Log Correlation Engine 3.0 Log Normalization Guide October 29, 2008 (Revision 1)

Similar documents
Log Correlation Engine 3.2 Log Normalization Guide May 19, 2009 (Revision 1)

Log Correlation Engine 3.4 Log Normalization Guide July 29, 2010 (Revision 3)

Log Correlation Engine 3.4 Statistics Daemon Guide July 29, 2010 (Revision 3)

Log Correlation Engine 4.0 Statistics Daemon Guide. August 13, 2012 (Revision 1)

Log Correlation Engine 4.4 Statistics Daemon Guide. February 26, 2015 (Revision 1)

Log Correlation Engine 4.0 Log Normalization Guide

Log Correlation Engine 4.0 High Performance Configuration Guide

July 18, (Revision 3)

Log Correlation Engine 4.2 Quick Start Guide. September 4, 2014 (Revision 3)

LCE Splunk Client 4.6 User Manual. Last Revised: March 27, 2018

Tenable Event Correlation

Tenable Common Criteria Evaluated Configuration Guide. October 29, 2009 (Revision 4)

Venusense UTM Introduction

Host Identity Sources

Tenable Hardware Appliance Upgrade Guide

Training UNIFIED SECURITY. Signature based packet analysis

Correlating IDS Alerts with Vulnerability Information

CompTIA Security+(2008 Edition) Exam

Tenable Network Security Support Portal. November 9, 2010 (Revision 8)

ACS / Computer Security And Privacy. Fall 2018 Mid-Term Review

CIS Controls Measures and Metrics for Version 7

Intrusion Detection System (IDS) IT443 Network Security Administration Slides courtesy of Bo Sheng

SonicWALL / Toshiba General Installation Guide

SecurityCenter 5.1 Upgrade Guide. November 12, 2015 (Revision 2)

CIS Controls Measures and Metrics for Version 7

n Learn about the Security+ exam n Learn basic terminology and the basic approaches n Implement security configuration parameters on network

Beyond a sensor. Towards the Globalization of SURFids. FIRST 20 th Annual Conference Vancouver, Canada

SecurityCenter 5.0 SCAP Assessments. May 28, 2015 (Revision 2)

Installation of RHEL 5 for Tenable SecurityCenter Evaluation

AccessEnforcer Version 4.0 Features List

SecurityCenter Upgrade Guide. July 21, 2015 (Revision 1)

Snort Rules Classification and Interpretation

SecurityCenter 4.8.x Upgrade Guide. December 16, 2014 (Revision 1)

Step-by-Step Configuration

Systrome Next Gen Firewalls

IT Services IT LOGGING POLICY

Pass4sure q. Cisco Securing Cisco Networks with Sourcefire IPS

Computer Network Vulnerabilities

KERIO TECHNOLOGIES KERIO WINROUTE FIREWALL 6.3 REVIEWER S GUIDE

Intrusion Detection. Comp Sci 3600 Security. Introduction. Analysis. Host-based. Network-based. Distributed or hybrid. ID data standards.

CIH

Forescout. Configuration Guide. Version 3.5

Network Security. Chapter 0. Attacks and Attack Detection

Cisco IOS Classic Firewall/IPS: Configuring Context Based Access Control (CBAC) for Denial of Service Protection

User Management: Configuring User Roles and Local Users

DoS Attacks Malicious Code Attacks Device Hardening Social Engineering The Network Security Wheel

Cyberoam Virtual Security Appliance - Installation Guide for VMware Player. Version 10

Nortel TPS Remediation Module for Nortel VPN Gateway Installation and Configuration

Step-by-Step Configuration

SecurityCenter 5.1 Administration Guide. November 12, 2015 (Revision 2)

SOA Software API Gateway Appliance 6.3 Administration Guide

CompTIA Security+ CompTIA SY0-401 Dumps Available Here at:

Barracuda Link Balancer

CSTNET Security Considerations

Compare Security Analytics Solutions

The following topics describe how to configure correlation policies and rules.

Best practices with Snare Enterprise Agents

OSSIM Fast Guide

Silver Peak EC-V and Microsoft Azure Deployment Guide

Securing CS-MARS C H A P T E R

90% 191 Security Best Practices. Blades. 52 Regulatory Requirements. Compliance Report PCI DSS 2.0. related to this regulation

Step-by-Step Configuration

Security Assessment Checklist

Ethical Hacking and Prevention

Configuring Network-based IDS and IPS Devices

Intrusion Detection and Prevention IDP 4.1r4 Release Notes

CSE 565 Computer Security Fall 2018

ASA/PIX Security Appliance

Network Security: Firewall, VPN, IDS/IPS, SIEM

Installation Procedure Red Hat 7 with Netscape 6

Port Mirroring in CounterACT. CounterACT Technical Note

ProCurve Network Immunity

Configuring Anomaly Detection

Logging. Steven M. Bellovin December 6,

Computer Forensics: Investigating Network Intrusions and Cybercrime, 2nd Edition. Chapter 2 Investigating Network Traffic

Manual Ftp Windows Server 2008 Firewall Rule Priority

2. INTRUDER DETECTION SYSTEMS

Nessus 3.0 Client Guide September 28, 2006 (Revision 14)

Log Correlation Engine 5.1 User Guide. Last Updated: August 28, 2018

ForeScout CounterACT. (AWS) Plugin. Configuration Guide. Version 1.3

Chapter 8 roadmap. Network Security

Modular Policy Framework. Class Maps SECTION 4. Advanced Configuration

Chapter 11: Networks

Security Manager Policy Table Lookup from a MARS Event

Log Correlation Engine 3.6 Administration and User Guide

SOURCEFIRE 3D SYSTEM RELEASE NOTES

MsActivator (VSOC 8.2) Administration Guide

Configuring the Cisco NAM 2220 Appliance

Identity Firewall. About the Identity Firewall

1. CyberCIEGE Advanced VPNs

PASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year

IHE NA Connectathon 2018: Network

Certified Vulnerability Assessor

SecurityCenter 4.6 Administration Guide. April 11, 2013 (Revision 5)

Security+ Practice Questions Exam Cram 2 (Exam SYO-101) Copyright 2004 by Que Publishing. International Standard Book Number:

Surat Smart City Development Ltd. Surat Municipal Corporation 1

Integrate Clavister Firewall

Intrusion Detection - Snort

Videoscape Distribution Suite Software Installation Guide

Integrating Juniper Sky Advanced Threat Prevention (ATP) and ForeScout CounterACT for Infected Host Remediation

Transcription:

Log Correlation Engine 3.0 Log Normalization Guide October 29, 2008 (Revision 1) The ne west version of this document is available at the following URL: http://cgi.tenablesecurity.com/lce_3.0_log_analysis.pdf

Table of Contents TABLE OF CONTENTS... 2 INTRODUCTION... 3 LOG PARSING AND NORMALIZATION... 3 WRITING LOG CORRELATION ENGINE PLUGINS... 10 FOR MORE INFORMATION... 15 ABOUT TENABLE NETWORK SECURITY... 16 2

Introduction This document discusses writing plugins for Tenable Network Security s Log Correlation Engine 3.0. Please share your comments and suggestions with us by emailing them to support@tenablesecurity.com. It is assumed that the reader has the following prerequisite skills: A working knowledge of Secure Shell (SSH) and key exchange. Experience with the Unix Operating System, including Unix regular expressions. Familiarity with Tenable s Log Correlation Engine (LCE) operation and architecture as described in the Log Correlation Engine Administration and User Guide. Knowledge of general log formats from various operating systems, network devices and applications. This document is intended to be used with LCE installations for version 3.0 and higher. If you are using an older version of LCE (known as Thunder, please refer to the LCE 2.0 Log Analysis Guide. Standards and Conventions Throughout the documentation, filenames, daemons and executables are indicated with a courier bold font such as gunzip, httpd and /etc/passwd. Command line options and keywords will also be printed with the courier bold font. Command line options may or may not include the command line prompt and output text from the results of the command. Often, the command being run will be boldfaced to indicate what the user typed. Below is an example running of the Unix pwd command. # pwd /opt/lce/ # Important notes and considerations are highlighted with this symbol and grey text boxes. Log Parsing and Normalization Architecture The LCE daemon, lced, receives entire log messages from SYSLOG messages or LCE clients. For example, the following log message could arrive at the LCE through one of the LCE s log parsing clients or have been sent via SYSLOG across the network directly: Jun 22 01:02:34 godzilla kernel: eth1: Setting promiscuous mode. Normalization When the LCE receives these logs, it uses libraries (known as.prm files) to analyze the message. The first part of analysis is to recognize the message type with unique keywords. 3

Once a message type is recognized, it is normalized and relevant data is populated into an event schema. Type abuse access-denied application backdoor blacklist compliance compromise connection correlated database data-leak detected-change dhcp dns dos Description Events and logs dealing with access to pornography, illegal content and other types of network usage against policy. Events from devices which indicate that access was prevented, but did not necessarily require a login. For example, many web sites have content that might deny access to a non-logged in users. Generic logs from applications not specifically given their own types like ftp, database, web or mail. Any type of IDS or system log which indicates the presence of or probing for a known backdoor or Trojan. Logs generated by TASL correlation scripts which compare connection event types as well as network sessions with known lists of hostile IP networks. Events that track compliance standards such as PCI and SOX. Logs that indicate IDS and system logs showing sever attacks. These are high-priority attacks that have been detected. For example, a Snort administrator access attempt or a system log that indicated that a known attack had occurred would both be normalized to this type. Any log from a web proxy, firewall, load balancer or other type of network device that logs a successful network connection event. There are a variety of TASL scripts that look for common types of network abuse, successful attacks and compromised systems. These alerts are categorized under the correlated type. Examples include successful password guessing and detection of systems that have had a worm outbreak. Logs from MySQL, MS-SQL, Oracle and other types of databases. Any event that indicates data leakage. These events originate from commercial data leakage vendors. Logs that indicate the network, system or users have somehow changed. Examples include changing a user s access rights as well as new hosts being added to the network. These logs originate from a variety of DHCP servers. These logs originate from a variety of DNS servers. All network IDS logs which indicate a denial of service attack are 4

normalized with this type. Logs from a variety of applications, network devices and communications logs that also indicate some sort of resource attack are also normalized as dos type events. error firewall ftp games hids honeypot intrusion lce login login-failure logout mail nbad nbs Any log from a system, application or log that indicates some sort of error condition is logged to this type. This can include errors from user input, hardware errors and many other types of logs. Any firewall log that has occurred from preventing access is tagged as a firewall event. For example, if an internal host was prevented from connecting to the outside world, it would be normalized as a firewall event. If a firewall allowed the connection, it would be logged as a connection event. Any logs from FTP servers which are not actual login or login-failure events. These include files and directories accessed as well as file transfers. Any logs from network monitoring applications such as NIDS which indicate the occurrence or presence of Internet and LAN games. Any logs from host based IDS systems that are distinct from anti-virus systems. Any logs from commercial or open source honeypots that indicate connections from other networks. Logs from network IDS and systems that indicate intrusion events that are probes or likely non-compromise types of events. Any logs from the Log Correlation Engine clients about their status and overall CPU, storage and memory information about the systems they are connected to. For Windows systems, this also includes USB inserts and deletes. Any successful login event. These can come from servers, network events and applications. Any unsuccessful login event. These can come from servers, network events and applications. Some applications and systems also log when a user logs out of a system. Logs from Sendmail, Exchange, Postfix and many other types of email servers which indicate receptions of email and sending of email. Logs from commercial network based anomaly systems. Any type of log that has never been seen before. There is a TASL script which keeps track of every local system and every log that has ever occurred for it. If a new event occurs on a host, the LCE will alert 5

if this has never occurred in the past. nessus network p2p-activity phishing pup-activity radius reboot router SC3 scanning shutdown spam startup stats switch Any log fro the Nessus vulnerability except for remote connection events which are normalized to login or login-failure events. Any log from the Tenable Network Monitor or Tenable NetFlow Monitor or their post-processed events. Both of these LCE clients log network sessions and multiple TASL scripts further analyze these logs to generate logs for large bandwidth connections as well as connections lasting longer than 15 minutes. Any network monitoring application such as a NIDS that indicates the occurrence of P2P traffic such as LimeWire or Bittorrent. Any logs, such as those from an email SPAM appliance, that indicates phishing activity. Any logs from system or network applications which indicate the presence of potentially unwanted software. Any authentication logs from Radius servers. Any type of log from a system, application or network device which indicates it has restarted. Any log from a variety of routers that indicates something has been done to the current system. For example, a router that logs changes to the OSPF routing table would be classified under this type. Any logs from the Security Center such as scan launches, additions of new users, deletion of reports and much more. Any type of log which indicates port scanning or port sweeping events. These logs can originate from many different sources including the Passive Vulnerability Scanner, network IDSes, firewalls and hostbased applications. Any log that indicates a network device, operating system or application has been turned off. Any logs, such as those from an email SPAM appliance, that indicates the attempt to send a SPAM email. Any log that indicates a network device, operating system or application has been started. Any logs generated by the LCE stats daemon which indicate large spikes in activity on a per-type basis. For example, the stats daemon will automatically alert when there has been a spike in login-failures. Any log from a variety of switches that indicates something has been done to the current system. For example, a switch that logs changes 6

to its local configuration would be classified under this type. system user-activity version virus vmware vpn vulnerability web web-error wireless Any log from a router, switch or operating system that indicates some sort of activity. For example, a Red Hat Linux server running the up2date command would have the logs from that activity classified as a system type. Any log from a router, switch or operating system that indicates some sort of activity. Any log from any device, application or system that can help identify the actual running version. Any log from host based anti-virus applications or network based IDS systems that indicate the occurrence or presence of virus activity. Any logs from VMware based applications. Logs from operating system, appliance based and firewall based VPNs. Any log that indicates the presence of a vulnerability. All web server logs, as well as web proxy logs that indicate some form of successful web access. All web server logs which indicate some form of web access that has resulted in an error such as 400 and 500 style HTTP codes. Any logs from wireless access devices. Below is an example screen capture of events as shown in a Security Center for a 24 hour period: 7

This portion of events (the screen image only shows SC3 types through lce types for 24 hours) offers some interesting patterns. The dark areas represent 6:00 PM through 6:00 AM. The activity graph shows that some types of events occur all the time, such as the intrusion types and lce types. If a Security Center user where to mouse over the graphs, they would be shown a pop up image of the total amount of events at that point and the exact times. Clicking on any of the event counts would bring the user to a list of unique events. For example, clicking on the 23 next to the SC3 type would show: This similar display displays the specific different set of normalized events that are part of the SC3 type. Event Schema Every normalized event will attempt to populate as much of the following schema as possible: Source and destination IP addresses IP Protocol Source and Destination Ports Unique Event Name Unique Event Type Sensor name Time of Event User Name For example, the above promiscuous mode message is parsed by the LCE rule number 1316. The rule is shown below: id=1316 name=promiscuous mode enabled. match= kernel: match=: Promiscuous mode enabled. log=event:linux-promiscuous_mode_enabled type:system 8

If this rule matches an event, it will populate the schema with the source IP of either the original SYSLOG message or the LCE client. It will also set an event name of Linux- Promiscuous_Mode_Enabled and an event type of system. This is an extremely simple normalization rule. This document will provide several examples which normalize similar log messages as well as more complex log messages such as firewall and intrusion detection logs. Libraries The LCE daemon references the.prm libraries located in the /opt/lce/daemons/plugins directory. The location of the directory used by LCE is controlled in the lce.conf file and may be located in other places if configured as such by the LCE administrator. Each library contains one or more LCE plugins that are designed to parse specific types of log files. The libraries may also contain specific information about the devices they support. For example, the library which parses certain types of Windows security events may contain information on how the Windows LCE Client should be configured. Missing Events It is quite likely that the LCE will receive logs for events but not have a rule designed to parse those events. The LCE is designed to only normalize what it has been told how to normalize. If configured to do so, through a setting in the lce.conf file, the LCE daemon will log any missing event to a file named notmatched.txt. This can be configured to keep the last 10,000 log events (which can be configured to be much higher if desired) and is useful for an immediate listing of what types of log events are being missed by the LCE. Through analysis of the contents of this log, users can see what the actual log messages look like and modify their.prm libraries accordingly. Matching Multiple Events The LCE can also be configured (via the lce.conf file) to continue to parse each log message across the entire.prm library of plugins. This is useful if more than one plugin is destined for a specific type of log file. For example, for a firewall that performs network address translation, each log may have three IP addresses. One IP address will be the internal address, another would be the public address and the third would be an Internet address. A university may have their students on a private network such as 10.10.22.134, translate them to a public university IP address and finally log the fact that they downloaded their email from Google s web site. By allowing the LCE to parse the same log multiple times, multiple events can be logged. More examples for the reason why multiple log hits would be required could be: 9

Separate rules to parse web logs for valid/invalid web hits as well as performing IDS analysis of the URLs for suspicious attacks Separate rules for generic firewall accept/deny as well as matching on specific denied ports Separate rules for valid/invalid logins as well as alerting on specific user names such as root and administrator Writing Log Correlation Engine Plugins Log Correlation Engine Database Events Tenable's LCE is designed to receive log messages, parse out relevant fields of those log messages and then store the results in a proprietary database. Each entry stored in the database is known as a LCE event and contains the following fields: srcip - the source IP address of the event dstip - the destination IP address of the event srcport - the source port of the event dstport - the destination port of the event proto - the protocol of the event sensor - the name of the sensor that sent the event event - the actual event name type - the type of sensor that sent the event (ids, firewall, etc.) message - the full log message that triggered the storing of this event user name the actual login name used for the matching user An event stored in the database may not have all of these fields set. The number of the fields that are set depends on how much information was parsed and recorded by the LCE upon receiving each log message. At a minimum, the event name and message fields should always be set. Log Correlation Engine Plugin Keywords There are several keywords available for writing plugins for the LCE. Some of these keywords are mandatory and some are optional. Keyword name=<plugin name> match=<match> Description This keyword specifies the name of the plugin. The name of the plugin generally describes what sort of log event this plugin is designed to trigger on. Multiple LCE plugins may have the same name. Match strings have the following format: [!]string! : Means that the packet must NOT match <string> A plugin may have multiple match statements. 10

Here is a full example for a Snort ICMP event: match=snort: match=-> match={icmp} regex=<regex> This keyword specifies a complex regular expression search rule that will be applied to the log message. A regex is applied only after a log message has matched all of the match= patterns. For example: match=snort: match=-> match={icmp} regex=snort:.+\] ([a-za-z0-9_ \.]+) \[.*\{ICMP\} ([0-9]+(\.[0-9]+){3}) -> ([0-9]+(\.[0-9]+){3}) Parentheses are used in this regular expression to allow the LCE to remember and save matched patterns in a received log message. These matched patterns are generally the fields of the log message that you want to save in an event structure. If the above regex was applied against the following snort ICMP alert, then the following fields of the log message would be saved because of the presence of parenthesis in the regex rule: SYSLOG alert: <33>Mar 24 08:01:33 fwall snort: [1:483:2] ICMP PING CyberKit 2.2 Windows [Classification: Misc activity] [Priority: 3]: {ICMP} 69.137.69.238 -> 69.140.169.124 Saved patterns: "ICMP PING CyberKit 2.2 Windows", "69.137.69.238", "69.140.169.124" These matched patterns may be recalled using dollar sign notation to indicate which match we are referring to. These are of the forms $[0-9] where the digit 0-9 specifies which pattern (in the order each pattern was matched) to recall. So for the above example, each pattern could be recalled resulting in these matches: $1 - which recalls "ICMP PING CyberKit 2.2 Windows" $2 - which recalls "69.137.69.238" $4 - which recalls "69.140.169.124" Notice that the destination IP address 69.140.169.124 is recalled using $4 and not $3. This is because each IP address regex pattern actually contains two sets of parenthesis: 11

([0-9]+(\.[0-9]+){3}) The first set of parenthesis, which are the outer parenthesis, match on the IP address as a whole. The second set of parenthesis, which are the inner parenthesis match on the last three octets of the IP address. Thus, this IP address regular expression results in two saved patterns. It just happens that in this case, we are only interested in the first of these saved patterns (the IP address as a whole). A match statement OR a regex is required. A plugin may contain multiple match statements but only one regex statement. log=<log options> The log keyword provides a way to specify what information to store in the LCE database if this plugin matches a received log message. As stated earlier, each entry stored in the LCE database is stored as a LCE event structure. The log keyword enables one to set each field of a stored event to either a value extracted from the received log message (using the saved patterns from the regex rule) or to a hard coded value written explicitly in the log statement. In this way a person can save only those pieces of a log message that are useful. For example, the regex rule may specify a search rule for an IP address pattern. If this search rule matches an IP address in a received log message, then the log keyword allows one to specify whether the IP address should map to the source IP or the destination IP when storing the event for this message. Mapping may be done for each field in an event structure using the following keywords: srcip, dstip, proto, event, type,user and sensor. The syntax for each mapping is as follows: keyword:<value> Where keyword is one of srcip, dstip, proto, event, type, user or sensor and <value> is either written explicitly or is a reference to a saved match pattern from the regex rule. For example, suppose we had the following set of match patterns and regex rules designed to match a Snort ICMP event: match=snort: match=-> match={icmp} regex=snort:.+\] ([a-za-z0-9_ \.]+) \[.*\{ICMP\} ([0-9]+(\.[0-9]+){3}) -> ([0-9]+(\.[0-9]+){3}) An example Snort event that we would match on in this case is: 12

<33>Mar 24 08:01:33 fwall snort: [1:483:2] ICMP PING CyberKit 2.2 Windows [Classification: Misc activity] [Priority: 3]: {ICMP} 69.137.69.238 -> 69.140.169.124 Here the regex contains parenthesis so as to save the event name, and source and destination IP addresses from this field. In order to store this event to the LCE database, we could set up the following log options: log=srcip:$2 dstip:$4 proto:1 event:snort_icmp_event type:ids Here the event name and protocol are hard-coded and the rest of fields are based upon extracted patterns from the received log message as specified by the regex rule. Note that if a value is hard coded it may NOT contain spaces. So in the above log rule, event:snort_icmp_event could NOT have been written as event:snort ICMP event. Only the event mapping must be specified when writing a plugin. The rest of the mappings are optional. If no dstip mapping is specified, then by default the LCE will set the destination IP address of an event to the address of the machine it received the log message from. All other mappings are zero-valued if not specified in the log rule. The log keyword is always required and within the log statement the event keyword (e.g.: event:snort_tcp_event ) is required as well. User Tracking The LCE can be used to track the IP addresses a network user is originating from and then tag any other events from that IP address as belonging to that user. To make use of this, the LCE needs to know which types of logs in your organization contain the username you wish to correlate and track IP addresses from. Please refer to the LCE Administraion and User Guide to learn how to configure this. When the LCE is configured, it will only use PRM IDs which have been configured to process user to IP address relationships. Consider the following PRM from the auth_bluesocket.prm file: id=1032 name=the BlueSocket device had a network user start their network session. match=user_tracking: match=event=user_l match=event=user_login_successful match=obj=user regex=&ipaddr=([0-9]+\.[0-9]+\.[0-9]+\.[0-9]+)&name=(.*)&msg= 13

log= type:login event:bluesocket-user_login srcip:$1 user:$2 An actual user authentication message for BlueSocket looks like this: <181>user_tracking: event=user_login_successful&loglevel=notice&obj=user&ipaddr=192.168.20. 20&name=demo@nessus.org&msg=Login RADIUS user demo@nessus.org on Primary RADIUS server at [00:13:02:89:d1:f5]/192.168.20.20 as role Authenticated, login time = 2008-06-17 20:39:29, sessionid = 00:0E:0C:73:A4:E0:121374956977878& The regex and log statements in the PRM extracts the string 192.168.20.20 and assigns it to srcip, and the username is assigned demo@nessus.org. If the LCE has not been configured to process ID 1032 as a source of user to IP address tracking, the event is normalized and logged as any other event. However, if ID 1032 were enabled for user to IP tracking, the LCE would perform the following steps: It would check the current table of usernames. If this were a new user, an additional new user event would be generated. It would also check the current table of usernames and IP address matches. If this were a new IP address for an existing user, then a new user to IP address message would be generated. Lastly, for any other events originating from the IP address of this login (in this case 192.168.20.20) they would all be automatically assigned a username of demo@nessus.org. Log Correlation Engine Plugin Management The LCE is distributed with a large number of plugins, but they may not all be of interest in a particular environment. To improve performance and facilitate log analysis, configure the LCE server with only the plugins desired for analysis. To disable a plugin, edit the file /opt/lce/admin/disabled-prms.txt and add in the full name of the PRM you wish to be ignored and then restart the LCE. Desired libraries, modified libraries and custom plugins should be placed in a separate plugins directory and the lce.conf file can be configured to direct the lced process to pull its events from this new directory. It is not recommended to modify Tenable PRM files as any update process will overwrite them with any changes made by Tenable. Log Correlation Engine Clients There are a number of LCE clients available for a variety of events and operating systems. They are all roughly configured the same way in that they are pointed to a data source, and they are connected to the LCE server by specifying the IP addresses and shared secret. Each LCE client must have the corresponding shared secret key specified in the LCE server s lce.conf file. Each of the available LCE clients are covered in a separate document entitled LCE Client Guide. 14

For More Information Tenable has produced a variety of other documents detailing the LCE s deployment, configuration, user operation, and overall testing. These are listed here: Log Correlation Engine Administration and User Guide additional information for installing, configuring and operating the LCE Log Correlation Engine Client Guide how to configure, operate and manage the various Unix, Windows, netflow, OPSEC and other clients TASL Reference Guide explanation of the Tenable Application Scripting Language with extensive examples of a variety of correlation rules Log Correlation Engine Statistics Daemon Guide configuration, operation and theory of the LCE s statistic daemon used to discover behavioral anomalies Documentation is also available for Nessus, the Passive Vulnerability Scanner and the Security Center. Please feel free to contact us at support@tenablesecurity.com, sales@tenablesecurity.com or visit our web site at http://www.tenablesecurity.com. 15

About Tenable Network Security Tenable, headquartered in Columbia, Md., USA, is the world leader in Unified Security Monitoring. Tenable provides agent-less solutions for continuous monitoring of vulnerabilities, configurations, data leakage, log analysis and compromise detection. For more information, please visit us at http://www.tenablesecurity.com. TENABLE Network Security, Inc. 7063 Columbia Gateway Drive Suite 100 Columbia, MD 21046 TEL: 410-872-0555 http://www.tenablesecurity.com 16