of the requesting appliance. Do not specify the IP address, because multiple appliances behind the same NAT gateway have the same IP address. l To reject all appliances in the list: cm-hostname (config) # no cmc rendezvous server accept all 4. Save your changes. hostname (config) # write memory Example In this example, the request from the nx-02 appliance is accepted and the request from the nx-04 appliance is rejected. cm-hostname (config) # show cmc rendezvous CMC rendezvous service name: cmc CMC server: Server rendezvous enabled: yes Auto-accept enabled: no © 2019 FireEye 589 Central Management Administration Guide APPENDIX B: Configuring Network Address Translation (NAT) Clients waiting approval: nx-02 (3.3.3.6) nx-04 (3.3.3.6) ... cm-hostname (config) # cmc rendezvous server accept client nx-02 cm-hostname (config) # no cmc rendezvous server accept client nx-04 cm-hostname (config) # write memory Configuring Global Host-Key Authentication in a NAT Deployment When global host-key authentication is enforced on the Central Management appliance, you must obtain the public host key from managed appliance and import it into the Central Management global host-keys database. This is described in Configuring Secure Shell (SSH) Authentication on page 557. The managed appliance host-key string includes its IP address. If the managed appliance is in an internal network behind a NAT gateway, the IP address in the key string you obtain from the managed appliance Web UI or CLI must be replaced with the virtual IP address that is mapped to the managed appliance on the NAT gateway. Example In this example, the Email Security — Server Edition appliance is behind the NAT gateway. Its IP address is 2.2.2.5, and its virtual IP address is 3.3.3.5. The host-key string you obtain from the appliance Web UI or CLI starts with "2.2.2.5". For example: 2.2.2.5 ssh-rsa BEWDS4d65dj/T29+6a38loABAAABAQDZZJLE/ftkUddyNW6KdqEQXjS0Pjb tzTn3OB51Qg0fdeQHrJgFHM2/4C9WtDkwuX5jd7gdWnSWYwrXDv657thlyRPIt4Wxjf0bpOolPKAe ... Before you import the host-key into the Central Management global host-keys database, you must replace "2.2.2.5" with "3.3.3.5." For example: 3.3.3.5 ssh-rsa BEWDS4d65dj/T29+6a38loABAAABAQDZZJLE/ftkUddyNW6KdqEQXjS0Pjb tzTn3OB51Qg0fdeQHrJgFHM2/4C9WtDkwuX5jd7gdWnSWYwrXDv657thlyRPIt4Wxjf0bpOolPKAe ... 590 © 2019 FireEye Central Management Administration Guide About CM Peer Service APPENDIX C: Configuring the CM Peer Service This appendix describes how to configure the CM Peer Service, and addresses the following topics: l About CM Peer Service below l Enabling or Disabling the CM Peer Service on page 593 l Generating and Importing Authentication Tokens Between CM Peers on page 595 l Enabling or Disabling All the Features of the CM Peer Service on the Peers on page 600 l CM Peer Distributed Correlation on page 603 l CM Peer Signature Sharing on page 607 l Allowing or Preventing a CM Peer to Use a Proxy Server on page 610 About CM Peer Service Large enterprise customers often use separate networks where each network is managed by a separate Central Management appliance and a separate team within the enterprise. For instance, one enterprise might configure their network into email and Web networks, where the email team manages all Email Security — Server Edition appliances, and the Web team manages all Network Security appliances. Another enterprise might use geographically distributed Central Management networks (for example, US, EU, APAC). Customers can benefit from using the CM Peer Service when they have multiple Central Management appliances that are managing multiple appliances as independent groups within the same environment. The CM Peer Service enables two Central Management appliances to communicate with each other to share local detection information, such as Network Security and Email Security — Server Edition URL correlation and locally generated signatures. © 2019 FireEye 591 Central Management Administration Guide APPENDIX C: Configuring the CM Peer Service The CM Peer Service provides a backbone to connect distributed Central Management networks. It enables two-way (CM-to-CM) interactions that allow enterprises to share vital information, such as alerts and signatures, between two or more separate Central Management networks. The CM Peer Service is used when one or more Central Management appliances are managing different appliances. The following diagram shows how the CM Peer Service is configured for two separate Central Management networks on a WAN. The CM Peer Service supports both LANs and WANs. When the CM Peer Service is enabled, you can access the following features: l l l CM Peer Distributed Correlation—Enables CM peers in one network to correlate email events detected by their Email Security — Server Edition appliance with malicious URLs detected by the Network Security appliance that is managed by CM peers in a different network. For details about the CM Peer Distributed Correlation feature, see CM Peer Distributed Correlation on page 603. CM Peer Signature Sharing— Allows CM peers to share locally generated signatures with remote CM peers. For details about the CM Peer Signature Sharing feature, see CM Peer Signature Sharing on page 607. CM Peer Update—Sends the new primary node's address information to the original primary node's peer after a failover. This feature allows seamless routing to the new primary node peer, and it is used in a Central Management High Availability (HA) configuration. IMPORTANT: The CM Peer Distributed Correlation and CM Peer Signature Sharing features must both be enabled when one Central Management platform manages both the Network Security and Email Security — Server Edition appliances. Otherwise, you need to enable only CM Peer Signature Sharing. For information on how the CM Peer Service (and associated features) works in a Central Management HA configuration, refer to the Central Management High Availability Guide. Task List for Configuring the CM Peer Service Complete the steps for configuring the CM Peer Service in the following order: 592 © 2019 FireEye Release 8.7 Enabling or Disabling the CM Peer Service 1. Log in to the CLI. 2. Enable the CM Peer Service on each of the participating Central Management appliances. For details about how to enable the peer service, see Enabling or Disabling the CM Peer Service below. 3. Generate and import authentication tokens to provide communication between CM peers. You must configure at least one relationship with two CM peers. Each peer must import a unique authentication token from every other CM peer. For details about how to generate and import authentication tokens, see Generating and Importing Authentication Tokens Between CM Peers on page 595. 4. Enable the CM Peer Distributed Correlation and CM Peer Signature Sharing features of the CM Peer Service on each CM peer. For details about how to enable all the features on each CM peer, see Enabling or Disabling All the Features of the CM Peer Service on the Peers on page 600. 5. Enable the malware-object notification setting on all the CM peers. For details about how to configure event notifications, see Event Notifications on page 295. 6. Enable the local signature generation settings on all the CM peers. Use the localsig enable command. 7. Verify the details for all the connected CM peers. For details about how to verify the details of the CM Peer Service on each peer, see Enabling or Disabling All the Features of the CM Peer Service on the Peers on page 600. Enabling or Disabling the CM Peer Service Use the CLI commands to enable or disable the CM Peer Service on each of the participating Central Management appliances. When you disable the CM Peer Service on a Central Management appliance, it can no longer interact with other CM peers. NOTE: You can enable or disable CM Peer Service only using the CLI. CM Peer Service is enabled by default. IMPORTANT: You cannot make configuration changes when the CM Peer Service is disabled. If you want to make peer service configuration changes and enable the CM Peer Service later, use the cms peer-service enable command later. © 2019 FireEye 593 Central Management Administration Guide APPENDIX C: Configuring the CM Peer Service Prerequisites l Admin access to the Central Management appliance. l A connection to the Dynamic Threat Intelligence (DTI) Cloud. l Network connectivity over SSH (port 22) and HTTPS (port 443) must be allowed on each of the participating Central Management appliances. Enabling or Disabling the CM Peer Service Using the CLI Follow these steps to enable or disable the CM Peer Service using the CLI. To enable the CM Peer Service: 1. Go to CLI configuration mode. CMS1 > enable CMS1 # configure terminal 2. Enable CM Peer Service on the platform. CMS1 (config) # cms feature peer-service enable 3. Verify the status of the CM Peer Service. CMS1 (config) # show cms peer-service CMS peer-service enabled: yes 4. Repeat this procedure for each CM peer. To disable the CM Peer Service: 1. Go to CLI configuration mode. CMS1 > enable CMS1 # configure terminal 2. Disable CM Peer Service on the Central Management appliance. CMS1 (config) # no cms feature peer-service enable 3. Verify the status of the CM Peer Service. CMS1 (config) # show cms peer-service CMS peer-service enabled: no 4. Repeat this procedure for each CM peer. 594 © 2019 FireEye Release 8.7 Generating and Importing Authentication Tokens Between CM Peers Generating and Importing Authentication Tokens Between CM Peers Every CM peer has its own unique CM Peer Service authentication token (auth-token). The token is required for communication with each peer based on the following secure interactions: l l Authentication—Authenticates each CM peer based on public or private keys. Authorization—Authorizes each peer to access only the CM Peer Service on the local system. All other management access is protected. In addition, each peer's access is limited to specific features that are enabled locally for that peer through the CM Peer Service interface. l Confidentiality—Provides encryption for all CM Peer Service communications. l Integrity—Provides communication integrity. In order for the CM peers to interact, each peer that wants to participate in the CM Peer Service must import the unique authentication token from the other CM peers. When a peer’s authentication token is imported, the peer is approved for CM Peer Service (and associated features) with your Central Management appliance. Importing a token is similar to creating an account. Therefore, the token must be from a trusted source that is authenticated with a secure out-of-band mechanism. For example, if the token is sent in a signed email, the sender of the email can be validated to be the administrator of the originating CM peer. After the token is generated, it can be reused for the token exchange with all other peers. FireEye recommends that you reuse the same token for each exchange. If you generate a new token, it must be reimported on all the other participating CM peers to resume CM Peer Service functionality. IMPORTANT: If you change the hostname or IP address of any CM peer, you must generate a new token for that CM peer and import it on all the peers of that Central Management network. NOTE: You can generate and import authentication tokens only using the CLI. Prerequisites l Admin access to the Central Management appliance. l A connection to the Dynamic Threat Intelligence (DTI) Cloud. © 2019 FireEye 595 Central Management Administration Guide l APPENDIX C: Configuring the CM Peer Service Network connectivity over SSH (port 22) and HTTPS (port 443) must be allowed on each of the participating Central Management appliances. l Each CM peer must have a unique hostname. l CM Peer Service must be enabled on your Central Management appliance. Generating and Importing Tokens for CM Peers Using the CLI Use the CLI commands to generate and import authentication tokens for CM peers. This section describes how to configure a single relationship with two CM peers. In this example, CM peer 1 (CMS1) is administered by Admin1 and CM peer 2 (CMS2) is administered by Admin2. IMPORTANT: After you import the token, a CM peer is able to interact with the CM Peer Service on your Central Management appliance. The hostname of the CM peer is automatically used as the name of the peer, and the IP address is determined by the value of the token. All CM peers must have unique IP addresses and hostnames. NOTE: You can export an existing token from a CM peer if you do not want to generate a new token. For details about how to export an existing authentication token, see Exporting an Existing Token from a CM Peer Using the CLI on page 599. When you import the token, a CM peer is disabled, by default, while the features are enabled by default. To generate an authentication token for a CM peer: 1. Go to CLI configuration mode. CMS1 > enable CMS1 # configure terminal 2. (Admin1) Generate an authentication token. Partial output of the generated token is displayed. CMS1 (config) # cms peer-service auth-token generate AUTH-TOKEN = "PD94bWwg.........." AUTH-TOKEN CHECKSUM = "cc47ba112df7e0743a41761491435ffb" . . . 596 © 2019 FireEye Release 8.7 Generating and Importing Authentication Tokens Between CM Peers 3. (Admin1) Copy all the characters within the quotes, but do not copy the quotes, from the generated auth-token. 4. (Admin1) Paste the token of CMS1 to an out-of-band mechanism (for example, a signed email). 5. (Admin1) Send the generated token of CMS1 to Admin2 through a secure out-ofband mechanism (for example, a signed email). To import an authentication token for peer setup: 1. Go to CLI configuration mode. CMS2 > enable CMS2 # configure terminal 2. (Admin2) Import the authentication token from CMS1. Paste the generated token of CMS1 on the same line as the command. CMS2 (config) # cms peer-service auth-token import <CMS_peer_one_token> NOTE: The actual hostname of CMS1 is automatically used after the token has been imported. 3. (Admin2) Generate an authentication token for CMS2. CMS2 (config) # cms peer-service auth-token generate AUTH-TOKEN = "PD94bWwg.........." AUTH-TOKEN CHECKSUM = "360a37cc532b9e2e75b674eb3b5fe2e0" . . . 4. (Admin2) Copy all the characters within the quotes, but do not copy the quotes, from the generated auth-token. 5. (Admin2) Paste the token of CMS2 to an out-of-band mechanism (for example, a signed email). 6. (Admin2) Send the generated token of CMS2 to Admin1 through a secure out-ofband mechanism (for example, a signed email). 7. (Admin1) Import the authentication token from CMS2. Paste the generated token of CMS2 on the same line as the command. CMS1 (config) # cms peer-service auth-token import <CMS_peer_two_token> NOTE: The actual hostname of the CMS2 is automatically used after the token has been imported. © 2019 FireEye 597 Central Management Administration Guide APPENDIX C: Configuring the CM Peer Service 8. (Admin1) Verify that CMS1 is connected to CMS2. CMS1 (config) # show cms peer-service CMS peer-service enabled: yes ----------------------------------------------------------------------CMS peer CMS2: Enabled: no Hostname: CMS2 Address: 172.16.216.51 Auth-token checksum: 360a37cc532b9e2e75b674eb3b5fe2e0 . . . ----------------------------------------------------------------------- 9. (Admin2) Verify that CMS2 is connected to CMS1. CMS2 (config) # show cms peer-service CMS peer-service enabled: yes ----------------------------------------------------------------------CMS peer CMS1: Enabled: no Hostname: CMS1 Address: 10.11.121.13 Auth-token checksum: cc47ba112df7e0743a41761491435ffb . . . ----------------------------------------------------------------------- NOTE: For multiple CM peers, repeat these steps on each CM peer until all the authentication tokens are imported on all the peers. Importing New Tokens for an Existing CM Peer Using the CLI Use the CLI commands to import new authentication tokens for an existing CM peer. If you have already imported the authentication token for an existing peer and you want to import a new token for that peer, you must delete the connection to the CM peer first before importing the new token. 598 © 2019 FireEye Release 8.7 Generating and Importing Authentication Tokens Between CM Peers To import a new authentication token for an existing CM peer: 1. Go to CLI configuration mode. CMS1 > enable CMS1 # configure terminal 2. Delete a CM peer connection. CMS1 (config) # cms peer <peer_hostname> delete 3. Import the new token from the specified CM peer. Paste the token of the specified CM peer on the same line as the command. CMS1 (config) # cms peer-service auth-token import <peer_token> Exporting an Existing Token from a CM Peer Using the CLI Use the CLI commands to export an existing authentication token from a CM peer. Use this procedure when you want to use an existing token with another CM peer but do not want to generate a new token. When a token is exported, it is displayed. You can copy the existing token and send it to the administrator of a CM peer. To export an existing authentication token with a CM peer: 1. Go to CLI configuration mode. CMS1 > enable CMS1 # configure terminal 2. Export an existing token. Partial output of the existing token is displayed. CMS1 (config) # cms peer-service auth-token export AUTH-TOKEN = "PD94bWwg.........." AUTH-TOKEN CHECKSUM = "234b19a369887ef5b0bbfd269c477704" . . . 3. Copy all the characters of the existing token within the quotes, but do not copy the quotes, from the exported auth-token. 4. Paste the exported token to an out-of-band mechanism (for example, a signed email). 5. Send the exported token to the administrator of the CM peer. © 2019 FireEye 599 Central Management Administration Guide APPENDIX C: Configuring the CM Peer Service Enabling or Disabling All the Features of the CM Peer Service on the Peers Use the CLI commands in this topic to enable or disable the CM Peer Distributed Correlation and CM Peer Signature Sharing features of the CM Peer Service on each CM peer. When you enable each CM peer, all the features are enabled. When you disable the CM Peer Service, CM peers can no longer interact with your Central Management appliance. However, you can enable or disable access to the CM Peer Distributed Correlation and CM Peer Signature Sharing features individually on each CM peer. Each administrator must verify the CM Peer Service connection to all CM peers. A status refresh is triggered in the following instances: l l l Periodically about every 1 to 5 minutes. Different interactions and different peers can be refreshed at different 1—minute to 5—minute intervals. Whenever any peer service configuration changes (for example, a new token is imported, a feature on a CM peer is disabled, and so on). When Central Management high availability (HA) failover occurs (when the secondary node becomes the new primary node). For information about how the CM Peer Service (and associated features) works in a HA configuration, refer to the Central Management High Availability Guide. The status might display "UNKNOWN" temporarily until the status is retrieved at the beginning of the refresh cycle. NOTE: You can enable or disable the CM Peer Service features on each CM peer only using the CLI. Prerequisites l Admin access to the Central Management appliance. l A connection to the Dynamic Threat Intelligence (DTI) Cloud. l l l 600 Network connectivity over SSH (port 22) and HTTPS (port 443) must be allowed on each of the participating Central Management appliances. CM Peer Service must be enabled on each of the participating Central Management appliances. Authentication tokens must be exchanged for communication between CM peers. © 2019 FireEye Release 8.7 Enabling or Disabling All the Features of the CM Peer Service on the Peers Enabling or Disabling All the Features of the CM Peer Service on the Peers Using the CLI Follow these steps to enable or disable all the features of the CM Peer Service on each CM peer using the CLI. To enable all the features of the CM Peer Service: 1. Go to CLI configuration mode. CMS1 > enable CMS1 # configure terminal 2. Enable all the CM Peer Service features on a CM peer. CMS1 (config) # cms peer <peer_hostname> enable 3. Save your changes. CMS1 (config) # write memory 4. Repeat this procedure for each CM peer. 5. Verify the status for all the connected CM peers. The following example verifies that CMS1 is connected to CMS2. CMS1 (config) # show cms peer-service CMS peer-service enabled: yes ----------------------------------------------------------------------CMS peer CMS2: Enabled: yes Hostname: CMS2 Address: 172.16.216.51 Auth-token checksum: 360a37cc532b9e2e75b674eb3b5fe2e0 Interactions with peer: Distributed CMS Correlation: Enabled: yes Status: OK @ 2016/01/27 18:58:51 Dynamic Threat Intelligence (DTI): Enabled: no Proxy mode: No proxy Status: UNKNOWN @ N/A Update Peer: Enabled: yes Status: OK @ 2016/01/27 18:56:30 © 2019 FireEye 601 Central Management Administration Guide APPENDIX C: Configuring the CM Peer Service ----------------------------------------------------------------------- To disable all the features of the CM Peer Service: 1. Go to CLI configuration mode. CMS1 > enable CMS1 # configure terminal 2. Disable all the CM Peer Service features on a CM peer. CMS1 (config) # no cms peer <peer_hostname> enable 3. Save your changes. CMS1 (config) # write memory 4. Repeat this procedure for each CM peer. 5. Verify the status for all the CM peers. The following example verifies that CMS1 is not connected to CMS2. CMS1 (config) # show cms peer-service CMS peer-service enabled: yes ----------------------------------------------------------------------CMS peer CMS2: Enabled: no Hostname: CMS2 Address: 172.16.216.51 Auth-token checksum: 360a37cc532b9e2e75b674eb3b5fe2e0 Interactions with peer: Distributed CMS Correlation: Enabled: yes Status: OK @ 2016/01/27 18:58:51 Dynamic Threat Intelligence (DTI): Enabled: no Proxy mode: No proxy Status: UNKNOWN @ N/A Update Peer: Enabled: yes Status: OK @ 2016/01/27 18:58:51 ----------------------------------------------------------------------- 602 © 2019 FireEye Release 8.7 CM Peer Distributed Correlation Deleting a CM Peer Using the CLI Follow these steps to delete a CM peer from the Peer Service relationship (not from the network) using the CLI. All configuration information and data associated with that peer will be removed, including the IP address and peer name. The CM peer is no longer connected to the Peer Service. If you want to reconnect to the same peer, you must import the existing token again. IMPORTANT: If you delete a CM peer and then want to add the CM peer back, you must import the token again. For information about how to import a token for an existing CM peer, see Importing New Tokens for an Existing CM Peer Using the CLI on page 598. To delete a CMS peer: 1. Go to CLI configuration mode. CMS1 > enable CMS1 # configure terminal 2. Delete a CMS peer. CMS1 (config) # cms peer <peer_hostname> delete 3. Save your changes. CMS1 (config) # write memory 4. Verify that all configuration information associated with that peer is removed. The following example verifies that all information associated with CMS2 is removed. CMS1 (config) # show cms peer-service CMS peer-service enabled: yes CM Peer Distributed Correlation CM Peer Distributed Correlation matches events detected by an appliance with events that are received from a CM peer in another network. CM Peer Distributed Correlation allows two Central Management networks to share information. Information about a malicious URL found in one Central Management network is shared with other Central Management networks. A typical correlation matches malicious URL events detected by the Network Security appliance with email events detected by the Email Security — Server Edition appliance. URL events and email events are linked to each other in the Web UI after they have been matched. For example, when a malicious URL is detected by the Network Security appliance, the URL is correlated by the Central Management appliance with the originating email on the Email Security — Server Edition appliance. For details about © 2019 FireEye 603 Central Management Administration Guide APPENDIX C: Configuring the CM Peer Service Network Security and Email Security — Server Edition event correlation, see Reviewing Email Alerts Correlated with Web Events on page 434. Alert notifications from a CM peer are missing the missing product and version attributes in the <alert> tag of the notification. When the malware-object notification setting is enabled on the Central Management appliance, Distributed Cross-CM alert notifications that contain information about the sender, intended recipient(s), and malicious URL are sent from the Central Management appliance or managed appliances. For details about how to manage the distribution of alert notifications for the Central Management appliance and managed appliances, see Managing the Distribution of Alert Notifications on page 421. Prerequisites l Admin access to the Central Management appliance. l A connection to the Dynamic Threat Intelligence (DTI) Cloud. l l l l Network connectivity over SSH (port 22) and HTTPS (port 443) must be allowed on each of the participating Central Management appliances. CM Peer Service must be enabled on each of the participating Central Management appliances. Authentication tokens must be exchanged for communication between the CM peers. The malware-object notification setting must be enabled on all the CM peers. For details about how to configure event notifications, see Event Notifications on page 295. Enabling or Disabling CM Peer Distributed Correlation Using the CLI Follow these steps to enable or disable the CM Peer Distributed Correlation feature on each CM peer using the CLI. To enable the CM Peer Distributed Correlation feature: 1. Go to CLI configuration mode. CMS1 > enable CMS1 # configure terminal 2. Enable the CM Peer Distributed Correlation feature on a CM peer. CMS1 (config) # cms peer <peer_hostname> interaction dist-correlation enable 3. Save your changes. 604 © 2019 FireEye Release 8.7 CM Peer Distributed Correlation CMS1 (config) # write memory 4. Verify the Distributed Correlation status on a CM peer. The following example verifies that Distributed Correlation is enabled on CMS2. CMS1 (config) # show cms peer-service CMS peer-service enabled: yes ----------------------------------------------------------------------CMS peer CMS2: Enabled: yes Hostname: CMS2 Address: 172.16.216.51 Auth-token checksum: 360a37cc532b9e2e75b674eb3b5fe2e0 Interactions with peer: Distributed CMS Correlation: Enabled: yes Status: OK @ 2016/01/27 18:59:38 Dynamic Threat Intelligence (DTI): Enabled: yes Proxy mode: No proxy Status: OK @ 2016/01/27 18:59:38 Update Peer: Enabled: yes Status: OK @ 2016/01/27 19:02:23 ----------------------------------------------------------------------- To disable the CM Peer Distributed Correlation feature: 1. Go to CLI configuration mode. CMS1 > enable CMS1 # configure terminal 2. Disable the CM Peer Distributed Correlation feature on a CM peer. CMS1 (config) # no cms peer <peer_hostname> interaction distcorrelation enable 3. Verify the Distributed Correlation status on a CM peer. The following example verifies that Distributed Correlation is disabled on CMS2. CMS1 (config) # show cms peer-service CMS peer-service enabled: yes ----------------------------------------------------------------------CMS peer CMS2: © 2019 FireEye 605 Central Management Administration Guide APPENDIX C: Configuring the CM Peer Service Enabled: yes Hostname: CMS2 Address: 172.16.216.51 Auth-token checksum: 360a37cc532b9e2e75b674eb3b5fe2e0 Interactions with peer: Distributed CMS Correlation: Enabled: no Status: UNKNOWN @ N/A Dynamic Threat Intelligence (DTI): Enabled: yes Proxy mode: No proxy Status: OK @ 2016/01/27 18:59:38 Update Peer: Enabled: yes Status: OK @ 2016/01/27 19:02:23 ----------------------------------------------------------------------- Viewing CM Peer Distributed Correlation Alerts in the Web UI When CM Peer Distributed Correlation is enabled, a globe icon in the URL column on the Email Security — Server Edition: Email Alerts page indicates that a user clicked a malicious URL that was detected by an Network Security appliance that was managed by CM peers. The Email Alerts page lists the results, grouped by recipient, of the correlated email events detected by the Email Security — Server Edition appliance in one network with malicious URLs detected by the Network Security appliance that was managed by a CM peer in a different network. 606 © 2019 FireEye Release 8.7 CM Peer Signature Sharing CM Peer Signature Sharing The CM Peer Signature Sharing feature allows CM peers to share locally generated signatures with remote CM peers using the CM Peer Service. When local signature generation settings are enabled, you can verify the number of active rules that are shared with local and remote CM peers by using the show localsig command. When CM Peer Signature Sharing is disabled, local and remote peers do not share locally generated signatures. An enterprise customer can have geographically distributed Central Management networks (for example, US, EU, APAC) with separate Central Management appliances that are all connected using the CM Peer Service. CM Peer Signature Sharing allows the Central Management appliance in the Central Management network in the US to share locally generated signatures with the other platforms in the EU and APAC. When one peered Central Management network identifies a malicious URL, the signature is shared with all the other peered Central Management networks. When deployed inline in block mode, any appliance in the EU or APAC automatically blocks a malicious URL identified in the US. Therefore, all users are protected in all peered Central Management networks. Prerequisites l Admin access to the Central Management appliance. l A connection to the Dynamic Threat Intelligence (DTI) Cloud. l l l l l Network connectivity over SSH (port 22) and HTTPS (port 443) must be allowed on each of the participating Central Management appliances. The Email Security — Server Edition appliance must be deployed in block mode. The Network Security appliance must be deployed inline and the monitoring interface must be configured for inline blocking. CM Peer Service must be enabled on each of the participating Central Management appliances. Authentication tokens must be exchanged for communication between the CM peers. The local signature generation settings must be enabled on all the CM peers using the localsig enable command. Enabling or Disabling CM Peer Signature Sharing Using the CLI Follow these steps to enable or disable DTI interaction between CM peers for CM Peer Signature Sharing using the CLI. © 2019 FireEye 607 Central Management Administration Guide APPENDIX C: Configuring the CM Peer Service To enable CM Peer Signature Sharing: 1. Go to CLI configuration mode. CMS1 > enable CMS1 # configure terminal 2. Generate a key file to enable DTI interaction between CM peers to share locally generated signatures with remote CM peers. CMS1 (config) # cms peer <peer_hostname> interaction dti enable 3. Save your changes. CMS1 (config) # write memory 4. Verify the DTI interaction status with a CM peer for CM Peer Signature Sharing. The following example verifies that DTI interaction with CMS2 is enabled for CM Peer Signature Sharing. CMS1 (config) # show cms peer-service CMS peer-service enabled: yes ----------------------------------------------------------------------CMS peer CMS2: Enabled: yes Hostname: CMS2 Address: 172.16.216.51 Auth-token checksum: 360a37cc532b9e2e75b674eb3b5fe2e0 Interactions with peer: Distributed CMS Correlation: Enabled: yes Status: OK @ 2016/01/27 19:07:26 Dynamic Threat Intelligence (DTI): Enabled: yes Proxy mode: No proxy Status: OK @ 2016/01/27 19:07:26 Update Peer: Enabled: yes Status: OK @ 2016/01/27 19:07:26 ----------------------------------------------------------------------- To disable DTI interaction with a CM peer for CM Peer Signature Sharing: 1. Go to CLI configuration mode. CMS1 > enable 608 © 2019 FireEye Release 8.7 CM Peer Signature Sharing CMS1 # configure terminal 2. Disable DTI interaction with a CM peer for CM Peer Signature Sharing. CMS1 (config) # no cms peer <peer_hostname> interaction dti enable 3. Save your changes. CMS1 (config) # write memory 4. Verify the DTI interaction status with a CM peer for CM Peer Signature Sharing. The following example verifies that DTI interaction with CMS2 is disabled for CM Peer Signature Sharing. CMS1 (config) # show cms peer-service CMS peer-service enabled: yes ----------------------------------------------------------------------CMS peer CMS2: Enabled: yes Hostname: CMS2 Address: 172.16.216.51 Auth-token checksum: 360a37cc532b9e2e75b674eb3b5fe2e0 Interactions with peer: Distributed CMS Correlation: Enabled: yes Status: OK @ 2016/01/27 19:07:26 Dynamic Threat Intelligence (DTI): Enabled: no Proxy mode: No proxy Status: UNKNOWN @ N/A Update Peer: Enabled: yes Status: OK @ 2016/01/27 19:07:26 ----------------------------------------------------------------------- Viewing the Number of Rules for CM Peer Signature Sharing Using the CLI Follow these steps to view the number of active rules that are shared between local and remote CM peers for CM Peer Signature Sharing using the CLI. © 2019 FireEye 609 Central Management Administration Guide APPENDIX C: Configuring the CM Peer Service NOTE: When the DTI feature is enabled, there will be a slight discrepancy in the Active rules value in the show localsig command output. This discrepancy is due to the way data is aggregated and synchronized. To view the number of active rules for CM Peer Signature Sharing: 1. Go to CLI enable mode. CMS1 > enable 2. Verify the number of active rules that are shared between CM peers. CMS1 > show localsig LocalSig Generator Enabled : YES Running : running Rule Versions : 1 Active rules : 1337 LocalFeed : Disabled Allowing or Preventing a CM Peer to Use a Proxy Server Use the CLI commands to allow or prevent a CM peer to use a proxy server to connect to other remote CM peers. If you allow a CM peer to use a proxy server, the proxy settings will be the same as those configured for DTI interaction to connect to other remote CM peers. By default, a CM peer does not use a proxy server to connect to other remote peers. NOTE: You can allow or prevent a CM peer to use a proxy server only using the CLI. Prerequisites l Admin access to the Central Management appliance. l A connection to the Dynamic Threat Intelligence (DTI) Cloud. l l l 610 Network connectivity over SSH (port 22) and HTTPS (port 443) must be allowed on each of the participating Central Management appliances. CM Peer Service must be enabled on each of the participating Central Management appliances. Authentication tokens must be exchanged for communication between the CM peers. © 2019 FireEye Release 8.7 Allowing or Preventing a CM Peer to Use a Proxy Server Allowing or Preventing a CM Peer to Use a Proxy Server Using the CLI Follow these steps to allow or to prevent a CM peer to use a proxy server to connect to other remote CM peers. To allow a CM peer to use a proxy server: 1. Go to CLI configuration mode. CMS1 > enable CMS1 # configure terminal 2. Identify a CM peer to use the same proxy server settings that are configured for DTI interaction to connect to other remote CM peers. CMS1 (config) # cms peer <peer_hostname> interaction dti proxy mode use-fenet 3. Save your changes. CMS1 (config) # write memory 4. Verify the proxy server status on a CM peer. The following example verifies that CMS2 is allowed to use a proxy server. CMS1 (config) # show cms peer-service CMS peer-service enabled: yes ----------------------------------------------------------------------CMS peer CMS2: Enabled: yes Hostname: CMS2 Address: 172.16.216.51 Auth-token checksum: 360a37cc532b9e2e75b674eb3b5fe2e0 Interactions with peer: Distributed CMS Correlation: Enabled: Status: 19:12:59 yes OK @ 2016/01/27 Dynamic Threat Intelligence (DTI): Enabled: yes Proxy mode: Use FENET proxy settings Status: OK @ 2016/01/27 19:12:59 Update Peer: Enabled: © 2019 FireEye yes 611 Central Management Administration Guide APPENDIX C: Configuring the CM Peer Service Status: OK @ 2016/01/27 19:12:59 ----------------------------------------------------------------------- To prevent a CM peer from using a proxy server: 1. Go to CLI configuration mode. CMS1 > enable CMS1 # configure terminal 2. Prevent a CM peer from using any proxy server to connect to other remote CM peers for DTI interaction. CMS1 (config) # cms peer <peer_hostname> interaction dti proxy mode noproxy 3. Save your changes. CMS1 (config) # write memory 4. Verify the proxy server status on a CM peer. The following example verifies that CMS2 is not allowed to use a proxy server. CMS1 (config) # show cms peer-service CMS peer-service enabled: yes ----------------------------------------------------------------------CMS peer CMS2: Enabled: yes Hostname: CMS2 Address: 172.16.216.51 Auth-token checksum: 360a37cc532b9e2e75b674eb3b5fe2e0 Interactions with peer: Distributed CMS Correlation: Enabled: yes Status: OK @ 2016/01/27 19:07:26 Dynamic Threat Intelligence (DTI): Enabled: yes Proxy mode: No proxy Status: OK @ 2016/01/27 19:07:26 Update Peer: Enabled: yes Status: OK @ 2016/01/27 19:07:26 ----------------------------------------------------------------------- 612 © 2019 FireEye Central Management Administration Guide Enabling the ETP Cloud Endpoint Using the CLI APPENDIX D: Monitoring Email Alerts from the Email Security Cloud Edition. You can configure the Central Management Appliance Dashboard to monitor email alerts from the Email Security Cloud. On the Central Management appliance, you need a license with your client ID. To see if it is configured, log in to your Central Management appliance and look for Customer ID (under the username drop-down) in the Web UI, or enter the show version command in the CLI. If you do not have a customer ID, contact FireEye Support. The protocol is Web Socket over TLS using port 443. The access points are us1.fireeyecloud.com and us2.fireeyecloud.com. These are both needed and back each other up. The CMS has a 1-hour idle connection timeout and therefore will disconnect from ETP occasionally. Enabling the ETP Cloud Endpoint Using the CLI The ETP Cloud endpoint has to be enabled before the Central Management appliance can monitor alerts from ETP Cloud. The following are the CLI provisioning commands to enter from the CLI. You will create two access points using the destination URLs, (one endpoint and the URL). You will specify a nickname, such as, "email-server" and specify the URL. The nickname you define for the access point has local significance, so you can use whatever you like as long as it is consistent. © 2019 FireEye 613 Central Management Administration Guide APPENDIX D: Monitoring Email Alerts from the Email Security - Cloud Edition. To enable the ETP endpoint: 1. Go to CLI configuration mode: cm-1 > enable cm-1 # configure terminal 2. Specify the endpoint name and access point: cm-1 (config) # cloud etp endpoint <etp-endpoint-name> uri <cloud etp uri> 3. If you are prompted, enter your username and password: cm-1 (config) # cloud etp endpoint <etp-endpoint-name> username <fenet_ username> password <fenet_password> 4. Enable the endpoint: cm-1 (config) # cloud etp endpoint <etp-endpoint-name> enable 5. Save your changes: cm-1 (config) # write memory 6. Verify the configuration: cm-1 (config) # show cloud etp status Endpoint: everest: Address: wss://iad-cc-api-vip-stage1.cso.fireeye.com:443 Enabled: yes JobWorker Connected: yes NotifHandler Connected: yes 7. To show the configured ETP instances: cm-1 (config) # show cloud etp configuration To remove the configuration and all its associated objects and alerts from the CM: cm-1 (config) # no cloud etp endpoint <etp-endpoint-name> ETP Cloud Aggregation An aggregator process receives data from the ETP Cloud and aggregates it into the Central Management appliance database for display on the Central Management appliance Web UI. To display the configuration of the aggregator: cm-1 (config) # show aggregator configuration To display the configuration of the aggregator endpoints: cm-1 (config) # show aggregator endpoints configuration 614 © 2019 FireEye Release 8.7 Viewing Email Alerts from the ETP Cloud in the Web UI Solving Connection Issues The following commands are usedto troubleshoot connection issues and used only when asked to do so by FireEye Support. To enable/disable SSL certification verification in the aggregator: cm-1 (config) # [no] aggregator ssl cert-verify To set the aggregator log level: cm-1 (config) # aggregator consumer logging level [debug|info|notice|warning|error] To set the SSL cipher list to use with the WebSocket connection: cm-1 (config) # aggregator ssl cipher-list To set the minimum TLS version to use with the WebSocket connection: cm-1 (config) # aggregator ssl min-version Viewing Email Alerts from the ETP Cloud in the Web UI On the Central Management appliance Dashboard, you can select ETP from the All Groups menu or an ETP instance from the All Appliances menu. For the selected groups and instances, you can view: l Total Malicious emails l Malicious URLs l Malicious Attachments l ETP Alerts You can view email alerts on the Central Management Dashboard by going to the Alerts tab and selecting one of the categories displayed under What's Happening: © 2019 FireEye 615 Central Management Administration Guide APPENDIX D: Monitoring Email Alerts from the Email Security - Cloud Edition. You can view detailed status of the ETP instance's connection by selecting an instance from the All Appliances drop-down to view the Summary. Note that ETP Cloud instances are not listed on the Appliances tab: 616 © 2019 FireEye Index ArcSight 220, 233 A AAA 161 admin password 78, 106 alert correlation 433-434, 437, 439-440 alert distribution 421 authentication SSH 557 automatic backups 253 AWS deployment 96 alert update settings, overview 341 B alert updates, configuring 342 backup, database AMI image 96 estimating space 248 appliance license 115 overview 245 appliance management scheduling with CLI 254 adding appliances 363, 366 task list 246 alert correlation 433-434, 437, 439440 uploading files 257 alert distribution 421 viewing results 246 configuring 383 groups 405 monitoring 421 using CLI 251 backups automatic 253 badges peer service 591 correlated alert 433-434, 437 profiles 412 endpoint 440 removing appliances 371 Blue Coat ProxySG 220 updating appliances 499 boot manager utilities 349 viewing information 373 Boot menu 349 © 2019 FireEye 617 Index browser support IPMI 61 Web UI 37 database 245-246, 248-249, 253, 256-258, 262 task list 246 date and time 179 C configuring NTP servers cache for DTI downloads 139-140, 144, 146-148 Central Management authentication 557, 590 using the Central Management Web UI 182 using the CLI 183 checks, health 269 NTP (network time protocol) authentication using the CLI 186 client-initiated connection 366 setting manually 179 certificates 161 CONTENT_UPDATES license 116 Create HA Pair link 376 custom IOC feeds creating a custom blacklist 514 deleting third-party feeds using the Web UI 521 downloading third-party feeds using the Web U 523 enabling or disabling 507 overview 505 task list 506 uploading a third-party feed 516 uploading using the Web UI 516 viewing details 518 viewing details using the CLI 519 using the CLI 180 setting the time zone using the Central Management Web UI 191 using the CLI 191 synchronizing to DTI server 192 disk space management on-demand 345 overview 345 disk wipe 358 distributed correlation, peer service enabling or disabling 604 overview 603 viewing alerts 606 DNS settings 199 viewing details using the Web UI 519 domain name settings 200 viewing from Alerts > Alerts > Alerts 520 DTI network DSA2 public keys 558-560, 562-563 automatic license updates 128 D automatic updates 137 DA_HANCOM license 116 changing active settings 131-134, 152 Dashboard 39 configuring credentials 152 618 © 2019 FireEye, Inc. Index download cache 139-140, 144, 146148 FIREEYE_APPLIANCE license 115 overview 127 Firefox browser 37, 61 populate cache 139-140, 144, 146-148 front panel, removing 57 FIREEYE_SUPPORT license 116 services 130 software updates 129 stats uploads 137 status 269 system health monitoring 129 G groups 405 Guest Images 220 H threat intelligence 127 hardware status 271 updating stats 155 health checks 269, 274, 489 upgrading from 220-221, 223 host-key authentication 565-568, 570, 572 uploading stats automatically by CLI 157 uploading stats manually by CLI 158 using HTTP proxy 136 HTTP proxy for DTI network requests 136 HTTP proxy server, configuring settings 207 validating 149-150 I E IP filtering 204, 206 email notifications for alerts 295 IPMI endpoint compromised 440 accessing the device serial port 63 endpoint contained 440 browser support 61 entropy 112 checking the device sensors 64 erasing hard disk 358 logging in 61 ESXi deployment 86 resetting 64 Ethernet port status 273 restarting the device 62 EULA (End User License Agreement) 76-77, 219, 221, 224 updating firmware 203 IPMI port 83 event correlation 433-434, 437, 439-440 IPv6, enabling 201 event notifications 295 daily digest, CSV fields 297 J Juniper STRM 220 F FireEye as a Service (FAAS) 122, 202 FireEye Network Security 30 © 2019 FireEye, Inc. K KVM deployment 101 619 Index management path 31 L LCD 57, 81 license management 115 about FireEye license keys 115 automatic updates 118 management request, accepting 366 MD_ACCESS license 116 media wipe 358 MIB, downloading to Apple devices 282 manual installation 121 to Linux devices 282 viewing notifications 125 license tokens 108 liquid crystal display 57, 81 local IOC feeds enabling or disabling 507 overview 505 viewing details 518 viewing details using the CLI 519 viewing details using the Web UI 519 viewing from Alerts > Alerts > Alerts 520 log files 233 configuring minimum level using the CLI to Windows devices 281 MVX cluster 30 N Network Address Translation (NAT) 575, 584, 586, 590 mappings for CM-initiated connections 576 mappings for VX-initiated connections 580 network administration 197, 203-204, 206, 212, 214 network proxy 220 network requirements 75 Network Security 30 for local drive 240, 242 network settings 197 for syslog server 238 notifications 163 configuring syslog server using the CLI 237 uploading to network using the CLI 244 viewing using the CLI 236 Log Manager 233 alert update 341 alert updates 342 NTP (Network Time Protocol) configuring authentication using the CLI 186 configuring servers 181 logs 233 using the Central Management Web UI 182 M using the CLI 183 management interface, defining ether2 210 NX Series High Availability (HA) 376 management network settings 199, 209 620 © 2019 FireEye, Inc. Index O R one-way sharing license rechecking appliance 491 override overview 117 one-way sharling license override using CLI 117 resetting appliance 491 resolution, screen 37 restore, database Open Virtualization Format (OVF) 86 guidelines 258 OVA image 86 overview 245 task list 246 P using CLI 260 password authentication 558 passwords changing admin 78, 106 Tools menu 352 peer service viewing results 246 riskware alert 426 RSA2 public keys 558-560, 562-563 rsyslog notifications 305, 328 allowing or preventing use of proxy server 610 S deleting peers 603 Secure Shell (SSH) authentication 557 distributed correlation alerts 606 security content updates license 116 distributed correlation feature 603 security content, validated 153 enabling or disabling 593 security content, validation 153-154 enabling or disabling all features 600 exporting existing tokens 599 screen resolution 37 about 153-154 serial port generating and importing tokens 595 accessing from a terminal server 77 importing new tokens 598 accessing from a Linux system 77 overview 591 accessing from a PC laptop 77 signature sharing feature 607 accessing from an Apple laptop 77 task list 592 settings 76 profiles 412 server-initiated connections 363 proxy notifications 340 Services Health 271 proxy server, configuring settings 207 signature sharing, peer service public key authentication 558-560 Q Q1 Lab QRadar 220 © 2019 FireEye, Inc. enabling or disabling 607 overview 607 viewing rules 609 621 Index SMTP email notification settings 313 time and date SNMP notifications 279 configuring NTP authentication using the CLI 186 software upgrades 219 configuring NTP servers SSH-DSA2, SSH-RSA2 public keys 558560, 562-563 using the Central Management Web UI 182 status using the CLI 183 DTI network 272 Ethernet port information 273 hardware information 271 services information 271 system information 270 version information 269 summary results 265-266 support license 116 system entropy 112 system status 270 setting manually 179 using the CLI 180 setting the time zone using the Central Management Web UI 191 using the CLI 191 time and date settings 179 time zone 190 setting using the Central Management Web UI 191 setting using the CLI 191 T tokens, license 108 testing deployment 265-266 Tools menu 349 third-party IOC feeds accessing 354 creating a custom blacklist 514 disabling 356 deleting using the Web UI 521 Manufacture Appliance option 350 downloading using the Web UI 523 Reset admin Password option 349 enabling or disabling 507 Return to Image Boot Menu option 350 overview 505 uploading 516 uploading using the Web UI 516 viewing details 518 viewing details using the CLI 519 viewing details using the Web UI 519 viewing from Alerts > Alerts > Alerts 520 setting password 352 viewing availability 357 Wipe Appliance Media and Manufacture Appliance option 350 Wipe Appliance Media option 349 triage collections, triage packages download 440 two-way sharing license 116 path to DTI cloud 31 622 © 2019 FireEye, Inc. Index sharing data with the DTI 155, 157158 U upgrades 219 user authentication 557, 562-563 user interfaces CLI 56 IPMI 60 LCD 81 Web UI 37, 39, 54 V version status 269 virtual appliances AWS deployment 96 KVM deployment 101 licensing 108 VMware ESXi deployment 86 VPN, enabling 122, 202 W Web browser support IPMI 61 Web UI 37 Web UI 39, 54 © 2019 FireEye, Inc. 623 Index 624 © 2019 FireEye, Inc. Technical Support For technical support, contact FireEye through the Support portal: https://csportal.fireeye.com Documentation Documentation for all FireEye products is available on the FireEye Documentation Portal (login required): https://docs.fireeye.com/ © 2019 FireEye 625 FireEye, Inc. | 601 McCarthy Blvd. | Milpitas, CA | 1.408.321.6300 | 1.877.FIREEYE | www.fireeye.com/company/contact-us.html © 2019 FireEye, Inc. All rights reserved. FireEye is a registered trademark of FireEye, Inc. All other brands, products, or service names are or may be trademarks or service marks of their respective owners.