BeyondInsight Installation Guide Version 6.6 – June 2018 Revision/Update Information: June 2018 Software Version: BeyondInsight 6.6 Revision Number: 0 CORPORATE H EADQUARTERS 5090 N. 40th Street Phoenix, AZ 85018 Phone: 1 818-575-4000 COPYRIGHT NOTICE Copyright © 2018 BeyondTrust Software, Inc. All rights reserved. The information contained in this document is subject to change without notice. No part of this document may be photocopied, reproduced or copied or translated in any manner to another language without the prior written consent of BeyondTrust Software. BeyondTrust Software is not liable for errors contained herein or for any direct, indirect, special, incidental or consequential damages, including lost profit or lost data, whether based on warranty, contract, tort, or any other legal theory in connection with the furnishing, performance, or use of this material. All brand names and product names used in this document are trademarks, registered trademarks, or trade names of their respective holders. BeyondTrust Software is not associated with any other vendors or products mentioned in this document. Contents Contents Contents 3 Introduction 6 Documentation for BeyondInsight Contacting Support 6 6 Overview 7 Architectural Review Installation Overview 7 8 Requirements 9 Server Requirements Windows Server 2008 Windows Server 2012 Web Server (IIS) Windows Server 2016 Client Requirements Database Requirements Supported Versions Components to Install Service Accounts Database Permissions Matrix ADOMD.net Requirement Port Requirements BeyondInsight UVM Appliance Password Safe 10 10 11 13 15 15 15 15 15 17 18 18 18 19 19 Installing Retina and BeyondInsight 21 Downloading Product Installers Installing and Configuring BeyondInsight Configuration Wizard Settings Installing Retina 21 21 21 24 Configuring Retina Connections to BeyondInsight 25 Configuring Central Policy Configuring Events Client 25 26 Configuring Analytics and Reporting 27 Verify SQL Report Server Configuration Configuring Analytics and Reporting 27 28 Configuring and Running a Scan 32 Patch Management Module 34 BeyondInsight Installation Guide 3 © 2018. BeyondTrust Software, Inc. Contents Installation Notes Requirements Mixed WSUS Environments Windows Server 2012 Overview Installing WSUS Administration Console Using PowerShell Resolving Internal HTTP 500.19 Error PowerBroker Unix and Linux 34 34 34 35 35 35 37 Requirements Generating a Certificate Exporting the BeyondInsight Server SSL Certificate Configuring Keywords PowerBroker for Windows 37 37 37 38 39 Generating a Certificate Creating an MSI File Configuring PowerBroker for Windows 39 39 39 PowerBroker Identity Services 41 Generating a Certificate Configuring PowerBroker Identity Services 41 41 Running the Software Removal Tool 43 Command Line Syntax 43 Using the BeyondInsight Configuration Tool 44 Changing the Access URL Configuring Session Timeout 45 45 Licensing 47 Upgrading Your License License Expiry 47 47 Configuring Windows Authentication to the Database Changing Database Authentication SQL Server 2012 48 49 Appendix A: Certificates 50 Working with BeyondInsight Certificates eEyeEmsServer Certificate EmsClientCert Certificate Troubleshooting BeyondInsight Certificates Using a Domain PKI for BeyondInsight Communication Prerequisites Requirements Assigning the SSL Web Service Certificate in BeyondInsight BeyondInsight Installation Guide 48 4 50 50 51 53 54 55 55 56 © 2018. BeyondTrust Software, Inc. Contents Configuring a Client Certificate for PowerBroker for Windows Configuring Auto Enrollment 57 58 Appendix B: Permissions 59 Analytics and Reporting SQL Server database access Analytics and Reporting Permissions Permissions Required for BeyondInsight Configuration User Permissions Required for the Web Proxy User Permissions Required for the SSRS Proxy User Permissions Required for the SQL Agent Service Running the Daily Sync Job Appendix C: Event Collectors 62 Overview License Keys Event Collectors Authentication and Encryption High Level Installation Software Install Certificates Exporting the Certificate Importing the EmsClientCert and eEyeEmsServer Certificates Importing the eEyeEmsCA Certificate Confirm Certificates Crypto Key Exporting the Key Importing the Key Windows Authentication BeyondInsight Installation Guide 59 59 59 59 60 60 61 5 62 62 62 62 63 63 65 65 66 67 69 69 69 70 70 © 2018. BeyondTrust Software, Inc. Introduction Introduction This guide provides detailed instructions and procedures for installing BeyondInsight. This section includes the document conventions, list of documentation for the product, and where to get additional product information. Documentation for BeyondInsight The complete BeyondInsight documentation set includes the following: • BeyondInsight Installation Guide • BeyondInsight User Guide • BeyondInsight Analytics and Reporting User Guide • Third Party Integration Guide If you are working with any of the BeyondInsight modules, refer to the product documentation for additional information about that module. Contacting Support For support, go to our Customer Portal then follow the link to the product you need assistance with. The Customer Portal contains information regarding contacting Technical Support by telephone and chat, along with product downloads, product installers, license management, account, latest product releases, product documentation, webcasts and product demos. Telephone Privileged Account Management Support Within Continental United States: 800.234.9072 Outside Continental United States: 818.575.4040 Vulnerability Management Support North/South America: 866.529.2201 | 949.333.1997 + enter access code All other Regions Standard Support: 949.333.1995 + enter access code Platinum Support: 949.333.1996 + enter access code Online http://www.beyondtrust.com/Resources/Support/ BeyondInsight Installation Guide 6 © 2018. BeyondTrust Software, Inc. Overview Overview This guide is designed to lead you through an installation of BeyondInsight. This guide assumes familiarity with Microsoft Server 2008/2012 and Microsoft SQL Server 2008/2012/2014 installations. Architectural Review Having a conceptual understanding of BeyondInsight’s architecture is tremendously valuable before installing and configuring the components. See the following diagram and explanations: BeyondInsight is the web-based console where you will configure and launch vulnerability assessment scans. As a scan completes, a report is automatically generated. Results can be navigated interactively in the console. BeyondInsight does not perform vulnerability scans directly, but sends a request to Retina. Retina Network Security Scanner is the scanning engine that performs all vulnerability assessments. It can run standalone, but when paired with BeyondInsight, scan results are sent securely to the management console to populate the SQL Server database. Analytics & Reporting is an additional web-based interface that provides comprehensive analytical tools and creates reports from collective scan data. It facilitates trending and delta reports, prioritization, anomaly detection, regulatory compliance. Retina Protection Agent provides local scanning capabilities and is generally used where network-based scanning is problematic. For example, mobile users who only connect periodically, or hardened servers that block scan attempts. The RPA coexists with other endpoint solutions, such as McAfee or Symantec, which may already be in place. BeyondInsight Installation Guide 7 © 2018. BeyondTrust Software, Inc. Overview Installation Overview Two software components comprise the solution: • BeyondInsight management console • Retina Network Security Scanner Analytics and Reporting is a supplementary configuration launched from the console and does not require a separate installer. Note: By default, the scanner is installed as a standalone component that, initially, will not recognize the console. Simple configuration steps will be performed that allow the scanner to: • Receive scan job requests from BeyondInsight • Send completed scan results securely back to BeyondInsight BeyondInsight Installation Guide 8 © 2018. BeyondTrust Software, Inc. Requirements Requirements Verifying that prerequisite software and settings are correct is the key to a successful installation. If you receive errors during the installation, first check that prerequisites have been met. The table below generally indicates the minimum software and hardware requirements. See the BeyondTrust Solution Requirements document. Important considerations follow. Minimum requirements are listed here. Work with your BeyondTrust Professional Services team to determine your deployment strategy. Operating System Windows Server 2008 R2 (64-bit only) – latest service pack is required Windows Server 2012 and 2012 R2 (64-bit only) Windows Server 2016 Note: Integration with WSUS on Windows Server 2016 is not supported at this time. Database Microsoft SQL Server 2008 SP2 or later Microsoft SQL Server 2008 R2 SP1 or later Microsoft SQL Server 2012 Microsoft SQL Server 2014 Microsoft SQL Server 2016 Microsoft SQL Standard or Enterprise Editions Only Microsoft SQL Server Reporting Services Microsoft SQL Server Analysis Services Microsoft SQL Server Integration Services Note: SQL Server collation must be set to SQL_Latin1_General_CP1_CI_ AS Processor Intel Dual Core 2.0GHz (or compatible, minimum) Assign two processors when installing Retina and the console on a single virtual machine. This greatly improves performance. Memory 16GB Minimum (Requires x64 OS) Hard Drive 500MB (software install) 40GB (database minimum) Network Network Interface Card (NIC) with TCP/IP enabled Server Requirements Microsoft .NET Framework 3.5 SP1 (Application Server Role, Windows Process Activation Service Support/HTTP Activation) Microsoft .NET Framework 4.5 (Application Server Role, Windows Process Activation Service Support/HTTP Activation) Microsoft Internet Information Server (IIS) 7.0 or later with ASP.Net support (Web Server (IIS) role) Client Requirements Adobe Flash Player 22.0 or later Notes Installation on Domain Controllers or Small Business Servers is not supported. BeyondInsight Installation Guide 9 © 2018. BeyondTrust Software, Inc. Requirements Server Requirements After you configure BeyondInsight, ensure the following IIS roles and Server Roles and Features in Server Manager are set. Note that some features are selected by default. Windows Server 2008 Web Server (IIS) Application Server Download and install the latest version of .NET Framework, 4.5 or higher. To verify, go to Control Panel | Programs | Programs and Features. BeyondInsight Installation Guide 10 © 2018. BeyondTrust Software, Inc. Requirements Windows Server 2012 Web Server (IIS) Verify Server Roles: Application Server Verify Server Roles: Verify Features: BeyondInsight Installation Guide 11 © 2018. BeyondTrust Software, Inc. Requirements BeyondInsight Installation Guide 12 © 2018. BeyondTrust Software, Inc. Requirements Windows Server 2016 Web Server (IIS) Note: Under Performance, only 'Static Content Compression' is required. BeyondInsight Installation Guide 13 © 2018. BeyondTrust Software, Inc. Requirements Note: Management Service is optional. Application Server BeyondInsight Installation Guide 14 © 2018. BeyondTrust Software, Inc. Requirements Features Client Requirements BeyondInsight and Analytics & Reporting use a browser-based interface. The client is a web browser. Therefore, the requirements apply to any machine, including the machine where BeyondInsight is installed, using a browser to access BeyondInsight or Analytics and Reporting consoles. Database Requirements • Install the SQL Server database before installing the console. • Install SQL Server while logged on as a domain or local administrator. Supported Versions The following Microsoft SQL Server versions are supported: • SQL Server 2008 and 2008 R2 • SQL Server 2012 and 2012 R2 • SQL Server 2014 • SQL Server 2016 Note: Microsoft SQL Server Express is not supported and will cause installation errors. Components to Install • Database Engine Services • Analysis Services • Reporting and Integration Services • SQL Server Management Studio Service Accounts • SQL Server 2008: Use the NT AUTHORITY\SYSTEM account for all services where you are required to set it. BeyondInsight Installation Guide 15 © 2018. BeyondTrust Software, Inc. Requirements • SQL Server 2012, 2014: Accept the default service accounts. SQL Server 2012 and 2014 creates individual accounts for each service. • Set SQL Server Agent to start ‘Automatic’ (default is ‘Manual’). • Select Windows authentication mode. Note: • You can select Mixed Mode authentication, if desired, and provide the ‘sa’ account password, however, this is not necessary when SQL Server resides on the same machine as the console. Select Add Current User when setting the SQL Server Administrator and Analysis Services Administrator. BeyondInsight Installation Guide 16 © 2018. BeyondTrust Software, Inc. Requirements Database Permissions Matrix Note: Note: Windows Authentication is not supported on remote standalone systems. UVM appliances and software must be on the domain or a trusted domain in a forest. REM3Admins is a custom role created by the installer. SQL Server 2008 + SQL Authentication (SQL Local or SQL Remote) SQL 2012+ / SQL 2014+ / SQL 2016 Assign SQL Server account the role: q sysadmin • • Windows Authentication (SQL Local) NT AUTHORITY\SYSTEM is assigned sysadmin server role. Assign NT AUTHORITY\SYSTEM the role: q sysadmin • NT AUTHORITY\NETWORK SERVICE exists as a Login in SQL Server. • • On the BeyondInsight database, assign these roles to the NT AUTHORITY\NETWORK SERVICE account: Add NT AUTHORITY\NETWORK SERVICE as a Login account in SQL Server. • On the BeyondInsight database, assign these roles to the NT AUTHORITY\NETWORK SERVICE account: q db_owner q REM3Admins q db_owner q REM3Admins In SQL Server, create a local Windows group and add the group to the SQL Server instance. Windows Authentication On the BeyondInsight database, assign these roles to the account: (SQL Remote - SQL Server q db_owner and BeyondInsight are on q REM3Admins the same domain or in Add each BeyondInsight machine to this local group, including any Event Collector trusted domains of a machines or Password Safe worker node machines, in the format: forest) 'Domain\MachineName1$', 'Domain\MachineName2$' Setting Server Role on NT AUTHORITY\SYSTEM Applies to SQL Server 2012, 2014, and 2016. 1. 2. In SQL Server 2012 Management Studio, go to Security | Logins | <right-click> NT AUTHORITY\SYSTEM | Properties. Select Server Roles |sysadmin, then click OK. BeyondInsight Installation Guide 17 © 2018. BeyondTrust Software, Inc. Requirements ADOMD.net Requirement The BeyondInsight web server uses SQL ADOMD.net components to communicate with the SQL Analysis Services cube. In cases where the web server does not have SQL installed, you will need to manually install the ADOMD.net components. The SQL_AS_ADOMD.msi file is included with BeyondInsight and can be found in the “Support” folder. After installing the ADOMD.net components you may need to restart IIS. Port Requirements BeyondInsight Function Database connectivity Components Port Console to the database, 1433 BeyondInsight Reporting to the database Event Collector Retina and Retina Protection agent to BeyondInsight RPA Central Policy Endpoint to the console RNSS Central Policy Scanner to the console Update Servers SyncIt or EUS to BeyondTrust server 443 or 80 Client Browser User to BeyondInsight or BeyondInsight Reporting 443 or 80 PowerBroker for Windows Connector to Web services 443 Version 1 – 2000 Version 2 – 443 Version 1 – 10001 Version 2 – 443 Android Mobile Connector Android agents to the console BeyondInsight Installation Guide 21690 18 443 © 2018. BeyondTrust Software, Inc. Requirements UVM Appliance Traffic Port Database Connectivity: BeyondInsight to SQL Server, BeyondInsight Analytics and Reporting to SQL Server 1433 Event Collector: Retina, PowerBroker Endpoint Protection Platform, or Retina Protection Agent to BeyondInsight 21690 Mobile Agents and PowerBroker Windows Connector to Web Services, Update Servers SyncIT or EUS to BeyondTrust 443 Android Mobile Connector, Android Agents to BeyondInsight 21691 PowerBroker Endpoint Protection Platform or Retina Protection Agent Central Policy Endpoint to BeyondInsight V1 – 2000, V2 - 443 V1 - 10001, Retina Central Policy, Retina to BeyondInsight V2 - 443 Update Servers SyncIT or EUS to BeyondTrust, Client Browser User to BeyondInsight or BeyondInsight Reporting 443 or 80 BeyondSaaS Job Results 8080 Windows Passwords: Password Safe Service to Client 135, 139, 445, 389 UNIX, Linux, Other: Password Safe Service to Client 22 MS SQL 1433, Database: Password Safe Service to Client Oracle 1521 RDP Client and Target Proxy Session Monitoring 4489 / 3389 SSH Client and Target Proxy Session Monitoring 4422 / 22 High Availability BeyondInsight HA 443, 5022 Notifications (email): SMITE 25 Appliance Discovery Tool 4069 Password Safe Functionality Service ---> Protocol User Enumeration nb-ssn| ms-ds 139|445* TCP Hardware Enumeration nb-ssn| ms-ds 139|445* TCP Requirement/Notes System Discovery BeyondInsight Installation Guide 19 WMI Service running on target © 2018. BeyondTrust Software, Inc. Requirements Remote Registry service running on target Software Enumeration nb-ssn| ms-ds 139|445* TCP Local Scan Services ms-ds 445 TCP Windows Password Change adsi-ldap 389 TCP ms-ds (445/TCP) is used as a fallback Windows Update/Restart Services wmi 135 TCP WMI Service running on target Active Directory Password Change adsi-ldap 389 TCP ms-ds (445/TCP) is used as a fallback User and Computer kerberos Authentication, Forest Level Trusts 88 TCP and UDP Unix/Linux/OS X ssh 22 TCP Oracle oracle-listener 1521 TCP MS SQL Server netlib 1433 TCP HP ILO ssh 22 TCP Dell DRAC ssh 22 TCP Remote Desktop rdp 3389 TCP SSH ssh 22 TCP Mail Server Integration smtp 25 TCP AD Integration idap 389 TCP Backup smb 445 TCP Time Protocol ntp 123 TCP HA Replication (pair) sql-mirroring|https 5022|443 TCP Password Change Session Management Appliance BeyondInsight Installation Guide 20 © 2018. BeyondTrust Software, Inc. Installing Retina and BeyondInsight Installing Retina and BeyondInsight Downloading Product Installers After BeyondTrust Sales generates a customer license, you will receive an email that includes a link to download product installers. Installing and Configuring BeyondInsight Installing the console is a two-step process: • Installing the software First, run the downloaded BeyondInsight_x.x.x installer, enter the console license key (serial number) and follow the default prompts. Supply the License Registration information when prompted. Note: • If you already installed Retina, the License Registration information will automatically populate. Running through the configuration After the software is installed, the BeyondInsight Configuration Wizard automatically starts. Note: Required audit upgrades are downloaded after the installation is complete. Audit upgrades take several minutes to complete, or longer depending on the number of pending updates. Configuration Wizard Settings Database page: Configure the database. Accept the default (local) SQL Server if the SQL Server is on the same machine and will use the logged on Windows credentials to connect. Otherwise, click the Advanced button to enter SQL Server information, including the SQL Server server name, database name, and database credentials. You can select an existing BeyondInsight database. Note that the BeyondInsight database version must match the installer version. Otherwise, an error message is displayed indicating the database version and installer version do not match. BeyondInsight Installation Guide 21 © 2018. BeyondTrust Software, Inc. Installing Retina and BeyondInsight Web Site Information page: Informs you that the console will be implemented as the default IIS website. Agent Password page: The Agent Password is used to configure the connection between the scanner and the console, to be performed later. Agents need a password to retrieve Central Policy information from the console. The password is also used when importing certificates using the Events Client Configuration tool. The password must match the machine’s password composition requirements. BeyondInsight Installation Guide 22 © 2018. BeyondTrust Software, Inc. Installing Retina and BeyondInsight Event Server Information page: Provides the option to configure SNMP. Email Information page: Allows you to provide a default SMTP mail server and account. This may be used, for example, to automatically email a report after vulnerability scans complete. However, the SMTP mail server and email address you provide are not verified by the configuration wizard. If you do not know the information you can enter fake data as shown below. Administrator Password page: Creates an initial login account to the console with full rights. This is NOT the local machine administrator or domain administrator account. The console administrator password must match the machine’s password composition requirements. BeyondInsight Installation Guide 23 © 2018. BeyondTrust Software, Inc. Installing Retina and BeyondInsight Ready to Apply Settings and BeyondInsight Configuration pages: After entering your information, the database will be created in SQL Server. Expect this process to take about 7-10 minutes. Once completed, and you select Finish, the management console starts in your default browser. You can log on with the Administrator account and password created earlier. Installing Retina To install Retina, run the downloaded Retina_x.xx.x installer, enter the license key (serial number) and follow the default prompts. After supplying the License Registration information, the auto-update process runs, contacting BeyondTrust servers; this can take several minutes. Once complete, Retina will automatically start. For more information, refer to the Retina Installation Guide. BeyondInsight Installation Guide 24 © 2018. BeyondTrust Software, Inc. Configuring Retina Connections to BeyondInsight Configuring Retina Connections to BeyondInsight Now that the scanner and the console are installed, they must be configured to work together by configuring both Central Policy and Events Client. Configuring Central Policy Central Policy enables Retina to pull scan requests from, and send scan status updates to, the console. To configure Central Policy: 1. 2. 3. Run Retina. Select Tools > Options. Select the Event Routing tab and then select Enable Event Routing to Centralized Console. 4. Select the Management tab, select Enable Central Policy and enter the required information. – Central Policy Server: Name or IP address of the machine where the console is installed. You can use ‘localhost’ if the scanner and the console reside on the same machine. – Password: Use the Agent Password that was defined during the previous BeyondInsight configuration steps. For example, ‘Retina123’. BeyondInsight Installation Guide 25 © 2018. BeyondTrust Software, Inc. Configuring Retina Connections to BeyondInsight – 5. Agent Name: Enter a name of your choice, which will identify the scanner in the console. Click the Test button. In a few seconds you should receive a confirmation message that the connection from the scanner to the BeyondInsight console was successful. If you receive a message that “The connection was refused by the specified server”, verify that the NT AUTHORITY\SYSTEM account is assigned the sysadmin server role as previously mentioned. Configuring Events Client The Events Client enables Retina to securely send completed scan data to the management console, where it will be extracted to populate the database. To configure the Events Client: 1. In Windows 2008: Start | All Programs | BeyondTrust| Tools |Event Client Configuration. In Windows 2012: Start | Apps | BeyondTrust| Events Client Configuration. 2. Run through the Events Client Installation wizard, accepting default values. At the Select a Client Certificate page, See "Appendix A: Certificates" 3. When prompted for a password, enter the Agent Password defined during the previous configuration steps. For example, ‘Retina123’. 4. At the Test Connection page, click Next, wait a few seconds, and verify that a test message was successfully sent to the Application Bus. After configuring Central Policy and Events Client, you are ready to run vulnerability scans and view the corresponding report. Next, you can set up Analytics and Reporting. BeyondInsight Installation Guide 26 © 2018. BeyondTrust Software, Inc. Configuring Analytics and Reporting Configuring Analytics and Reporting Analytics and Reporting requires initial configuration before it can be used. The configuration assumes that SQL Reporting, Analysis and Integration services are installed and working as per the prerequisites. See Database Requirements. Before configuring Analytics and Reporting, verify that the SQL Report Server is working properly. Verify SQL Report Server Configuration 1. On Windows 2008: Start | All Programs | Microsoft SQL Server 2008 R2 | Configuration Tools | Reporting Services Configuration Manager On Windows 2012: Start | Apps | Microsoft SQL Server 2014 (or 2012) | SQL Server 2014 Reporting Services Configuration Manager 2. After connecting, select Web Service URL, then select the Report Server Web Service URL link and verify the confirmation web page. 3. Select Report manager URL, then select the Report Manager Site Identification link and verify success. BeyondInsight Installation Guide 27 © 2018. BeyondTrust Software, Inc. Configuring Analytics and Reporting Configuring Analytics and Reporting For details on the permissions needed to use Analytics and Reporting, see Appendix B: Permissions. 1. 2. Log on to the console and select Analytics and Reporting. On the logon page, enter the same administrator/password used to log on to the console. Once logged on, select Configure Now. 3. Installation Credentials: Enter the machine or domain administrator credentials. BeyondInsight Installation Guide 28 © 2018. BeyondTrust Software, Inc. Configuring Analytics and Reporting 4. SQL Server and SQL Server Analysis Services: Enter the Machine Name. 5. SQL Server Reporting Services (SSRS): Enter the Web Service URL, i.e., http://<machine name>:80/ReportServer. BeyondInsight Installation Guide 29 © 2018. BeyondTrust Software, Inc. Configuring Analytics and Reporting 6. SQL Server Agent: The SQLSERVERAGENT service account created during the SQL Server 2012/2014 installation will not have the necessary write permissions to the BeyondInsightReporting database. 7. Web Service Credentials: User name and password should automatically populate, just select Deploy. 8. Deployment Progress: Deployment progress is shown while the database BeyondInsightReporting is created. Verify success, then select Finish. Deployment Complete: Once the deployment completes, select the option to synchronize data now. This critical process synchronizes scan results from the RetinaCSDatabase, which was created during the management console configuration, with the newly created BeyondInsightReporting database. By default, synchronization occurs every day at 12:00 am (See Step 5: SQL Server Agent), but can also be run manually if desired. It takes several minutes to complete. 9. 10. Verify successful synchronization by selecting the SQL Server Agent Jobs tab and then Refresh. Be mindful NOT to select the browser’s refresh button since that will reload the page and you will have to log on again. BeyondInsight Installation Guide 30 © 2018. BeyondTrust Software, Inc. Configuring Analytics and Reporting BeyondInsight Installation Guide 31 © 2018. BeyondTrust Software, Inc. Configuring and Running a Scan Configuring and Running a Scan For your first scan, it is helpful to only scan the local machine since this will verify communication between Retina and the console without introducing other variables such as firewall settings or network conditions that may impede scanning external targets. Configuring and running a discovery scan can be performed with a few simple steps: 1. In the management console, navigate to the Assets tab, then click Scan. 2. Click Discovery Scan. The Management Report Templates contain the specific audits that will be executed on the target machines. Click Scan. 3. 4. Enter the target machines to scan. You can use a single IP address, an IP address range, CIDR notation or named host(s). 5. 6. Enter credentials for the target machine(s). Click Start Scan. BeyondInsight Installation Guide 32 © 2018. BeyondTrust Software, Inc. Configuring and Running a Scan 7. Select the Jobs tab to see scan progress. When the scan completes, select the Reports tab, and then double-click the completed job to open the report. BeyondInsight Installation Guide 33 © 2018. BeyondTrust Software, Inc. Patch Management Module Patch Management Module For more information about the Patch Management module requirements, refer to the BeyondInsight User Guide. Patch Management Module Requirements BeyondInsight management console 2.0 or later Installation Notes • Ensure that your license includes the Patch Management module feature before proceeding with the install. Contact your BeyondTrust representative. • Installing the Patch Management module on domain controllers or Small Business Servers is not supported. • BITS and Microsoft WSUS Client must be enabled on all clients. Requirements Windows Server 2012 WSUS Installation Requirements • IIS • Windows PowerShell • .NET Framework 4.5 Features • Microsoft Report View Redistributable 2008 http://www.microsoft.com/enus/download/details.aspx?id=3841 Mixed WSUS Environments Review this section if you plan to use the Patch Management module or the SCCM feature. The fundamental challenge with mixed scenarios with different operating systems has to do with the WSUS API version. To support local publishing activities (basically anything involving putting a third-party update into the WSUS database), both the WSUS Console version of the BeyondInsight server and the version of WSUS installed on the WSUS server must be same. Otherwise, the Third Party Patch Service returns the following error message and no Third Party Updates will be available for approval and installation. Message: Failed to publish packageName. Publishing operation failed because the console and remote server versions do not match. Currently there are three supported production versions of WSUS that can contribute to this situation. • WSUS v3.2 - runs on Windows Server 2003, 2008, and 2008R2 • WSUS v6.2 - runs on Windows Server 2012 • WSUS v6.3 - runs on Windows Server 2012 R2 Resolution Ensure all WSUS servers and BeyondInsight servers have the same WSUS patches installed. To check the WSUS patches installed on a server: BeyondInsight Installation Guide 34 © 2018. BeyondTrust Software, Inc. Patch Management Module 1. 2. 3. Log on to the server you need to check. If you are running Windows Server 2003, find the patches in Add or Remove Programs: a. Open Control Panel > Add or Remove Programs. b. At the top of the window, select Show updates. c. Scroll to Windows Server Update Services. d. Note the KB numbers (in parentheses) at the end of each "Hotfix" entry. If you are running Windows Server 2008, find the patches in Programs and Features: a. Open Control Panel > Programs and Features. b. In the left pane, click View installed updates. c. Scroll to Windows Server Update Services. d. Note the KB numbers (in parentheses) at the end of each entry. Windows Server 2012 Overview Review the following articles to learn more about how Windows Server 2012 and WSUS work together. • WSUS on Windows Server 2012 Overview http://technet.microsoft.com/en-us/library/hh852345.aspx • Deploy Windows Server Update Services in Your Organization http://technet.microsoft.com/en-us/library/hh852340.aspx • Difference between WSUS 3.2 and WSUS 6.0 http://social.technet.microsoft.com/Forums/windowsserver/en-US/16d5f9bb-98cc-4285-a88652fb2b99531e/difference-between-wsus-30-and-wsus-40 Installing WSUS Administration Console Using PowerShell 1. 2. Open a Windows PowerShell console as an administrator. Execute the following command: Install-WindowsFeature -Name UpdateServices-Ui This command installs the console only and will not run a post-install task. Resolving Internal HTTP 500.19 Error If Windows Server 2012, IIS, WSUS, and BeyondInsight are installed on the same server, and HTTP Error 500.19 occurs when you try to log on to BeyondInsight. Windows Server 2012 is a 64-bit only Operating System. When WSUS is installed, suscomp.dll is defined globally and loaded in every application pool. The BeyondInsight application pool is 32-bit and will result in the error when the 64-bit suscomp.dll attempts to load. You can use one of the following ways to fix the issue. Option 1 1. Back up IIS. 2. Open IIS Manager. 3. Click the server module node in the tree and select Modules. 4. Right-click DynamicCompressionModule and select Unlock. 5. Right-click on StaticCompressionModule and select Unlock. BeyondInsight Installation Guide 35 © 2018. BeyondTrust Software, Inc. Patch Management Module 6. 7. 8. 9. Open the Default Web Site, and then open Modules. Right-click DynamicCompressionModules and select Remove. Right-click StaticCompressionModule and select Remove. Do IISRESET from an elevated/administrative command prompt. Option 2 Install BeyondInsight and WSUS on separate Windows Server 2012 servers. BeyondInsight Installation Guide 36 © 2018. BeyondTrust Software, Inc. PowerBroker Unix and Linux PowerBroker Unix and Linux Use BeyondInsight to manage PowerBroker for Unix & Linux event log records. Configure BeyondInsight and PowerBroker for Unix & Linux to work together to send the event logs to the BeyondInsight management console. This chapter provides information on preparing PowerBroker Servers to work with BeyondInsight. Refer to the PowerBroker Servers product documentation for specific details on the keywords that must be configured. Requirements • BeyondInsight version 4.5 or later • PowerBroker for Unix & Linux version 7.5 or later Generating a Certificate 1. 2. 3. 4. 5. 6. 7. 8. Open the BeyondInsight Configuration Tool and select Certificate Management. Select Export certificate. Select Client certificate from the list. Enter a password for the export file and provide the destination in the Path field. Click OK to export the certificate as a PKCS#12 file (with a .pfx extension). Using BeyondTrust FIPS Object Module for OpenSSL, convert the certificate from PKCS#12 format (*.pfx file) to PEM format (*.pem): openssl pkcs12 –clcerts –in <full_pathname_of_pfx_to_convert> out <full_pathname_of_target_pem> –nodes Securely copy the certificate to the PowerBroker Servers Unix & Linux Master and Logserver hosts. In the PBUL settings file, assign the path and filename of this certificate to the keyword sslrcscertfile. Exporting the BeyondInsight Server SSL Certificate 1. 2. Open the Windows Certificate Manager (certmgr.msc) and expand the Trusted Root Certification Authorities folder. In the details pane, select the BeyondInsight server SSL certificate in the Issued To field. The certificate name contains the hostname of the BeyondInsight server and the text “eEye EMS CA”. Example: RCS hostname is LA-RETINACS-01: The certificate’s name is “LA-RETINACS-01 eEye EMS CA” 3. 4. 5. From the Action menu, select All Tasks > Export. In the Certificate Export Wizard: a. Select No when asked to export the private key, and then click Next. b. Select the DER encoded binary X.509 (*.CER) format, and then click Next. c. Provide the target destination of the certificate, and then click Next. d. Confirm the settings, and then click Finish to export the certificate. Using BeyondTrust FIPS Object Module for OpenSSL, convert the certificate from DER format (*.cer) to PEM format (*.pem) using this command: openssl x509 -inform der -in BeyondInsight Installation Guide 37 © 2018. BeyondTrust Software, Inc. PowerBroker Unix and Linux 6. 7. <full_pathname_of_cer_to_convert> -out <full_pathname_of_target_pem> Securely copy the certificate to the PBUL Master and Logserver hosts. In the PBUL settings file, assign the path and filename of this certificate to the keyword sslrcscafile. For more information about importing the certificates, refer to “Solr Install” in the PowerBroker for Unix & Linux Installation Guide. Configuring Keywords If you have not done so during the for Unix & Linux installation, set the following keywords in pb.settings on the Master and Log server hosts: • rcshost • rcswebsvcport • sslrcscertfile • sslrcscafile • rcseventstorefile For a complete list of keywords that must be configured, refer to the PowerBroker for Unix & Linux product documentation. BeyondInsight Installation Guide 38 © 2018. BeyondTrust Software, Inc. PowerBroker for Windows PowerBroker for Windows To configure PowerBroker for Windows to forward events to BeyondInsight, you must follow the procedures in this section. Ensure that you have the appropriate license key for BeyondInsight. Before proceeding, ensure all PowerBroker for Windows components and BeyondInsight are installed. Generating a Certificate Generate a client certificate using the BeyondInsight Configuration tool. Certificates must be deployed to any asset where you are capturing events with PowerBroker for Windows. After you generate a certificate, you can create an MSI. You can then set up a GPO with the MSI and deploy the certificate to your PowerBroker assets. Note: Do not generate a client certificate if there is one created for either PowerBroker Endpoint Protection Platform or for Retina Network Security Scanner. You can use the existing client certificate for your PowerBroker for Windows assets. To generate a certificate: 1. 2. 3. 4. Run the configuration tool, and then click Certificate Management. Select Generate Certificate, and then select Client Certificate from the Certificate type menu. Enter a password. Click OK. Creating an MSI File To create an MSI file: 1. Run the BeyondInsight Configuration tool. 2. Click Generate Certificate msi. The certinstaller.msi file is created in the following directory: C:\Program Files (x86)\eEye Digital Security\Retina CS\Utilities\msi Configuring PowerBroker for Windows Install the PowerBroker for Windows components. For more information, refer to the PowerBroker Installation Guide. To configure PowerBroker for Windows: 1. 2. Run the Group Policy Management Editor. Go to the Management folder in the Administrative Templates section. BeyondInsight Installation Guide 39 © 2018. BeyondTrust Software, Inc. PowerBroker for Windows 3. Set the following options: Table 2. Management Settings for BeyondInsight Integration Setting Log events to BeyondInsight Enable Asynchronous BeyondInsight Event Logging Configure the BeyondInsight Certificate Name Configure the BeyondInsight heartbeat interval Configure BeyondInsight to Store XML Events on Failure Configure the BeyondInsight Web Service URL Description Activates event forwarding to BeyondInsight. Sends event logs to the System event log when BeyondInsight cannot process the events. Sets the BeyondInsight certificate name, eEyeEmsClient. Enter the interval in minutes. The default interval is every 360 minutes (6 hours). Configure a regular interval to send heartbeat events to ensure there is a connection between PowerBroker and BeyondInsight. In addition to the usual events, when configured to send events to BeyondInsight, a heartbeat event will also be sent (event ID 28701). Create a path for the event data XML file when the file cannot be sent to BeyondInsight. Enter the URL for the BeyondInsight web service. Follow the format: https://myserver/EventService/Service.svc Enter a workgroup name. Configure the PowerBroker workgroup name for BeyondInsight A workgroup name is needed for asset matching in BeyondInsight. Enable BeyondInsight Trace Logging BeyondInsight Installation Guide Enable to create a trace log if events are not flowing into BeyondInsight. 40 © 2018. BeyondTrust Software, Inc. PowerBroker Identity Services PowerBroker Identity Services To configure PowerBroker Identity Services to forward events to BeyondInsight, you must follow the procedures in this section. Ensure that you have the appropriate license key for BeyondInsight. Before proceeding, ensure all PowerBroker Identity Services components and BeyondInsight are installed. Generating a Certificate Generate a client certificate using the BeyondInsight Configuration tool. To generate a certificate: 1. 2. 3. 4. Run the configuration tool, and then click Certificate Management. Select Generate Certificate, and then select Client Certificate from the Certificate type menu. Enter a password. Click OK. Configuring PowerBroker Identity Services You must configure settings from the PowerBroker Identity Services server. To configure: 1. 2. 3. 4. 5. 6. Run the DBUtilities tool. Select the Enable BeyondInsight check box. Enter the URL to the BeyondInsight server. Enter the name of the client certificate generated earlier. Optionally, create a workgroup name. A workgroup name can be used as a unique identifier. Select the Validate client certificate check box, and then click Test Connection to ensure the connection between the servers works properly. BeyondInsight Installation Guide 41 © 2018. BeyondTrust Software, Inc. PowerBroker Identity Services BeyondInsight Installation Guide 42 © 2018. BeyondTrust Software, Inc. Running the Software Removal Tool Running the Software Removal Tool The BeyondTrust Software Removal Tool (SRT) is a standalone application that you can use to uninstall third-party security programs. You must run the SRT on the computer where the applications are installed. You can remove the following antivirus applications: Symantec, McAfee, AVG Technologies, ESET, NOD32, TrendMicro, CA eTrust, Kaspersky, Sophos, WebRoot, AdAware, Malware bytes, Spybot, and ZoneAlarm. Alternatively, you can uninstall applications when you are deploying Retina Protection Agents using BeyondInsight. For more information, refer to the BeyondInsight User Guide. Command Line Syntax /guid -pcode product_code -upar "/norestart /qn" where product_code is the MSI product code of the software that you want to remove. You can also use the following optional commands: /logfile the name (or the entire path) of the log file /password some antivirus products require a password to uninstall (for example, Kaspersky). /restart specifies if the machine will be restarted after completely uninstalling all antivirus products. Possible values: 0 - no restart 1 - restart BeyondInsight Installation Guide 43 © 2018. BeyondTrust Software, Inc. Using the BeyondInsight Configuration Tool Using the BeyondInsight Configuration Tool After you initially configure BeyondInsight, you can change settings using the BeyondInsight Configuration Tool. The options configured during installation are described here, Configuration Wizard Settings. Note that you can turn on SSL settings for Active Directory queries (Authentication node). You can use SSL when creating Active Directory queries or creating Active Directory user groups in the console. For more information, refer to the BeyondInsight User Guide User Guide. Additional Configuration Settings Test Connection Click to test the connection to the SQL Server database. Create Database Select to create a database. Upgrade Database Use this feature to upgrade your database. Manage License Use the License Manager to update your license or transfer the license (remove the license from the installation computer and move to another computer). Certificate Management Certificates are used by the Events Client component to ensure secure data transmission. Generate certificate and export the certificate to a preferred location. The certificate password must be the same as the Central Policy password. Create an SSL certificate to create a secure connection to IIS. Install SSL Certificate The certificate is not generated by a trusted certificate authority. An invalid certificate message is displayed to browsers connected to IIS. Enable Debug Logging Use this feature when troubleshooting with the BeyondTrust support team. Stop and Start Services Select to start and stop the BeyondInsight services. BeyondInsight Installation Guide 44 © 2018. BeyondTrust Software, Inc. Using the BeyondInsight Configuration Tool Sync Benchmarks Synchronizes the benchmark templates that reside in the database with the templates available on the server. Light writeback is a feature used by the Patch Management module. This ensures that information returned to the Patch Management module indicates that Disable Light Writebacks patches are deployed and items are no longer vulnerable. If you are not using the Patch Management module, you can turn off light writebacks. Create an MSI file that contains a client certificate. Generate Certificate msi You can then set up a GPO with the MSI and deploy the certificate to your PowerBroker assets. Generate Certificate Zip Used with PowerBroker for Unix & Linux Solr installations. Refer to the PowerBroker for Unix & Linux Installation Guide. Import Certificates Used with PowerBroker for Unix & Linux Solr installations. Refer to the PowerBroker for Unix & Linux Installation Guide. Grant Permissions Grants permissions to all stored procedures in the schema so that services and web services can run all stored procedures. Click the link to disable authentication. When set to Disabled, SSL client certificates will be ignored. Client Authentication Click the link again to set to Enabled. SSL authentication is now turned on with the Require setting selected (rather than the Accept setting). Go to the SSL Settings in IIS for the BeyondInsight server to confirm the settings. For environments where there are multiple console installations, you can turn off services to save resources. Click the link to Disabled, in this case. Management Console For example, this scenario might apply to your environment if you are running Password Safe and would like to deploy more than one console. You would not need the services running on the secondary consoles. This setting applies to software installations not hardware appliance installations. Changing the Access URL You can change the default BeyondInsight web site URL. The default access URL is https://<server name>/WebConsole. To change the URL: 1. 2. 3. Start the Configuration tool. Scroll to Web Site Information. Change the URL. Ensure the web site address is prefixed with https:// 4. Click Apply. Configuring Session Timeout A user can remain logged on to the console while inactive for a maximum length of 20 minutes. You can change this value using the Configuration tool. BeyondInsight Installation Guide 45 © 2018. BeyondTrust Software, Inc. Using the BeyondInsight Configuration Tool To change the setting: 1. 2. 3. 4. Start the Configuration tool. Scroll to Web Site Information. Change the session timeout value. Click Apply. BeyondInsight Installation Guide 46 © 2018. BeyondTrust Software, Inc. Licensing Licensing Upgrading Your License Use the BeyondInsight Configuration tool to update your license. You need to upgrade your license to extend your license or to extend the asset count purchased (for example, 500 assets to 1 000 assets). To upgrade your license: 1. 2. 3. 4. 5. 6. Select Start > All Programs > BeyondTrust > BeyondInsight > BeyondInsight Configuration. Click Manage License. On the License Management page, select Update License and click Next. Enter the serial number and click Next. Click Finish. Click Apply to close the BeyondInsight Configuration tool. License Expiry You can continue to log on to the console after the license key expires. However, product updates are no longer provided. BeyondInsight Installation Guide 47 © 2018. BeyondTrust Software, Inc. Configuring Windows Authentication to the Database Configuring Windows Authentication to the Database Windows authentication is recommended for database access. Security best practice for PCI DSS compliance is to use Windows authentication. For more information, see Database Permissions Matrix. Changing Database Authentication Use the following procedure as a guide to setting up Windows authentication on your SQL Server database. To change database authentication to Windows: 1. 2. Log on to SQL Server. Create a SQL Server login. 3. After the login is created, go to the login properties for the new login, and create a user mapping to the BeyondInsight database and the REM3Admins role. BeyondInsight Installation Guide 48 © 2018. BeyondTrust Software, Inc. Configuring Windows Authentication to the Database SQL Server 2012 If you are using SQL Server 2012, note that the NT AUTHORITY\NETWORK SERVICE account is not created by default. This account is required if you want to use Windows authentication. (This account exists by default on SQL Server 2008 R2). The Application Pool runs as NT AUTHORITY\NETWORK SERVICE. For remote configurations, SQL Server uses the Domain\MachineName$. For same server configurations, SQL Server uses the NT AUTHORITY\NETWORK SERVICE account. In an environment where SQL Server 2012 and BeyondInsight are installed on the same server, you must create the NT AUTHORITY\NETWORK SERVICE account in SQL Server before changing the authentication mode. Permissions assigned on the BeyondInsight database must include: db_owner and REM3Admins (a custom role created by the installer). The BeyondInsight Manager Engine service runs as local system. When SQL Server is local to the BeyondInsight installation grant the same permission to NT AUTHORITY\SYSTEM account. If SQL Server and BeyondInsight are not on the same server, then the default Windows permissions apply. BeyondInsight Installation Guide 49 © 2018. BeyondTrust Software, Inc. Appendix A: Certificates Appendix A: Certificates Certificates are used for secure communication between agents and BeyondInsight. There are two types of certificates used with BeyondInsight and agents: • SSL certificate – Required to encrypt the communication • Client certificate – Required to authenticate a client You can use BeyondInsight certificates or create custom certificates. You can use the BeyondInsight Configuration tool to create certificates. Working with BeyondInsight Certificates The following certificates are used for communication between BeyondTrust solutions and BeyondInsight: • eEyeEmsCA - Certification Authority (CA) certificate The CA certificate generates and validates client and server certificates, and is located on both agent and server in the Trusted Root Certification Authorities in the Local Machine store. • EmsClientCert - Client authentication certificate • eEyeEmsServer - Server authentication certificate When connecting to the BeyondInsight Web Service (for example, PowerBroker for Windows connecting to the Event Service), the EmsClientCert is used to authenticate the client and the SSL certificate is used to encrypt the data. This prevents anonymous connections to the services. Typically, a Certification Authority (CA) such as VeriSign validates anonymous clients. With BeyondInsight, a self-signed CA is created and distributed with the client certificate. BeyondInsight can then work in a variety of environments especially where network connectivity is a problem. This avoids the need to register each system instance with an online CA. Internally, each client certificate contains a private-public key pair. During the SSL handshake the server requests the client certificate. The client authenticates the certificate before initiating the connection and the server again validates when it is received. eEyeEmsServer Certificate Install the eEyeEmsServer certificate on the server in the Local Machine Store, under the Personal Store. To verify that the certificate is valid, double-click the certificate. The following screen capture shows a valid certificate. BeyondInsight Installation Guide 50 © 2018. BeyondTrust Software, Inc. Appendix A: Certificates EmsClientCert Certificate The EmsClientCert certificate is used for the following purposes: • Agent<->Server communications during deployments. Only applies to PowerBroker Endpoint Protection Platform agent deployments. • Agent<->Server communications when sending/receiving events. The certificate is required to send events to BeyondInsight and must be exported from the server and then imported on the agent. Exporting the EmsClientCert Certificate 1. 2. Open the BeyondInsight Configuration Tool. Click the Certificate Management link. BeyondInsight Installation Guide 51 © 2018. BeyondTrust Software, Inc. Appendix A: Certificates 3. 4. 5. 6. Select Export certificate. Select Client Certificate from the Certificate type list. Enter a chosen password and a matching confirmation password. It is recommended to use the existing BeyondInsight Central Policy password. Provide a Path: a. Click the ... button and navigate to your desired location. b. Enter a File name and select "Certifcate files (*.pfx)" as the Save as type. It is recommended to name the certificate “eEyeEmsClient.pfx”. c. Click Save. d. Verify the path has been filled in correctly and then click OK. BeyondInsight Installation Guide 52 © 2018. BeyondTrust Software, Inc. Appendix A: Certificates Troubleshooting BeyondInsight Certificates When troubleshooting certificate issues, check the following: • Is the eEyeEmsCA certificate expired? • Does the certificates store have more than one version of the eEyeEmsCA certificate? • Does the eEyeEmsCA certificate have the correct usage identifiers in place? Use the following screen capture as a guide. • Does eEyeEmsCA exist on the agent and the server? Ensure the certificate on the agent has the same serial number as the certificate on the BeyondInsight server. To view the serial number, double-click the CA certificate in the Certificate Manager to open the dialog box: BeyondInsight Installation Guide 53 © 2018. BeyondTrust Software, Inc. Appendix A: Certificates • Was the eEyeEmsCA certificate regenerated or removed? Regenerating or removing the eEyeEmsCA certificate invalidates any certificate that was generated using the old CA certificate. This breaks the communication between the agents and the server until the Client and Server certificates are regenerated on the server and the new Client certificate is deployed on all agents connecting to BeyondInsight. • Did the Central Policy password change? If you change the password for Central Policy using the BeyondInsight Configuration tool, the password change is not automatically applied to EmsClientCert.pfx. When you deploy PowerBroker Endpoint Protection Platform on a target, the package will include the certificate with the old password. In this scenario, the events communication will not be successfully configured on the target. Using the BeyondInsight Configuration tool, generate a new client certificate with a new password that matches the Central Policy password. • To ensure the client certificate works properly with BeyondInsight, the certificate must have correct usage identifiers and the private key present. Using a Domain PKI for BeyondInsight Communication This section is intended to highlight key points to creating a custom certificate. For detailed procedures on creating a custom domain certificate refer to Microsoft’s documentation. Keep the following considerations in mind if you are creating a custom template to use for BeyondInsight. • You can modify templates using the Certificate Templates Console (certtmpl.msc). BeyondInsight Installation Guide 54 © 2018. BeyondTrust Software, Inc. Appendix A: Certificates • The default Computer template meets the requirements for BeyondInsight communication. However, you must create a copy of the Computer template and update any particular BeyondInsight configuration settings in the copy. • To issue the new template, use the certsrv.msc snap-in. Prerequisites Ensure the following is in place in your environment before proceeding. • Domain member server with Active Directory Certificate Services installed and configured. • Certificate Authority Web Enrollment role installed http://technet.microsoft.com/en-us/library/cc731183.aspx Requirements 1. The certificates must be configured as Server Authentication and Client Authentication in the Intended Purposes section of the certificate. 2. The Subject key must contain common text for all client certificates. In the following example the common text is Test. BeyondInsight Installation Guide 55 © 2018. BeyondTrust Software, Inc. Appendix A: Certificates Assigning the SSL Web Service Certificate in BeyondInsight 1. 2. 3. Start the BeyondInsight Configuration Tool. Scroll to Web Service in the list. Select the domain PKI certificate from the list, and then click Apply. BeyondInsight Installation Guide 56 © 2018. BeyondTrust Software, Inc. Appendix A: Certificates Configuring a Client Certificate for PowerBroker for Windows 1. 2. 3. 4. Edit the GPO that you are using to deploy policy to your PowerBroker for Windows targets. In Group Policy Management Editor, go to Administrative Templates > BeyondTrust > PowerBroker for Windows > System > Management. Double-click the Configure the BeyondInsight Certificate Name setting. Enter the common text in the client certificate Subject key. BeyondInsight Installation Guide 57 © 2018. BeyondTrust Software, Inc. Appendix A: Certificates Configuring Auto Enrollment To configure auto enrollment for the certificate: 1. 2. 3. 4. In GPME, edit the GPO that applies to your PowerBroker for Windows targets. Go to Computer Configuration > Windows Settings > Security Settings > Public Key Policies > Automatic Certificate Request Settings. Right-click in the right pane, and select New > Automatic Certificate Request. Go through the wizard. On the Certificate Template page, select the custom template. Refer to the following technet article for more details: http://technet.microsoft.com/en-us/library/cc731522.aspx BeyondInsight Installation Guide 58 © 2018. BeyondTrust Software, Inc. Appendix B: Permissions Appendix B: Permissions This section is designed for more advanced deployments where local admin or administrator privileges might not be desired for installing or using BeyondInsight. Analytics and Reporting Installation Permissions Minimum permissions needed for the BeyondInsight account. SQL Server database access Ideally, assign the account installing BeyondInsight the sysadmin Server Role. Otherwise, ensure at least the following SQL Server permissions are assigned to the account: ALTER database BULKINSERT CREATE Role CREATE Application Role CREATE Schema CREATE Type CREATE Table ALTER Table UPDATE Table CREATE UNIQUE NONCLUSTERED INDEX CREATE NONCLUSTERED INDEX CREATE PROCEDURE ALTER PROCEDURE EXECUTE PROCEDURE CREATE VIEW ALTER VIEW GRANT EXEC, SELECT, INSERT, UPDATE, DELETE Analytics and Reporting Permissions Permissions Required for BeyondInsight Configuration User Account entered on this page of the configuration wizard: Step 1: Installation Credentials • Local administrator rights to the SQL Analysis Services – this is needed to deploy the Analysis Services cube. • Permission to create a registry key under HKEY_LOCAL_MACHINE\SOFTWARE\EEYE • Log on as Batch Job security policy on the SQL Server computer. 1. BeyondInsight Configuration Database Roles Member in Role Database Sysadmin BeyondInsight reporting Required to: • install the SQL job and the SSIS packages. BeyondInsight Installation Guide 59 © 2018. BeyondTrust Software, Inc. Appendix B: Permissions • create the BeyondInsight reporting database. • view SQL job statuses and details. Alternatively, add the configuration user to the SQLAgentRole of the MSDB database on the BeyondInsight server for lower privileges. db_owner BeyondInsight Required to install the stored procedures for BeyondInsight reporting to synchronize data from the BeyondInsight management console. System User This role is at the root of SQL Reporting Services management website and is required to read information from SSRS. Browser This role is on the root folder settings for the SQL Report Services management website and is required to read and run reports deployed to SSRS. Content Manager This role is on the root folder settings for the SQL Report Services management website and is required to deploy the reports to SSRS. Permissions Required for the Web Proxy User Note: These permissions are automatically set up during installation if the installing user has permissions to. Account entered on this page of the configuration wizard: Step 5: Web Service Credentials 2. Web Proxy User Roles Member in Role Database RetinaInsightReader BeyondInsight reporting RetinaInsightUser BeyondInsight management console RetinaInsightReader BeyondInsight reporting cube in SQL Analysis Services System User This role is at the root of SQL Report Services management website and is required to deploy the reports to SSRS. Browser This role is on the root folder settings for the SQL Report Services management website and is required to read and run reports deployed to SSRS. Permissions Required for the SSRS Proxy User Note: These permissions are automatically set up during installation if the installing user has permissions to. Account entered on this page of the configuration wizard: Step 3: SQL Reporting Services (SSRS) 3. SSRS Proxy User Roles Member in Role Database RetinaInsightReader BeyondInsight reporting RetinaInsightUser BeyondInsight management console RetinaInsightReader BeyondInsight reporting cube in SQL Analysis Services BeyondInsight Installation Guide 60 © 2018. BeyondTrust Software, Inc. Appendix B: Permissions Permissions Required for the SQL Agent Service Running the Daily Sync Job Permission to process the BeyondInsight SSAS database. 4. SSAS Proxy User Roles Member in Role Database RetinaInsightSSIS BeyondInsight RetinaInsightUser BeyondInsight management console BeyondInsight Installation Guide 61 © 2018. BeyondTrust Software, Inc. Appendix C: Event Collectors Appendix C: Event Collectors The event collector role collects events and serves policy for BeyondTrust integrations, including: Retina, PowerBroker Endpoint Protection, PowerBroker for Windows, PowerBroker for Unix & Linux, PowerBroker Mac, and PowerBroker Identity Services. You can deploy additional event collectors to scale BeyondInsight to accommodate for regional deployments in larger environments. However, it is not a typical installation scenario. It is recommended that BeyondTrust's Professional Services advise you on whether this installation scenario is suited to your BeyondInsight deployment. This section does not apply to UVM appliance deployments. Overview Review the following sections to learn more about the event collectors and dependencies. License Keys The license key for all event collectors must match the license key for the main BeyondInsight installation. Event Collectors There are two types of event collectors currently used by BeyondInsight: • A standalone collector that runs as a Windows service. This service collects events and serves policy from Central Policy. Used by Retina and PowerBroker Endpoint Protection Platform (EPP). • A BeyondInsight event collector that runs as a web service. Used by PowerBroker for Windows, PowerBroker for Mac, PowerBroker for Unix & Linux. Authentication and Encryption Product Encryption Authentication Port PowerBroker for Unix & Linux SSL Client certificate 443 PowerBroker for Windows SSL Client certificate 443 PowerBroker for Mac SSL Client certificate 443 PowerBroker Endpoint Protection Platform SSL Retina SSL - Client certificate 21690 (to send - Central policy password (to get events) policy) 443 (to get policy) - Client certificate BeyondInsight Installation Guide 21690 (to send - Central policy password (to get events) policy) 443 (to get policy) 62 © 2018. BeyondTrust Software, Inc. Appendix C: Event Collectors High Level Installation Use the following instructions to deploy BeyondInsight and the event collectors. The following install files are needed: • BeyondInsight • Event Server and patches - Confirm the latest version with BeyondTrust. A license is required. • Retina Network Security Scanner All files can be downloaded from the client portal. 1. 2. 3. 4. 5. 6. 7. 8. Install BeyondInsight and run through the configuration as if it were a standard BeyondInsight installation. Set the database to external database on the BeyondInsight UVM. (For Central Policy). Set up the crypto keys. For instructions, see Crypto Key. a. Export the crypto key from the primary BeyondInsight server. b. Import the key to all Event Server machines. Set up the certificates. For instructions, see Certificates. a. Export the 3 certificates with private keys from primary BeyondInsight. b. Import the certificates to all event collector machines. Start the BeyondInsight Configuration tool and disable Management Console. See Software Install. Run the latest Event Collector installer and run through the configuration. Install any available Event Collector patch files. Start the BeyondInsight Configuration tool (Start > All Programs > BeyondTrust > Tools > BeyondInsight Configuration). Click Grant Permissions and then click Apply. You must also click Grant Permissions and Apply on the primary BeyondInsight server after the standalone servers are set up. 9. Configure Retina scanners to point to the Central Policy and send Retina events to the event collector in each region. 10. If using Windows authentication, the event collector machine name must be added to a local group created on the SQL Server host. For more information, see Windows Authentication. Software Install For the software install, ensure the following are in place. For the Event Collector service, set Subsequent failures and Reset fail count after as shown: BeyondInsight Installation Guide 63 © 2018. BeyondTrust Software, Inc. Appendix C: Event Collectors For a software install, you must turn off the management console on any secondary event collectors. A secondary event collector is a server that is not hosted on a BeyondInsight server that is also serving as the console role. To turn off the management console on the event collectors: 1. 2. Start the BeyondInsight Configuration tool. Click the Management Console:Enabled link, and then click Yes to continue. The status is now displayed as Disabled: BeyondInsight Installation Guide 64 © 2018. BeyondTrust Software, Inc. Appendix C: Event Collectors 3. The services must be restarted after this change. Click the Stop Services link, and then click the Start Services link. Certificates The following BeyondInsight certificates must be exported from the primary BeyondInsight server and then imported on the standalone event collectors. • eEyeEmsCA - the root certificate • EmsClientCert - client authentication certificate • eEyeEmsServer - server authentication certificate Exporting the Certificate To export the certificate using the Certificates snap-in: 1. 2. 3. 4. 5. 6. 7. 8. Run mmc.exe. Select File > Add/Remove snap-in. Select Certificates, and then click Add. Select Computer Account, and then click Next. Select Local Computer, and then click Finish. Click OK. Expand Certificates. Expand Personal, and then select Certificates. BeyondInsight Installation Guide 65 © 2018. BeyondTrust Software, Inc. Appendix C: Event Collectors 9. Right-click eEyeEmsClient > All Tasks > Export. a. Click Next. b. Select Yes, export the private key. c. Select the check boxes: Include all certificates in the certification path if possible and Export all extended properties. d. Enter a password. The password is needed when you import the certificate. e. Click browse, save the file with a .pfx extension, and then click Next. f. Click Finish. 10. Copy the exported file to a network share. Importing the EmsClientCert and eEyeEmsServer Certificates The EmsClientCert and eEyeEmsServer certificates must be imported on every Event Server you are deploying. These certificates are imported to the Personal store. To import the certificate using the Certificates snap-in. BeyondInsight Installation Guide 66 © 2018. BeyondTrust Software, Inc. Appendix C: Event Collectors 1. 2. 3. 4. 5. Open the Certificates snap-in. Right-click the Personal folder, and then select All Tasks > Import. Click Next on the first page of the import wizard. Click Browse. On the Open dialog box, ensure that the file type is selected from the list. The certificate file has a .pfx extension. 6. 7. 8. Find the file and click Open. Click Next. Enter the certificate password. This is the password that you created when you exported the certificate. Ensure the Include all extended properties check box is selected. 9. Click Next. The certificate must be imported to the Personal store. Click Next. 10. Click Finish. Importing the eEyeEmsCA Certificate To import the eEyeEmsCA certificate to the Trusted Root store: BeyondInsight Installation Guide 67 © 2018. BeyondTrust Software, Inc. Appendix C: Event Collectors 1. 2. 3. 4. 5. 6. Open the Certificate manager snap-in. Expand Trusted Root Certification Authorities. Right-click the Certificates folder, and then select All Tasks > Import. Click Next on the first page of the import wizard. Click Browse. On the Open dialog box, ensure that the file type is selected from the list. The certificate file has a .pfx extension. 7. Enter the certificate password. This is the password that you created when you exported the certificate. 8. Ensure the Include all extended properties check box is selected. 9. Click Next. The certificate must be imported to the Trusted Root store. Click Next. 10. Click Finish. BeyondInsight Installation Guide 68 © 2018. BeyondTrust Software, Inc. Appendix C: Event Collectors Confirm Certificates Confirm certificates on the BeyondInsight server and Event Servers are the same by reviewing the information in the Thumbprint for the certificate. Double-click the certificate, and then select the Details tab. Crypto Key The crypto key is used for Retina credentialed scans and password change actions. Note that you must run xmltodatabasesynctool.exe as Administrator. Exporting the Key On the primary BeyondInsight server: 1. 2. 3. 4. Go to the BeyondInsight installation directory. For example, by default: \Program Files (x86)\eEye Digital Security\Retina CS\. Run xmltodatabasesynctool.exe. Click Cryptography Key. Verify Export Key is selected. BeyondInsight Installation Guide 69 © 2018. BeyondTrust Software, Inc. Appendix C: Event Collectors 5. 6. 7. Enter a password. Click Export. Copy RetinaCS.eKey to a network share. Importing the Key On each event collector server, import the crypto key: 1. 2. 3. 4. 5. 6. 7. 8. Access the network share where you exported the crypto key and copy to the Event Server computer. Run xmltodatabasesynctool.exe. Click Cryptography Key. Select Import Key. Enter the password that you created when you exported the key. Click Import. Find the key and then click Open. After you import a crypto key, you must set the following values to NULL in the dbo.Version table: Access code and Expiry. In SQL Server Management Studio, run the following query on the BeyondInsight database: update version set AccessCode = null, Expiry = null Windows Authentication If you are using Windows authentication for an event collector, a local group must already have been created on the SQL Server host. This group requires db_owner access to the BeyondInsight database and is assigned the REM3Admins role. You must add each event collector machine name to this local group. For example, DomainName\EventServerMachineName$. For more information, see Configuring Windows Authentication to the Database. BeyondInsight Installation Guide 70 © 2018. BeyondTrust Software, Inc.