SlideShare uma empresa Scribd logo
1 de 20
Baixar para ler offline
Auditing Novell Applications   ®

Event Collection with Novell Sentinel Log Manager
                                   ™




David Corlette
Product Line Lead
DCorlette@novell.com
Agenda

    •   Overview of Novell event auditing technologies
                                          ®




    •   nAudit: Identity Manager, Novell eDirectory ,
                                                   ™


        Access Manager, iManager, Modular
        Authentication Service, Netware       ®




    •   Syslog: Privileged User Manager, SecureLogin
    •   Custom API: Open Enterprise Server




2   © Novell, Inc. All rights reserved.
Auditing Novell Applications          ®




    •   Several historical auditing frameworks
    •   Acquired products which use their own frameworks
    •   Minimal and weak industry event auditing standards
    •   Current common standards:
         –   nAudit

         –   Syslog

         –   Custom API



3   © Novell, Inc. All rights reserved.
nAudit Framework
Architecture

        Source
       Application

       Instrumentation                                      Sentinel

           Platform                             Connector
            Agent                         SSL


              Cache



5   © Novell, Inc. All rights reserved.
Event Structure

    •   21 pre-defined fields with data types and baseline
        semantic definitions
    •   LSC file defines additional semantics for each event




6   © Novell, Inc. All rights reserved.
Configuration

        Event Source
    •   Each application has its own instrumentation
         –   Event Selection varies as a result
    •   Simple configuration file for Platform Agent
         –   LogHost=<Sentinel Collector Manager IP>
         –   LogEnginePort=1289 <Event Source Server port>


        Novell Sentinel  ®
                                          ™



    •   If Connector/Event Source Server/Collector is properly
        deployed, Event Sources will automatically deploy

7   © Novell, Inc. All rights reserved.
Configuration Examples
                                           Novell Access Manager



    Novell Identity Manager




                                             Novell eDirectory




8    © Novell, Inc. All rights reserved.
Syslog Framework
Architecture

         Source
        Application

                                                             Sentinel

            Syslog                               Connector
           Daemon                          TCP




10   © Novell, Inc. All rights reserved.
Event Structure

     •   Defined header with date/time and host ID
          –   Jan 12 10:12:03 myhost …
     •   Pseudo-standard that application ID follows host ID
          –   Jan 12 10:12:03 myhost sshd: ...
     •   Rest of message is free-form; some Novell applications
         use structured JSON string to carry data
     •   Simple, lightweight format but requires more complex
         parsing on the backend




11   © Novell, Inc. All rights reserved.
Configuration

         Event Source
     •   Each application has its own configuration procedure
          –   Event Selection varies as a result


         Novell Sentinel  ®
                                           ™



     •   If Event Source Server is properly deployed and
         Collector is in ESM Library, Collector/Connector/Event
         Sources will automatically deploy




12   © Novell, Inc. All rights reserved.
Configuration Examples
                                             Privileged User Manager




                                                     SUSE Linux
                                                             ®




                                   filter f_sentinel { facility(authpriv,auth,ftp,kern,mail,local0); };
                                   destination d_sentinel { tcp(130.57.171.51 port(1468)); };
                                   log { source(src); filter(f_sentinel); destination(d_sentinel); };


                                                     SecureLogin
                     Novell SecureLogin 7.0 SP1 will include a syslog forwarder which will forward
                     NSL events (sent to Windows EventLog) to Sentinel. Instructions TBD.
13   © Novell, Inc. All rights reserved.
Custom API Example
Architecture

     NCP AFP CIFS
         NSS
         Open
       Enterprise
        Server                                               Sentinel
           Vigil Engine
                                                 Connector
                Vigil
                Client
                                           TCP

            Sentinel
             Agent

15   © Novell, Inc. All rights reserved.
Event Structure

     •   Vigil Engine exposes C API for clients to connect and
         receive events
     •   Client can output in common formats like XML, NVP
     •   Fields are named and have pre-defined, fixed meanings
     •   Sentinel Agent reads STDOUT from Vigil Client
                              ™



     •   Sentinel Agent forwards data over Syslog to Sentinel
         NSS CREATE TaskID[0] Zid[98] ParentZid[7F] FileType[3] FileAttributes[20]
         OpRetCode[0] VolID[6E584A8B8170DE01800112DF59F86F0C]
         UserID[03000000000000000000000000000000] UserName[Supervisor] uid[0] uname[root]
         euid[0] euname[root] suid[0] suname[root] fsuid[0] fsuname[root] gid[0] guname[root]
         egid[0] eguname[root] sgid[0] sguname[root] fsgid[0] fsguname[root] comm[vi]
         target[VOL1:/.myfile.txt.swx] key[0x0] requestedRights[0x00000002]
         createFlags[0x00000100] createAndOpen[0x00000000] retOpenCreateAction[0x00000002]
         accessed[2009-07-28 11:47:16] created[2009-07-28 11:47:16] modified[2009-07-28
         11:47:16] metaDataModified[2009-07-28 11:47:16] targethost[OESVigil]


16   © Novell, Inc. All rights reserved.
Configuration

         Event Source
     •   Client must be configured to connect to Engine
     •   Sentinel Agent must be configured to invoke Client
     •   Agent must be configured to send to Sentinel
     ➔   Scripts are provided to accomplish all of the above


         Novell Sentinel  ®
                                           ™



     •   If Event Source Server is properly deployed and
         Collector is in ESM Library, Collector/Connector/Event
         Sources will automatically deploy

17   © Novell, Inc. All rights reserved.
Open Enterprise Server Configuration
                     Demonstration
Unpublished Work of Novell, Inc. All Rights Reserved.
This work is an unpublished work and contains confidential, proprietary, and trade secret information of Novell, Inc.
Access to this work is restricted to Novell employees who have a need to know to perform tasks within the scope
of their assignments. No part of this work may be practiced, performed, copied, distributed, revised, modified,
translated, abridged, condensed, expanded, collected, or adapted without the prior written consent of Novell, Inc.
Any use or exploitation of this work without authorization could subject the perpetrator to criminal and civil liability.


General Disclaimer
This document is not to be construed as a promise by any participating company to develop, deliver, or market a
product. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in
making purchasing decisions. Novell, Inc. makes no representations or warranties with respect to the contents
of this document, and specifically disclaims any express or implied warranties of merchantability or fitness for any
particular purpose. The development, release, and timing of features or functionality described for Novell products
remains at the sole discretion of Novell. Further, Novell, Inc. reserves the right to revise this document and to
make changes to its content, at any time, without obligation to notify any person or entity of such revisions or
changes. All Novell marks referenced in this presentation are trademarks or registered trademarks of Novell, Inc.
in the United States and other countries. All third-party trademarks are the property of their respective owners.

Mais conteúdo relacionado

Mais procurados

Integrating Apple Macs Using Novell Technologies
Integrating Apple Macs Using Novell TechnologiesIntegrating Apple Macs Using Novell Technologies
Integrating Apple Macs Using Novell TechnologiesNovell
 
GWAVACon 2013: Novell Open Enterprise Server - Roadmap and Future
GWAVACon 2013: Novell Open Enterprise Server - Roadmap and FutureGWAVACon 2013: Novell Open Enterprise Server - Roadmap and Future
GWAVACon 2013: Novell Open Enterprise Server - Roadmap and FutureGWAVA
 
Novell Storage Manager: Your Secret Weapon for Simplified File and User Manag...
Novell Storage Manager: Your Secret Weapon for Simplified File and User Manag...Novell Storage Manager: Your Secret Weapon for Simplified File and User Manag...
Novell Storage Manager: Your Secret Weapon for Simplified File and User Manag...Novell
 
Securing Your Endpoints Using Novell ZENworks Endpoint Security Management
Securing Your Endpoints Using Novell ZENworks Endpoint Security ManagementSecuring Your Endpoints Using Novell ZENworks Endpoint Security Management
Securing Your Endpoints Using Novell ZENworks Endpoint Security ManagementNovell
 
Deep Dive Into Windows Server 2012 Hyper-V
Deep Dive Into Windows Server 2012 Hyper-VDeep Dive Into Windows Server 2012 Hyper-V
Deep Dive Into Windows Server 2012 Hyper-VLai Yoong Seng
 
Lessons Learned: Novell Open Enterprise Server Upgrades Made Easy
Lessons Learned: Novell Open Enterprise Server Upgrades Made EasyLessons Learned: Novell Open Enterprise Server Upgrades Made Easy
Lessons Learned: Novell Open Enterprise Server Upgrades Made EasyNovell
 
Domain Services for Windows: Best Practices for Windows Interoperability
Domain Services for Windows: Best Practices for Windows InteroperabilityDomain Services for Windows: Best Practices for Windows Interoperability
Domain Services for Windows: Best Practices for Windows InteroperabilityNovell
 
Apache CloudStack Architecture by Alex Huang
Apache CloudStack Architecture by Alex HuangApache CloudStack Architecture by Alex Huang
Apache CloudStack Architecture by Alex Huangbuildacloud
 
Xen PV Performance Status and Optimization Opportunities
Xen PV Performance Status and Optimization OpportunitiesXen PV Performance Status and Optimization Opportunities
Xen PV Performance Status and Optimization OpportunitiesThe Linux Foundation
 
Finding Virtual Coins in the Couch
Finding Virtual Coins in the CouchFinding Virtual Coins in the Couch
Finding Virtual Coins in the CouchNovell
 
2 architectural at CloudStack Developer Day
2  architectural at CloudStack Developer Day2  architectural at CloudStack Developer Day
2 architectural at CloudStack Developer DayKimihiko Kitase
 
Archiving and e-Discovery for Novell GroupWise
Archiving and e-Discovery for Novell GroupWiseArchiving and e-Discovery for Novell GroupWise
Archiving and e-Discovery for Novell GroupWiseNovell
 
12th Japan CloudStack User Group Meetup MidoNet with scalable virtual router
12th Japan CloudStack User Group Meetup   MidoNet with scalable virtual router12th Japan CloudStack User Group Meetup   MidoNet with scalable virtual router
12th Japan CloudStack User Group Meetup MidoNet with scalable virtual routerTakeshi Nakajima
 
Quest NetVault FastRecover Continuous Data Protection (CDP)
Quest NetVault FastRecover Continuous Data Protection (CDP)Quest NetVault FastRecover Continuous Data Protection (CDP)
Quest NetVault FastRecover Continuous Data Protection (CDP)Dell Data Protection
 
SUSE Linux Enterprise Server for System z SP1
SUSE Linux Enterprise Server  for System z SP1 SUSE Linux Enterprise Server  for System z SP1
SUSE Linux Enterprise Server for System z SP1 Novell
 
Hacking apache cloud stack
Hacking apache cloud stackHacking apache cloud stack
Hacking apache cloud stackMurali Reddy
 

Mais procurados (20)

Integrating Apple Macs Using Novell Technologies
Integrating Apple Macs Using Novell TechnologiesIntegrating Apple Macs Using Novell Technologies
Integrating Apple Macs Using Novell Technologies
 
GWAVACon 2013: Novell Open Enterprise Server - Roadmap and Future
GWAVACon 2013: Novell Open Enterprise Server - Roadmap and FutureGWAVACon 2013: Novell Open Enterprise Server - Roadmap and Future
GWAVACon 2013: Novell Open Enterprise Server - Roadmap and Future
 
Novell Storage Manager: Your Secret Weapon for Simplified File and User Manag...
Novell Storage Manager: Your Secret Weapon for Simplified File and User Manag...Novell Storage Manager: Your Secret Weapon for Simplified File and User Manag...
Novell Storage Manager: Your Secret Weapon for Simplified File and User Manag...
 
Securing Your Endpoints Using Novell ZENworks Endpoint Security Management
Securing Your Endpoints Using Novell ZENworks Endpoint Security ManagementSecuring Your Endpoints Using Novell ZENworks Endpoint Security Management
Securing Your Endpoints Using Novell ZENworks Endpoint Security Management
 
Deep Dive Into Windows Server 2012 Hyper-V
Deep Dive Into Windows Server 2012 Hyper-VDeep Dive Into Windows Server 2012 Hyper-V
Deep Dive Into Windows Server 2012 Hyper-V
 
Lessons Learned: Novell Open Enterprise Server Upgrades Made Easy
Lessons Learned: Novell Open Enterprise Server Upgrades Made EasyLessons Learned: Novell Open Enterprise Server Upgrades Made Easy
Lessons Learned: Novell Open Enterprise Server Upgrades Made Easy
 
Domain Services for Windows: Best Practices for Windows Interoperability
Domain Services for Windows: Best Practices for Windows InteroperabilityDomain Services for Windows: Best Practices for Windows Interoperability
Domain Services for Windows: Best Practices for Windows Interoperability
 
Management server internals
Management server internalsManagement server internals
Management server internals
 
Apache CloudStack Architecture by Alex Huang
Apache CloudStack Architecture by Alex HuangApache CloudStack Architecture by Alex Huang
Apache CloudStack Architecture by Alex Huang
 
Novell Filr
Novell FilrNovell Filr
Novell Filr
 
Server 2008 R2 Yeniliklər
Server 2008 R2 YeniliklərServer 2008 R2 Yeniliklər
Server 2008 R2 Yeniliklər
 
Xen PV Performance Status and Optimization Opportunities
Xen PV Performance Status and Optimization OpportunitiesXen PV Performance Status and Optimization Opportunities
Xen PV Performance Status and Optimization Opportunities
 
Finding Virtual Coins in the Couch
Finding Virtual Coins in the CouchFinding Virtual Coins in the Couch
Finding Virtual Coins in the Couch
 
Xen and Apache cloudstack
Xen and Apache cloudstack  Xen and Apache cloudstack
Xen and Apache cloudstack
 
2 architectural at CloudStack Developer Day
2  architectural at CloudStack Developer Day2  architectural at CloudStack Developer Day
2 architectural at CloudStack Developer Day
 
Archiving and e-Discovery for Novell GroupWise
Archiving and e-Discovery for Novell GroupWiseArchiving and e-Discovery for Novell GroupWise
Archiving and e-Discovery for Novell GroupWise
 
12th Japan CloudStack User Group Meetup MidoNet with scalable virtual router
12th Japan CloudStack User Group Meetup   MidoNet with scalable virtual router12th Japan CloudStack User Group Meetup   MidoNet with scalable virtual router
12th Japan CloudStack User Group Meetup MidoNet with scalable virtual router
 
Quest NetVault FastRecover Continuous Data Protection (CDP)
Quest NetVault FastRecover Continuous Data Protection (CDP)Quest NetVault FastRecover Continuous Data Protection (CDP)
Quest NetVault FastRecover Continuous Data Protection (CDP)
 
SUSE Linux Enterprise Server for System z SP1
SUSE Linux Enterprise Server  for System z SP1 SUSE Linux Enterprise Server  for System z SP1
SUSE Linux Enterprise Server for System z SP1
 
Hacking apache cloud stack
Hacking apache cloud stackHacking apache cloud stack
Hacking apache cloud stack
 

Semelhante a Using Novell Sentinel Log Manager to Monitor Novell Applications

Introduction to Crystal and Jasper Reports for Novell Sentinel 6.1
Introduction to Crystal and Jasper Reports for Novell Sentinel 6.1Introduction to Crystal and Jasper Reports for Novell Sentinel 6.1
Introduction to Crystal and Jasper Reports for Novell Sentinel 6.1Novell
 
Introduction to Crystal and Jasper Reports for Novell Sentinel 6.1
Introduction to Crystal and Jasper Reports for Novell Sentinel 6.1Introduction to Crystal and Jasper Reports for Novell Sentinel 6.1
Introduction to Crystal and Jasper Reports for Novell Sentinel 6.1Novell
 
How to Architect a Novell Sentinel Implementation
How to Architect a Novell Sentinel ImplementationHow to Architect a Novell Sentinel Implementation
How to Architect a Novell Sentinel ImplementationNovell
 
Puppet devops wdec
Puppet devops wdecPuppet devops wdec
Puppet devops wdecWojciech Dec
 
Novell SecureLogin 7 and Your Microsoft Active Directory Setup
Novell SecureLogin 7 and Your Microsoft Active Directory SetupNovell SecureLogin 7 and Your Microsoft Active Directory Setup
Novell SecureLogin 7 and Your Microsoft Active Directory SetupNovell
 
Utilizing Novell Sentinel Advisor and Attack Vulnerability
Utilizing Novell Sentinel Advisor and Attack VulnerabilityUtilizing Novell Sentinel Advisor and Attack Vulnerability
Utilizing Novell Sentinel Advisor and Attack VulnerabilityNovell
 
Rapid Deployment of Novell ZENworks Configuration Management
Rapid Deployment of Novell ZENworks Configuration ManagementRapid Deployment of Novell ZENworks Configuration Management
Rapid Deployment of Novell ZENworks Configuration ManagementNovell
 
OSMC 2010 | Insides SUSE Linux by Joachim Werner
OSMC 2010 | Insides SUSE Linux by Joachim WernerOSMC 2010 | Insides SUSE Linux by Joachim Werner
OSMC 2010 | Insides SUSE Linux by Joachim WernerNETWAYS
 
Securing Your Linux System
Securing Your Linux SystemSecuring Your Linux System
Securing Your Linux SystemNovell
 
Application Repackaging Best Practices for Novell ZENworks 10 Configuration M...
Application Repackaging Best Practices for Novell ZENworks 10 Configuration M...Application Repackaging Best Practices for Novell ZENworks 10 Configuration M...
Application Repackaging Best Practices for Novell ZENworks 10 Configuration M...Novell
 
Rancher Rodeo 13 mai 2022
Rancher Rodeo 13 mai 2022Rancher Rodeo 13 mai 2022
Rancher Rodeo 13 mai 2022SUSE
 
Update Management and Compliance Monitoring with the Subscription Management...
Update Management and Compliance Monitoring with the Subscription  Management...Update Management and Compliance Monitoring with the Subscription  Management...
Update Management and Compliance Monitoring with the Subscription Management...Novell
 
Introduction to Novell ZENworks Configuration Management Troubleshooting
Introduction to Novell ZENworks Configuration Management TroubleshootingIntroduction to Novell ZENworks Configuration Management Troubleshooting
Introduction to Novell ZENworks Configuration Management TroubleshootingNovell
 
Simplified, Robust and Speedy Novell Identity Manager Implementation with Des...
Simplified, Robust and Speedy Novell Identity Manager Implementation with Des...Simplified, Robust and Speedy Novell Identity Manager Implementation with Des...
Simplified, Robust and Speedy Novell Identity Manager Implementation with Des...Novell
 
"Wie passen Serverless & Autonomous zusammen?"
"Wie passen Serverless & Autonomous zusammen?""Wie passen Serverless & Autonomous zusammen?"
"Wie passen Serverless & Autonomous zusammen?"Volker Linz
 
Slide DevSecOps Microservices
Slide DevSecOps Microservices Slide DevSecOps Microservices
Slide DevSecOps Microservices Hendri Karisma
 
Anatomy of a Build Server Attack
Anatomy of a Build Server AttackAnatomy of a Build Server Attack
Anatomy of a Build Server AttackDevOps.com
 
How to detect side channel attacks in cloud infrastructures
How to detect side channel attacks in cloud infrastructuresHow to detect side channel attacks in cloud infrastructures
How to detect side channel attacks in cloud infrastructuresPasquale Puzio
 

Semelhante a Using Novell Sentinel Log Manager to Monitor Novell Applications (20)

Introduction to Crystal and Jasper Reports for Novell Sentinel 6.1
Introduction to Crystal and Jasper Reports for Novell Sentinel 6.1Introduction to Crystal and Jasper Reports for Novell Sentinel 6.1
Introduction to Crystal and Jasper Reports for Novell Sentinel 6.1
 
Introduction to Crystal and Jasper Reports for Novell Sentinel 6.1
Introduction to Crystal and Jasper Reports for Novell Sentinel 6.1Introduction to Crystal and Jasper Reports for Novell Sentinel 6.1
Introduction to Crystal and Jasper Reports for Novell Sentinel 6.1
 
How to Architect a Novell Sentinel Implementation
How to Architect a Novell Sentinel ImplementationHow to Architect a Novell Sentinel Implementation
How to Architect a Novell Sentinel Implementation
 
Puppet devops wdec
Puppet devops wdecPuppet devops wdec
Puppet devops wdec
 
Novell SecureLogin 7 and Your Microsoft Active Directory Setup
Novell SecureLogin 7 and Your Microsoft Active Directory SetupNovell SecureLogin 7 and Your Microsoft Active Directory Setup
Novell SecureLogin 7 and Your Microsoft Active Directory Setup
 
Utilizing Novell Sentinel Advisor and Attack Vulnerability
Utilizing Novell Sentinel Advisor and Attack VulnerabilityUtilizing Novell Sentinel Advisor and Attack Vulnerability
Utilizing Novell Sentinel Advisor and Attack Vulnerability
 
Rapid Deployment of Novell ZENworks Configuration Management
Rapid Deployment of Novell ZENworks Configuration ManagementRapid Deployment of Novell ZENworks Configuration Management
Rapid Deployment of Novell ZENworks Configuration Management
 
OSMC 2010 | Insides SUSE Linux by Joachim Werner
OSMC 2010 | Insides SUSE Linux by Joachim WernerOSMC 2010 | Insides SUSE Linux by Joachim Werner
OSMC 2010 | Insides SUSE Linux by Joachim Werner
 
Securing Your Linux System
Securing Your Linux SystemSecuring Your Linux System
Securing Your Linux System
 
Application Repackaging Best Practices for Novell ZENworks 10 Configuration M...
Application Repackaging Best Practices for Novell ZENworks 10 Configuration M...Application Repackaging Best Practices for Novell ZENworks 10 Configuration M...
Application Repackaging Best Practices for Novell ZENworks 10 Configuration M...
 
Rancher Rodeo 13 mai 2022
Rancher Rodeo 13 mai 2022Rancher Rodeo 13 mai 2022
Rancher Rodeo 13 mai 2022
 
Update Management and Compliance Monitoring with the Subscription Management...
Update Management and Compliance Monitoring with the Subscription  Management...Update Management and Compliance Monitoring with the Subscription  Management...
Update Management and Compliance Monitoring with the Subscription Management...
 
Introduction to Novell ZENworks Configuration Management Troubleshooting
Introduction to Novell ZENworks Configuration Management TroubleshootingIntroduction to Novell ZENworks Configuration Management Troubleshooting
Introduction to Novell ZENworks Configuration Management Troubleshooting
 
Simplified, Robust and Speedy Novell Identity Manager Implementation with Des...
Simplified, Robust and Speedy Novell Identity Manager Implementation with Des...Simplified, Robust and Speedy Novell Identity Manager Implementation with Des...
Simplified, Robust and Speedy Novell Identity Manager Implementation with Des...
 
"Wie passen Serverless & Autonomous zusammen?"
"Wie passen Serverless & Autonomous zusammen?""Wie passen Serverless & Autonomous zusammen?"
"Wie passen Serverless & Autonomous zusammen?"
 
Slide DevSecOps Microservices
Slide DevSecOps Microservices Slide DevSecOps Microservices
Slide DevSecOps Microservices
 
Anil Info
Anil InfoAnil Info
Anil Info
 
Anatomy of a Build Server Attack
Anatomy of a Build Server AttackAnatomy of a Build Server Attack
Anatomy of a Build Server Attack
 
How to detect side channel attacks in cloud infrastructures
How to detect side channel attacks in cloud infrastructuresHow to detect side channel attacks in cloud infrastructures
How to detect side channel attacks in cloud infrastructures
 
XS Boston 2008 OVF
XS Boston 2008 OVFXS Boston 2008 OVF
XS Boston 2008 OVF
 

Mais de Novell

Filr white paper
Filr white paperFilr white paper
Filr white paperNovell
 
Social media class 4 v2
Social media class 4 v2Social media class 4 v2
Social media class 4 v2Novell
 
Social media class 3
Social media class 3Social media class 3
Social media class 3Novell
 
Social media class 2
Social media class 2Social media class 2
Social media class 2Novell
 
Social media class 1
Social media class 1Social media class 1
Social media class 1Novell
 
Social media class 2 v2
Social media class 2 v2Social media class 2 v2
Social media class 2 v2Novell
 
LinkedIn training presentation
LinkedIn training presentationLinkedIn training presentation
LinkedIn training presentationNovell
 
Twitter training presentation
Twitter training presentationTwitter training presentation
Twitter training presentationNovell
 
Getting started with social media
Getting started with social mediaGetting started with social media
Getting started with social mediaNovell
 
Strategies for sharing and commenting in social media
Strategies for sharing and commenting in social mediaStrategies for sharing and commenting in social media
Strategies for sharing and commenting in social mediaNovell
 
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECHInformation Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECHNovell
 
Workload iq final
Workload iq   finalWorkload iq   final
Workload iq finalNovell
 
The Identity-infused Enterprise
The Identity-infused EnterpriseThe Identity-infused Enterprise
The Identity-infused EnterpriseNovell
 
Shining the Enterprise Light on Shades of Social
Shining the Enterprise Light on Shades of SocialShining the Enterprise Light on Shades of Social
Shining the Enterprise Light on Shades of SocialNovell
 
Accelerate to the Cloud
Accelerate to the CloudAccelerate to the Cloud
Accelerate to the CloudNovell
 
The New Business Value of Today’s Collaboration Trends
The New Business Value of Today’s Collaboration TrendsThe New Business Value of Today’s Collaboration Trends
The New Business Value of Today’s Collaboration TrendsNovell
 
Preventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log ManagementPreventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log ManagementNovell
 
Iaas for a demanding business
Iaas for a demanding businessIaas for a demanding business
Iaas for a demanding businessNovell
 
Workload IQ: A Differentiated Approach
Workload IQ: A Differentiated ApproachWorkload IQ: A Differentiated Approach
Workload IQ: A Differentiated ApproachNovell
 
Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...
Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...
Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...Novell
 

Mais de Novell (20)

Filr white paper
Filr white paperFilr white paper
Filr white paper
 
Social media class 4 v2
Social media class 4 v2Social media class 4 v2
Social media class 4 v2
 
Social media class 3
Social media class 3Social media class 3
Social media class 3
 
Social media class 2
Social media class 2Social media class 2
Social media class 2
 
Social media class 1
Social media class 1Social media class 1
Social media class 1
 
Social media class 2 v2
Social media class 2 v2Social media class 2 v2
Social media class 2 v2
 
LinkedIn training presentation
LinkedIn training presentationLinkedIn training presentation
LinkedIn training presentation
 
Twitter training presentation
Twitter training presentationTwitter training presentation
Twitter training presentation
 
Getting started with social media
Getting started with social mediaGetting started with social media
Getting started with social media
 
Strategies for sharing and commenting in social media
Strategies for sharing and commenting in social mediaStrategies for sharing and commenting in social media
Strategies for sharing and commenting in social media
 
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECHInformation Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECH
 
Workload iq final
Workload iq   finalWorkload iq   final
Workload iq final
 
The Identity-infused Enterprise
The Identity-infused EnterpriseThe Identity-infused Enterprise
The Identity-infused Enterprise
 
Shining the Enterprise Light on Shades of Social
Shining the Enterprise Light on Shades of SocialShining the Enterprise Light on Shades of Social
Shining the Enterprise Light on Shades of Social
 
Accelerate to the Cloud
Accelerate to the CloudAccelerate to the Cloud
Accelerate to the Cloud
 
The New Business Value of Today’s Collaboration Trends
The New Business Value of Today’s Collaboration TrendsThe New Business Value of Today’s Collaboration Trends
The New Business Value of Today’s Collaboration Trends
 
Preventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log ManagementPreventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log Management
 
Iaas for a demanding business
Iaas for a demanding businessIaas for a demanding business
Iaas for a demanding business
 
Workload IQ: A Differentiated Approach
Workload IQ: A Differentiated ApproachWorkload IQ: A Differentiated Approach
Workload IQ: A Differentiated Approach
 
Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...
Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...
Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...
 

Último

Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessWSO2
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...BookNet Canada
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Jeffrey Haguewood
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...Karmanjay Verma
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 

Último (20)

Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with Platformless
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 

Using Novell Sentinel Log Manager to Monitor Novell Applications

  • 1. Auditing Novell Applications ® Event Collection with Novell Sentinel Log Manager ™ David Corlette Product Line Lead DCorlette@novell.com
  • 2. Agenda • Overview of Novell event auditing technologies ® • nAudit: Identity Manager, Novell eDirectory , ™ Access Manager, iManager, Modular Authentication Service, Netware ® • Syslog: Privileged User Manager, SecureLogin • Custom API: Open Enterprise Server 2 © Novell, Inc. All rights reserved.
  • 3. Auditing Novell Applications ® • Several historical auditing frameworks • Acquired products which use their own frameworks • Minimal and weak industry event auditing standards • Current common standards: – nAudit – Syslog – Custom API 3 © Novell, Inc. All rights reserved.
  • 5. Architecture Source Application Instrumentation Sentinel Platform Connector Agent SSL Cache 5 © Novell, Inc. All rights reserved.
  • 6. Event Structure • 21 pre-defined fields with data types and baseline semantic definitions • LSC file defines additional semantics for each event 6 © Novell, Inc. All rights reserved.
  • 7. Configuration Event Source • Each application has its own instrumentation – Event Selection varies as a result • Simple configuration file for Platform Agent – LogHost=<Sentinel Collector Manager IP> – LogEnginePort=1289 <Event Source Server port> Novell Sentinel ® ™ • If Connector/Event Source Server/Collector is properly deployed, Event Sources will automatically deploy 7 © Novell, Inc. All rights reserved.
  • 8. Configuration Examples Novell Access Manager Novell Identity Manager Novell eDirectory 8 © Novell, Inc. All rights reserved.
  • 10. Architecture Source Application Sentinel Syslog Connector Daemon TCP 10 © Novell, Inc. All rights reserved.
  • 11. Event Structure • Defined header with date/time and host ID – Jan 12 10:12:03 myhost … • Pseudo-standard that application ID follows host ID – Jan 12 10:12:03 myhost sshd: ... • Rest of message is free-form; some Novell applications use structured JSON string to carry data • Simple, lightweight format but requires more complex parsing on the backend 11 © Novell, Inc. All rights reserved.
  • 12. Configuration Event Source • Each application has its own configuration procedure – Event Selection varies as a result Novell Sentinel ® ™ • If Event Source Server is properly deployed and Collector is in ESM Library, Collector/Connector/Event Sources will automatically deploy 12 © Novell, Inc. All rights reserved.
  • 13. Configuration Examples Privileged User Manager SUSE Linux ® filter f_sentinel { facility(authpriv,auth,ftp,kern,mail,local0); }; destination d_sentinel { tcp(130.57.171.51 port(1468)); }; log { source(src); filter(f_sentinel); destination(d_sentinel); }; SecureLogin Novell SecureLogin 7.0 SP1 will include a syslog forwarder which will forward NSL events (sent to Windows EventLog) to Sentinel. Instructions TBD. 13 © Novell, Inc. All rights reserved.
  • 15. Architecture NCP AFP CIFS NSS Open Enterprise Server Sentinel Vigil Engine Connector Vigil Client TCP Sentinel Agent 15 © Novell, Inc. All rights reserved.
  • 16. Event Structure • Vigil Engine exposes C API for clients to connect and receive events • Client can output in common formats like XML, NVP • Fields are named and have pre-defined, fixed meanings • Sentinel Agent reads STDOUT from Vigil Client ™ • Sentinel Agent forwards data over Syslog to Sentinel NSS CREATE TaskID[0] Zid[98] ParentZid[7F] FileType[3] FileAttributes[20] OpRetCode[0] VolID[6E584A8B8170DE01800112DF59F86F0C] UserID[03000000000000000000000000000000] UserName[Supervisor] uid[0] uname[root] euid[0] euname[root] suid[0] suname[root] fsuid[0] fsuname[root] gid[0] guname[root] egid[0] eguname[root] sgid[0] sguname[root] fsgid[0] fsguname[root] comm[vi] target[VOL1:/.myfile.txt.swx] key[0x0] requestedRights[0x00000002] createFlags[0x00000100] createAndOpen[0x00000000] retOpenCreateAction[0x00000002] accessed[2009-07-28 11:47:16] created[2009-07-28 11:47:16] modified[2009-07-28 11:47:16] metaDataModified[2009-07-28 11:47:16] targethost[OESVigil] 16 © Novell, Inc. All rights reserved.
  • 17. Configuration Event Source • Client must be configured to connect to Engine • Sentinel Agent must be configured to invoke Client • Agent must be configured to send to Sentinel ➔ Scripts are provided to accomplish all of the above Novell Sentinel ® ™ • If Event Source Server is properly deployed and Collector is in ESM Library, Collector/Connector/Event Sources will automatically deploy 17 © Novell, Inc. All rights reserved.
  • 18. Open Enterprise Server Configuration Demonstration
  • 19.
  • 20. Unpublished Work of Novell, Inc. All Rights Reserved. This work is an unpublished work and contains confidential, proprietary, and trade secret information of Novell, Inc. Access to this work is restricted to Novell employees who have a need to know to perform tasks within the scope of their assignments. No part of this work may be practiced, performed, copied, distributed, revised, modified, translated, abridged, condensed, expanded, collected, or adapted without the prior written consent of Novell, Inc. Any use or exploitation of this work without authorization could subject the perpetrator to criminal and civil liability. General Disclaimer This document is not to be construed as a promise by any participating company to develop, deliver, or market a product. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. Novell, Inc. makes no representations or warranties with respect to the contents of this document, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. The development, release, and timing of features or functionality described for Novell products remains at the sole discretion of Novell. Further, Novell, Inc. reserves the right to revise this document and to make changes to its content, at any time, without obligation to notify any person or entity of such revisions or changes. All Novell marks referenced in this presentation are trademarks or registered trademarks of Novell, Inc. in the United States and other countries. All third-party trademarks are the property of their respective owners.