TIBCO LogLogic® Security Event Manager Enterprise Virtual Appliance Release Notes Software Release 3.5.2 October 2012 1 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED OR BUNDLED TIBCO SOFTWARE IS SOLELY TO ENABLE THE FUNCTIONALITY (OR PROVIDE LIMITED ADD-ON FUNCTIONALITY) OF THE LICENSED TIBCO SOFTWARE. THE EMBEDDED OR BUNDLED SOFTWARE IS NOT LICENSED TO BE USED OR ACCESSED BY ANY OTHER TIBCO SOFTWARE OR FOR ANY OTHER PURPOSE. USE OF TIBCO SOFTWARE AND THIS DOCUMENTIS SUBJECTTO THE TERMS AND CONDITIONSOFA LICENSE AGREEMENT FOUNDIN EITHERASEPARATELY EXECUTED SOFTWARE LICENSE AGREEMENT, OR, IF THERE IS NO SUCH SEPARATE AGREEMENT, THE CLICKWRAP END USER LICENSE AGREEMENT WHICH IS DISPLAYED DURING DOWNLOAD OR INSTALLATION OF THE SOFTWARE (AND WHICH IS DUPLICATED IN THE LICENSE FILE) OR IF THERE IS NO SUCH SOFTWARE LICENSE AGREEMENT OR CLICKWRAP END USER LICENSE AGREEMENT, THE LICENSE(S) LOCATED IN THE “LICENSE” FILE(S) OF THE SOFTWARE. USE OF THIS DOCUMENT IS SUBJECT TO THOSE TERMS AND CONDITIONS, AND YOUR USE HEREOF SHALL CONSTITUTE ACCEPTANCE OF AND AN AGREEMENT TO BE BOUND BY THE SAME. This document contains confidential information that is subject to U.S. and international copyright laws and treaties. No part of this document may be reproduced in any form without the written authorization of TIBCO Software Inc. TIBCO, Two-Second Advantage and LogLogic are either registered trademarks or trademarks of TIBCO Software Inc. in the United States and/or other countries. All other product and company names and marks mentioned in this document are the property of their respective owners and are mentioned for identification purposes only. THIS SOFTWARE MAY BE AVAILABLE ON MULTIPLE OPERATING SYSTEMS. HOWEVER, NOT ALL OPERATING SYSTEM PLATFORMSFORASPECIFIC SOFTWARE VERSIONARE RELEASEDATTHESAME TIME. SEE THE README FILE FOR THE AVAILABILITYOF THIS SOFTWARE VERSIONONASPECIFIC OPERATING SYSTEM PLATFORM. THIS DOCUMENT IS PROVIDED “AS IS” WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FORAPARTICULAR PURPOSE,OR NON-INFRINGEMENT. THIS DOCUMENT COULD INCLUDE TECHNICAL INACCURACIES OR TYPOGRAPHICAL ERRORS. CHANGES ARE PERIODICALLY ADDED TO THE INFORMATION HEREIN; THESE CHANGES WILL BE INCORPORATED IN NEW EDITIONS OF THIS DOCUMENT. TIBCO SOFTWARE INC. MAY MAKE IMPROVEMENTS AND/OR CHANGES IN THE PRODUCT(S) AND/OR THE PROGRAM(S) DESCRIBED IN THIS DOCUMENT AT ANY TIME. THE CONTENTS OF THIS DOCUMENT MAY BE MODIFIED AND/OR QUALIFIED, DIRECTLY OR INDIRECTLY, BY OTHER DOCUMENTATION WHICH ACCOMPANIES THIS SOFTWARE, INCLUDING BUT NOT LIMITED TO ANY RELEASE NOTES AND "READ ME" FILES. Copyright © 2002-2012 TIBCO Software Inc. ALL RIGHTS RESERVED. TIBCO Software Inc. Confidential Information 2 Release Notes for TIBCO LogLogic® Security Event Manager Enterprise Virtual Appliance, v3.5.2 GA TIBCO LogLogic® Security Event Manager Enterprise Virtual Appliance provides operations and security professionals with VMware support for our best in class SEM product. It offers scalable and comprehensive data security assistance monitoring for organizations challenged by the complexity of modern IT infrastructures. It is designed to continuously protect the most valuable business assets: core systems and the intellectual property they hold. This document lists functionality changes and bug fixes in TIBCO LogLogic® Security Event Manager Enterprise Virtual Appliance version 3.5.2. Note: For changes to the Release Notes after the initial release, see https://download.tibco.com/tibco/ Requirements ........................................................................................................................................ 4 Supported Platforms ............................................................................................................... 4 Virtual Machine Requirements .............................................................................................. 4 Web Console Requirements ................................................................................................... 4 SEM EVA Performances ...................................................................................................................... 4 Supported Log Sources by SEM EVA................................................................................................ 5 Technical Support ................................................................................................................................. 7 Documentation Support ...................................................................................................................... 7 3 Requirements Supported Platforms TIBCO LogLogic® Security Event Manager Enterprise Virtual Appliance can be installed on the following servers: VMWare Workstation 8 or higher VMWare ESXi 4.1 or higher Virtual Machine Requirements Disk space: 850 GB Memory size (RAM): 16 GB Processor: 8 VMware vCPU's Web Console Requirements The Web Console can be used with the following web browsers: Web browser Microsoft Internet Explorer Mozilla Firefox Version 7.0 or higher 13 or higher Hosts running the Web Console must have at least: 1 GB of RAM. 1024x768 resolutions. 1 GHz 32-bit (x86) or 64-bit (x64) processor. SEM EVA Performances SEM EVA Max. EPS (remote Log Collector) 2500 Max. Instances 1 Archive Storage (GB) 66 Online Storage (GB) 600 4 Supported Log Sources by SEM EVA Vendor Product Vendor Anti virus/spyware/spam Apache Blue Coat Cisco ClamAV Clearswift Clearswift Clearswift F-Secure Sophos Symantec Symantec TrendMicro TrendMicro Spamassassin Blue Coat ProxyAV Ironport Mail Security ClamAV Mimesweeper For SMTP DB Mimesweeper For SMTP Log Mimesweeper For WEB Policy Manager Puremessage Norton Antivirus Symantec Antivirus Interscan Viruswall Trend Micro SPS sytem Authentication server ActivIdentity ActivIdentity ActivIdentity Cisco Cisco Cistron EMC EMC EMC Microsoft Novell Utimaco Activpack v4 Activpack v6.3 Activpack v6.5 Cisco ACS Csv Cisco ACS Syslog Radius Rsa Ace server Rsa Ace WMI Rsa Securid linux Internet Authentication Service Novell eDirectory Safeguard Business application - Centralized management Arkoon Arkoon Arkoon Arkoon Intrusion.com ISS ISS ISS ISS Juniper LogLogic McAfee Microsoft Nagios TrendMicro Webmin Ntsyslog Arkoon DB Arkoon DB v3 Arkoon DB v4 Arkoon Syslog Securenet Provider SiteProtector SP4 SiteProtector SP5 SiteProtector SP6 SiteProtector SP7 Netscreen Security Manager v2004 Security Change Manager Epolicy Orchestrator Microsoft Operation Management Nagios Trend Micro Control Manager Webmin Database services Microsoft Microsoft Loglogic Oracle Sourcefire Ms sql Ms sql Operational Database Security Manager (DSM) Oracle DB Sourcefire3D Product Domain Name System (DNS) isc.org Bind File server NetApp ProFTPD Wu-ftpd Vsftpd Netapp ProFTPD Wuftpd Honeypot honeyd.org Honeyd Intrusion Detection System (IDS) / Intrusion Prevention System (IPS) 3Com TippingPoint Cisco Cisco CSA v45 Cisco Cisco CSA v52 Cisco Cisco CSA v60 Cisco Cisco IPS (SDEE) Enterasys Dragon IDS v7_0 Enterasys Dragon IDS v7_1 Enterasys Dragon IDS v7_2 ForeScout Activescout Intrusion.com Securenet Sensor ISS Realsecure wgm Juniper Netscreen IDP McAfee Entercept McAfee Intrushield Niksun Netdetector Samhain Samhain Sentry Tools Portsentry Snort Snort Snort Snort DB Snort Winsnort Symantec Symantec Client Security Symantec Symantec Endpoint Protection Symantec Symantec Network Security Tripwire Tripwire Tripwire Tripwire Entreprise Log management LogLogic LogLogic LogLogic LMI SMP SMP Relay Messaging services Ciphertrust courier-mta.org Eudora GNU Inter7 Lotus Microsoft Postfix sendmail.org TrendMicro Imapd IronMail Courier MTA Qpopper Exim Vpopmail Lotus Domino Exchange Postfix Sendmail Interscan Messaging Security Suite Directory services - - 5 Vendor Product Network device Aruba Check Point Cisco Cisco Cisco Cisco Cisco Cisco Cyberguard Draytek F5 Juniper Juniper Juniper Linksys Lucent Nortel Nortel Nortel Nortel Nortel StoneSoft Zyxel Zyxel Aruba Wireless Access Point Check Point Internal Log Cisco CSS Cisco FWSM Cisco Router Cisco Switch Cisco VPN Cisco VPN IOS compat Cyberguard Vigor Bigip Juniper Secure Access Netscreen Netscreen v6 Wap11 Brick Alteon Web Switch Contivity Nortel Alteon Nortel switch Nortel VPN gateway Stonegate Zywall Zyxel Operating System Breach Security FreeBSD Grsecurity HP HP IBM IBM Intersect alliance Intersect alliance Intersect alliance Intersect alliance Intersect alliance Intersect alliance Intersect alliance Linux Microsoft Microsoft Microsoft Microsoft Microsoft Microsoft Microsoft Microsoft Microsoft Microsoft Microsoft Netfilter Nokia Sun Sun Ipchains Modsecurity FreeBSD Grsecurity HP UX Tru64 Aix Tivoli Directory Server Windows 2000 server snare Windows 2000 workstation snare Windows 2003 server snare Windows 2008 server snare Windows all snare Windows Vista workstation snare Windows XP workstation snare Linux Internet Connection Firewall Windows 2000 server Windows 2000 workstation Windows 2003 server - English Windows 2003 server - French Windows 2008 server - English Windows 2008 server - French Windows Vista - English Windows Vista - French Windows XP - English Windows XP - French Netfilter IPSO Solaris Solaris BSM Vendor Blue Coat Deny ALL F5 Ingrian McAfee Microsoft Microsoft Squid Squid Sun TrendMicro TrendMicro WebSense WebSense Product Blue Coat ProxySG Rweb Appshield Ingrian WebShield Internet Security Acceleration v2000 FW Internet Security Acceleration v2004 Squid Squidguard Iplanet Interscan Web Security Suite Linux v2 Interscan Web Security Suite Windows v2 Websense v5 Websense v6 Remote desktop Symantec PCanywhere Unified Threat Management (UTM) Astaro Astaro Barracuda Check Point Check Point Cisco Cisco Fortinet PaloAlto Networks NetASQ NetASQ NetASQ NetASQ Sonicwall Symantec Symantec Astaro v4 Astaro v5 Barracuda Check Point Pointsec Protector Cisco ASA Cisco PIX Fortigate Firewall Netasq Alarm v6 Netasq Connection v6 Netasq Filter v6 Netasq v5 Sonicwall Symantec Gateway Security v2 Symantec Gateway Security v3 Virtualization - Vulnerability scanner Criston ISS ISS McAfee Qualys Tenable Security Criston VM Internet Security Scanner v6 Internet Security Scanner v7 Foundstone QualysGuard Nessus Web server Apache Microsoft Microsoft Microsoft Apache Internet Information Services NCSA Internet Information Services W3C Internet Information Services W3C v3 Other APC APC APC EMU APC UPS Proxy / Reverse proxy Beeware I Sentry Products also supported through LogLogic LMI are highlighted in green. -6- Technical Support LogLogic is committed to the success of our customers and to ensuring our products improve customers' ability to maintain secure, reliable networks. Although LogLogic products are easy to use and maintain, occasional assistance may be necessary. LogLogic provides timely and comprehensive customer support and technical assistance from highly knowledgeable, experienced engineers who can help you maximize the performance of your LogLogic Appliances. To reach our experienced support team by telephone: Toll Free, US—1 800 957 LOGS (5647) Toll—1 408 834 7480 Toll Free, Canada—1 800 957 LOGS (5647) Toll—1 408 834 7480 Toll Free, Mexico—1 800 957 LOGS (5647) Toll—1 408 834 7480 Toll Free, United Kingdom—00 800 0330 4444 Toll—01480 479391 Toll Free, Mainland Europe—00 800 0330 4444 Toll— +44 1480 479391 Toll Free, Japan IDC—0061 800 0330 4444 Toll— Not Available Toll Free, Japan KDD—0010 800 0330 4444 Toll— Not Available Toll Free, Brazil—0021 800 0330 4444 Toll— Not Available Email: support@loglogic.com Support Website: http://www.loglogic.com/services/support/ When contacting LogLogic Support, be prepared to provide the following information: Your name, e-mail address, phone number, and fax number Your company name and company address Your appliance model and release version Serial number located on the back of the Appliance or the eth0 MAC address A description of the problem and the content of pertinent error messages (if any) Documentation Support Your feedback on the LogLogic documentation is important to us. If you have questions or comments, send email to DocComments@loglogic.com. In your email message, please indicate the software name and version you are using, as well as the title and document release date of your documentation. Your comments will be reviewed and addressed by LogLogic Technical Publications. The Technical Publications team is eager to receive your feedback to help ensure that the documentation is accurate and useful. -7-