F I R E E Y E T E C H N I C A L D O C U M E N T A T I O N CENTRAL MANAGEMENT RELEASE NOTES RELEASE 8.7 CENTRAL MANAGEMENT / 2019 FireEye and the FireEye logo are registered trademarks of FireEye, Inc. in the United States and other countries. All other trademarks are the property of their respective owners. FireEye assumes no responsibility for any inaccuracies in this document. FireEye reserves the right to change, modify, transfer, or otherwise revise this publication without notice. Copyright © 2019 FireEye, Inc. All rights reserved. Central Management Release Notes Software Release 8.7.0 Revision 2 FireEye Contact Information: Website: www.fireeye.com/company/contact-us.html Technical Support: https://csportal.fireeye.com Phone (US): 1.408.321.6300 1.877.FIREEYE Contents Announcements 4 FireEye Customer Security Best Practices 4 Upgrade 5 Downloading Content from the DTI Offline Update Portal 5 Supported Appliance Versions 5 Upgrading IPMI 3.11 and BIOS 1.9 Firmware for Specific Platforms 5 Upgrading MVX Smart Grid and Private Grid Clusters 7 Enabling Access to Intel Context 8 What's New 9 URL Click Reporting 9 Search and Download Quarantined Emails Using the API 9 Service Health System Trends 10 2020 California Law Password Compliance 10 Display of Available Features 10 Artifacts Column with OS Graph Icons 11 New and Modified APIs 11 Fixed Central Management Issues 13 Known Central Management Issues 15 Technical Support 17 Documentation © 2019 FireEye 17 3 Central Management Release Notes Announcements Announcements This document provides an overview of the new features, resolved issues, and known issues in the FireEye Central Management 8.7.0 release. FireEye Customer Security Best Practices Because our quality assurance process includes continuous security testing, FireEye recommends updating all FireEye products with the latest releases as soon as possible. As an overall strategy to reduce risk exposure, customers are also encouraged to follow best practices, which include: l l 4 Always keep the product version up-to-date Limit network access to the management interfaces of the appliance using firewalls or similar measures l Only issue accounts to trusted administrators l Use strong passwords l Monitor logs l Restrict physical access to the appliance to trusted administrators © 2019 FireEye Release 8.7 Upgrade Upgrade The FireEye Central Management 8.7.0 release requires a reboot for the update to take effect. You can upgrade your Central Management appliance to 8.7.0 from release 8.5.0 or later. IPMI and BIOS firmware updates are required for the CM 4500 model. See the section "Upgrading IPMI 3.11 and BIOS 1.9 Firmware for Specific Platforms" below. Downloading Content from the DTI Offline Update Portal If you download Central Management 8.7.0 security content from the DTI Offline Update Portal, use the SCNET-1.0 channel of the portal. CAUTION! Downloading security content from a different channel will result in a loss of detection. For details, see the FireEye DTI Offline Update Portal User Guide. Supported Appliance Versions A Central Management platform running release 8.7.0 can manage the following appliance versions: l Network Security (NX Series): 8.3.x, 8.2.x, 8.1.x l Email Security — Server Edition (EX Series): 8.4.x, 8.3.x, 8.2.x l File Protect (FX Series): 8.2.x, 8.0.x l Malware Analysis (AX Series): 8.4.x, 8.3.x, 8.2.x l Endpoint Security (HX Series): 4.8.x, 4.7.x l VX Series: 8.3.x, 8.2.x (upgrade only) Upgrading IPMI 3.11 and BIOS 1.9 Firmware for Specific Platforms The CM 4500 model requires upgrades to IPMI 3.11 and BIOS 1.9. You must install the IPMI upgrade before you upgrade the BIOS. (COM-21016, COM-25601) See the Administration Guide for the appliance for detailed instructions about upgrading IPMI. To upgrade IPMI to version 3.11: © 2019 FireEye 5 Central Management Release Notes Announcements CAUTION: IPMI network and password settings revert to factory defaults after this upgrade, and IPMI logs are deleted. Make a note of your settings and back up your IPMI logs. WARNING: Do not shut down or remove power from the appliance during the upgrade. 1. Go to CLI configuration mode. hostname> enable hostname# configure terminal 2. Begin the upgrade: hostname (config)# ipmi firmware update latest 3. Confirm the upgrade: hostname (config)# show ipmi If the upgrade fails, try the steps again. If IPMI functions are not fully restored, perform a full power cycle (cold shutdown) on the appliance: 1. Stop the reload process: hostname (config)# reload halt 2. Disconnect all power cables for 2 minutes. 3. After 2 minutes, reconnect power cables and restart the appliance. To upgrade the BIOS to version 1.9: 1. Go to CLI configuration mode. hostname> enable hostname# configure terminal 2. Begin the upgrade: hostname (config)# system bios firmware update latest WARNING: Do not shut down or remove power from the appliance during the upgrade. 3. Confirm the upgrade: hostname (config)# show system bios 4. Stop the reload process: hostname (config)# reload halt 5. Disconnect all power cables for 2 minutes. 6. After 2 minutes, reconnect power cables and restart the appliance. 6 © 2019 FireEye Release 8.7 Upgrade Upgrading MVX Smart Grid and Private Grid Clusters FireEye recommends that you upgrade and configure the cluster using the Central Management appliance Web UI. Follow these upgrade guidelines. l l l Upgrade clusters when cluster utilization is low. Cluster utilization of less than 30% is recommended. You can upgrade cluster VX Series appliance nodes to VX 8.3.x from VX 8.2.0 and later only. If you upgrade from an earlier version, you must upgrade to VX 8.2.x first and then upgrade to 8.3.x. Clusters should be upgraded using the Central Management Web UI only. VX Series nodes that are part of a cluster should not be upgraded individually. FireEye recommends the following upgrade path: l Upgrade the Central Management appliance to 8.7.0. l Upgrade the cluster to version 8.3.x using the Central Management 8.7.0 Web UI. l If there are available VX nodes that are not part of the cluster and are running a version earlier than 8.3.0, upgrade the individual VX nodes to 8.3.0 or later before you add them to a cluster. Keep the following things in mind when you upgrade to this release. l l l l l l Do not create a new cluster on CM 8.7.0 with VX nodes with versions earlier than 8.3.0. If your cluster has different IP addresses configured for submission and cluster interfaces, you cannot upgrade the cluster to 8.3.0 or later. To upgrade, you must delete the cluster, upgrade the VX nodes to 8.3.0 or later, and then create a new cluster with VX 8.3.0 or later nodes. The VX node hostname on the CM must match the VX hostname on the appliance. If they are different, you must change the hostnames to match before upgrading to 8.3.0 or later. When you create a cluster, ensure the VX hostname on the VX series appliance is same as the node hostname in the Central Management Web UI. To ensure that a sensor enrolls with a broker node within the same cluster, you must configure the preferred cluster setting on the sensor. Otherwise, if a broker node fails, the sensor can attach to another cluster managed by the same Central Management appliance. To configure a preferred cluster, use the command mvx cluster enrollment-service preferred name <clusterName>. The Upgrade Cluster option is available only if the cluster is in Ready status. The Abort option is grayed out in the Web UI. To abort a cluster operation, you must use the command cmc mvx cluster <cluster-name> task abort. © 2019 FireEye 7 Central Management Release Notes l l l Announcements If the Central Management Web UI displays that cluster settings do not match, you must synchronize the configuration on the Central Management appliance. Use the command cmc mvx cluster <cluster-name> sync-config. There are no longer master nodes in the VX Series releases 8.3.0 and later. There are broker and compute nodes only. When you configure clusters using the CLI, you can check cluster status using the command show cmc mvx cluster <cluster-name>. You must wait for the cluster to be in Ready status before executing the next cluster management command. After the upgrade, the cluster status will be Busy-Updating for several minutes and then will change to Ready. If the status does not return to Ready within 15-20 minutes, follow these steps to detach and then re-attach the busy VX node. 1. On the Central Management appliance, stop the cluster: cm-hostname (config) # cmc mvx cluster <cluster-name> task abort 2. On the busy VX node, enter the following command: vx1-hostname (config) # mvx node detach force 3. If the cluster contains other VX nodes, enter the following command on each one. (This is not necessary if there are no other nodes in the cluster.) vx2-hostname (config) # mvx node <name-of-busy-VX-node> detach force The cluster status will be degraded for a few minutes and then will return to the Ready state. Wait until the busy VX node is shown as "available" on the Nodes page. 4. When the busy node becomes available, add it to the cluster again: cm-hostname (config) # cmc mvx cluster <cluster-name> node <node-name> NOTE: During cluster upgrade, you may see duplicate clusters appearing on cluster page. This is temporary and a single cluster will be seen after cluster upgrade is completed. See the MVX Smart Grid Administration Guide for detailed cluster upgrade and configuration instructions. Enabling Access to Intel Context Appliances now need access to the Amazon Web Services (AWS) cloud for ATI communication. The intel context service is hosted in multiple AWS regions and resolves to multiple IP addresses based on geographic location. To determine the IP addresses for your location, go to https://dnschecker.org/#A/context.fireeye.com. See the AWS IP address range documentation for information about whitelisting the IP addresses. 8 © 2019 FireEye Release 8.7 URL Click Reporting What's New This section describes new features in the FireEye Central Management release 8.7.0. URL Click Reporting The URL Click Reporting feature on a managed Email Security — Server Edition appliance generates a URL click event when a rewritten URL within an email message body is clicked by the recipient. The click event data (such as click count, time stamp, recipient, and type) is gathered and analyzed using FireEye Helix and third-party software. URL click event types are missed or blocked click events. A missed click event is generated when FireEye Advanced URL Detection Engine (FAUDE) did not analyze the URL as malicious before it was clicked. A blocked click event is generated when FAUDE returned a malicious verdict for the URL and it was blocked. When a missed URL click event is created retroactively, the retroactive alert is updated with that URL click event. The alert details are displayed on the eAlerts > Alerts page. The URL Click Reporting feature is enabled by default and displayed in the Central Management and Email Security — Server Edition appliance Dashboard and eAlerts pages. For more information, see the "URL Click Reporting" section of the Central Management Administration Guide. Search and Download Quarantined Emails Using the API Use the following APIs for managing quarantined emails: l List quarantined emails GET https://<address>/wsapis/v2.0.0/emailmgmt/quarantine l Release a list of emails by ID from the quarantine POST https://<address>/wsapis/v2.0.0/emailmgmt/quarantine/release l Delete a list of emails by ID from the quarantine POST https://<address>/wsapis/v2.0.0/emailmgmt/quarantine/delete © 2019 FireEye 9 Central Management Release Notes l What's New Download email by ID from the quarantine GET https://<address>/wsapis/v2.0.0/emailmgmt/quarantine/<queue_id> For more information, see the FireEye API Reference Guide. Service Health System Trends You can view a service health statistics trend graph for the Central Management appliance from the Dashboard page. 2020 California Law Password Compliance In Release 8.7.0, the IPMI interface cannot be enabled if the password admin or ADMIN is configured. A full factory reset of an appliance that uses a prohibited password will reset the IPMI password and require a password change before the IPMI interface can be reenabled. Other configured passwords will not be changed. Version 8.4.0 is compliant with Civil Code TITLE 1.81.26. Security of Connected Devices, commencing with 1798.91.04. “(a) A manufacturer of a connected device shall equip the device with a reasonable security feature or features …” “… it shall be deemed a reasonable security feature if either of the following requirements are met: (1) The preprogrammed password is unique to each device manufactured. (2) The device contains a security feature that requires a user to generate a new means of authentication before access is granted to the device for the first time.” Display of Available Features The Web UI Features page shows tiles for the features available for this appliance. Tiles for enabled features are marked with a checkmark and are outlined in green. Features introduced in the release of Central Management that you are viewing are labeled New. 10 © 2019 FireEye Release 8.7 Artifacts Column with OS Graph Icons Click i in a tile to view additional information about the feature, including the version in which it was released, the category of security it provides, and any additional requirements. Artifacts Column with OS Graph Icons When you download the current Security Content to your Central Management appliance, icons are displayed in the Artifacts column on the Alerts page. Click an icon to see the associated section, such as Malicious Alerts, OS Change Graph, or OS Change Table. New and Modified APIs l l The System Health API is now supported on Central Management. Use the IOC for an Alert request to retrieve the IOC in XML format for a specific alert. GET https://<address>/wsapis/v2.0.0/openioc?{alert_id=<alert_id> | alert_uuid=<alert_uuid>} For more information, see the FireEye API Reference Guide. © 2019 FireEye 11 Central Management Release Notes 12 What's New © 2019 FireEye Release 8.7 New and Modified APIs Fixed Central Management Issues The following issues were resolved in the Central Management 8.7.0 Release. The relevant issue tracking numbers for each item are included in parentheses. l l l l l l l l l When alerts were purged from a managed FX Series appliance, the Central Management Web UI displayed an empty alerts page after a scan page containing those old alerts were clicked. This issue has been resolved. (CMS-13684) When the analyst user selected a cluster from the Dashboard group drop-down menu, the Web UI page displayed empty. This issue has been resolved. (CMS14731) When the Central Management HA appliance running release 8.6.0 was downgraded to release 8.5.0, the cluster went into a degraded state and node configuration was not synchronized. This issue has been resolved. (CMSHA-1218) A FireEye appliance, with product_type set to Null was added to the Central Management appliance for management. When the appliance was selected from the Alerts page, the error message "500: Server Error Oops! Something went wrong!" occurred. This issue has been resolved. (CMS-13430) When the System Health Request API call was issued, the error message "Your privileges do not allow calling the API code:AUTH004" was displayed. This issue has been resolved. (CMS-13573) In the Search Emails > Processed Emails section of the Central Management Web UI, when a wildcard was used in the Attachment and URL field for the managed Email Security — Server Edition appliance, some search combinations did not work correctly. This issue has been resolved. (CMS-13627) When fenet proxy was configured on the Central Management appliance and then the URL Screenshot link was clicked in the Web UI Alerts page, the error message "Error in processing API request" was displayed. This issue has been resolved. (CMS-14344) On the Central Management appliance, attempts to open a Malware Analysis appliance alert resulted in a fatal error. This issue has been resolved. (CMS-14356) The IOC feed sent to a managed Endpoint Security appliance from the Central Management appliance did not contain the URLs for PHISH.LIVE.DTI.URL. This issue has been resolved. (CMS-14417) © 2019 FireEye 13 Central Management Release Notes l l 14 Fixed Central Management Issues When the managed defense feature was enabled on the Central Management HA cluster, the CMSAPI service was disabled as an unexpected side effect. This issue has been resolved. (CMS-14468) When managed appliance alerts were aggregated, the Central Management appliance displayed an aggregation error : "ERROR: nextval: reached maximum value of sequence signature_attr_details_id_seq." This issue has been resolved. (CMS-14556) © 2019 FireEye Release 8.7 New and Modified APIs Known Central Management Issues The following issues are known in Central Management release 8.7.0. NOTE: The relevant issue tracking numbers for each item are included in parentheses. l l l l l l l l l When the Category drop-down menu is clicked, the Central Management appliance Web UI begins processing for the Supported Feature tab before a category is selected from the menu. (CMS-14725) When an operator logs into the Central Management appliance, the CMS load status is missing from the About > Health Check > System Information section of the Web UI. (CMS-14733) When a user in the Monitor role logs into the Central Management appliance Web UI and clicks the notification (bell) menu, the What to improve detection? notification is missing. (CMS-14751) The Central Management appliance Web UI log intermittently displays a "Failed to load master manifest" warning and an "Error code 14403" error message for managed Network Security and Email Security — Server Edition appliances. (CMS14763) When an analyst logs into the Central Management appliance Web UI, attempts to view the OS Change Details from the Alert > Email > Alert tab result in the log message: "action failed Insufficient authorization to perform action". (CMS-14779) When an analyst logs into the Central Management appliance Web UI, the Clusters with Critically High Utilization widget should not be displayed on the dashboard. (CMS-14798) A Central Management appliance cluster upgrade from release 8.2.0.782612 to release 8.3.1.871507 results in exception 2025 errors. (CMS-14799) When you remove a node from the Central Management appliance Web UI Clusters tab, the node IP address appears twice under the NODE IP. (CMS-14800) When the metadata streaming feaure is enabled on the Web UI, an "Invalid set_ request" message is displayed for a managed Email Security — Server Edition appliance running a release earlier than 8.4.0. (CMS-14801) © 2019 FireEye 15 Central Management Release Notes l l 16 Known Central Management Issues When an alert detail is clicked for a managed Network Security appliance, an MD5 checksum Web infection erroneously appears in the OS Change Graph. (CMS14814) From the Central Management Web UI, when an object or file is submitted for analysis on the managed Malware Analysis appliance, the submission must time out before the user can view the Malware Appliance alert details. (CMS-14821) © 2019 FireEye Technical Support For technical support, contact FireEye through the Support portal: https://csportal.fireeye.com Documentation Documentation for all FireEye products is available on the FireEye Documentation Portal (login required): https://docs.fireeye.com/ © 2019 FireEye 17 FireEye, Inc. | 601 McCarthy Blvd. | Milpitas, CA | 1.408.321.6300 | 1.877.FIREEYE | www.fireeye.com/company/contact-us.html © 2019 FireEye, Inc. All rights reserved. FireEye is a registered trademark of FireEye, Inc. All other brands, products, or service names are or may be trademarks or service marks of their respective owners.