Content Quick Start Guide
Content Quick Start GuideContent Quick Start Guide
This topic discusses configuration procedures for getting RSA NetWitness Platform set up initially in your environment.
Sections:
- Configuring Services
- Deploying Content
- Developing Content
- Maintaining Content
- Investigating Metadata
Configuring ServicesConfiguring Services
Throughout this document, you may come across the following:
- Services that your installation does not have or use. For example, if you only use RSA NetWitness Platform to capture packet data, you may not have any Log Decoders. In this case, skip the sections that do not apply to you.
- Services for which your installation has multiple instances. For example, you may have several Log Decoders. In this case, repeat the instructions so that you have set up each of your individual services.
If you have all of the following services, this is the preferred order for configuring your system:
- Decoder(s)
- Log Decoder(s)
- Concentrator(s)
- Broker(s)
- Reporting Engine
- ESA
DecoderDecoder
The Decoder service captures network data in packet form. RSA recommends that you begin setup with your Decoder.
- Assign a capture interface. For details, see Assign Capture Interface in the Appendix.
- Enable Capture Autostart. For details, see Capture Autostart in the Appendix.
For more details, see the "Configure Capture Settings" topic in the Decoder and Log Decoder Configuration Guide.
Log DecoderLog Decoder
The Log Decoder service captures log data as events. Setup for your Log Decoder is similar to setting up your Decoder:
- Assign a capture interface. For details, see Assign Capture Interface in the Appendix.
- Enable Capture Autostart. For details, see Capture Autostart in the Appendix.
For more details, see the "Configure Capture Settings" topic in the Decoder and Log Decoder Configuration Guide.
ConcentratorConcentrator
Concentrators aggregate data captured by Decoders and Log Decoders. This allows you to investigate, query and alert on both log and packet meta data in real time. You need to add your Decoder and Log Decoder services to the Concentrator to begin the aggregation process.
Note: RSA recommends that if you are capturing both log and packet data, you should have a dedicated Concentrator service for each, and use a Broker service and then have a broker to aggregate data between the two services.
-
Depending on your version:
- For NetWitness 11.x: Navigate to ADMIN > Services.
- For Security Analytics 10.x: In the Security Analytics menu, select Administration > Services.
-
In the Administration Services view, select a Concentrator, and select View > Config.
Note: If you have both Decoder and Log Decoder services, you can add them in any order.
-
To add a service, perform the following steps:
- Click
in the Aggregate Services toolbar to add a service. - Select and add your service (for example, a Decoder).
- Enter the administrator credentials for the Decoder service.
- Click
-
Repeat step 3 until you have added all of the Decoder and Log Decoder services from which you want to aggregate.
Note: Optionally, you can configure your Concentrator to aggregate from both your Log Decoders and Decoders. For details, see the "Configure Aggregate Services" topic in the Broker and Concentrator Configuration Guide.
-
In the Aggregation Configuration panel, under Aggregation Settings, select Aggregate Autostart.
When a Decoder or Log Decoder starts up, it automatically begins capturing data if Capture Autostart is enabled. You can always start and stop data capture manually.
- Click Apply, then click Start Aggregation.
-
The Aggregate Autostart takes effect on the next service restart. To restart the service:
- From the toolbar, change the View from Config to System, by opening the View menu (Config
) and selecting System. - From the toolbar, select Reboot.
- The system displays a message asking you to confirm the reboot: click Yes, then the service restarts.
- From the toolbar, change the View from Config to System, by opening the View menu (Config
For more details, see the "Broker and Concentrator Configuration" topic in the Broker and Concentrator Configuration Guide.
BrokerBroker
The broker service aggregates meta data from configured concentrators. This allows you to investigate and monitor data from multiple concentrators. You need to add your Concentrator service to your Broker.
-
Depending on your version:
- For NetWitness 11.x: Navigate to ADMIN > Services.
- For Security Analytics 10.x: In the Security Analytics menu, select Administration > Services.
- In the Administration Services view, select a Broker, and select View > Config.
- Click
in the Aggregate Services toolbar to add a service. - Select and add your Concentrator.
- Enter the administrator credentials for the Concentrator service.
-
In the Aggregation Configuration panel, under Aggregation Settings, select Aggregate Autostart.
Note: This option determines whether aggregation starts automatically each time the Broker is started. Checked means yes, unchecked means no.
-
Click Apply, then click Start Aggregation.
Note: Changes take effect immediately.
For more details, see the "Broker and Concentrator Configuration" topic in the Broker and Concentrator Configuration Guide.
Reporting EngineReporting Engine
A Reporting Engine runs reports and alerts based on the data drawn from a data source, so you must associate a data source, or multiple data sources, to a Reporting Engine. There are three types of data sources:
- NWDB Data Sources—The NetWitness Database (NWDB) data sources are Decoders, Log Decoders, Brokers, Concentrators, Archiver, and Collection.
- IPDB Data Sources—The Internet Protocol Database (IPDB) data source contains both normalized and raw event messages. It stores all collected messages in a file system organized by event source (device), IP address, and time (year/month/day) with index files to facilitate searches (report and queries).
- Warehouse Data Sources—The Warehouse data sources are Pivotal and MapR.
To associate a data source with a Reporting Engine:
-
Depending on your version:
- For NetWitness 11.x: Navigate to ADMIN > Services.
- For Security Analytics 10.x: In the Security Analytics menu, select Administration > Services.
- In the Administration Services view, select a Reporting Engine, and select View > Config.
- Select the Sources tab.
-
Click
> Available Services to display the list of available services.Note: The UI presents a list of all services that have already been configured, and that can be used as a source for the reporting engine. This may include any of the following services (depending on your NetWitness installation): Archivers, Brokers, Concentrators, Log Decoders, Malware Analysis, Network Decoders, Incident Management or IPDB Extractor.
-
Select a Concentrator or Broker service and click OK.
- Enter the administrator credentials for the service and click OK.
For more details, see the "Configure Data Sources" topic in the Reporting Engine Configuration Guide.
Event Stream Analysis (ESA)Event Stream Analysis (ESA)
The RSA NetWitness Platform Event Stream Analysis (ESA) service provides advanced stream analytics such as correlation and complex event processing of disparate event data from Concentrators, Decoders, and Log Decoders, which results in incident detection and alerting.
To associate a data source with the ESA service:
-
Depending on your version:
- For NetWitness 11.x: Navigate to ADMIN > Services.
- For Security Analytics 10.x: In the Security Analytics menu, select Administration > Services.
- In the Administration Services view, select an ESA service, and select View > Config.
- Select the Data Sources tab.
- Click
to display the list of available services. -
Select the Concentrator (or Broker, if it is being used) and click OK.
Note: RSA recommends Concentrators as the data source for ESA. For more details, see the "Add a Data Source to an ESA Service" topic in the Event Stream Analysis Configuration Guide.
-
Click
.The Edit Service dialog is displayed.
- Enter the administrator credentials for the service and click Save.
- Click
Enable. - Click Apply for your changes to take effect.
For more details, see the "Configure ESA" and "Add a Data Source to an ESA Service" topics in the Event Stream Analysis Configuration Guide.
Deploying ContentDeploying Content
Content developed by the RSA team may be found in RSA Live within the RSA NetWitness Platform. See the Live Services Guide for deploying the content from Live. Content may also be created and deployed through a Professional Services engagement or directly by RSA customers.
The following table lists the types of content, and the guide and topic where you can find more information for that content type.
- Resource Type:
RSA Log Collector
- Guide:
Log Collector Configuration Guide
- Topic:
Configure Event Source Types
- Resource Type:
RSA Log Device (i.e. Log Parser)
- Guide:
Log Parser Tool User Guide
- Topic:
Parser Structure
- Resource Type:
RSA Lua Parser
- Guide:
Decoder and Log Decoder Configuration Guide
- Topic:
Use Custom Parsers
- Resource Type:
RSA Feeds
- Guide:
Decoder and Log Decoder Configuration Guide
- Topic:
Create and Deploy Custom Feed Using Wizard
- Resource Type:
RSA Application Rules
- Guide:
Decoder and Log Decoder Configuration Guide
- Topic:
Configure Decoder Rules
- Resource Type:
RSA Event Stream Analysis Rule
- Guide:
Alerting Using ESA Guide
- Topic:
Alerting: Add Rules to the Rule Library
- Resource Type:
RSA Security Analytics Reports, Charts, Alerts and Lists
- Guide:
Reporting Guide
- Topic:
Working with Reports in the Reporting Module
Developing Use CasesDeveloping Use Cases
RSA recommends that you begin with a conversation of your required use cases and the desired outcomes. Once you and your team have determined what you want to be achieve, understand the components of RSA NetWitness Platform that you have purchased, and they can help in meeting your use cases. Review the content in RSA Live, understand what each resource type does, how they are used and their output. If existing content does not meet your use case requirements, you may need to develop custom content. For details, see Developing Content.
Inventory Customer SystemInventory Customer System
RSA recommends that you begin with an inventory of the customer system. Some information that may be helpful when addressing customer use cases are as follows:
- What are their critical assets?
- What parsing capabilities does the customer have configured? Are they a packet or log customer or do they have both?
- What are their alerting capabilities? Will their resources and product licensing support reporting alerts and ESA?
- What protocols are configured within the environment?
- What event sources does the customer forward to RSA NetWitness Platform?
- Do they have an Endpoint product that will forward logs to RSA NetWitness Platform?
- What are their vulnerabilities and needs related to business-driven security.
Gather Use CasesGather Use Cases
Once you have an inventory of the customer environment, you gather the use cases they need. Addressing the use cases may follow this general flow:
- Look at existing bundled content to determine if the content within it aligns with the use cases.
-
Review Tags and Medium to search for other content.
Note: Tags catalog existing content according to an incident response approach, for example attack phase or authentication. Medium categorizes content based on whether it applies to log or packet customers (or both).
- Read descriptions and requirements for the rules to determine if they match the environment, for example the Windows log being collected.
- Consider custom content if you do not find any existing content that matches the use cases.
For details of RSA Live Content, see RSA Live Content. For details on developing custom content, see Developing Content.
Example Use Case: Detection of MalwareExample Use Case: Detection of Malware
Use Case: I want to detect malware within my network.
Environment: Packet and log customer. Full alerting capabilities including ESA. Log sources include an IDS, Firewall, Anti-virus and web logs.
Potential Implementation:
With a search of RSA Live Content for Bundle types, you can see that the Known Threats Pack and Hunting Pack exist and are tagged with a Medium of packet.
The customer environment supports this and the pack descriptions match the use case. Additionally, the customer has ESA and can enable the Advanced Threat Detection module (see the "Configure Automated Threat Detection" topic in the Alerting using ESA guide) to be alerted to command and control traffic within their environment using their packet capture and web logs. This is a good start for content for the detection of malware. Between the parsers, app rules, feeds, and the c2 atd module, this content provides coverage for multiple malware delivery and infection vectors, as well as beaconing and c2 behavior. This enables you to catch a potential infection as well as existing incidents before they worse.
Since the bundle is geared mostly towards packet content, you search within RSA Live for a Medium of log, log and packet, and with a Category (Tag in Security Analytics 10.x) of malware.
This search returns the same ESA rules that were not by default deployed by the bundles, such as Backdoor Activity detected or Windows Worm Activity Detected Logs. Since the customer has ESA, you read the description and determine their environment and use case match these rules and deploy them to the service.
Finally, you review the logs for events generated that may indicate malware signatures and decide you want them to exist in the malware report. At this time, you may decide to customize the log parser to generate the metadata that aligns with the Malware Activity report (i.e. add static tags to messages of inv.category = 'threat' && inv.context = 'malware’).
RSA Live ContentRSA Live Content
The following is a brief overview of the content types available within RSA NetWitness Platform and links to existing RSA Live content.
- Resource Type:
Bundle
- Supported Medium:
Log, Packet, Log and Packet
- Description:
A container for a themed or related set of content. Each piece of content is specified as a dependency within the bundle.
List of supported content is in Content Bundles or Packs.
Note: Content Bundles do not support subscription. You can view the list of content in each bundle in the documentation (RSA Link Content Space). You can then periodically redeploy these pieces of content.
- Resource Type:
RSA Log Collector
- Supported Medium:
Log
- Description:
Event sources are the assets on the network, such as servers, switches, routers, storage arrays, operating systems, and firewalls. In most cases, your Information Technology (IT) team configures event sources to send their logs to the Log Collector and the Security Analytics administrator configures the Log Collector to poll event sources and retrieve their logs.
List of supported content:
- Resource Type:
RSA Log Device
- Supported Medium:
Log
- Description:
Defines how a NetWitness Log Decoder identifies, parses, and extracts information from the events of a specific event source.
List of supported content: https://community.rsa.com/community/products/netwitness/parser-network/event-sources
- Resource Type:
RSA Lua Parser
- Supported Medium:
Packet (with few exceptions for Log)
- Description:
Packet parsers identify the application layer protocol of sessions seen by the Decoder, and extract meta data from the packet payloads of the session.
List of supported content: Packet Parsers
- Resource Type:
RSA Feeds
- Supported Medium:
Log, Packet
- Description:
A feed is a list of data that is compared to sessions as they are captured or processed. For each match, additional metadata is created. This data could identify and classify malicious IPs or incorporate additional information such as department and location based on internal network assignments.
List of supported content: In Depth Feeds Information
- Resource Type:
RSA Application Rule
- Supported Medium:
Log, Packet
- Description:
Application layer rules are applied at the session level on a Log Decoder or a Decoder to output a single piece of meta key and value once the rule logic has been matched.
List of supported content: RSA Application Rules
- Resource Type:
RSA Event Stream Analysis Rule
- Supported Medium:
Log, Packet, Log and Packet
- Description:
ESA's advanced Event Processing Language allows you to express filtering, aggregation, joins, pattern recognition and correlation across multiple disparate event streams. Event Stream Analysis helps to perform powerful incident detection and alerting.
List of supported content: RSA ESA Rules
- Resource Type:
RSA Security Analytics Report
- Supported Medium:
Log, Packet, Log and Packet
- Description:
A container for RSA Security Analytics rules. A rule represents a unique query that detects and summarizes the requested information within a collection of network data.
List of supported content:
Using BundlesUsing Bundles
Bundles are a grouping of related content around a theme that are easily deployed at one time instead of needing to individually select and deploy each piece of content within the set. For the list of available bundles and dependencies, see Content Bundles or Packs.
Note: Be sure to use the medium attribute assigned to the bundle to ensure it matches your RSA NetWitness Platform’s deployment of either a packet (Decoder), log (Log Decoder) or log and packet combination (Decoder + Log Decoder).
Filtering Content with Live SearchFiltering Content with Live Search
You can filter the content for deployment by Resource Type, Medium and Tags.
- Resource Type is valuable to deploy content types only supported by your environment. For example, if you are not using Event Stream Analytics (ESA), there would be no reason to attempt to deploy that content type.
- Medium is helpful to filter on just log (applied to content that uses meta derived from log data), packet (applied to content that uses meta derived from network packets) or log and packet (applied to content that correlates meta derived across log and packet data).
-
Depending on your version, you can filter by tag or category:
- In Security Analytics 10.x, Tags you can select tag , see Live Content Search Tags.
- In NetWitness 11.x, you can use Categories to narrow results. Categories offer a richer set of items than was available as Tags. This is a hierarchical model, four levels deep. Each category catalogs content with an Incident Response service-based approach. For details, see the NetWitness Investigation Model.
- RSA developers mark the content as discontinued in RSA Live. Users can view discontinued content or hide it from view in Live.
- Discontinued content is added to the Discontinued Content list in the documentation.
- Users should disable Discontinued Parsers (see below). , , , , you may still see these parsers., , , , select Administration > Services.
., , , , you want to get the most accurate results with the best performance. Accuracy can be achieved by adhering to the data model and careful query construction. Before you begin developing content, however, it is important to understand what type of content is for your use case. , , , , , you can deploy either a log parser or packet Lua parser dependent upon the source of the data. Use feeds and application rules to examine the data parsed from the event sources and generate additional metadata when conditions are met. You can use this additional metadata during the investigation process, for alerting or integration with incident management tools. , you should create a reporting engine alert. If you want to be notified about multiple different events across disparate sources within a timeframe, you should use ESA. , you can simply create a report. If you want a report that has more enhanced aggregation criteria, create a report against the warehouse using the criteria listed on the screen. Also, if you want to use a timeframe, you can create a report based on the last day or week against warehouse data, last month up to a year on Archiver data and the last hour up to a day using Concentrator or Broker (NWDB) data., , packets and the endpoint. RSA recommends that you keep within this model as much as possible when you create custom content, so the existing rules may apply to it as well. As a best practice, document any custom meta keys and possible values, if applicable, with clear definitions for future content developers and researchers., , , configuration files for the Log Decoder and Concentrator may need to be updated. (The Decoder does not need to have manual updates to the meta model as new meta keys are automatically stored.) See Customize the meta framework for information about updating the meta model within the product., aliases and data types that are used across the different content types. The individual services control and manage this data model differently:, any new meta keys generated by the packet parsers or feeds are dynamically added to the data model. The only time the data model needs to be updated is if aliases are needed for a particular key.*/, , ip_dstport integer, service integer , tcp_dstport integer, device_type string, ip_dst string);, , nonstandard traffic and ECAT alerts
*/, , , , , , 'IDS', 'Firewall') AND ip_dstport=443), , , , , , , nonstandard traffic and ECAT alerts
*/, , , , 'IDS', 'Firewall') AND ip_dstport=443) as s1, , , , , , , , , , , , , , , , 18, *, *, *) end (0,9, *, *, *); , , , , , , , , , , , , , , , , , , , , , , , such as percentages, rations, averages, counts, min and max, within a given time window., see the topic "Alerting: ESA Enablement Guide" in the Alerting Using ESA guide., this stores events in memory, which may cause issues if storing over a long period or large number of events., , size long);, sum(size) AS size FROM Event.win:time_batch(1 minute) GROUP BY ip_src;, , , , , , , , , sum(size) as size, , , , , , , , , , put rules into trial mode on the ESA service prior to enabling in production. See the topic "Work with Trial Rules" in the Alerting Using ESA guide., , , , , , , , device_class='firewall', action=eval("{'GET','POST'}") }, , , , , , , , , , , , , , , , , , , , , , , , to test advanced EPL statements with schema-based scenarios. This is a good resource for when you start the development process outside of RSA NetWitness:, , , , , or has become irrelevant due to changes in technology or attack techniques and tools., or by searching through RSA Live by data range since last deployed. Be sure to subscribe to any content for which you want to receive update notifications. See the RSA Security Analytics Live Services guide for more information about subscriptions., , , , , , , , , , select the capture interface., , , , select Administration > Services., , select a Decoder or Log Decoder service, and select View > Config., , select Capture Interface Selected.
) and selecting System., , , , , select
Reboot., , then the service restarts., , , , , , , , , , , , , , , ,