Contents/Index/Search Download Complete PDF Send Feedback Print This Page

Previous

Next

Configuring Event Definitions

Use the Policy tab to configure and customize the events that define the SmartEvent Event Policy.

Related Topics

Tuning SmartEvent Using Learning Mode

Modifying Event Definitions

Creating Event Definitions (User Defined Events)

Eliminating False Positives

Administrator Permissions Profile - Policy

Tuning SmartEvent Using Learning Mode

SmartEvent is ready "out-of-the-box" with an Event Policy based on real-world expectations. In most cases, however, further fine-tuning is required. The SmartEvent Learning Mode analyzes the Event Log and generates a report with suggestions as to what modifications you should make to your system Event Policy. It should be run a day or so after installing SmartEvent, and whenever you want to further refine the events detected.

Running Learning Mode

To run Learning Mode, proceed as follows:

  1. From the Actions menu, select Learning Mode.
  2. Select Advanced analysis method, and then select Advanced.
  3. Choose from which date you would like to analyze events. If this is the first time you are running Learning Mode, it is recommended to select Analyze entire database.
  4. Select OK to close the Learning mode advanced options window, and OK again to begin the analysis. This may take some time.

Working with Learning Mode Results

When the analysis is complete, a browser window opens with SmartEvent recommendations for fine-tuning your Event Policy. Once Learning Mode presents its results, proceed as follows:

  1. Review the Learning Mode results.
  2. If you do not want to accept the SmartEvent recommendation, clear the applicable recommendation.
  3. To apply the suggestions, select Apply.
  4. Select the Policy tab to confirm that the changes have been applied to specific Event Definitions. Specifically review per event what exceptions have been added to the section Apply the following exceptions.
  5. To save and implement these changes to the Event Policy, select File > Save, and Actions > Install Event Policy.

Modifying Event Definitions

SmartEvent is constantly culling data from your Log servers, and searching for patterns within all the network chatter that enters your system.

Depending on the levels set within each Event Definition, the number of events detected can be quite high. Yet only a portion of those events may be meaningful. By modifying the thresholds and other criteria that make up an event, you can reduce the number of false alarms.

Note - Use Learning Mode First

These modifications are done in the Event Definitions. A high-level view of the process of modifying Event Definitions is as follows:

  1. Select a type of event from one of the Event Policy categories.
  2. Adjust the Event Definitions as desired. The elements that can be modified vary per Event Definition. Some event types will include all; others will have just one or two of these configurable elements.
  3. When you have finished making changes to the Event Definitions, save the Event Policy by selecting File > Save.
  4. From the Actions menu, select Install Event Policy.

Event Definitions and General Settings

The Selector tree is divided into two branches: Event Policy and General Settings. All of the events detectable by SmartEvent are organized by category in the Event Policy branch. Selecting an event definition displays its configurable properties in the Detail pane, and a description of the event in the Description pane. Clearing the property removes this event type from the Event Policy the next time the Event Policy is installed.

The General Settings branch contains Initial Settings, such as defining Correlation Units, which are typically used for initial configuration. Clicking on a General Settings item displays its configurable properties in the Detail pane.

For details on specific attacks/events, refer to the Event Definition Detail pane.

Event Definition Parameters

When an event definition is selected, its configurable elements appear in the Detail pane, and a description of the event is displayed in the Description pane. There are generally six types of configurable elements:

  • Thresholds, such as Detect the event when more than x connections were detected over y seconds
  • Severity, such as Critical, Medium, Informational, etc.
  • Automatic Reactions, such as Block Source or run External Script
  • Exclusions, such as Exclude the following sources and destinations
  • Exceptions, such as Apply the following exceptions
  • Time Object, such as to issue an event if the following occurs outside the following Working Hours

Not all of these elements appear for every Event Definition. After installing and running SmartEvent for a short time, you will discover which of these elements need to be fine-tuned per Event Definition. For more about fine-tuning Event Definitions, see Configurable Elements of Event Definitions.

The configurable settings are straight-forward for the General Settings items. Adding a Time Object opens a window to set the appropriate hours and days of the week. For configuration information regarding most objects in General Settings, see System Administration.

Event Threshold

The Event Threshold allows you to modify the limits that, when exceeded, indicates that an event has occurred. The limits typically are the number of connections, logs, or failures, and the period of time in which they occurred. It appears thus:

Detect the event when more than x connections/logs/failures (etc.) were detected over a period of y seconds.

One way of decreasing the number of false alarms based on a particular event is to increase the number of connections, logs or failures and/or the period of time for them to occur.

Severity

An event severity affects in which queries (among those that filter for severity) this type of event will appear.

To modify the severity of an event, select a severity level from the drop-down list.

Automatic Reactions

Upon detection, an event can activate an Automatic Reaction. The SmartEvent administrator can create and configure a single Automatic Reaction, or many, according to the needs of the system. For example, a single Mail Reaction can be defined to inform the administrator of any event to which it is applied, or multiple Automatic Mail Reactions can be created in order to inform a different responsible party for each type of event.

There are five kinds of Automatic Reactions:

  • Mail - alert an administrator by email that the event has occurred
  • SNMP Trap - generate an SNMP Trap

    It is possible to send event fields in the SNMP Trap message. The format for such an event field is [seam_event_table_field]. The following list represents the possible seam_event table fields:

    AdditionalInfo varchar(1024)

    AutoReactionStatus varchar(1024)

    Category varchar(1024)

    DetectedBy integer

    DetectionTime integer

    Direction integer

    DueDate integer

    EndTime integer

    EventNumber integer

    FollowUp integer

    IsLast integer

    LastUpdateTime integer

    MaxNumOfConnections integer

    Name varchar(1024) ,NumOfAcceptedConnections integer

    NumOfRejectedConnections integer

    NumOfUpdates integer

    ProductCategory varchar(1024)

    ProductName varchar(1024)

    Remarks varchar(1024)

    RuleID varchar(48)

    Severity integer

    StartTime integer

    State integer

    TimeInterval integer

    TotalNumOfConnections varchar(20)

    User varchar(1024)

    Uuid varchar(48)

    aba_customer varchar(1024) ,

    jobID varchar(48)

    policyRuleID varchar(48)

  • Block Source - instruct the Security Gateway to block the source IP address(es) from which this event was detected for a configurable period of time (choose any period of time from one minute to over three weeks).
  • Block Event activity - instruct the Security Gateway to block a distributed attack emanating from multiple sources or attacking multiple destinations for a configurable period of time (choose any period of time from one minute to over three weeks).
  • External Script - run a script that you provide. See Creating an External Script for help in writing a script that can exploit SmartEvent data.

Each Automatic Reaction must be defined, and that can be done either from within an Event Definition, or from General Settings > Objects > Automatic Reactions.

The following sections describe how to add an Automatic Reaction to an event, and how to create

Adding an Automatic Reaction to an Event

To add an Automatic Reaction for SmartEvent to execute when this type of event is detected, proceed as follows:

  1. Select the icon [...].
  2. Either select an Automatic Reaction that you have created from the list, or select Add new…. (See section below for details on creating each type of Automatic Reaction.)
  3. Configure the Automatic Reaction, and then select Save.
  4. Click OK.
Creating Automatic Reactions

Automatic Reactions can be created either from:

  • within an Event Definition, by selecting the icon [...] and clicking Add new…
  • the Policy tab, by selecting General Settings > Objects > Automatic Reactions

The first step for each of the following procedures assumes that you are at one of these two starting points.

Create a Mail Reaction
  1. Select Add > Mail.
  2. Give the automatic reaction a significant Name.
  3. Fill out the Mail Parameters of From, To and cc. To add multiple recipients, separate each email address with a semi-colon. Note that the Subject field has the default variables of [EventNumber] - [Severity] - [Name], which automatically adds to the mail subject the event number, severity and name of the event that triggered this reaction. These variables can be removed at your discretion. You can also include your own standard text per mail reaction.
  4. Enter the domain name of the SMTP server.
  5. Select Save.
Create an SNMP Trap Reaction
  1. Select Add > SNMP Trap.
  2. Give the automatic reaction a significant Name.
  3. Fill out the SNMP Trap parameters of Host, Message, OID and Community name. The command send_snmp uses values that are found in the file chkpnnt.mib, in the directory $CPDIR/lib/snmp/. Any OID value used in the SNMP Trap parameters window must be defined in chkpnnt.mib, or in a file that is referenced by it. If the OID field is left blank, then the value is determined from iso.org.dod.internet.private.enterprises.checkpoint.products.fw.fwEvent = 1.3.6.1.4.1.2620.1.1.11.

    When the automatic reaction occurs, the SNMP Trap is sent as a 256 byte DisplayString text. However, if the OID type is not text, the message is not sent.

  4. Select Save.
Create a Block Source Reaction
  1. Select Add > Block Source.
  2. Give the automatic reaction a significant Name.
  3. Select from the drop-down list or enter the number of minutes to block this source.
  4. Select Save.
Create a Block Event Activity Reaction
  1. Select Add > Block Event Activity.
  2. Give the automatic reaction a significant Name.
  3. Select from the drop-down list or enter the number of minutes to block this source.
  4. Select Save.
Create an External Script Reaction
  1. Select Add > External Script.
  2. Give the automatic reaction a significant Name.
  3. Do one of these steps:
    1. Enter the full path and file extension of the script.
    2. Make sure that the executable is located on the SmartEvent server in the directory $FWDIR/bin.
      The path and script name must not contain any spaces.
  4. Select Save.

    Note - The script must run no longer than 10 minutes, otherwise it will be terminated by the SmartEvent Server.

Working Hours

Working Hours are used to detect unauthorized attempts to access protected systems and other forbidden operations after-hours. To set the Regular Working Hours for an event, select a Time Object that you have configured from the drop-down list.

To create a Time Object:

  1. From the Policy tab, select General Settings > Objects > Time Objects.
  2. Click Add. Enter a Name and Description.
  3. Select the days and times that are considered Regular Working Hours.
  4. Click OK.

To assign a Time Object to an event:

  1. From the Policy tab, select an event that requires a Time Object (for example, User Login at irregular hours in the Unauthorized Entry event category).
  2. Select the Time Object you created from the drop-down list.
  3. Select File > Save to save the configuration.

Adding Exclusions

Exclusions remove log entries from query results according to defined criteria (query properties). For example, if source 10.10.10.1 is defined as an exclusion for an event, all events with source 10.10.10.1 do not show in the query result. Global Exclusions work in the same way, except they apply to all events.

You can add exclusions in one of these ways:

  • Manually using this window
  • By accepting Learning Mode recommendations
  • By right-clicking an event and selecting Exclude from event definition.

To manually add an exclusion:

  1. Click Add.
  2. In the Exclusion window, select the Source and/or destination Server object you want to exclude from the query results.
  3. Configure any other filter criteria that are available for the specified event.
  4. Optionally, click Apply and delete existing events to remove the excluded events from the existing query results.

    If you do not see the host object listed, you may need to create it in SmartEvent.

You can change or delete existing exclusions by selecting Edit or Remove, respectively.

Exceptions

Exceptions allow an event to be independently configured for the sources or destinations that appear here. For example, if the event Port Scan from Internal Network is set to detect an event when 30 port scans have occurred within 60 seconds, you can also define that two port scans detected from host A within 10 seconds of each other is also an event.

To manually add an exception, under the heading Apply the following exceptions, click Add and select either the Source and/or Destination of the object to which you want to apply different criteria for this event.

Note - If you do not see the host object listed, you may need to create it in SmartEvent.

Existing exceptions can be modified or deleted by selecting Edit or Remove, respectively.

Creating Event Definitions (User Defined Events)

Creating a user-defined event requires knowledge of the method by which SmartEvent identifies events. The following section begins with a high level overview of how logs are analyzed to determine if an event is occurring or has occurred.

High Level Overview of Event Identification

Events are detected by the SmartEvent Correlation Unit. The Correlation Unit task is to scan logs for criteria that match an Event Definition. SmartEvent uses these procedures to identify events:

Matching a Log Against Global Exclusions

When the Correlation Unit reads a log, it first checks whether the log matches any defined Global Exclusions. Global Exclusions (defined on the Policy tab > Event Policy > Global Exclusions) direct SmartEvent to ignore logs that are not expected to contribute to an event. If the log matches a Global Exclusion, it is discarded by the system. If not, the Correlation Unit begins matching it against each Event Definition.

Matching a Log Against Each Event Definition

Each Event Definition contains a filter which is comprised of a number of criteria that must be found in any matching log. The criteria are divided by product; that is, the Event Definition may include a number of different products, but each product has its own criteria.

Event Definition Criteria

For a log from Endpoint Security to match on Event Definition "A", it must match the Action, Event Type, Port, and Protocol values listed in the Endpoint Security column. A log from a Security Gateway must match the values listed in its column.

SmartEvent divides this process into two steps. The Correlation Unit first checks whether the Product value in the log matches one of the acceptable Product values of an Event Definition.

If Log 1 did not contain an acceptable Product value, the Correlation Unit would then compare the log against Event Definition "B", and so on. If the log fails to match against any Event Definition, it is discarded.

After checking the "Product" criterion, the Correlation Unit checks whether the log contains the Product-specific criteria to match the Event Definition. For instance, the product Endpoint Security generates logs that involve the Firewall, Spyware, Malicious Code Protection, and others, and the log contains this information in the field "Event Type". If an event is defined to match on Endpoint Security logs with the Event Type "Firewall", then an Endpoint Security log with Event Type "Spyware" will fail against the Event Definition filter. Other criteria may be specific to the Product as well.

Returning to our example, Log 1 has matched Event Definition "A" with an acceptable Product value. The Correlation Unit now examines whether the log contains the necessary criteria for an Endpoint Security log to match.

Comparing Log Details with Event Definition

If the criteria did not match, the Correlation Unit would continue comparing the log criteria to other Event Definitions, until discarding it.

Creating an Event Candidate

Once a log matches the criteria, it is added to an Event Candidate. Event Candidates let SmartEvent tracks logs until an event threshold has been crossed, at which point an event is generated.

Event Candidate

Note that:

  • the Event Candidate can track logs from multiple products
  • the logs must originate from the same source
  • the Event Candidate tracks logs even before all of the criteria have been matched

Each Event Definition may have multiple Event Candidates existing simultaneously, each of which is keeping track of logs grouped by similar properties, such as by host, service, destination, or any combination of these or others. In the figure above the logs that form the Event Candidate have a common Source value, and have been dropped, blocked or rejected by a Firewall. They are grouped together because the Event Definition is designed to detect this type of activity originating from a single source.

Whenever a log matches the Event Definition but has properties different than those of the existing Event Candidates, a new Event Candidate is created and added to what can be thought of as the Event Candidate Pool.

New Event Candidate Added to the Pool

Note that SmartEvent creates a new Event Candidate for a log with a different source.

To illustrate further, consider an event defined to detect a high rate of blocked connections. SmartEvent tracks the number of blocked connections for each Firewall, and the logs of the blocked traffic at each Firewall forms an event candidate. When the threshold of blocked connection logs from any Firewall is surpassed, that Firewall event candidate becomes an event. While this Event Definition creates one event candidate for each Firewall monitored, other Event Definitions may create many more.

A log joins an Event Candidate

The Event Candidate Pool is a dynamic environment, with new logs being added and older logs being discarded when they have exceeded an Event Definition time threshold.

When a Candidate Becomes an Event

When a candidate becomes an event, the Correlation Unit forwards the event to the Event Database. But discovering an event does not mean that SmartEvent stops tracking logs related to it. The Correlation Unit will keep adding matching logs to the event as long as they continue to arrive during the event threshold. Keeping the event "open" condenses what might otherwise appear as many instances of the same event to one, and provides accurate, up-to-date information as to the beginning and end time of the event.

Creating a User-Defined Event

New Event Definitions can be created by right clicking an existing Event Definition or via the Actions menu:

Right Click

Actions Menu

Description

New

New Custom Event

Launches the Event Definition Wizard, which allows you to choose whether to base the event on an existing Event Definition, or from scratch.

Save As

Save Event As

Creates an Event Definition based on the properties of the highlighted Event Definition. When selecting Save As, the system prompts you to save the selected Event Definition with a new name for later editing. Save As can also be accessed from the Properties window.

All User Defined Events are saved at Policy tab > Event Policy > User Defined Events. Once an Event Definition exists here, it can be modified via the Properties window, available by right click and from the Actions menu.

Creating a New Event Definition

To create a User Defined Event based on an existing event:

  1. From the Actions menu, select New Custom Event.

    The Event Definition Wizard opens.

  2. For Create an event, select that is based on an existing event and select an event that has similar properties to the event you want to create. Click Next.
  3. Give the Event Definition a name, enter a Description and select a Severity level. Click Next.
  4. Set whether the event is generated by:
    • a single log — In many cases, a single log can depict an event, such as a log from a virus scanner that reports that a virus has been found.
    • multiple logs — Multiple logs are required if the event can only be identified as a result of a combination of multiple logs, such as a High Connection Rate.

    Click Next.

  5. Check the products that can trigger this event and select Next.
  6. Choose whether to edit the product filters.
    • If you added an additional product you can choose whether you want to edit the filters for each product (Edit all product filters), or only those of new products you have added (Edit only newly selected product filters).
    • If you did not add any additional products, you can choose to edit the filters of existing products (Yes) or you can skip the step and leave the product filters unchanged (No, Leave the original files).

    Click Next.

  7. Edit or add product filters for each product by For each log field that you want in the Event Definition filter:
    1. Select the Log field from the available Log Field list.
    2. Click Add to edit the filter.
    3. Select whether the filter matches on All Conditions or Any Conditions.
    4. Double-click on the Log field and select the values to use in the filter.

    Click Next.

  8. Once you have defined the filters for each product, define how to process logs by selecting values for the following options:
    • Detect the event when at least __ logs occurred over a period of __ seconds contains the event thresholds that define the event. You can modify the event thresholds by altering the number of logs and/or the period of time that define the event.
    • Each event definition may have multiple Event Candidates existing simultaneously allows you to set whether SmartEvent creates distinct Event Candidates based on a field (or set of fields) that you select below.

      Select the field(s) by which distinct Event Candidates will be created allows you to set the field (or set of fields) that are used to differentiate between Event Candidates.

    • Use unique values of the __ field when counting logs directs SmartEvent to count unique values of the specified field when determining whether the Event Threshold has been surpassed. When this property is not selected, SmartEvent counts the total number of logs received.
  9. Click Finish.

Editing a User-Defined Event

  1. From the Policy tab > Event Policy > User Defined Events, right click a User-Defined Event and select Properties.
  2. In the tabs provided make the necessary changes:

    Name

    Give the Event Definition a name, enter a Description and select a Severity level. The text you enter in the Description field appears in the Event Description area (under the event configurable properties).

    Filter

    To edit a product filter select the product and do the following:

    1. Select the Log field from the available Log Fields list.

      If the field you want is not displayed select Show more fields... to add another field to the Log Fields list.

    2. Click Add to edit the filter.
    3. Select whether the filter matches on All Conditions or Any Conditions.

    Count logs

    This screen defines how SmartEvent counts logs associated with this event.

    • a single log — In many cases, a single log can depict an event, such as a log from a virus scanner that reports that a virus has been found.

      With this option you can set the fields that are used to group events into Event Candidates. Logs with matching values for these fields are added to the same event. For example, multiple logs reporting a virus detected on the same source with the same virus name will be combined into the same event.

    • multiple logs — Multiple logs are required for events that identify a certain level of activity, such as a High Connection Rate.

      When the event is triggered by multiple logs, set the behavior of Event Candidates:

      Detect the event when at least... — Set the Event Threshold that, when exceeded, indicates that an event has occurred.

      Select the field(s) by which distinct event candidates will be created — An event is generated by logs with the same values in the fields specified here. Define how logs are grouped into Event Candidates by selecting the relevant fields here.

      Use unique values of the ...— Only logs with unique values for the fields specified here are counted in the event candidate. For example, a port scan event might count logs that include unique ports scanned, and do not increment the log count for logs that contain ports already encountered in the event candidate.

      Advanced — enables you to define the keep=alive time for the event, as well as how often the Correlation Unit updates the SmartEvent server with new logs for the created event.

    Event Format

    When an event is generated, information about the event is presented in the Event Detail pane.

    This screen lets you specify whether the information will be added to the detailed pane and from which Log Field the information is taken.

    If you do not want to populate an Event Field clear it in the Display column.

    GUI representation

    All events can be configured and this screen allows you to determine the configuration parameters that are displayed.

    The Threshold section will display the number of logs that need to be matched to create the event. This is usually not displayed for single log events and displayed for multiple log events.

    The Exclude section lets you specify the log fields that will be displayed when adding an event exclusion.

    The Exception section lets you specify the log fields that will be displayed when adding an event exception.

  3. Click Ok to save your changes.

Eliminating False Positives

The purpose of this chapter is to provide additional assistance in reducing false positives.

Services that Generate Events

Certain types of services are characterized by a high amount of traffic that could be misidentified as events. The following are examples of services and protocols that could potentially generate events:

  • Software that performs a routine scan of the network to make sure that everything is running properly. Configuring SmartEvent to exclude this source from a scan event will eliminate a source of false positive events.
  • High connection rate on a web server. SmartEvent should be set to allow a higher connection rate per minute on a busy web server, or to exclude this source from a scan event.

Common Events by Service

The information in the table below provides a list of server types where high activity is common. Modify the Event Policy by adjusting event thresholds and adding Exclusions for servers and services in order to further reduce the amount of false positives detected.

Common events by service

Server Type

Category

Event Name

Source

Dest

Service

Reason

SNMP

Scans

IP sweep from internal network

Any

Any

SNMP-read

Hosts querying other hosts

DNS Servers

Scans

IP sweep from internal network

DNS servers

-

DNS

Inter-DNS servers updates

 

Denial of Service (DoS)

High connection rate on internal host on service

Any

DNS servers

DNS

DNS requests and inter-DNS servers updates

 

Anomalies

High connection rate from internal network

Any

Any

DNS

DNS requests and inter-DNS servers updates

 

Anomalies

High connection rate from internal network on service

Any

Any

DNS

DNS requests and inter-DNS servers updates

 

Anomalies

Abnormal activity on service

Any

Any

DNS

DNS requests and inter-DNS servers updates

NIS Servers

Scans

Port scan from internal network

NIS servers

Any

-

Multiple NIS queries

 

Denial of Service (DoS)

High connection rate on internal host on service

Any

NIS servers

NIS

NIS queries

 

Anomalies

High connection rate from internal network

Any

Any

NIS

NIS queries

 

Anomalies

High connection rate from internal network on service

Any

Any

NIS

NIS queries

 

Anomalies

Abnormal activity on service

Any

Any

NIS

NIS queries

LDAP Servers

Denial of Service (DoS)

High connection rate on internal host on service

Any

LDAP servers

LDAP

LDAP requests

 

Anomalies

High connection rate from internal network

Any

LDAP servers

LDAP

LDAP requests

 

Anomalies

High connection rate from internal network on service

Any

LDAP servers

LDAP

LDAP requests

 

Anomalies

Abnormal activity on service

Any

LDAP servers

LDAP

LDAP requests

HTTP Proxy Servers - Hosts To Proxy Server

Denial of Service (DoS)

High connection rate on internal host on service

Any

Proxy servers

HTTP:8080

Hosts connections to Proxy servers

 

Anomalies

High connection rate from internal network

Any

Proxy servers

HTTP:8080

Hosts connections to Proxy servers

 

Anomalies

High connection rate from internal hosts on service

Any

Proxy servers

HTTP:8080

Hosts connections to Proxy servers

 

Anomalies

Abnormal activity on service

Any

Proxy servers

HTTP:8080

Hosts connections to Proxy servers

HTTP Proxy Servers - Out to the Web

Scans

IP sweep from internal network

Proxy servers

 

Any

HTTP/ HTTPS

Proxy servers connections out to various sites

 

Denial of Service (DoS)

High connection rate on internal host on service

Proxy servers

 

Any

HTTP/ HTTPS

Proxy servers connections out to various sites

 

Anomalies

High connection rate from internal network

Proxy servers

 

Any

HTTP/ HTTPS

Proxy servers connections out to various sites

 

 

High connection rate from internal hosts on service

Proxy servers

 

Any

HTTP/ HTTPS

Proxy servers connections out to various sites

 

Anomalies

Abnormal activity on service

Proxy servers

 

Any

HTTP/ HTTPS

Proxy servers connections out to various sites

UFP Servers

Denial of Service (DoS)

High connection rate on internal host on service

Any

UFP servers

Any/UFP by vendor

Firewall connections to UFP servers

 

Anomalies

High connection rate from internal network

Any

UFP servers

Any/UFP by vendor

Firewall connections to UFP servers

 

Anomalies

High connection rate from internal hosts on service

Any

UFP servers

Any/UFP by vendor

Firewall connections to UFP servers

 

Anomalies

Abnormal activity on service

Any

UFP servers

Any/UFP by vendor

Firewall connections to UFP servers

CVP Servers Request

Denial of Service (DoS)

High connection rate on internal host on service

Any

CVP servers

Any/CVP by vendor

Firewall connections to CVP servers

 

Anomalies

High connection rate from internal network

Any

CVP servers

Any/CVP by vendor

Firewall connections to CVP servers

 

Anomalies

High connection rate from internal hosts on service

Any

CVP servers

Any/CVP by vendor

Firewall connections to CVP servers

 

Anomalies

Abnormal activity on service

Any

CVP servers

Any/CVP by vendor

Firewall connections to CVP servers

CVP Servers Replies

Scans

Port scans from internal network

CVP servers

Any

-

multiple CVP replies to same GW

 

Scans

IP sweep from internal network

CVP servers

-

CVP

CVP replies to multiple GWs

 

Denial of Service (DoS)

High connection rate on internal host on service

CVP servers

Any

Any/CVP by vendor

CVP replies

 

Anomalies

High connection rate from internal network

CVP servers

Any

Any/CVP by vendor

CVP replies

 

Anomalies

High connection rate from internal hosts on service

CVP servers

Any

Any/CVP by vendor

CVP replies

 

Anomalies

Abnormal activity on service

CVP servers

Any

Any/CVP by vendor

CVP replies

UA Server Request

Denial of Service (DoS)

High connection rate on internal host on service

Any

UA servers

uas-port (TCP:19191 TCP:19194)

connections to UA servers

 

Anomalies

High connection rate from internal network

Any

UA servers

(TCP:19191 TCP:19194)

connections to UA servers

 

Anomalies

High connection rate from internal hosts on service

Any

UA servers

uas-port (TCP:19191 TCP:19194)

connections to UA servers

 

Anomalies

Abnormal activity on service

Any

UA servers

uas-port (TCP:19191 TCP:19194)

connections to UA servers

UA Servers Replies

Scans

Port scans from internal network

UA servers

Any

-

multiple UA replies to the same computer

 

Scans

IP sweep from internal network

UA servers

Any

uas-port (TCP:19191 TCP:19194)

multiple UA replies to multiple computers

 

Denial of Service (DoS)

High connection rate on internal host on service

UA servers

Any

uas-port (TCP:19191 TCP:19194)

UA replies

 

Anomalies

High connection rate from internal network

UA servers

Any

uas-port (TCP:19191 TCP:19194)

UA replies

 

Anomalies

High connection rate from internal hosts on service

UA servers

Any

uas-port (TCP:19191 TCP:19194)

UA replies

 

Anomalies

Abnormal activity on service

UA servers

Any

uas-port (TCP:19191TCP:19194)

UA replies

SMTP Servers

Scans

IP sweep from internal network

SMTP servers

-

SMTP

SMTP servers connections out to various SMTP servers

 

Denial of Service (DoS)

High connection rate on internal host on service

SMTP servers

Any

SMTP

SMTP servers connections out to various SMTP servers

 

Anomalies

High connection rate from internal network

SMTP servers

Any

SMTP

SMTP servers connections out to various SMTP servers

 

Anomalies

High connection rate from internal hosts on service

SMTP servers

Any

SMTP

SMTP servers connections out to various SMTP servers

 

Anomalies

Abnormal activity on service

SMTP servers

Any

SMTP

SMTP servers connections out to various SMTP servers

Anti-Virus Definition Servers

Scans

IP sweep from internal network

AV_Defs servers

-

Any/AV by vendor

Anti-Virus definitions updates deployment

 

Denial of Service (DoS)

High connection rate on internal host on service

AV_Defs servers

-

Any/AV by vendor

Anti-Virus definitions updates deployment

 

Anomalies

High connection rate from internal network

AV_Defs servers

-

Any/AV by vendor

Anti-Virus definitions updates deployment

 

Anomalies

High connection rate from internal hosts on service

AV_Defs servers

-

Any/AV by vendor

Anti-Virus definitions updates deployment

 

Anomalies

Abnormal activity on service

AV_Defs servers

-

Any/AV by vendor

Anti-Virus definitions updates deployment

Administrator Permissions Profile - Policy

SmartEvent lets you to assign a Profile to an administrator for the SmartEvent database. When an administrator logs into SmartEvent his user name and password are verified by the SmartEvent server. If the administrator is not defined on the SmartEvent server, the server will attempt the login process with the credentials that are defined on the Security Management Server or Multi-Domain Server connected with SIC to the SmartEvent server.

The Permission Profile types for the SmartEvent Events tab are set in the SmartDashboard or SmartDomain Manager (SmartDashboard > Manage > Permissions Profiles > New / Edit) connected to the Security Management Server or Multi-Domain Server with this option:

The following are the four types of Permission Profiles:

  • None indicates that the administrator cannot view the SmartEvent Policy tab.
  • Read Only enables the administrator to view SmartEvent Policy tab.
  • Read/Write enables the administrator to perform Install Policy and modify the SmartEvent Policy tab.

    With Read/Write permissions the administrator can also configure one or both of the following from within the Events tab:

    • Exclude from Event Definition
    • Add Exception to Event Definition
  • Customized allows user-defined access to the selected Check Point products and select permissions per application

Multi-Domain Security Management

When using Multi-Domain Security Management, SmartEvent works with specified Domains. In the Policy tab, administrator can see events, exceptions and exclusions for Domains according to administrator permissions.

A Multi-Domain Security Management Policy administrator can be one of the following:

  • Locally defined administrator on the SmartEvent Server
  • Multi-Domain Server Super User defined on the Multi-Domain Server.
  • An administrator with permissions to all Domains selected in SmartEvent (Policy > General Settings > Objects > Domains). Unlike the two above, this type of administrator can install a Policy and can view events that are cross-Domain (an event created from logs that come from multiple Domains).
 
Top of Page ©2013 Check Point Software Technologies Ltd. All rights reserved. Download Complete PDF Send Feedback Print