RSA NetWitness Platform

Similar documents
RSA NetWitness Platform

RSA NetWitness Logs. Salesforce. Event Source Log Configuration Guide. Last Modified: Wednesday, February 14, 2018

RSA NetWitness Logs. Microsoft Azure NSG (Flow Logs) Event Source Log Configuration Guide. Last Modified: Monday, February 26, 2018

RSA NetWitness Platform

RSA NetWitness Platform

RSA NetWitness Logs. Symantec DLP Last Modified: Thursday, April 12, Event Source Log Configuration Guide

RSA NetWitness Platform

Aruba Networks Mobility Controller

RSA NetWitness Platform

RSA NetWitness Logs. Microsoft Network Policy Server. Event Source Log Configuration Guide. Last Modified: Thursday, June 08, 2017

RSA NetWitness Logs. VMware vcenter Server. Event Source Log Configuration Guide. Last Modified: Thursday, November 30, 2017

Azure Archival Installation Guide

RSA NetWitness Platform

RSA NetWitness Logs. Microsoft SharePoint Server. Event Source Log Configuration Guide. Last Modified: Friday, June 02, 2017

RSA NetWitness Logs. Microsoft System Center Configuration Manager. Event Source Log Configuration Guide. Last Modified: Thursday, June 08, 2017

RSA NetWitness Logs. Oracle Directory Server. Event Source Log Configuration Guide. Last Modified: Thursday, June 29, 2017

RSA NetWitness Logs. Cisco IronPort Security Appliance. Event Source Log Configuration Guide. Last Modified: Thursday, January 19, 2017

RSA NetWitness Logs. GlobalSCAPE Enhanced File Transfer (EFT) Server. Event Source Log Configuration Guide. Last Modified: Thursday, May 25, 2017

RSA NetWitness Logs. Tripwire Enterprise. Event Source Log Configuration Guide. Last Modified: Friday, November 3, 2017

RSA NetWitness Logs. Radiator Radius Server. Event Source Log Configuration Guide. Last Modified: Thursday, November 2, 2017

RSA NetWitness Logs. VMware ESX/ESXi. Event Source Log Configuration Guide. Last Modified: Tuesday, November 7, 2017

Integrate Microsoft Office 365. EventTracker v8.x and above

RSA NetWitness Logs. Oracle Audit Vault and Database Firewall. Event Source Log Configuration Guide

RSA NetWitness Logs. Microsoft Exchange Server. Event Source Log Configuration Guide. Last Modified: Thursday, November 2, 2017

RSA NetWitness Logs. McAfee Endpoint Encryption. Event Source Log Configuration Guide. Last Modified: Friday, June 02, 2017

RSA NetWitness Logs. EMC Data Domain. Event Source Log Configuration Guide

RSA NetWitness Logs. Juniper Networks NetScreen-Security Manager Last Modified: Thursday, May 25, Event Source Log Configuration Guide

RSA NetWitness Logs. McAfee Data Loss Prevention Endpoint. Event Source Log Configuration Guide. Last Modified: Thursday, May 25, 2017

RSA NetWitness Logs. Citrix Access Gateway Last Modified: Thursday, May 11, Event Source Log Configuration Guide

RSA NetWitness Logs. Cisco Meraki. Event Source Log Configuration Guide. Last Modified: Monday, November 13, 2017

RoomWizard Exchange Connector. Complete Implementation/Upgrade Guide Microsoft Exchange On-Premises Microsoft Office 365

RSA NetWitness Logs. Microsoft Network Access Protection. Event Source Log Configuration Guide. Last Modified: Thursday, May 18, 2017

RSA NetWitness Logs. Imperva SecureSphere. Event Source Log Configuration Guide. Last Modified: Monday, May 22, 2017

RSA NetWitness Logs. Trend Micro OfficeScan and Control Manager. Event Source Log Configuration Guide. Last Modified: Thursday, November 30, 2017

RSA NetWitness Logs. Microsoft Forefront Endpoint Protection. Event Source Log Configuration Guide. Last Modified: Monday, November 13, 2017

RSA NetWitness Platform

RSA NetWitness Logs. EMC Isilon. Event Source Log Configuration Guide. Last Modified: Tuesday, October 31, 2017

RSA NetWitness Logs. F5 Big-IP Application Security Manager. Event Source Log Configuration Guide. Last Modified: Friday, May 12, 2017

Securing Office 365 with Okta

Cloud Secure. Microsoft Office 365. Configuration Guide. Product Release Document Revisions Published Date

RSA NetWitness Logs. Citrix XenApp. Event Source Log Configuration Guide

RSA NetWitness Logs. F5 Big-IP Access Policy Manager. Event Source Log Configuration Guide. Last Modified: Friday, May 12, 2017

Calendar coexistence. Free/busy lookup services between G Suite, Office 365 and Exchange

RSA NetWitness Logs. Cisco Wireless LAN Controller. Event Source Log Configuration Guide

RSA NetWitness Logs. Tenable Nessus. Event Source Log Configuration Guide. Last Modified: Wednesday, August 09, 2017

RSA NetWitness Logs. DenyAll Web Application Firewall. Event Source Log Configuration Guide. Last Modified: Thursday, November 2, 2017

Mission Guide: Office 365 OneDrive

RSA NetWitness Logs. Trend Micro InterScan Messaging Security Suite. Event Source Log Configuration Guide. Last Modified: Tuesday, April 25, 2017

CA Mobile Device Management Configure Access Control for Using Exchange PowerShell cmdlets

INTRODUCTION PRE-CONFIGURATION

RSA NetWitness Logs. Bit9 Security Platform. Event Source Log Configuration Guide. Last Modified: Friday, May 05, 2017

RSA NetWitness Logs. Oracle iplanet Web Server. Event Source Log Configuration Guide. Last Modified: Tuesday, May 09, 2017

Workspace ONE UEM Notification Service. VMware Workspace ONE UEM 1811

RSA NetWitness Logs. Cisco IronPort Web Security Appliance (WSA) Event Source Log Configuration Guide. Last Modified: Tuesday, January 9, 2018

Calendar updated presence

RSA NetWitness Logs. ManageEngine NetFlow Analyzer. Event Source Log Configuration Guide. Last Modified: Monday, March 06, 2017

RSA NetWitness Logs. Microsoft Windows. Event Source Log Configuration Guide. Last Modified: Thursday, October 5, 2017

Quest Migration Manager Migrating to Microsoft Office 365

RSA NetWitness Logs. Event Source Log Configuration Guide

RSA NetWitness Logs. Juniper Networks NetScreen ScreenOS Last Modified: Wednesday, November 8, Event Source Log Configuration Guide

RSA NetWitness Logs. Airtight Management Console. Event Source Log Configuration Guide. Last Modified: Thursday, May 04, 2017

RSA NetWitness Logs. MySQL Enterprise. Event Source Log Configuration Guide. Last Modified: Wednesday, November 15, 2017

Microsoft O365 Integration Guide

Issued March FLY for Dropbox Installation and Configuration Guide

RSA NetWitness Logs. RSA Web Threat Detection. Event Source Log Configuration Guide. Last Modified: Friday, April 14, 2017

RSA NetWitness Logs. EMC Ionix Unified Infrastructure Manager. Event Source Log Configuration Guide

RSA NetWitness Logs. Juniper Networks NetScreen Firewall Last Modified: Monday, October 9, Event Source Log Configuration Guide

RSA NetWitness Logs. Cisco Adaptive Security Appliance Last Modified: Wednesday, November 8, Event Source Log Configuration Guide

RSA NetWitness Logs. IBM WebSphere DataPower. Event Source Log Configuration Guide. Last Modified: Friday, January 5, 2018

RSA NetWitness Logs. Citrix XenMobile EMM Suite Last Modified: Wednesday, January 25, Event Source Log Configuration Guide

RSA NetWitness Logs. Sophos Enterprise Console Last Modified: Friday, July 21, Event Source Log Configuration Guide

DaDaDocs for Microsoft Dynamics 365 Administrator Guide

HPE Security ArcSight Connectors

<Partner Name> <Partner Product> NETWITNESS Logs Implementation Guide. Imperva Counter Breach 11.5

INSTALLATION GUIDE Spring 2017

Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com.

One Identity Active Roles 7.2. Azure AD and Office 365 Management Administrator Guide

RSA NetWitness Logs IBM DB2. Event Source Log Configuration Guide. Last Modified: Friday, November 17, 2017

RSA NetWitness Logs. Bind DNS. Event Source Log Configuration Guide. Last Modified: Thursday, October 19, 2017

Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com.

AvePoint Governance Automation 2. Release Notes

RSA NetWitness Logs. IBM ISS SiteProtector. Event Source Log Configuration Guide. Last Modified: Monday, May 22, 2017

Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com.

AvePoint Cloud Governance. Release Notes

271 Waverley Oaks Rd. Telephone: Suite 206 Waltham, MA USA

RSA NetWitness Logs. IBM Domino. Event Source Log Configuration Guide. Last Modified: Thursday, October 19, 2017

SMB Partner Tech Series

Chime for Lync High Availability Setup

RSA NetWitness Logs. F5 Big-IP Advanced Firewall Manager. Event Source Log Configuration Guide. Last Modified: Friday, May 12, 2017

Microsoft Surface Hub Microsoft Surface Hub administrator's guide Intro to Microsoft Surface Hub Prepare your environment for Microsoft Surface Hub

GODADDY TO OFFICE 365 MIGRATION PLAYBOOK

Client Certificate Authentication Guide. June 28, 2018 Version 9.4

RSA NetWitness Logs. IBM Tivoli Identity Manager. Event Source Log Configuration Guide. Last Modified: Monday, March 06, 2017

Using vrealize Operations Tenant App as a Service Provider

<Partner Name> <Partner Product> RSA NETWITNESS Logs Implementation Guide. Exabeam User Behavior Analytics 3.0

Integrate your CSP Direct Agreement

RSA NetWitness Logs. VMware NSX. Event Source Log Configuration Guide. Last Modified: Thursday, November 30, 2017

Installation Guide Revision B. McAfee Cloud Workload Security 5.0.0

VMware AirWatch PowerShell Integration Guide Securing your infrastructure

Coveo Platform 7.0. Microsoft SharePoint Legacy Connector Guide

Transcription:

RSA NetWitness Platform Event Source Log Configuration Guide Microsoft Office 365 Last Modified: Thursday, June 7, 2018 Event Source Product Information: Vendor: Microsoft Event Source: Office 365 Versions: API v1.0 RSA Product Information: Supported On: Security Analytics 10.6.2 and later Event Source Log Parser: cef Note: The CEF parser parses this event source as device.type=msoffice365. Collection Method: Plugin Framework Event Source Class.Subclass: Host.Cloud

Collecting Office 365 Events in NetWitness Platform Office 365 is a Web-based version of Microsoft's Office suite of enterprise-grade productivity applications. Office 365 is delivered to users through the cloud and includes Exchange Online for email, SharePoint Online for collaboration, Lync Online for unified communications, and a suite of Office Web Apps (web-based versions of the traditional Microsoft Office suite of applications). The Office 365 integration consumes activity logs using the Office 365 Management Activity API. The Office 365 Management Activity API aggregates actions and events into tenant-specific content blobs, which are classified by the type and source of the content they contain. Currently, these content types are supported: Audit.AzureActiveDirectory Audit.Exchange Audit.SharePoint Audit.General (includes all other workloads not included in the previous content types) DLP.All (DLP events only for all workloads) The following sections describe how to configure Office 365 as an event source: Configure the Office 365 Event Source Set Up the Office 365 Event Source in NetWitness Platform Office 365 Collection Configuration Parameters Configure the Office 365 Event Source Perform the following tasks to configure your event source: I. Begin Recording User and Admin Activity II. (Optional) Enable Audit Logs III. Use the Azure Management Portal IV. Deploy the Office 365 Files from RSA NetWitness Live V. Enable Subscription For more information on Office 365, see the following Microsoft URLs: Collecting Office 365 Events in NetWitness Platform 2

Office 365 Management API getting started: https://msdn.microsoft.com/en-us/office- 365/get-started-with-office-365-management-apis Enable mailbox auditing in Office 365: https://technet.microsoft.com/enus/library/dn879651.aspx Begin Recording User and Admin Activity This section describes how to begin recording user and admin activity. 1. Go to admin portal for Office365: https://portal.office.com/adminportal/home#/homepage. 2. Go to Admin center > Security and Compliance > Audit Log Search and enable logging. If logging has already been enabled, you may not see the option to enable logs. Note: It make take up to 24 hours for some logs to appear once logging has been enabled. (Optional) Enable Audit Logs Note: This step is only required if you wish to consume Audit.Exchange logs. In order to track all activities performed on all mailbox in an organization you need enable audit through a Powershell command. 3 Begin Recording User and Admin Activity

1. Connect to Exchange Online using remote PowerShell a. Open Windows PowerShell and run the following command: $UserCredential = Get-Credential b. Type user name and password for an Office 365 global admin account, and then click OK. c. Run the following command: $Session = New-PSSession -ConfigurationName Microsoft.Exchange - ConnectionUri https://outlook.office365.com/powershell-liveid/ - Credential $UserCredential -Authentication Basic -AllowRedirection Import-PSSession $Session d. To verify, run the following command: Get-Mailbox 2. Enable mailbox audit logging. Below command enables mailbox audit logging for Pilar Pinilla s mailbox: Set-Mailbox -Identity "Pilar Pinilla" -AuditEnabled $true Below command enables mailbox audit logging for all user mailboxes in your organization: Get-Mailbox -ResultSize Unlimited -Filter {RecipientTypeDetails -eq "UserMailbox"} Set-Mailbox -AuditEnabled $true 3. Specify owner actions to audit. Below command specifies that the MailboxLogin and HardDelete actions are performed by the mailbox owner: Set-Mailbox "Pilar Pinilla" -AuditOwner MailboxLogin,HardDelete Below command specifies MailboxLogin, HardDelete, and SoftDelete actions performed by the mailbox owner will be logged for all mailboxes in the organization Get-Mailbox -ResultSize Unlimited -Filter {RecipientTypeDetails -eq "UserMailbox"} Set-Mailbox -AuditOwner MailboxLogin,HardDelete,SoftDelete Use the Azure Management Portal This section describes how to use the Azure Management Portal to register your application in Azure AD, and to create a key. Use the Azure Management Portal 4

To register your application: 1. Go to Office365 portal > Admin Portal > Azure AD Admin center > App registration > New Application Registration. 2. Fill in the details and create the app. Note: The value of Sign-on URL is ignored. For example, in the image above, we have used https://madeupwebsite.com as a place holder. 3. Go to Required Permissions > Add API Access > Select an API and select Office 5 Use the Azure Management Portal

365 Management APIs. 4. Press Select and then enable the permissions as shown here: Note: The "Read DLP policy events including detected sensitive data" permission needs to be assigned only if logs are being read from the DLP.All resource group. 5. Press Select and then Done. 6. Select the Grant Permissions tab. Use the Azure Management Portal 6

Continue to the next procedure, for creating a key. To create a key: 1. Select the Grant Permissions tab. 2. Create a key. 7 Use the Azure Management Portal

Important: Azure only displays the client secret at the time you initially generate it. You cannot navigate back to this page and retrieve the client secret later. Make sure to copy and save this key, as it is needed for further configuration. 3. Go to properties and make the app Multi-tenanted. 4. Save the settings. Deploy the Office 365 Files from RSA NetWitness Live Office 365 requires resources available in RSA NetWitness Live in order to collect logs. To deploy the Office 365 content from Live: 1. In the RSA NetWitness Platform menu, select Live. 2. Browse Live for the cef parser, using RSA Log Device as the Resource Type. Deploy the Office 365 Files from RSA NetWitness Live 8

3. Select the cef parser from the list and click Deploy to deploy it to the appropriate the Log Decoders. 4. You also need to deploy the Office 365 package. Browse Live for MS Office 365 content, typing Office 365 into the Keywords text box and click Search. 5. Select the item returned from the search and click Deploy to deploy to the appropriate Log Collectors. Note: On a hybrid installation, you need to deploy the package on both the VLC and the LC. 6. Restart the nwlogcollector service. For more details, see the Add or Update Supported Event Source Log Parsers topic, or the Live Resource Guide on RSA Link. Enable Subscription Go to the office office365audit folder on the VLC and execute SubscribeLogCategory.py to subscribe to a resource group: # cd /etc/netwitness/ng/logcollection/content/collection/cmdscript/office365audit # source /opt/rh/python27/enable Note: The previous command (highlighted) is not required for NetWitness 11.0 or later. # python SubscribeLogCategory.py tenant_id application_id application_key resource_group [--proxy_server PROXY_SERVER] [--proxy_port PROXY_PORT] [-- proxy_user PROXY_USER] [--proxy_password PROXY_PASSWORD] The following screen shows an example of running this script. 9 Enable Subscription

Enable Subscription 10

Set Up the Office 365 Event Source in NetWitness Platform This section contains details on setting up the event source in RSA NetWitness Platform. In addition to the procedure, the Office 365 Collection Configuration Parameters are described, as well as how to Collecting Office 365 Events in NetWitness Platform. To configure the Office 365 Event Source: 1. In the RSA NetWitness Platform menu, select Administration > Services. 2. In the Services grid, select a Log Collector service, and from the Actions menu, choose View > Config. 3. In the Event Sources tab, select Plugins/Config from the drop-down menu. The Event Categories panel displays the File event sources that are configured, if any. 4. In the Event Categories panel toolbar, click +. The Available Event Source Types dialog is displayed. 5. Select office365audit from the list, and click OK. The newly added event source type is displayed in the Event Categories panel. 11 Set Up the Office 365 Event Source in NetWitness Platform

6. Select the new type in the Event Categories panel and click + in the Sources panel toolbar. The Add Source dialog is displayed. 7. Define parameter values, as described in Office 365 Collection Configuration Parameters. 8. Click Test Connection. The result of the test is displayed in the dialog box. If the test is unsuccessful, edit the device or service information and retry. Note: The Log Collector takes approximately 60 seconds to return the test results. If it exceeds the time limit, the test times out and RSA NetWitness Platform displays an error message. 9. If the test is successful, click OK. The new event source is displayed in the Sources panel. Set Up the Office 365 Event Source in NetWitness Platform 12

Office 365 Collection Configuration Parameters The following table describes the configuration parameter for the Microsoft Office 365 integration with RSA NetWitness Platform. Fields marked with an asterisk (*) are required. Note: When run from behind an SSL proxy, if certificate verification needs to be disabled, uncheck the SSL Enable checkbox in the Advanced section. Note: For more details, see the following Microsoft website: https://msdn.microsoft.com/en-us/office-365/office-365-management-activity-apireference#retrieving-content. Name Name * Enabled Application ID * Application Key * API Resource Base URL * Authority URL Tenant Domain * / Tenant ID Description Enter an alpha-numeric, descriptive name for the source. This value is only used for displaying the name on this screen. Select the box to enable the event source configuration to start collection. The box is selected by default. The Client ID is found the Azure Application Configure tab. Scroll down until you see it. When you are configuring the event source, the client secret is displayed when you are creating a key, and you select duration of validation. Make sure to save this, because you will only be able to see it once, and it cannot be retrieved later. Enter https://manage.office.com Enter https://login.microsoftonline.com Go to the active directory and click on the directory. In the Active Directory list, click the directory that you are using with your Office 365 tenant. The tenant ID for your Office 365 tenant is displayed as part of the URL. RSA recommends you use a Tenant Domain, rather than an ID. Example Tenant Domain: netwitnesstest.onmicrosoft.com 13 Office 365 Collection Configuration Parameters

Name Resource Group Names * Start Date * Use Proxy Proxy Server Proxy Port Proxy User Proxy Password Source Address Description Resource group names specify the Log categories to which you are subscribed. For details, see Collecting Office 365 Events in NetWitness Platform. Enter one of the following values: [Audit.AzureActiveDirectory, Audit.Exchange, Audit.SharePoint, Audit.General, DLP.All] To subscribe to more than one log category, you need to repeat the Collecting Office 365 Events in NetWitness Platform procedure and select another value. Choose the date from which to start collecting. This parameter defaults to the current date. Check to enable proxy. If you are using a proxy, enter the proxy server address. Enter the proxy port. Username for the proxy (leave empty if using anonymous proxy). Password for the proxy (leave empty if using anonymous proxy). A custom value chosen to represent the IP address for the Office365 Event Source in the customer environment. The value of this parameter is captured by the device.ip meta key. Copyright 2018 Dell Inc. or its subsidiaries. All Rights Reserved. Trademarks For a list of RSA trademarks, go to www.emc.com/legal/emc-corporationtrademarks.htm#rsa. Office 365 Collection Configuration Parameters 14