System Logs are like Fingerprints

ObserveIT:
User Activity Monitoring
Your Full Name Here
youremail@youremail.com
Month 2014
Copyright © 2014 ObserveIT. All rights reserved.
All trademarks, trade names, service marks and logos referenced herein belong to their respective companies. This document is for informational purposes only.
www.observeit.com
ObserveIT Software that acts like a security camera on your servers!

 Video camera: Recordings of all user activity
 Summary of key actions: Alerts for problematic activity

2
Business challenges that ObserveIT addresses
Remote Vendor
Monitoring
• Impact human behavior
• Transparent SLA and billing
• Eliminate ‘Finger pointing’
Compliance &
Security Accountability
Root Cause Analysis &
Documentation
• Reduce compliance costs for
GETTING compliant and
STAYING compliant
• Satisfy PCI, HIPAA, SOX, ISO
• Immediate root-cause answers
• Document best-practices
3
An Analogy
Bank Branch Office
Bank Computer Servers
Companies invest in access control
but once users gain access,
there is little knowledge of
who they are and what they do!
(Even though 71% of data breaches
involve privileged user credentials)
They both hold money…
…They both have Access Control…
...Here they also have security cameras…
…Here, they don’t!
4
Why?
Because system logs are built by DEVELOPERS for DEBUG!
Only 1% of(and
datanot
breaches
are
by SECURITY
ADMINS for SECURITY AUDIT)
discovered by log analysis!
(Even in large orgs with established SIEM processes,
the number is still only 8%!)
“
“
“
“
I don’t have this problem.
I’ve got log analysis!
The picture isn’t quite as
rosy as you think.
5
Can you tell what
happened here?
Replay Video
Wouldn’t it be easier
with a ‘Replay Video’
button?
Video Replay shows
exactly what happened
6
And many commonly used apps don’t even have their own logs!
• DESKTOP APPS
DESKTOP APPS
•
•
•
•
Firefox / Chrome / IE
MS Excel / Word
Outlook
Skype
REMOTE & VIRTUAL
• Remote Desktop
• VMware vSphere
ADMIN TOOLS
•
•
•
•
Registry Editor
SQL Manager
Toad
Network Config
TEXT EDITORS
• vi
• Notepad
7
System Logs are like
Fingerprints
They show the results/outcome
what
took place
System Logs areoflike
Fingerprints
User Audit Logs are like
Surveillance Recordings
They show exactly what
took place!
“
“
Both are valid…
…But the video log goes right to the point!
8
Our Solution
1: Video Capture
Video
Session
Recording
‘Admin‘
= Alex
Logs on as ‘Administrator’
X X X
ITthe
Alex
Admin
2: Video Content Analysis
List of apps,
files, URLs
accessed
3: Shared-user Identification
Corporate
Server or Desktop
WHO is doing WHAT
on our network???
Cool! Now I know.
Audit Reporting DB &
SIEM Log Collector
User
Alex
Video
Play!
Text Log
App1, App2
Sam the
Security Officer
9
Demo Links:
Powerpoint demo: Click here to show
Live hosted demo: http://demo.observeit.com
Internal demo: http://184.106.234.181:4884/ObserveIT
YouTube demos:
English: http://www.youtube.com/watch?v=uSki27KvDk0&hd=1
Korean: http://www.youtube.com/watch?v=k5wLbREixco&hd=1
Chinese: http://www.youtube.com/watch?v=KVT-1dX_CoA&hd=1
Japanese: http://www.youtube.com/watch?v=7uwXlHpLeTc&hd=1
French: http://www.youtube.com/watch?v=wC31aXpkGOg&hd=1
LIVE DEMO
Russian: http://www.youtube.com/watch?v=fzVhLfSb2nY&hd=1
Enhance your SIEM with User Activity Monitoring
• View ObserveIT users’ activity in SIEM
• Direct link to the ObserveIT Video URL from the SIEM
• Ability to correlate ObserveIT events with other
system events
• Ability to define rules/alerts based on ObserveIT
user’s recorded events
11
Current system log report not clear enough?
Then link to the video replay!
SIEM Platform
OS and DB System
Log Report
Video Player
Event…
Event…
Event…
System Dashboard
ObserveIT User
Log Report
Event…
Event…
Event…
Simple & automated correlation rules:
Timestamp + user + machine  Video Replay
12
ObserveIT Video and Text Logs in CA UARM
List of every app run
Timeline view
Breakdown by users
and servers
Detailed action listing
Click ‘Play the video!’
icon to view
13
ObserveIT Video and Text Logs in Arcsight
Dashboard
breakdown of user
activity
Each action can link to
open a video replay
Video replay of user actions,
within the Arcsight console
14
ObserveIT Video and Logs in Splunk – Activity Dashboard
Search Window
Dashboard breakdowns
Detailed text logs of
user actions
Click icon to launch
video replay
ObserveIT Video and Logs in Splunk – Browse Sessions
Search Window
Session details (Windows)
Session details (Unix)
Click icon to launch
video replay
ObserveIT Video and Logs in Splunk – Session details
Click icon to launch video replay
per action
ObserveIT Video and Logs in LogRhythm
ObserveIT Video and Text Logs in RSA enVision
Metadata filtering
Event listing
19
DEPLOYMENT SCENARIO OPTIONS
Standard Agent-based Deployment
•
•
•
•
Agent installed
each monitored
Administrators
access on
ObserveIT
audit machine
• Agent becomes active only when user session starts
• ASP.NET application in IIS
• Data capture is triggered by user activity (mouse movement, text typing,
Data
Storage
Mgmt
Serverinterface
receives
data
from
Agents
• Primary
forsession
video replay
and
reporting
etc.). No recording takes place while user is idle
ASP.NET
application
IIS • Microsoft
• Also
used forinconfiguration
and admin
tasks database
SQL Server
• Communicates with Mgmt Server via HTTP on customizable port, with
Collects
all data
delivered
by the
• Web
console
includes
granular
policy
rules for limiting
(orAgents
optonal
file-system
storage)
optional SSL encryption
Analyzesaccess
and categorizes
and sends
to DB data,
Servermetadata and screenshots
to sensitivedata,
data
•
Stores
all
config
• Offline mode buffers recorded info (customizable buffer size)
Communicates with Agents for
config
updates via standard TCP port 1433
• All
connections
• Watchdog mechanism
prevents
tampering
ObserveIT
Agents
ObserveIT
Web Console
ObserveIT
Management
Server
Remote
Users
Database
Server
Metadata Logs
& Video Capture
Local
Login
Desktop
AD
Network
Mgmt
SIEM
BI
Open API and Data Integration
• Standards-based
• Simple integration
21
Gateway Jump-Server Deployment
Corporate Servers
SSH
PuTTY
(no agent installed)
MSTSC
Gateway
Server
Corporate Desktops
Internet
(no agent installed)
ObserveIT
Agent
Remote and local users
Corporate Servers
(no agent installed)
ObserveIT
Management Server
22
Hybrid Deployment
Corporate Servers
SSH
PuTTY
(no agent installed)
MSTSC
Gateway
Server
Corporate Desktops
Internet
(no agent installed)
ObserveIT
Agent
Remote and local users
Direct login
(not via gateway)
Sensitive production servers
(agent installed)
ObserveIT
Management Server
23
Gateway Jump-Server Deployment
Customer #1 Servers
SSH
PuTTY
(no agent installed)
MSTSC
Gateway
Server
Internet
Remote and local users
Customer #2 Servers
(no agent installed)
ObserveIT
Agent
Customer #3 Servers
(no agent installed)
ObserveIT
Management Server
24
Citrix Published Apps Deployment
Published Apps
Citrix
Server
Remote
Access
ObserveIT
Agent
ObserveIT
Management Server
25
HOW AGENT WORKS
ObserveIT Architecture:
How the Windows Agent Works
Synchronized capture via
Active Process of OS
Screen
Capture
Real-time
User action
triggers Agent
capture
User logon wakes
up the Agent
Captured metadata & image
packaged and sent to Mgmt
Server for storage
Metadata
Capture
URL
Window Title
Etc.
27
ObserveIT Architecture:
How the Linux/Unix Agent Works
User-mode executable that
is bound to every secure
shell or telnet session
CLI I/O
Capture
Real-time
TTY CLI activity
triggers Agent
capture
User logon wakes
up the Agent
Captured metadata & I/O
packaged and sent to
Mgmt Server for storage
Metadata
Capture
System Calls
Resources Effected
Etc.
28
KEY FEATURES: WHAT MAKES OBSERVEIT GREAT
Generate logs for every app
(Even those with no internal logging!!)
WHAT DID THE USER DO?
A human-understandable list
of every user action
Cloud-based app: Salesforce.com
System utilities: GPO, Notepad
Legacy software: financial package
30
Video analysis generates intelligent text metadata
for Searching and Navigation
ObserveIT captures:
• User
• Server
• Date
• App launched
• Files opened
• URLs
• Window titles
• Underlying system calls
Launch video replay at the
precise location of interest
31
Recording all protocols
Telnet
Windows Console
(Ctrl-Alt-Del)
Unix/Linux Console
• Agnostic to network protocol and client application
• Remote sessions and also local console sessions
• Windows, Unix, Linux
32
Logs tied to Video recording: Windows sessions
Audit Log
USER SESSION REPLAY:
Bulletproof forensics for
security investigation
Replay Window
CAPTURES ALL ACTIONS:
Mouse movement, text entry, UI
interaction, window activity
PLAYBACK NAVIGATION:
Move quickly between apps that the
user ran
33
Logs tied to Video recording: Unix/Linux sessions
Audit Log
List of each
user command
Replay Window
Exact video playback
of screen
34
Privileged/Shared User Identification
ObserveIT requires named user
account credentials prior to granting
access to system
User logs on as generic
“administrator”
Each session audit is now
tagged with an actual name:
Login userid: administrator
Actual user: Daniel
Active Directory used
for authentication
35
Policy Messaging
NOTE: PCI-DSS compliance regulations
require that user activity be audited.
Send policy and status
updates to each user exactly
when they log in to server
All activity during this login session will
be recorded. Please confirm that you
are aware that you are being recorded.
Capture optional user
feedback or ticket # for
detailed issue tracking
Ensure that policy standards
are explicitly acknowledged
36
Real-time Playback
On-air icon launches
real-time playback
View session activity
“live", while users are
still active
37
Report Automation:
Pre-built and custom compliance reports
Schedule reports to run
automatically for email delivery
in HTML, XML and Excel
Canned compliance audits
and build-your-own
investigation reports
Design report according to
precise requirements: Content
Inclusion, Data Filtering,
Sorting and Grouping
38
Double-password privacy assurance:
Addresses employee privacy mandates
Two passwords:
One for Management. Second
for union rep or legal counsel
Textual audit logs can be accessed
by compliance officers for security
audits, but video replay requires
employee rep authorization
(both passwords)
39
API Interface
Control ObserveIT Agent via
scripting and custom DLLs
within your corporate
applications
Start, stop, pause and resume
recorded sessions based on custom
events based on process IDs, process
names or web URLs
40
Robust Security
• Agent ↔ Server communication
•
•
•
•
AES Encryption - Rijndael
Token exchange
SSL protocol (optional)
IPSec tunnel (optional)
• Database storage
•
•
Digital signatures on captured sessions
Standard SQL database inherits your enterprise
data security practices
• Watchdog mechanism
•
•
•
Restarts the Agent if the process is ended
If watchdog process itself is stopped, Agent
triggers watchdog restart
Email alert sent on watchdog/agent tampering
41
Recording Policy Rules
Determine what apps to
record, whether to record
metadata, and specify
stealth-mode per user
Granular include/exclude
policy rules per server,
user/user group or application
to determine recording policy
42
Pervasive User Permissions
• Granular permissions /
access control
• Define rules for each user
• Specify which sessions the user may playback
• Permission-based filtering
affects all content access
•
•
•
•
Reports
Searching
Video playback
Metadata browsing
• Tight Active Directory
integration
• Manage permissions groups in your native AD
repository
• Access to ObserveIT Web
Console is also audited
• ObserveIT audits itself
• Addresses regulatory
compliance requirements
43
Thank You!
Your Full Name
youremail@youremail.com
Copyright © 2014 ObserveIT. All rights reserved.
All trademarks, trade names, service marks and logos referenced herein belong to their respective companies. This document is for informational purposes only.
www.observeit.com