WHITE PAPER Get the value of real Business Intelligence from your logs Executive Summary The security issues exceed the context of the IT department and find their real place. Software solutions of log analysis offer tools covering the full cycle of incident management: prevent, detect, contain, investigate, correct and report. Beyond the correlation of alarms, operational management of security logs should also enable to ensure the legitimate use of company resources to ensure service quality and regulatory compliance. Click&DECiDE offers real solutions of secure log management and assists companies to pass the IT Audit in the context of a process of compliance with international regulations. www.clickndecide.com 98, route de la Reine 92100 Boulogne-Billancourt +33 (0)6 71 99 86 60 sales@clickndecide.com Table of Contents 1. Log management solutions? ........................................................................................................................ 4 1.1. Security log management .................................................................................................................. 4 1.2. The Regulatory Challenge ................................................................................................................. 4 2. Click&DECiDE‟s Security Log Management Solution .................................................................................. 5 3. Click&DECiDE : 4 Key Elements.................................................................................................................. 6 3.1.1. Centralization and Archiving your logs .......................................................................................... 6 3.1.2. Reporting in real-time and dashboards .......................................................................................... 6 3.1.3. Correlation & real-time alertes Remontées d‟alertes en temps réel .............................................. 6 3.1.4. Forensic Investigation .................................................................................................................... 6 3.2. Log Lifecycle Management ................................................................................................................ 7 3.3. Our Three Main Products ................................................................................................................... 7 3.3.1. Click&DECiDE Network & Security Intelligence Professional Package ........................................ 7 3.3.2. Click&DECiDE Network & Security Intelligence Package Enterprise ............................................ 7 3.3.3. Click&DECiDE BAI for NSI ............................................................................................................ 8 3.4. 4. Key benefits ........................................................................................................................................ 8 3.4.1. Management of structured and semi-structured Data ................................................................... 8 3.4.2. Distribution of the information on your desktop ............................................................................. 8 3.4.3. Distribution of the information via the web portal ........................................................................... 9 3.4.4. Advanced Analysis, Correlation, Alert, Forensic analysis ............................................................. 9 3.4.5. Archiving for Regulatory Compliance and Auditing ....................................................................... 9 3.4.6. Powerful Customization Tool ......................................................................................................... 9 Architecture .................................................................................................................................................. 9 4.1.1. Step 1: Log Collection .................................................................................................................. 10 4.1.2. Step 2: Archival ............................................................................................................................ 10 4.1.3. Step 3: Log Filtering & Data Enhancement ................................................................................. 10 4.1.4. Step 4: Database Management ................................................................................................... 10 4.1.5. Step 5: Dashboard Creation ........................................................................................................ 10 4.1.6. Step 6: Customizing Reports ....................................................................................................... 11 4.1.7. Step 7: Correlation and Alerting ................................................................................................... 11 4.2. Easy configuration via Click&DECiDE Configurator ........................................................................ 11 4.3. Intuitive Administration via Click&DECiDE Management Console .................................................. 11 5. Devices supported ...................................................................................................................................... 12 6. Key features ............................................................................................................................................... 13 6.1. Log Centralization & Archival ........................................................................................................... 13 Key Points .................................................................................................................................................. 13 Key Benefits ............................................................................................................................................... 14 6.2. 2 Dashboard Generation & Reporting ................................................................................................. 14 www.clickndecide.com sales@clickndecide.com 6.2.1. Examples of Click&DECiDE Pre-defined Dashboards ................................................................ 14 Firewall/VPN Dashboards .......................................................................................................................... 14 Proxy Dashboards ...................................................................................................................................... 15 Intrusion Detection Dashboards ................................................................................................................. 15 Web Site Statistics Dashboards ................................................................................................................. 15 Content Filtering Dashboards..................................................................................................................... 15 E-mail Statistics Reports ............................................................................................................................ 15 Systems Statistics Reports ......................................................................................................................... 16 Strong Authentication Dashboards ............................................................................................................ 16 6.3. Easy Dashboard Access via Click&DECiDE Web Portal ................................................................. 16 6.4. Plan your Dashboard Generation via the Click&DECiDE Task Scheduler ...................................... 17 6.5. Event Correlation and Alerting ......................................................................................................... 17 6.6. Alerting & Correlation Console ......................................................................................................... 19 6.7. Advanced Forensic Analysis & Data Manipulation .......................................................................... 22 6.7.1. 7. 8. 3 Cubes ........................................................................................................................................... 22 System Requirements ................................................................................................................................ 24 7.1. Systems ............................................................................................................................................ 24 7.2. Components ..................................................................................................................................... 24 7.3. Databases ........................................................................................................................................ 24 Conclusion .................................................................................................................................................. 25 www.clickndecide.com sales@clickndecide.com 1. Log management solutions? Log management solutions allow automating the collection, consolidation of the events with various types of network devices. Besides the software guarantees the archive in the data native format and allows the transformation of the collected data in real decision-making indicators. Advanced functions of correlation and alerting also guarantee you a pro activity on your information system. Security events logs are collected, consolidated, normalized and archived. In many cases, these events might be used: in case of forensic investigation, inquiries or to understand a specific security incident via synthetic dashboards. Security log management participates and optimizes in an essential way your Enterprise Risk Management and allows validating and controlling the security rules of the company. 1.1. Security log management Security‟s role in log management is to aim to deliver the following three assurances: Confidentiality The assurance and prevention that information is not disclosed to inappropriate and unauthorized entities or processes. Your enterprise‟s sensitive data is held in confidence and logs are preserved, analyzed, correlated and reported to ensure that it is limited to an appropriate set of individuals or organizations. Integrity The assurance over the correctness and appropriateness of the content and/or source of a piece of information, including the prevention of the unauthorized modification of information to ensure that your data is sound, unimpaired and in perfect condition. Availability The ability to access and use a specific resource within a specific time frame as defined within the IT product specification. This relates to the concern that information objects and other system resources are accessible when needed and without undue delay. Today security is enterprise wide and CEO and CFO are held responsible for security violations. IT is a key stakeholder on the compliance steering committee. The IT Director is a key stakeholder on the compliance steering committee. According to ISO 17799, the Management should express their commitment, clearly define and support the direction of the security policy. We can also clearly observe that recent legislation reflects the dimensions of security at present and over the coming years. 1.2. The Regulatory Challenge Proper log management is critical if your organization is affected by laws and regulations that require the collection and archiving of event logs. Audit and control reviews are held annually and quarterly, if not more frequently, to uncover violations of organizational policy or separation of duties, as well as breaches in the use of private or confidential customer or enterprise information Due to the increasing concerns over the integrity of today‟s business data, new regulations have been introduced which reinforce the need for stronger internal control mechanisms. In the US, the Sarbanes Oxley Act has placed the responsibility for establishing rigorous internal control systems and Records Management procedures among publicly-quoted companies directly on senior executives. The law Sarbanes-Oxley is mandatory for listed companies in the US stock exchange. 4 www.clickndecide.com sales@clickndecide.com This development is not restricted to the US or US-quoted companies. Much of the EU corporate governance regulations are creating similar Records Management requirements. For example: Basel II (Europe), Loi de Sécurité Financière (France), the Tabaksblat Code (Netherlands). Frameworks and standards related to these regulations include: COSO, COBIT and ISO/IEC 27002. Some of the most common challenges posed by new regulations and which the above frameworks treat in detail include: How to introduce better Internal Control mechanisms for new regulations? How to define “who has access to what” within the organization? How to report on current access permissions as needed? How to determine when access permissions were granted and revoked? How to see how access permissions have changed over time? How to comply while keeping cost down? How to comply while supporting current operations? 2. Click&DECiDE’s Security Log Management Solution Click&DECiDE enables to address the following challenges: Provide compliance with international regulations Optimizing Risk management by staying informed and responding in real-time to security threats. Enhancing the global level of your security intelligence thanks to the management of your security events. Our solutions need to meet your overall issues of log management, namely: Log Centralization & Archival To meet the legal requirements of logs retention and provide a simple way to reconcile the your listeners needs as well as regulatory needs. Once collected the raw data need to be archived in case of future use. The information is also inserted into a database for the generation of dashboards or investigation purposes. Reporting Delivery of dashboards by category of devices with information adapted to different stakeholders within the company. These dashboards should provide both an overview and a detailed view if necessary. These data are updated on a daily basis. Correlation & Alerting Different mechanisms of correlation and alerting should help you to identify real-time alerts or inconsistencies thanks to the Alerting and Correlation Console. Forensic Analysis The tools should enable you to investigate and manipulate the data to find the causes of malfunctions or attacks. These tools should also allow you to filter data. Click&DECiDE transforms huge volumes of disparate event data into actionable knowledge! 5 www.clickndecide.com sales@clickndecide.com 3. Click&DECiDE : 4 Key Elements The four key elements of Click&DECiDE‟s solution enable you to meet your challenges: 3.1.1. Centralization and Archiving your logs Click&DECiDE collects in real-time and continuous if necessary whole set of logs. These logs are stored in native format for compliancy regulatory rules, archived and inserted in the database for generation of dashboards and investigation. 3.1.2. Reporting in real-time and dashboards Click&DECiDE supplies dynamic dashboards to have a global vision of the enterprise infrastructure in realtime which allow using a unique BI tool for all your equipments. 3.1.3. Correlation & real-time alertes Remontées d’alertes en temps réel Click&DECiDE enables to correlate, identify vulnerabilities and sends in real-time alerts relevant to help your IT teams and assign a criticality level of alerts through the Alerting and Correlation Console. 3.1.4. Forensic Investigation Click&DECiDE includes as standard features in its software's advanced forensic analysis and traceability of events to identify and highlight malfunctions. Archived data can also be replayed at any time in the Click&DECiDE system for investigations for a longer period of time. 6 www.clickndecide.com sales@clickndecide.com 3.2. Log Lifecycle Management The various solutions proposed by Click&DECiDE enable to accompany the lifecycle of a log. 3.3. Our Three Main Products 3.3.1. Click&DECiDE Network & Security Intelligence Professional Package Centralizing all the events at a single point, Click&DECiDE NSI Professional provides advanced dynamic dashboards on your various standard equipments. These dashboards can be generated in real time or scheduled from a Web portal. Click&DECIDE NSI Professional also provides dynamic interactive reports or cubes with multidimensional views allowing you to analyze data from different angles interactively. Reports are available in all output formats including PDF, Excel, HTML. Click&DECiDE NSI Professional also incorporates a mechanism for legal archiving of the collected logs. 3.3.2. Click&DECiDE Network & Security Intelligence Package Enterprise Click&DECiDE NSI Enterprise covers all your needs in terms of operating logs. It provides advanced dynamic dashboards from your different standard equipments. These dashboards can be generated in real time or scheduled from a Web portal. Click&DECIDE NSI Professional also provides dynamic interactive reports or cubes with multidimensional views allowing you to analyze data from different angles interactively. Reports are available in all output formats including PDF, Excel, HTML. It allows integration in these dashboards of critical applications of the company related to its business. Click&DECiDE NSI Enterprise also incorporates a mechanism for legal archiving of the collected logs. Click&DECiDE NSI Enterprise also allows the management of alarms in real-time, on thresholds on correlations multi-devices, allowing answers to suspicious activities. 7 www.clickndecide.com sales@clickndecide.com Click&DECiDE NSI Enterprise assist you to be compliant with international regulations (Sarbanes-Oxley, Bale II, HIPAA, LSF …). Click&DECiDE NSI Enterprise enables you to have dashboards in real-time in Excel format. 3.3.3. Click&DECiDE BAI for NSI Click&DECiDE BAI, true BI tool, allows you to modify existing reports, create new dashboards and reports and to adapt the graphic to match your image. Click&DECiDE BAI can modify existing cubes, create new cubes and put quickly in place new indicators or investigative tool you need. Click&DECiDE BAI allows you to create alarms from the reports, dashboards and indicators. To prevent persons concerned that an abnormal behavior was spotted in them. Click&DECiDE BAI adds the ability to directly create reports, cubes, dashboards on information contained in your application databases, to build a real access portal to the company information. Click&DECiDE BAI allows having real-time information in Excel format with filtering profiles. 3.4. Key benefits Software proposed by Click&DECiDE enables you: Automate log collection, archiving, alerting as well as generating dashboards. Reduce vulnerabilities of your information system. Analyse threats. Reduce risk. The bottom line... Click&DECiDE Solutions protect your enterprise! 3.4.1. Management of structured and semi-structured Data Click&DECiDE engine may collect, aggregate and perform maintenance (tasks scheduling and purging) on all your structured and semi-structured data: RDBMS, flat file, WMI, Syslog, SNMP, Radius, .... It can also collect data and create cubes, queries and reports, from all sort of sources (Oracle, UDB (DB / 2, SQL DS AS400/iSeries), ODBC, other data Access (Excel, Analysis Services). 3.4.2. Distribution of the information on your desktop Click&DECiDE allows you to create and run ad hoc queries, reports, dashboards, or cubes OLAP (data from multiple databases and Analysis Services). You can send the information you want in the format you wish (PDF, MS Excel, Word, Access), HTML, XML, TXT, CSV, ... to the right people, thanks to our advanced management profiles user (Windows, Active Directory, LDAP, RADIUS). 8 www.clickndecide.com sales@clickndecide.com 3.4.3. Distribution of the information via the web portal The web portal of Click&DECiDE allows you to run predefined queries or reports ad hoc, OLAP cubes and interactive dashboards. The information is transmitted to the right person, either real time or on a scheduled basis according to criteria you set in the proper format. You can choose between HTML, XML, PDF, MS Excel, Word, Access, TXT, CSV, Mail, RSS, Web Part, Web Query MS Office, SharePoint, or direct access via shortcuts, ... The information is modeled and filtered through our powerful user profile management system (Windows, Active Directory, LDAP, RADIUS). 3.4.4. Advanced Analysis, Correlation, Alert, Forensic analysis You can analyze and investigate a posteriori your data through the analysis of Click&DECiDE OLAP cubes and correlation of data into interactive reports: through drill-downs on dynamic reports and interactive dashboards (map, chart, drill-down cube). Decision makers can be alerted in real time through our combined criteria of alerts based on KPI (Key Performance Indicators) by email, RSS, Web Part, Syslog, SNMP Trap, ... 3.4.5. Archiving for Regulatory Compliance and Auditing Click&DECiDE allows you to store semi-structured data in their native format with signing, compression and indexing for compliance. You can also restore and replay of archived data at any time by using the Replay feature. 3.4.6. Powerful Customization Tool Easily customize your reports, the theme of your web portal, your dashboards and cubes to respect the graphic charge of your enterprise. Parse your semi-structured and tabular data with our Universal Parser (using regular expressions) and our Parser tabular data. 4. Architecture Let‟s take a closer look at the architecture behind Click&DECiDE‟s solutions. 9 www.clickndecide.com sales@clickndecide.com 4.1.1. Step 1: Log Collection From Heterogeneous Devices Click&DECiDE supports the major device categories of the market: Firewall, Proxy, Servers, IPS (Intrusion Prevention System), IDS (Intrusion Detection System), Server E-mail, Authentication Server, Anti-Virus, Server Web. With a broad Range of Log Formats The data can be collected either in Syslog*, from flat file or via certain propriety protocols like CheckPoint LEA, Windows WMI or Radius. The logs depending on the support can be collected in real time or deferred time. (* Click&DECiDE is itself a Syslog server) 4.1.2. Step 2: Archival The collected data is then stored via the Click&DECiDE Log Archive module to ensure its integrity over the long-term. The data includes a digest it is compressed and encrypted before being archived in the Log Vault. 4.1.3. Step 3: Log Filtering & Data Enhancement The Click&DECiDE ULA (Universal Log Analyser) analyses, standardizes and filters the event data in real time. The data can be enriched in real time by content information coming from external sources (RDNS, LDAP Directory, SQL Table, Dictionaries) in order to improve the readability. Each Click&DECiDE Engine enables you to insert several tens of millions of events in the database per day. 4.1.4. Step 4: Database Management Click&DECiDE aggregates, consolidates and purges your security event data in the Click&DECiDE database thanks to its automated Database management tasks. Scheduled aggregation and purge features enable Click&DECiDE to reduce the size of your database significantly (Coefficient of 25 for equipments like firewalls and proxy) 4.1.5. Step 5: Dashboard Creation Dashboard generation is automated and can easily be scheduled (daily, weekly or monthly task). The dashboards can be generated in real-time. The powerful drill-down features enable the user to go directly to the detailed information they need. The navigation features enable users to go to the sections they need and perform historical trending by navigating from day-to-day or month-to-month in a click. 10 www.clickndecide.com sales@clickndecide.com 4.1.6. Step 6: Customizing Reports Our product BAI allows the NSI users of Click&DECiDE to modify dashboards, reports, cubes in order to customize them, in the visual aspect as in the functional aspect. You can set up new indicators, new graphs which are asked for and assemble them into new dashboards or by adding them to existing reports. All output formats are available among PDF, Excel, HTML, XML. Click&DECiDE BAI users can access information through user‟s customized web portal to generate in real-time, or schedule reports, cubes and dashboards. The scheduled results can be delivered via email, RSS, Web Parts or SharePoint Web Parts and Web Queries. Profiles and Models can be used to filter the data distribution, so that each user or user group can access only the data they are authorized to see. Finally, an intelligent supervision may be applied to the reports, based on the results of these reports and queries, and alerts can be triggered 4.1.7. Step 7: Correlation and Alerting Advanced correlation features enable you to rapidly detect in real-time violations and identify vulnerabilities. Click&DECiDE sends trusted alters to your IT staff in real-time via e-mail, Trap SNMP or via the Click&DECiDE Alerting & Correlation Console to help them quickly isolate and resolve potential threats and automate protection. The alerting & Correlation Console further enables you to manage the level of alerts, filter or acquit them. 4.2. Easy configuration via Click&DECiDE Configurator Click&DECiDE Suite of products integrates an easy-to-use Configurator wizard that simplifies the installation of devices by filling in a guided-specific way the specific information to the database, the local RDNS, the mail server, the aggregation procedures, purging and archiving of the data. The Management Console is automatically configured by the Configurator with the appropriated information. 4.3. Intuitive Administration via Click&DECiDE Management Console The Click&DECiDE Management Console enables an advanced configuration of the Agents, Filters and Parsers. The alerts, rules and fields can be configured as well at that level. 11 www.clickndecide.com sales@clickndecide.com 5. Devices supported Click&DECiDE supports over 100 Types of devices. The support of a new device is easily, as Click&DECiDE delivers by default 2 generic parsers Flat File and Syslog (based on regular expressions) that will enable you to realize your proper Plug In. Do not hesitate to contact us if certain devices are not present in the list below, your device has certainly already be integrated by one of our customers. 12 Product Type of data ActivIdentity Aladdin eSafe Apache ARKOON Network Security Blue Coat Secure Web Gateway Check Point Firewalls Cisco ASA Series Cisco Catalyst Cisco IronPort-C ESA Cisco IronPort-S WSA Cisco PIX Series Cisco Routers Series Cisco Secure Acs Cisco Security Modules Cisco Switch Series Clavister Security Gateways Deny All F5 Web Acceleration Fortinet Fortigate IBM ISS Proventia (A-GmM) IBM Lotus Domino Juniper Networks NetScreen Juniper NSM McAfee IntruShield McAfee Web Gateway Microsoft Active Directory Microsoft Exchange Microsoft Internet Connection Firewall Microsoft Internet Information Server (IIS) Microsoft ISA Server Microsoft WMI (Windows Management Instrumentation) MimeSweeper for SMTP Netapp Net Cache NETASQ Netfilter ipchains Netfilter iptables Novell Border Manager Olfeo Postfix Radius Radius Cisco Secure Radius Telefonica Radware, Defense Pro Sendmail Snort SonicWall Sourcefire Squid Squid Reverse Proxy Stonesoft StoneGate Symantec Gateway Security Symantec Raptor Firewall Trend Micro IMSS Trend Micro IWSS WatchGuard Radius, Authentication E-mail, Content Filtering Web Site Firewall, IPS, Proxy Proxy, Content Filtering Firewall Firewall Firewall E-mail, Content Filtering Proxy Firewall Router & Switch Radius, Authentication Firewall Router & Switch Firewall, Proxy IPS, Web Site Web Site Firewall, IPS, Proxy, Content Filtering, UTM IPS Web Site Firewall, IPS Firewall, IPS IPS Proxy, Content Filtering WMI E-mail Firewall Web Site Firewall, Proxy WMI E-mail, E-mail Content Filtering Proxy Firewall, Proxy, IPS Firewall Firewall Proxy Proxy E-mail Radius Radius Radius IPS E-mail IPS Firewall IPS Proxy Server Web Site Firewall Firewall, Proxy Firewall E-mail, E-mail Content Filtering Content Filtering, Proxy Firewall www.clickndecide.com sales@clickndecide.com 6. Key features 6.1. Log Centralization & Archival The Click&DECiDE Log Archive module enables you to securely store all your logs in raw format or CSV of all your devices over the long-term. Click&DECiDE enable you to archive the following major log formats: Syslog. Flat Files. LEA (Check Point). Microsoft WMI. Radius. Or any Proprietary format. Click&DECiDE Log Archive is made of 2 key components: Log Storage and Log Vault. The Log Storage component generates logs in flat file and enriched CSV formats which are then written in the log storage directory. The Log Vault component enable to sign (SHA-A), compress (ZIP) and encrypt the log files (AES) before they are archived to meet international regulations. Files can be organized by device type or group and/or date. The compression rate is 90%. Logs can be replayed at any point in time by simply extracting a copy from the Log Vault. Key Points 13 Secure Archival in raw format of event log (in their unaltered and non modified state). Compression and signature of log files by day and/or by device for internal and external regulatory, legal and auditing needs. Post-mortem analysis from archived logs Archival and viewing of log files by Date/Source/Size or Type of Device Centralization in one place of all Enterprise activity data. www.clickndecide.com sales@clickndecide.com Key Benefits Thanks to the Click&DECiDE Log Archive module you can meet the following challenges: Ensure forensic analysis. Ensure the confidentiality, integrity and availability of your data Allow inquiries and investigations. Meet regulatory compliance 6.2. Dashboard Generation & Reporting Click&DECiDE interprets and presents holistic information, categorized in a clear format: Each dashboard can be easily adapted to your needs. Dashboards are generated according to the parameters that you select via the Click&DECiDE Web Portal. Navigation is very intuitive and user-friendly within each Dashboard, the hyperlinks will bring you to more and more detailed information, and you will benefit from the advanced drilldown features. The Click&DECiDE Task Scheduler enables you to define and schedule the generation of Dashboards and their distribution via e-mail to the major stakeholders. Click&DECiDE provide around 200 reports by default. 6.2.1. Examples of Click&DECiDE Pre-defined Dashboards Click&DECiDE delivers a wide range of pre-defined Dashboards by default, please find a non-exhaustive list below: Firewall/VPN Dashboards 14 Information on the Services. Information on the traffic. Most used Firewall rules. Bandwidth for the Top N Users. Connections per day/per hour. Address sources by status… www.clickndecide.com sales@clickndecide.com Proxy Dashboards Most Visited Domains by Visits. Top N Users/IP Addresses by Hits. Top N Users/IP Addresses by Session Length. Statistics on Proxy Status, File Types, Search Engines, Keywords … Most Visited Country, OS, Browser … Intrusion Detection Dashboards Top N messages classed by Hits. Alert destination by level. Attack Sources by level. Alert Messages by Source. Alert Messages by Destination. Top N attacks … Web Site Statistics Dashboards General Information on Web Pages‟ status. Most active sources classed by visit. Hits by month, day of the month, hour and so on … Visits by month, day of the month, hour and so on … Information on Search Engines. Information on Referees. Information on Browsers. Information on countries … Content Filtering Dashboards General information on the Viruses. Viruses received and sent by day. General information on e-mails. Incoming Viruses for Internal Addresses. Outgoing Viruses by Internal Senders. Volume of Incoming Mails by POP Server. Volume of Outgoing mails by SMTP Server… E-mail Statistics Reports 15 General E-mail Statistics, hourly/daily E-mail traffic. E-mail Address Statistics. Most Active E-mail Users. E-mail Messaging Flows, Inbound, Internal, Outbound E-mail Statistics. Top External Sender/Recipient Company. Total number of Encrypted E-mails… www.clickndecide.com sales@clickndecide.com Systems Statistics Reports WMI Filtered traffic, hourly/daily activity. Log activity for the Top n users. Top n failed/successful logons and successful logoffs by user. Security log, Security system event, Security Privilege Use Activity. Security Account Management Activity. File and Directory Access statistics by user. Event types of the day … Strong Authentication Dashboards General statistics by method and Group of Activities Status of connections. Mode of connexions. Events per day Authentication method Information on the blocked or accepted users. Information on the non used devices. Information per user, etc. 6.3. Easy Dashboard Access via Click&DECiDE Web Portal Click&DECiDE provides a secure Web Portal, accessed using a direct authentication with AD, for the consultation of your reports or for the generation of real time reports. Depending on the user profile, Click&DECiDE directly provides a pre-defined report or through a multi-criteria selection allows you to generate a report adapted to your needs. This real-time dynamic request feature makes it possible to analyze and generate reports with increasingly precise criteria. 16 www.clickndecide.com sales@clickndecide.com 6.4. Plan your Dashboard Generation via the Click&DECiDE Task Scheduler Click&DECiDE enables you to schedule easily reports via the Click&DECiDE Web Portal. The Click&DECiDE Task Scheduler makes the generation of static reports, simple and efficient. The Click&DECiDE Task Scheduler will be able to perform the following: Define your parameters by the type of report. Select the output format of your reports (Adobe Acrobat PDF). Define or arrange the availability of your reports. Create a mailing distribution list to send the reports as attachments. Choose the frequency of the generation of your reports. Moreover, the use of the Click&DECiDE Web Portal enables you to benefit from its user profile management system thus enabling you to define the users who are allowed to schedule or consult reports. 6.5. Event Correlation and Alerting Click&DECiDE delivers alerts and examples of correlation by default and simple alerts in multi-device combination. The alerts are sent to a Web Console Alert or by e-mail, SNMP Trap and/or Syslog. Administrators can easily use advanced function to create customized alerts and actions The Web Console enables you to easily manage real-time alerts. Administrators can easily use advanced function to create customized alerts and customized actions. 17 www.clickndecide.com sales@clickndecide.com Click&DECiDE correlate events from a wide range of network devices to provide faster decision making and greater enterprise security. Click&DECiDE provide an easy way to define the pattern of events, rules and corresponding actions to simplify the monitoring of network events. Click&DECiDE provides four possible correlation methods to correlate security events from different devices to identify security incidents and send trusted alerts: 1. Generate an alert when a fixed pattern is met. 2. Generate an alert when a threshold is met with a pre-defined session timeout (Memory Counter). 3. Generate an alert if either of the two above actions are identified, and correlated with information in a database, LDAP or a dictionary. 4. Generate an alert when the result of a query in the database meets certain criteria defined in the rule. This query can be scheduled. This method enables analysis over long periods of time such as port scans There are many benefits of event correlation. The correlation allows you to have a more efficient use of IT staff time and skills, optimization of “Business Continuity” as well as the prevention of revenue loss resulting from downtime is a major benefit. Click&DECiDE collects, archives and analyzes huge volumes of data for your Enterprise. These data need to be analyzed in real-time and are useful in many security scenarios. 18 www.clickndecide.com sales@clickndecide.com According to the pre-defined set of actions, several types of alerts or tasks can be executed: Publish the alert on the Alert and Correlation Console. Write in the database. Send an e-mail. Generate a SNMP TRAP. Launch a script. The Alert and Correlation Console can manage the priority level of alerts, warnings pay with comments for better traceability. 6.6. Alerting & Correlation Console Click&DECiDE provides a real-time HTTP Alerting & Correlation Console (ACC) for dynamic alert filtering and alert management. The Console is multi-user with advanced secure user profile management. The four tabs: Alert Summary, Information, Resolved and Search ; enable your IT Staff to quickly identify, isolate, filter and mitigate threats: Alert Summary: displays alerts that are either to be acknowledged or either in progress. Alerts can easily be managed by clicking the “In Progress” or “To be Acknowledged” icons in the Status column. Information: displays Information type alerts. Resolved: displays the alerts that have been treated and resolved. Search: displays all the alerts, clicking any of the icons or hyperlinks enables you to filter and group alerts. For example, filter events through an IP Address. 19 www.clickndecide.com sales@clickndecide.com The Console enables you to display up to sixteen fields: Alert Date, Type, Destination, Dependency, Due Date/ In Progress, Application, Number, Last Comment Level, Device, Event ID, Company, Risk, Source, Description, Last User. A user-friendly interface with intuitive graphs highlight the priority of alerts and the management due dates. Hyperlinks enable you to navigate between the tabs and access alert relevant links online. The Console centralizes and manages the status of your aggregated alerts via the Management, History and Extra Information tabs: Management: this tab enables you to consult the details concerning the aggregated alert and the alert status. You can easily modify the status, due date and priority and if needed forward the alert by SNMP, E-mail or Syslog.. History: this tab enables you to track alert mitigation by user profile and follow previous Alert Management modifications made to the Alert, along with the date, user profile and comments made. Extra Information: this tab contents additional information, displayed according to the parameters selected. Possibility to generate daily, weekly and monthly OLAP cubes for IP Source and or IP Destination. 20 www.clickndecide.com sales@clickndecide.com Advanced Configuration Panel The Alerting & Correlation Console Configuration Panel enables you to manage User Profiles, Filtering Rules and column display features in real-time. Column Display: enables the user to select the columns they want to be displayed in the Alerting & Correlation Console. Filtering Rules: enables the user to add and modify filtering rules according defined criteria. 21 User Profiles: enables Administrators to define, edit and delete user profiles and assign permissions. www.clickndecide.com sales@clickndecide.com 6.7. Advanced Forensic Analysis & Data Manipulation Click&DECiDE enables you to store your data and so on preserving an Audit Trail and make an analysis in depth on this data. An Audit Trail is a set of logs and records maintained in chronological order which is used to provide evidence during an incident. These logs and records can be used a posteriori to detect and identify intruders. In the case of advanced searches, traceability and forensic analysis, Click&DECiDE proposes the following methods: Cubes Traceability Reports multi-equipment, multi-sources Report Generator – Click&DECiDE Builder 6.7.1. Cubes The OLAP cubes allow you to manipulate huge volumes of data and easily perform Forensic Investigation. Thanks to the Cubes, your IT staff can quickly gain answers to the „who‟, „what‟ and „why‟ based on a large set of data. The OLAP Cubes are based on dimensions and measures. Dimensions represent the objects of analysis. For example in a network intrusion log, dimensions could be source IP address, destination IP address, attack signature and time. Measures represent the numeric data that you analyze across dimensions. For example, in the same network intrusion log, the number of instances of connections between a particular pair of IP addresses would be a measure. The slice and dice feature of Click&DECiDE Cubes makes these queries intuitive and easy to use. The following questions could therefore be answered by a Click&DECiDE Cube based on the above example: How many of a specific attack can be seen to be attacking or originating from a specific IP address? How many specific attacks are common over the day, week, month or year? Which specific IP addresses are attractive to attackers over time? Dimensions can be structured hierarchically. Our Cubes‟ drill-down feature allows you to examine data at various levels depending on the analysis in question. The dimensions and measures forms the data cube that the analyst manipulates to access various views of the data. The power that Click&DECiDE Cubes brings to a database full of logs is impressive. The utility of Cubes can be leveraged further by the richness of your logs and the variety of queries entered. To use Cubes you need to install “Microsoft Office 2003 Web components”, as is the case for Pivot Cross Tables, except that Click&DECiDE Cubes can be used without any size restrictions. 22 www.clickndecide.com sales@clickndecide.com 23 Multi-device, multi-source Traceability Reports on the activity of an IP Address over a pre-defined period, which traces events a posteriori. - Date - Origin - Action - Source IP - Destination IP - Rule/Attack/Results - Source Area - Destination Area Report Generator – Click&DECiDE Builder: For the generation of customized reports Click&DECiDE Builder allows you to create specific reports, customized for your company‟s look and feel and according to your needs. Click&DECiDE Builder allows you to modify the pre-defined reports that you can consult as well on line on the Click&DECiDE Web Portal. In addition, Click&DECiDE Builder enables you to create reports “from scratch” for all your needs of Business Intelligence. It thus meets all the specific needs of each department of your company. www.clickndecide.com sales@clickndecide.com 7. System Requirements Required Configuration for Click&DECiDE 7.1. Systems For demo or light evaluation (less than 1 Million of event per day) o Windows XP SP3 or greater o Windows Vista SP3 or greater o Windows 7 (32 and 64 bits) For production o Windows 2003 SP2 or greater (32 and 64 bits) o Windows 2008 SP1 or greater (32 and 64 bits) Minimum RAM: 2Gb for demo or light evaluation, 4Gb for production Minimum Hard disk: Programs : 1,5Gb without logs Logs: o Cannot exceed 4Gb, if you are using SQL Server express edition. o Otherwise, please read our Click&DECiDE NSI Volume Estimation Guide 7.2. Components • Microsoft Web Components 11 (version 12) • SQL Server Native Client 2005 SP3 or greater • Microsoft .NET Framework 3.5 SP1 or greater • IIS (default version from system version) 7.3. Databases • SQL Server 2005 (Express for demo or light evaluation only, Standard or Enterprise for production) SP3 or greater • SQL Server 2008 (Express for demo or light evaluation only, Standard or Enterprise for production) SP1 or greater (32 and 64 bits) Note: if you have installed Microsoft IIS (Interne Information Services) after installing the Microsoft .NET Framework 3.5 SP1, don‟t forget to enable the Microsoft.NET framework in IIS as below: 1. Select Start> All Programs> Accessories> Command Prompt. 2. Go to the following directory where the Microsoft framework was installed: C:\Windows\Microsoft.NET\Framework\v2.0.50727 (by default). 3. Run the following command: aspnet_regiis –i 24 www.clickndecide.com sales@clickndecide.com 8. Conclusion Succeed with Click&DECiDE: Quickly identify hidden threats while meeting audit, regulatory and legal requirements such as Sarbanes-Oxley with centralized log and event consolidation in a centralized or distributed architecture. Improve system availability, service assurance and protect intellectual property with real-time intrusion detection. Identify real incidents from amongst event noise and false positive alerts to gain meaningful and realtime security information Here are just a few of the reasons why our customers choose Click&DECiDE: Centralize logs from any network device. Transform your raw data into key indicators Reduce security costs through automation Generate added-value to your investments. Analyse activity by user and department. Optimize network capacity planning management. Improve IT staff efficiency. Identify the attacks by Source and Type Reduce the “Business Risk” by answering in real-time to the security incidents Get compliant with international regulations. Click&DECiDE offers a complete, integrated solution that allows at the same time: Collect and archive logs. Centralization and archiving of the logs in the raw format Delivery of dashboards on the majority of your equipments. Real-time rise of the correlated alerts. Forensic analysis and data manipulation. With Click&DECiDE your IT team now has the ability to proactively discover, detect and prevent intrusive activities and provide up-to-the minute dashboard reports for the management. If you want more information about Click&DECiDE solutions, please visit our website: www.clickndecide.com where you can find product sheets, corporate presentations, and you can download the free evaluation license. If you want an online demo, please contact our sales team: sales@clickndecide.com 25 www.clickndecide.com sales@clickndecide.com