サポートと今すぐチャット
サポートとのチャット

InTrust 11.6 - Real-Time Monitoring Guide

Alerts

Alert settings define whether an alert is sent to an alert database when the rule is matched. Use the Alert tab in the rule's properties to configure the corresponding settings:

  • Select the Store the alert in alert database option if you want to keep the alert and make it viewable in Monitoring Console.
  • Click Define Custom Fields to add your own fields to the alerts that are generated when the rule is matched.
  • Click Alert Suppression to specify whether to suppress duplicate alerts and define what alerts are considered duplicates. Suppressing an alert means adding it to a list of similar alerts rather than considering it a separate alert. When you use Monitoring Console to view alerts, you can see suppressed alerts where the alert counter is greater than 1.

Also, you can supply alert name and description, initial state, comment and alert code.

Using Named Fields in Alerts

In addition to predefined fields, your alerts can include any named fields that InTrust can calculate based on the events it captures. The following are examples of such fields:

  • Who
  • What
  • Where
  • When
  • Where From
  • WhoDomain
  • Whom

To use such a field as a variable, enclose it in percent signs (and omit whitespace); for example, %Who% or %WhereFrom%. There are numerous named fields defined for InTrust, and the set of such fields can vary from environment to environment.

Some of these fields are available from the field selection menu in the alert editor.

Providing IT Security Search URLs in Alerts

You can include relevant IT Security Search query URLs in alerts triggered by your rules. When the alert-handling user opens such a URL, they get the event that triggered the alert and also the context for that event: similar events shortly before and after the event. If you want to include such URLs in alerts, create a custom field for the query in the alert editor and use the IT Security Search Query URL command to set the field's value.

If InTrust doesn't know where IT Security Search is located at the time that you click this item, you will be prompted for the IT Security Search URL. Make sure you get the address right. If you need to change it later, you have to edit the ITSearchAddress organization parameter. For details, see Organization Parameter Editor.

Response Actions

A response action defines what measures are taken if certain rules are matched. Response actions can do the following:

  • Execute scripts
  • Send SNMP traps
  • Execute commands
  • Enforce audit policies
  • Run InTrust tasks

Click the Response Actions tab in a rule's properties to configure the corresponding settings.

Response actions can follow one another. When you provide several response actions, they are executed in the order they are arranged.

For all response action types except “Execute Task”, you can specify whether the action is executed by the server or by the agent. To do it, open the response action’s properties dialog box and click the General tab. To configure settings that are specific to each response action, click the Settings tab. These settings are described below.

If a response action setting relies on an external value, you can specify a predefined keyword that represents the value. These keywords are resolved when the rule is matched, the resulting event data is used to resolve the keywords, and the response action uses the values.

Execute Script

As a response action, InTrust can run one of the scripts available in the Configuration | Scripts container in InTrust Manager. The supported scripting languages are PowerShell, ECMAScript, JScript and VBScript.

NOTE: To execute PowerShell scripts, InTrust runs the 64-bit version of PowerShell, because this is the version mainly in use today.

InTrust provides several predefined scripts. These scripts assist in administrative tasks, such as adding a user to a group or changing the type of an account. If necessary, you can create your own scripts from scratch or as a modified copy of an predefined script.

To configure a response action that involves script execution

  1. Open the properties dialog box of the corresponding rule.
  2. Click the Response Action tab, and click Add. The Select Response Action Type dialog appears.
  3. Select Execute script from the list and click OK to start the New Response Action Wizard. Select the script to be executed.

Each script has parameters that can be customized so that the script fits a particular situation. By specifying these parameters you define how the script is applied and what it is applied to. For example, the parameters for the AddUserToGroup script include Computer, Group, Protocol and User.

To edit a parameter

  1. Select the parameter and click Edit.
  2. Specify a value.

For details about setting up scripts for use in response actions, see InTrust Script Objects in InTrust Customization Kit.

Send SNMP Trap

To configure a response action that involves sending an SNMP trap

  1. Open the properties dialog box of the corresponding rule.
  2. Select the Response Action tab, and click Add. The Select Response Action Type dialog box appears.
  3. Select Send SNMP trap from the menu. The properties dialog box is displayed.
  4. On the Settings tab of the dialog box, specify the following parameters:
    • Address
      This is the network address of the recipient of the trap.

    • Community
      This is the SNMP community that will receive the SNMP trap.

    • Trap type
      This is a one of the standard trap types as defined in RFC 1157.

    • Specific type
      This is a specific trap type.

    • Parameters
      This is a list of OIDs and values that you consider relevant and need to include in the trap.

You can specify keywords for all the listed settings except the OIDs and value types in the list of parameters. Make sure that the value for which you want to use a keyword is the correct type. Otherwise, the SNMP trap is not sent.

Note: InTrust supports only SNMPv1 for this type of response action.

Execute Command

To configure a response action that executes a command file

  1. Select the Response Action tab, and click Add. The Select Response Action Type dialog box appears.
  2. Select Execute command from the menu. The properties dialog box is displayed.
  3. On the Settings tab of the dialog box, specify the following parameters:
    • The folder in which the command file will be executed

    • The path to the command file

    • Trap type
      This is a one of the standard trap types as defined in RFC 1157.

    • Any parameters that the command file requires

    • Whether command file execution will be synchronous—that is, whether InTrust should wait for the end of command file execution before proceeding to the next response action in line (provided one is present)

You can specify alert and event field names for the first three settings. Make sure that the field names you specify make sense as value settings.

Set Audit Policy

Audit policy enforcement may be an appropriate response action in many situations. For example, if an abnormal event occurs in your network, it may indicate that you are overlooking related events with your current audit policy. This response action enables you to automatically apply an audit policy that is most suitable under the circumstances.

To configure a response action that enforces a specified audit policy

  1. Select the Response Action tab, and click Add. The Select Response Action Type dialog box appears.
  2. Select Set audit policy from the menu.
  3. Specify the audit policy you want to be applied by the response action. Select Turn off audit to stop all auditing activity for the listed events, or select Audit these events to specify the events to be audited. You can set auditing for successful and failed events. The options are as follows:
    • Use current settings (meaning, preserve the settings that are in effect during rule matching)

    • Audit

    • Do not audit

Notification

Notification settings, located on the Notification tab of a rule's properties, define:

  • What messages will be sent to recipients
  • What notification method will be used

Recipient is a role you assign to users to let them receive notification messages (usually, these are persons in charge for security issues resolution). To get a list of recipients, you can expand the Notifications node in InTrust Manager.

Add message templates, and select the type of each message.

You can add predefined fields to the text of the message template. These fields are replaced by corresponding data when a message is created. The recipientss specified by the policy receive these messages.

Using Named Fields in Notification Messages

In addition to predefined fields, your message templates can include any named fields that InTrust can calculate based on the events it captures. The following are examples of such fields:

  • Who
  • What
  • Where
  • When
  • Where From
  • WhoDomain
  • Whom

To use such a field as a variable, enclose it in percent signs (and omit whitespace); for example, %Who% or %WhereFrom%. There are numerous named fields defined for InTrust, and the set of such fields can vary from environment to environment.

Some of these fields are available from the field selection menu in the message template editor.

Providing IT Security Search URLs in Email

You can include relevant IT Security Search query URLs in notification messages that your recipients get. When a recipient opens such a URL, they get the event that triggered the alert and also the context for that event: similar events shortly before and after it. To include such links in notification messages, use the IT Security Search Query URL command in the message template editor.

If InTrust doesn't know where IT Security Search is located at the time that you click this item, you will be prompted for the IT Security Search URL. Make sure you get the address right. If you need to change it later, you have to edit the ITSearchAddress organization parameter. For details, see Organization Parameter Editor.

Knowledge Base

The Knowledge Base tab in the properties of a rule contains the articles explaining the situation in which the rule is triggered, and possible reasons of the problem. Each rule is shipped with a Vendor Knowledge Base Article; to add your company's expertise to the rule, use the Custom Knowledge Base Article field.

Note: If the role-based administration feature is enabled, a user can edit the Knowledge Base (for example, add a Custom Knowledge Base Article to a rule) only if the user account has the Modify permission on that rule. This can be done on the Security tab. For details, refer to the Role-Based Administration of InTrust topic.

関連ドキュメント

The document was helpful.

評価を選択

I easily found the information I needed.

評価を選択