18.07.2013 Views

Sidewinder G2 6.1.2 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.2 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.2 Administration Guide - Glossary of Technical ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Auditing on the<br />

<strong>Sidewinder</strong> <strong>G2</strong><br />

Chapter 19: Auditing and Reporting<br />

Auditing on the <strong>Sidewinder</strong> <strong>G2</strong><br />

Auditing is one <strong>of</strong> the most important features on the <strong>Sidewinder</strong> <strong>G2</strong>. The<br />

<strong>Sidewinder</strong> <strong>G2</strong> generates audit each time the <strong>Sidewinder</strong> <strong>G2</strong> or any<br />

<strong>Sidewinder</strong> <strong>G2</strong> service is stopped or started. Audit is also generated when any<br />

<strong>of</strong> the <strong>Sidewinder</strong> <strong>G2</strong>’s audit facilities are modified. Other relevant audit<br />

information that is captured includes identification and authentication attempts<br />

(successful and failed), network communication (including the presumed<br />

addresses <strong>of</strong> the source and destination subject), administrative connections<br />

(using srole), and modifications to your security policy or system configuration<br />

(including all administrator activity, such as changing the system time).<br />

Audit can be viewed and monitored using tools such as <strong>Sidewinder</strong> <strong>G2</strong>’s<br />

dashboard, audit viewing and reporting windows, and the <strong>of</strong>f-box <strong>Sidewinder</strong><br />

<strong>G2</strong> Security Reporter. <strong>Sidewinder</strong> <strong>G2</strong> can also be configured to send alerts for<br />

particular types <strong>of</strong> audit using IPS Attack Responses and System Event<br />

Responses.<br />

The <strong>Sidewinder</strong> <strong>G2</strong>’s audit facilities monitor the state <strong>of</strong> log files to minimize the<br />

risk <strong>of</strong> lost data. Log files are compressed, labeled, and stored on a daily basis,<br />

and a new “current” log file is created. Using this mechanism, no audit data is<br />

lost during the storage transition.<br />

The amount <strong>of</strong> available audit storage space is monitored very closely on the<br />

<strong>Sidewinder</strong> <strong>G2</strong> via the rollaudit and logcheck utilities to monitor the log file size<br />

and rotate log files as needed. (For information on using rollaudit, see<br />

“Rollaudit cron jobs” on page 599. For information on using the logcheck utility,<br />

refer to the logcheck man page.)<br />

There are three main components to the <strong>Sidewinder</strong> <strong>G2</strong> audit process:<br />

• auditd — This is the audit logging daemon. This daemon listens to the<br />

<strong>Sidewinder</strong> <strong>G2</strong> audit device and writes the information to log files. The log<br />

files provide a complete record <strong>of</strong> audit events that can be viewed by an<br />

administrator. auditd sends all audit data to a binary file called<br />

/var/log/audit.raw.<br />

• auditbotd — The <strong>Sidewinder</strong> <strong>G2</strong> uses a daemon called auditbotd to<br />

listen to the audit device and gather the security-relevant information it<br />

finds. The auditbot daemon tracks these events and uses its configuration<br />

to determine when the data might be indicating a problem and require a<br />

response, such as an attempted break-in. If it does detect an audit event<br />

that has a configured response, <strong>Sidewinder</strong> <strong>G2</strong> responds accordingly. For<br />

more information on configuring IPS attack and system event responses,<br />

refer to Chapter 20.<br />

• auditdbd — This daemon maintains the audit database. auditdbd monitors<br />

the audit stream and sends reporting information to the MySQL database<br />

called auditdb. The auditdbd server is disabled by default.<br />

Important: Reporting services are not available until the auditdbd server is<br />

enabled. For information on enabling the auditdbd server, see “Enabling and<br />

disabling servers” on page 65.<br />

533

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!