Tripwire Enterprise Server Rule Sets Vincent Fox, Doreen Meyer, and Paul Singh UC Davis, Information and Educational Technology July 25, 2006.

Slides:



Advertisements
Similar presentations
Tripwire Enterprise Server – Basic Tasks Doreen Meyer and Vincent Fox UC Davis, Information and Education Technology July 12, 2006.
Advertisements

Tripwire Enterprise Server Network Nodes, Reports, and Dashboards Vincent Fox and Doreen Meyer UC Davis, Information and Educational Technology August.
Guide to MCSE , Enhanced 1 Activity 14-1: Browsing Security Templates Objective: To become familiar with built-in security templates Start  Run.
MCITP Guide to Microsoft Windows Server 2008 Server Administration (Exam #70-646) Chapter 3 Configuring the Windows Server 2008 Environment.
Managing Security and System Integrity. Value Proposition  Need for high reliability and integrity of information networks  Need for security at multiple.
Chapter 9 Chapter 9: Managing Groups, Folders, Files, and Object Security.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 5: Managing File Access.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 11: Monitoring Server Performance.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 5: Managing File Access.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 7: Advanced File System Management.
MIS Chapter 51 Chapter 5 – Managing File Access MIS 431 Created Spring 2006.
Security SIG: Introduction to Tripwire Chris Harwood John Ives.
Hands-On Microsoft Windows Server 2003 Administration Chapter 5 Administering File Resources.
MIS 431 Chapter 71 Ch. 7: Advanced File Management System MIS 431 Created Spring 2006.
70-270, MCSE/MCSA Guide to Installing and Managing Microsoft Windows XP Professional and Windows Server 2003 Chapter Nine Managing File System Access.
By Rashid Khan Lesson 8-Crowd Control: Controlling Access to Resources Using Groups.
5.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 5: Working with File Systems.
7.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 7: Introducing Group Accounts.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 7: Advanced File System Management.
3.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 3: Introducing Active Directory.
Chapter 10 Chapter 10: Managing the Distributed File System, Disk Quotas, and Software Installation.
Check Disk. Disk Defragmenter Using Disk Defragmenter Effectively Run Disk Defragmenter when the computer will receive the least usage. Educate users.
Installing Windows XP Professional Using Attended Installation Slide 1 of 41Session 2 Ver. 1.0 CompTIA A+ Certification: A Comprehensive Approach for all.
Tripwire Enterprise Server – Getting Started Doreen Meyer and Vincent Fox UC Davis, Information and Education Technology June 6, 2006.
1 Using Compressed Files and Folders Applications and operating systems read and write to compressed files. NTFS uncompresses the file before making it.
Operating System & Application Files BACS 371 Computer Forensics.
OS and Application Files BACS 371 Computer Forensics.
Records and Information Management IT - Enterprise Content Management SPIDR II Global Features Reference Guide April 2013.
11 SHARING FILE SYSTEM RESOURCES Chapter 9. Chapter 9: SHARING FILE SYSTEM RESOURCES2 CHAPTER OVERVIEW Create and manage file system shares and work with.
Guide to Operating System Security Chapter 5 File, Directory, and Shared Resource Security.
Chapter 5 File and Printer Services
Access Control Lists and NTFS Permissions INFO333 – Lecture Mariusz Nowostawski Noria Foukia.
Users and Groups Security Architecture Editing Security Policies The Registry File Security Auditing/Logging Network Issues (client firewall, IPSec, Active.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 7: Advanced File System Management.
Hands-On Microsoft Windows Server 2008 Chapter 5 Configuring, Managing, and Troubleshooting Resource Access.
Chapter 5 Configuring, Managing, and Troubleshooting Resource Access
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 7: Advanced File System Management.
Managing, Organizing and Finding Files, Information, Shared Folders and Offline Folders powered by dj.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 5: Managing File Access.
Section 7: Implementing Security Using Group Policy Exploring the Windows Security Architecture Securing User Accounts Exploring Security Policies Hardening.
Hands-On Microsoft Windows Server 2008 Chapter 5 Configuring, Managing, and Troubleshooting Resource Access.
计算机系 信息处理实验室 Lecture 6 Management Mechanisms
IBM OmniFind Enterprise Edition V9.1 – July 2010 Data Source – FileNet P8 crawler overview  Key features: –Access to FileNet P8 Content Engine by using.
DIT314 ~ Client Operating System & Administration CHAPTER 5 MANAGING USER ACCOUNTS AND GROUPS Prepared By : Suraya Alias.
Windows NT Chapter 13 Key Terms By Bill Ward NT Versions NT Workstation n A desktop PC that both accesses a network and works as a stand alone PC NT.
CIS 290 LINUX Security Tripwire file integrity and change management tool and log monitoring.
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 23 – The Registry.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 11: Monitoring Server Performance.
Chapter 10 Chapter 10: Managing the Distributed File System, Disk Quotas, and Software Installation.
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 11: Managing Access to File System Resources.
MCSE Guide to Microsoft Windows Vista Professional Chapter 5 Managing File Systems.
Troubleshooting Security Issues Lesson 6. Skills Matrix Technology SkillObjective Domain SkillDomain # Monitoring and Troubleshooting with Event Viewer.
Page 1 NTFS and Share Permissions Lecture 6 Hassan Shuja 10/26/2004.
INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used? Tripwire.
MCSE GUIDE TO MICROSOFT WINDOWS 7 Chapter 5 Managing File Systems.
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
Subscribers – List Model
© Copyright 2014 TONE SOFTWARE CORPORATION. Confidential and Proprietary. All rights reserved. ® Administrator Training – Release Alarms Administration.
 Introduction  Tripwire For Servers  Tripwire Manager  Tripwire For Network Devices  Working Of Tripwire  Advantages  Conclusion.
Configuring and Managing Resource Access Lecture 5.
Chapter 8 Server Management: Directories & Software Directory Structure Creating A Directory Directory Properties Setup Wizard Registry Installing/Uninstalling.
Sharing Resources Lesson 6. Objectives Manage NTFS and share permissions Determine effective permissions Configure Windows printing.
By Daniel Grim. What Is Windows NT? IPSEC/Windows Firewall NTFS File System Registry Permissions Managing User Accounts Conclusion Outline.
IDS And Tripwire Rayhan Mir COSC 356. What is IDS IDS - Intrusion detection system Primary function – To monitor network or host resources to detect intrusions.
11 SUPPORTING WINDOWS XP FILE AND FOLDER ACCESS Chapter 5.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 7: Advanced File System Management.
Chapter 9: Managing Groups, Folders, Files, and Object Security
File System Management
Introducing NTFS Reliability Security Long file names Efficiency
Presentation transcript:

Tripwire Enterprise Server Rule Sets Vincent Fox, Doreen Meyer, and Paul Singh UC Davis, Information and Educational Technology July 25, 2006

Working with Rule Sets Questions Questions Rule types and rule groups Rule types and rule groups How does a rule work? How does a rule work? The parts of a file system rule The parts of a file system rule File system attributes File system attributes Criteria sets Criteria sets Rule buttons Rule buttons

Tripwire Enterprise Console

File System Rule Types UNIX file system rules (files and directories) UNIX file system rules (files and directories) Windows or unix file system rules (files and directories) Windows or unix file system rules (files and directories) Windows registry rules (keys and key values) Windows registry rules (keys and key values)

Rules and Rule Groups

Rule Search

Default Rule Groups Root rule group Root rule group Unlinked rule group Unlinked rule group

Default Rule Groups

How Does a File System Rule Work? Run version check (baseline, promotion, task) Run version check (baseline, promotion, task) Rule identifies files and directories (objects) that are to be checked, and what attributes to check. The local agent determines if monitored objects have changed. Rule identifies files and directories (objects) that are to be checked, and what attributes to check. The local agent determines if monitored objects have changed. If changes are detected, local agent creates new element versions and sends the new versions to the Enterprise Server. If changes are detected, local agent creates new element versions and sends the new versions to the Enterprise Server.

The Components of a File System Rule Start points Start points Criteria sets Criteria sets Exclusions Exclusions Stop points Stop points Actions Actions

File System Rule Components – Start Point

File System Rule Components – Criteria Set

File System Rule Components – Stop Point If a stop point is added, the file system rule will not check the specified file or directory for changes.

File System Rule Components – Exclusions

File System Components - Actions

Adjusting Rules Feature Add a start point Add a start point Edit an existing start point Edit an existing start point Add a stop point Add a stop point Delete a single stop point Delete a single stop point

Adjusting a Rule in Node View

Adjusting a Rule

Severity Levels and Severity Ranges A severity level is a numeric value that indicates the importance of a change. A severity level is a numeric value that indicates the importance of a change. Severity levels are assigned to every rule. Severity levels are assigned to every rule. For file system rules, you assign a severity level to each start point in the rule. For file system rules, you assign a severity level to each start point in the rule.

Default Severity Ranges Range Range Indicator Color Value HighRed MediumYellow34-66 LowBlue1-33

Global Severity Settings

Attributes and Criteria Sets File system attributes File system attributes Creating and modifying criteria sets Creating and modifying criteria sets Keeps encrypted database of File/Registry Attributes (including 4 hashing algorithms – HAVAL, MD5, SHA and CRC-32) Tripwire detects changes to 29 object properties (file/directory) and 21 Registry keys/values on Windows.

Rules: Windows Directory Attributes

Rules: Windows File Attributes

Attributes – File/Directories Archive flag Archive flag Read-only flag Read-only flag Hidden flag Hidden flag Offline flag Offline flag Temporary flag Temporary flag System flag System flag Directory flag Directory flag Last access time Last access time Last write time Last write time Create time Create time File size File size Turns on event tracking for that object Turns on event tracking for that object MS-DOS 8.3 name MS-DOS 8.3 name NTFS Compressed flag NTFS Compressed flag NTFS Owner SID NTFS Owner SID NTFS Group SID NTFS Group SID NTFS DACL NTFS DACL NTFS SACL NTFS SACL Security descriptor control Security descriptor control Size of security descriptor Size of security descriptor CRC-32 CRC-32 MD5 MD5 SHA SHA HAVAL HAVAL Number of NTFS streams Number of NTFS streams CRC-32 hash of all alternative data streams CRC-32 hash of all alternative data streams MD5 hash of all alternative data streams MD5 hash of all alternative data streams SHA hash of all alternative data streams SHA hash of all alternative data streams HAVAL hash of all alternative data streams HAVAL hash of all alternative data streams

Rules: Registry Attributes

Windows Registry: Attributes Registry Key Objects Registry Key Objects –Last write time –Owner SID –Group SID –DACL –SACL –Security descriptor control –Size of security descriptor for the key –Name of class –Number of subkeys –Maximum length of subkey name –Maximum length of classname –Number of values –Maximum length for value name –Maximum length of data for any value in the key –Turns on event tracking for that object Registry Value Objects Registry Value Objects –Type of value data –Length of value data –CRC-32 hash of value data –MD5 hash of value data –SHA hash of value data –HAVAL hash of value data

Windows Registry User Settings: User Settings: –HKEY_USERS –HKEY_CURRENT_USER System Settings: System Settings: –HKEY_LOCAL_MACHINE –HKEY_CLASSES_ROOT –HKEY_CURRENT_CONFIG

Developing the UCD Windows Rule Set Critical OS system files and directories. Critical OS system files and directories. Determine critical registry keys. Determine critical registry keys. –Keep it general initially. –Tailor to more specifics per system and business requirements.

Rules: UNIX File and Directory Attributes

File System Attributes for UNIX Attribute Applies to… Description ACL Files and directories Access control list Access Files and directories Last date and time accessed Change Files and directories Last date and time modified or created

File System Attributes for UNIX Attribute Applies to Description Group Files and directories Group owning a file or directory Growing Files only Size/SHA-1 hash. Size must be larger than baseline and/or hash change

File System Attributes for UNIX Attribute Applies to Description MD5 Files only MD5 hash Modify Files and directories Last date and time content changed

Criteria Sets for UNIX

UNIX Criteria Set – Content Only

UNIX Criteria Set – Permissions Only

Rule Buttons New Group New Group New Rule New Rule Import, Export Import, Export Move Move Link, Unlink Link, Unlink Delete Delete

New Rule Group

New Rule

Rule Import and Export Import and export rules to preserve rule sets Import and export rules to preserve rule sets “version control” “version control”

Rule Buttons Move Move Link Link Unlink Unlink Delete Delete

Assignment for August 8 Create a file system rule Create a file system rule Create a windows registry rule Create a windows registry rule Deployment options Deployment options

July-August Training Schedule July 12: adding and configuring a node using the basic rule set July 12: adding and configuring a node using the basic rule set July 25: creating and modifying rules July 25: creating and modifying rules August 8: reports, dashboard, deployment August 8: reports, dashboard, deployment

Contacts - class mailing list - class mailing list Vincent Fox - Vincent Fox - Doreen Meyer - Doreen Meyer - Bob Ono - Bob Ono - Paul Singh - Paul Singh - Software - Software -