LogMon Documentation
<!--
-->
LogMon Guide |
document created on 14 3 2006 document modified on 21 July 2006 |
CONTENTS
- What is LogMon?
- Architecture of LogMon.
- Working of LogMon.
- Using LogMon.
- Configuring LogMon.
- LogMon GUI.
- Supporting software Packages
- Directory Structure and Naming Convention
- Making dumb terminal
- Log Archival
- Shutting down and starting LogMon
- How to and FAQ
- Appendix
What is LogMon?
LogMon provides for centralized log monitoring and report generation system
for various security devices being monitored.
LogMon caters to various category of security devices and various products within same same category
LogMon uses extensible architecture to collect logs, process it and prepare reports.
LogMon can be easily extended to add more security devices in future
Reports can be generated on a daily and weekly basis.
Devices from which logs are collected
- Anti-Virus
- Symantec AV corporate Edition version 10.0
- TrendMicro IMSS v. 5.0
- TrendMicro IWSS
- IDS
- RealSecure IDS version 2.0.6.1027
- Cisco IDS version 4.1.(5)
- FireWall
- CheckPoint Linux version R54
- CheckPoint Windows version R55
- CiscoPix version 6.0(4)
Architecture of LogMon.
LogMon Engine
LogMon's working can be broadly divided following categories
- Collecting logs from devices
- Generating reports from logs
- Real time monitoring and alarm
- Log archival
LogMon operator console provides full graphical control on LogMon server. Here is the explanation how it does that Security devices like Symantec antivirus,IWSS,IMSS and RealSecure IDS are Windows machine. LogMon uses Net::RDEP Module for collecting logs from Cisco IDS machine Logs of PIX FireWall are collected using syslog Logs of CheckPoint FireWall are collected using utility called 'fw1-loggrabber'
LogMon Operator Console
It acts as dumb terminal for LogMon i.e. LogMon can be accessed from
operator console with GUI. operator console creates exports graphics from the
LogMon Server to display the data on the operator's console. Facility like
XlogMaster to view Log files dynamically as they are getting generated can
be used from operator console and user does not need to access LogMon server
physically though actual processing is done at LogMon server only
Working of LogMon.
LogMon's working can be divided into two basic categories
Collecting Logs
Collecting logs using TailLog Client
these devices logs in a log file,in a particular directory specified in the configuration.
LogMon uses a client named "TailLog Client" which can monitor the specified directory
and look for latest created file,this is the file in which devices are logging messages
TailLog Client uses a
configuration
file.
where many parameters can be specified,
TailLog a utility is written in Visual Basic.
explanation for the same is given in 'Using LogMon' section.
Collecting logs using Net::RDEP
This is a perl module which can fetch logs from Cisco IDS machine
details are given in 'Using LogMon' section.
Collecting logs using syslog
console of PIX FireWall provides a facility of sending logs to remote machine's syslog
with certain facility and level
LogMon receives logs from PIX FireWall with facility and level as local4.debug
using syslog log file are rotated periodically
Collecting logs using fw1-loggrabber
fw1-loggrabber fetches logs from CheckPoint machine using TCP connection.
fw1-loggrabber can be configured with needs. More about configuring fw1-loggrabber
can be found at 'Using LogMon' section.
logical picture of log collection on LogMon server
Pre-request from devices for collecting logs
for collecting logs using TailLog client
TailLog client must be properly configured on the device. see section configuring
TailLog client.
for collecting logs from RealSecure IDS
RealSecure IDS does not log into file by default, administrator must do this setting and
provide proper path to TailLog client to collect logs from RealSecure IDSS server
for collecting logs from Cisco IDS
Cisco IDS logs are collected using Net::RDEP module running on LogMon server
IP address of LogMon server must be added in trusted host list in Cisco IDS server so
that query from LogMon server is served
for collecting logs from Cisco PIX
Cisco PIX firewalls logs are collected using Syslog First Cisco PIX server must be
configured to send logs to remote server with appropriate facility and severity
LogMon runs daemons to process the log files collected and generates reports for those.
for the devices for which aggregation of report is possible for those
weekly reports are created by aggregating the daily reports thus saving system resources and time.
These reports are delivered to concern people using mail.
Mail delivery can be controlled using configuration files.
More about this can be found in 'configuring LogMon' section.
Report generation criteria
Log files consist of various logs of various severity but not all
the types of logs are taken into consideration while generating reports
Mentioned below are a few cases which support the above statement
- CISCO IDS
in report of CISCO IDS details about 'Informational' events are not included
Both CHECKPOINT FireWall machine's report (R55 and R54) details
about event with action 'accept' are not present.
RealSecure IDS log file contains logs of severity like 'high','medium' and 'low'
but details about logs of severity 'low' are not included in report prepared.
LogMon monitors logs collected in real time and and generates alarms for suspicious event
LogMon GUI(Xlogmaster) can be used for looking at log files in real time.
more about Xlogmaster is given in 'Using Xlogmaster' section.
Logs collected are moved to NAS on periodic basis.
LogMon is provided with NFS mount point. moving log file on NAS helps
to keep disk utilization low.
Using of LogMon.
LogMon comes with perl scripts which provides command lines
for collecting logs and producing reports for various devices
- Collecting logs sent by TailLog
$>logrotate.pl [port no] [path/to/logfile] [directory/to/which/logfile/to/be/rotated/]
TailLog sends log on UDP port specified in configuration file. logrotate.pl can read that port
and collect the logs and write into logfile. every day at 00:00:00 logfile will be rotated and
will go to specified directory with year and month hierarchy and time extention
(e.g. file
av_imss rotated on 3 apr 2006 might be placed as <dir>/2006/04/av_imss-20060404-000003)
- Collecting logs from CheckPoint FireWall
$>fw1-loggrabber -l /path/to/lea_R54.conf -c /path/to/fw1-loggrabber_R54.conf
LogMon provides wrapper to run this command, assuring that even if the connection is broken
for some reason command will be called again so that log collection will continue
- Collecting logs from Cisco IDS
$>cisco_redirect.pl
cisco_redirect.pl uses configuration file to know about details about Cisco IDS server
details are given in 'Configuring LogMon' section
- Starting log collection from all devices
$>call_logrotate.pl
'call_logrotate.pl' uses configuration file to know about
- for which devices logging is to started.
- which devices uses TailLog client.
- if TailLog then details about port no., file name,rotation directory.
- if fw1-loggrabber then fw1-loggrabber's configuration files
- if Cisco IDS then Cisco IDS's conf file
as CiscoPix FireWall logs are collected using syslog log
collection will start at system start. - Generating report
$>log_process.pl [OPTIONS] [DEVICE] [INPUT DIR] [OUTPUT FILE] [FROM TIME] [TO TIME]
options can be '-daily' or '-agg' depending upon how report is to be generated
Device name can be any from this list
av_imss, av_iwss, av_symantec1, av_symantec2, ids_rs, ids_cisco, fw_pix, fw_r55, fw_r54
input directory should be upto device level depth
for '-daily' option,and upto final level for '-agg' option.
output file is a report file in which report generated will be written.
from time and to time ,here u can specify duration for which report is to be generated.
Time can be provided in any format.
e.g.
$>log_process.pl -daily ids_rs /opt/logmon/ROTATED/ids/ids_rs/
/opt/logmon/REPORTS/ids/ids_rs/DAILY/2006/07/ids_rs-20060709 2006070900:00:00 2006070923:59:59
here actual log file will be at /opt/logmon/ROTATED/ids/ids_rs/<year>/<month>/
log_process.pl will select appropriate log files
$>log_process.pl -agg fw_pix /var/tmp/pixtempdir/ /opt/logmon/REPORTS/fw/fw_pix/WEEKLY/2006/fw_pix-13 "4 June 2006 00:00:00" "10 June 2006 23:00:00"
- Generating reports for all devices
$>call_logprocess.pl
call_logprocess.pl uses configuration files to know about details like
- where are the log files
- where to put reports generated
- whether weekly report are to be generated
For the daily reports time duration will be taken previous days 24 hours.
i.e. if fired on 24 march 2006 then time duration taken will be from "23 march 2006 00:00:00" to "23 march 23:59:59"
For weekly reports duration will be from "17 march 2006 00:00:00" to "23 march 2006 23:59:59" - Send mail from LogMon
$>mail.pl [options]
Options can be any from following list
- -smtp_server
- -from
- -to
- -cc
- -bcc
- -subject
- -body_header
- -body_content
- -body_footer
- -footer
- -attach
options like to,cc,bcc and attach can take multiple values and should be provided in comma
separated form
unspecified options value will be taken from configuration file
more will be in 'Configuring LogMon' section
mail.pl is mainly used for sending reports and alerts to concern person - Send generated reports
$>call_mail.pl
'call_mail.pl' will send previous days reports to address specified in configuration file
Configuring of LogMon.
Configuration directory contains following files
Click on a link to view sample file.
- chkpt_ignore_pattern_file
- chkpt_r54_protected_ip_file
- chkpt_r55_protected_ip_file
- cisco_ids_severity_file
- device_port.conf
- error_constants.pm
- false_positive_source_ip
- log_paths.pm
- log_process_constants.pm
- mail_conf
- name_for_ip.pm
- pix_conf
- pix_conf_parent_file
- pix_errcodes
- rs_ids_severity_file
Here is the details about each file
- chkpt_ignore_pattern_file
This file contains patterns in log file for which log entry is to be ignored.
e.g. sample entry can be like this,
action=accept
This will ignore all entries for which action is accept. - chkpt_r54_protected_ip_file
This file contains entry about ip address and its name, for which detailed
information is to be provided in report file.
Regular expression is also supported
i.e.entry like this
172.16.*.* local LAN
will produce detailed information about all ip addresses in 172.16. range. - chkpt_r55_protected_ip_file
This file contains entry about ip address and its name,
for which detailed information is to be provided in report file.
Regular expression is also supported
i.e.entry like this
172.16.*.* local LAN
will produce detailed information about all ip addresses in 172.16. range.
Only difference in report of CheckPoint-R55 and CheckPointR54 is
protected check is done against Destination IP in cake of CheckPoint-R55 whereas
for CheckPoint-R54 protected check is done against Source IP. - cisco_ids_severity_file
This file contains 'severity signature' pair.
In Cisco IDS logfile each entry has severity defined ,but adding entry in this file
for some signature will cause severity defined in logfile to be replaced with what is
mentioned in this file.
e.g.
For signature 'Half-open sys' severity in log file may be 'High' but
adding entry in this file like
'low Half-open Syn'
will cause is to be displayed 'low' in prepared report file. - rs_ids_severity_file
This file contains 'severity signature' pair and works in exactly same fashion as it works
for Cisco IDS.
- device_port.conf
This file contains entries like
<device_name>=<port_no> or
<device_name>=n/a
This file will be used to know about the port no. to be used for
collecting logs from TailLog client.
Devices which do not use TailLog client for those it would be n/a i.e not applicable
Note: Make sure that port no. given in TailLog client's configuration file running on
respective device matches with what is given here.
- error_constants.pm
This file contains information about error messages that are to be displayed when user
fires wrong command line for 'log_process.pl'.
user don't need to change/edit this file.
- false_positive_source_ip
This file contains 'Source IP Destination IP' pair for which alert generated in Cisco
IDS will be considered as false positive events.
Report generated will be equipped with comment column for this events.
Regular expression is supported for IP
e.g. adding entry like this
130.1.3.* 195.1.*.*
will cause all events for with source address from 130.1.3 network and destination
address from 195.1 network, to be considered as false positive events. - log_paths.pm
This file contains information about all the parameters like
path of all configuration files mentioned here
path of all scripts used by LogMon
path of all directories used by LogMon
user don't need to edit this file. - log_process_constants.pm
This file is perl module and contains all constants used.
user don't need to edit this.
- mail.conf
This file contains all the details required for sending mail from LogMon server.
Using 'mail.pl' which includes following parameters.- smtp_server
- from
- to
- cc
- subject
- body_header
- body_content
- body_footer
- footer
- attach
User can specify value of these parameter in this file or in command line.
Unspecified parameters value will be taken from this file. - name_for_ip.pm
It's always easy and better for one to know machine by its name rather than ip address.
This file contains name to be used in report for ip's encountered in log file.
Format of this file is like hash map where 'ip' is key and 'its name' would be the value.
- pix_conf, pix_conf_parent_file, pix_errorcodes
These files are used by logprocess.pl in preparation of Cisco Pix FireWall report
user don't need to edit these files.
Using Xlogmaster.
Xlogmaster is a graphical utility to monitor logs as they are coming
and take required action on occurrence of certain events
more about Xlogmaster in tutorial
System Services and Packages Used
LogMon uses some system services like
- Syslog
- NTP
- Perl-5.8
- fw1-loggrabber-1.11.1
- TailLog-1.5
- Net::RDEP
- Xlogmaster-1.6.0
As described in 'Working of LogMon' section logs of Cisco PIX FireWall are collected
using Syslog
as this logs are coming from remote machine some changes are required in file named
'/etc/sysconfig/syslog'
default syslog configuration will not be able to receive logs from remote machine to do such provision
file '/etc/sysconfig/syslog' needs to be changed
initially line will be as shown below
SYSLOGD_PARAMS=""
changing it to
SYSLOGD_PARAMS="-r"
will enable remote logging and system will be able to receive logs sent by remote machine
One of the important thing in process of log collection and report generation
is time synchronization
NTP (Network Time Protocol) is utility to synchronize two Unix machine
adding following entries in file '/etc/ntp.conf' of any device machine will make device
machine to refer time from LogMon machine periodically
server <LogMon machine IP>
where as LogMon itself refers time from Time Server in USA
entries of file '/etc/ntp.conf' of LogMon looks like this
server 129.6.15.28 server 129.6.15.29 server 132.163.4.101 server 132.163.4.102
To synchronize MS-Windows machine with LogMon machine LogMon uses software called 'AboutTime'
Giving LogMons IP as Network Time Server will make Windows machine to refer time from LogMon
![]() Here is a typical client session. In this example, AboutTime reports a 3 millisecond difference between the local computer's clock and the network time server. |
![]() Here is AboutTime's own four-server "traffic" display. It shows that one of the server protocols is unavailable (red), and another is responding to a request (yellow). |
Perl is the programming language used for writing scripts. These scripts runs as daemons
and collects logs from various devices and generate reports.
www.perl.com is official perl home page run by O'Reilly.
FW1-Loggrabber is a command-line tool to grab log files from Checkpoint FW-1 remotely using
Checkpoints LEA (Log Export Api), which is one part of Checkpoints OPSEC API.
More information can be found at
fw1-loggrabber site
TailLog is a command line utility to collect logs from remote MS-Windows machine.
TailLog can monitor a folder in which log files resides and send UDP packets as logfile is
growing, on desired machine and port.
Binary and source code are included with this documentation CD.
Remote Data Exchange Protocol (RDEP) is a protocol designed by Cisco Systems in order to
exchange Intrusion Detection System events, configuration, log, and control messages. This
protocol is supported at least the Cisco IDS version 4.0.
This implementation only supports the collection of events.
The events are retrieved in a format, also developed by Cisco, referred to as Intrusion
Detection Interaction and Operations Messages (IDIOM), which is an XML document. A simple
module for handling these documents is included with this distribution (XML::Idiom).
RDEP supports two methods for retrieving events: an event query and an event
subscription. Both methods use SSL to query the RDEP server and retrieve the events. The
event query method will retrieve all the events in a given time range. No connection is
maintained in anyway. The event subscription, however, does maintain a connection and will
support multiple "gets" to continue to retrieve events as they are available.
See www.cisco.com for more information in RDEP or IDIOM.
Xlogmaster allows you to monitor all your log files and all
devices that allow being read by cat. Furthermore it supplies
several filters that will do things from raising/hiding lines in the
text display to starting programs to send you a paging message about a
possible security breach.
If used wisely Xlogmaster can make it very easy to keep track of
everything that happens on your system and it can increase your systems
security by quite a lot.
Directory Structure and Naming.
Directory Structure.
as described in 'Configuring LogMon' section 'Top Level Directory' can be specified
this is directory in which all directory/files related to LogMon resides
all configuration files used should be in directory
<Top Level Directory>/CONFIGURATION/
all scripts used should be in directory
<Top Level Directory>/log_analysis/codes/aggregation_codes/ or
<Top Level Directory>/log_analysis/codes/report_generation_codes/
depending on kind of script it is
all Logs Collected should get rotated in
<Top Level Directory>/ROTATED/<class>/<device>/<year>/<month>
all reports generated should go in
<Top Level
Directory>/REPORTS/<class>/<device>/<DAILY>/<year>/<month>
or
<Top Level Directory>/REPORTS/<class>/<device>/<WEEKLY>/<year>/
Naming Convention.
All log files rotated should have name like
<class>_<device>-<year><month><day>-<hour><min><sec>
e.g.
ids_cisco-20060612-000003
which means that this is a file of device Cisco of class IDS and was rotated on 00:00:03 of
12 June 2006 thus will have logs of 11 June 2006
Daily report of IMSS antivirus generated for 4 march 2006 will have name
av_imss-20060304
Weekly report of IMSS antivirus generated for 4 march 2006 will have name
av_imss-2006-9
as report is for 9th week of year 2006
Making Dumb Terminal.
XDMCP is the protocol used for making dumb terminal
XDMCP stands for "X Display Manager Control Protocol" and is a network protocol.
It provides a way of running the X-Terminal to run on your PC (or MAC)
and it uses the X Server to provide a client/server interface between display hardware
(the mouse, keyboard, and video displays) and the desktop environment
while also providing both the windowing infrastructure and a
standardized application interface (quoted from XFree86 Project home page).
The X-Terminal can be displayed with an individual window or multiple windows,
based on your X window system's software capabilities and setup.
there is Office machine
there is Home machine
you want to make Home machine is dumb terminal for Office machine
steps are as follows
- on Office machine
-
edit file "/etc/opt/kde3/share/config/kdm/kdmrc"
[xdmcp]
Enable=true
port=177
-
edit file "/etc/X11/xdm/xdm-config"
Comment out this line
"DisplayManager.requestPort: 0"
and make it like
"!DisplayManager.requestPort: 0"
-
- on Home machine
edit file "/etc/inittab"
add line
7:123:respawn:/usr/X11R6/bin/X -query [Office_ip] >/var/tmp/xserver.log 2>&1 tty7
at proper place number 7 may
now you should see login prompt of Office machine on your Home machine
if not, configure firewall of Office machine to allow request from Home machine
Log Archival.
All the the logs collected and reports gnerated are archived at NAS
(Network Area Storage Device) at periodic intervals.
thus making it easy to maintain the free disk space on LogMon server.
Shutting down and Starting LogMon.
Shutting down LogMon
LogMon can be turned down using following comamnd
$>shutdown -h now
to restart LogMon server use fillowing comamnd
$>shutdown -r now
to run this command super user privilege are required.
User should close all LogMon GUI (Xlogmaster) application before putting LogMon down.
Starting LogMon
All the services e.g. NTP, Syslog, LogMon daemon and Xlogmaster should automatically
start on startup of LogMon
few tests are required to check this. More about this in 'How To/Trouble Shooting' section
- I want to setup TailLog client on my machine
get the TailLog binary from this CD or any other resources
which include other machines on which TailLog is running
prepare a folder on disk containing these three files
1. TailLog.exe
2. TailLog.cfg
3. TailLog.bat
bat file should do two things
1. go to folder containing TailLog.exe and TailLog.cfg
cd <Folder_name>
2. fire command to start TailLog
TailLog.exe TailLog.cfg
now add this bat file in 'system Scheduled Tasks' to run on startup using standard procedure
configure TailLog to run forever in scheduled task (default is to run for 72
hours).
now TailLog is ready to run on startup. To start TailLog now right click on TailLog
entry in Scheduled Task list and select 'run'
Configuring TailLog
edit the TailLog.cfg according to needParameter description version version of TailLog Currently 1.5 watchDirName Folder in which Log files resides on server tag_name something to identify which device
e.g. ids_rs for RealSecure IDSpipe_flag give 1, to enable pipeLog mode command_to_execute in pipeLog mode this command will be executed and
output will be sent to serverfile_pattern extention of log files e.g. *.log diagnostic_tag any thing but must start with '###' diagnostic_flag keep 1, to enable diagnostic messages on,recommended 1 skip_flag keep 1, to get current entries, recommended 1 check_interval time interval to check update in log file,
recommended value is 5send_attempts TailLog will try to send a packet for maximum this times,
recommended value is 100attempts_for_mark number of times to check standard output before sending
mark signal,used in pipeLog modesend_summary_interval Summary packet will be sent if no updates are found for
this many seconds, recommended value is 20ServerName IP of LogMon Server ServerPort Port number on which to send packets,make sure
that one instance of 'logrotate.pl' is listening on this portSleepInterval in milliseconds,time for which TailLog will sleep
after sending last packet,recommended value is 2000Debug Flag to log any debugging message from TailLog.keep 0 - TailLog is giving error saying 'mswinsck.ocx' not found when started.
file 'mswinsck.ocx' is included with TailLog source and binary.
copy this file in 'C:\windows\system32\'
now go to command prompt and register this ocx file by firing this command
C:\> regsvr32 C:\windows\system32\mswinsck.ocx - I want to install AboutTime on my machine.
Get executable from this CD or download from
AboutTime Site
double click on .exe file and installation will start automatically.
any further details can be found at this site.
- I am receiving Alerts from LogMon saying 'Logfile not updated'
may be logging is stopped for this device
if the device is windows machine (IMSS, IWSS, Symantec, IDS RS) check whether
TailLog client is running
using following procedure
1. Right click on empty area of task bar
2. click on Task Manager
3. click on Processes
4. select checkbox to see processes from users
5. see if TailLog is present in that list
6. if not restart the TailLog using Scheduled Task.
if device is checkpoint FireWall
then restart the loggrabber using this command.
$> fw1_restart.pl
this script fired automatically once a day to reestablish the connection so that connection
with CheckPoint FireWall at most one day old. - I am receiving Alerts from LogMon saying 'NTP Server not responding'
see how many servers(IP) alert is about
there are total four NTP servers from which LogMon is taking time
if it is about 1,2 or 3 servers then this alert can be treated as informational
alert - I am not able to receive daily report mails from LogMon
See if internal mail system is working fine
if yes then check the SMTP servers IP given in mail.conf file in CONFIGURATION
directory.
more detailed information can be found at logfile at LOGMON_LOGS directory,mail.log
file
if mail was sent from LogMon this file must have entry about mail sent details. - I am receiving blank reports from LogMon
see if any entries were there in log file for that day for that device.
if log file consist of only diagnostic messages (for Windows based machine)
then it might be the case that TailLog is observing wrong Logfile or wrong
Directory
for any other device you should receive 'Log file not updated' alert before blank
report mail
- I want to check whether all services (NTP, Syslog, LogMon daemon) are running
to check NTP, fire this command on console
$> /etc/init.d/xntpd status
result should show you 'running'to check Syslog, fire this command on console
$> /etc/init.d/syslog status
result should show you 'running'
you need superuser privilege to check thisif result is 'unused' fire command like
$> /etc/init.d/xntpd start
$> /etc/init.d/syslog start
to see LogMon daemon running or not best method will be to see whether all log files
are updating or not
another method is see see file 'device_port.conf' in 'CONFIGURATION' directory
which contains port numbers on which 'logrotate.pl' is listening now fire command
$> fuser <port_no>/udp
if this command shows you some process ID then it means that port is in use. To see
which process is using this port fire this command
$> ps -p <PID>
this command should show 'logrotate.pl' in command column
if not then that it means that log collection for this port's device is stopped
and you should receive alert from LogMon saying 'Log file not updated'
- I want to see disk space utilization
following command will show the disk space used
$> df -kh
- I want to see system performance
following command will show systems performance in real time
$> top
use q to exit
TailLog Client pseudo code
TailLog pseudo code is provided with source of TailLog Client included in this CD
click
here
to view TailLog pseudo code
schema for device log file
IMSS | IWSS | Symantec | CheckPoint R54 |
CheckPoint R55 |
Cisco PIX | RealSecure | Cisco IDS | |
access-group | - | - | - | - | - | Y | - | - |
action | Y | Y | Y | Y | Y | Y | - | - |
date_time | Y | Y | Y | Y | Y | Y | Y | Y |
dest_addr | Y | Y | Y | Y | Y | Y | Y | Y |
dest_nat_addr | - | - | - | Y | Y | - | - | - |
dest_port | - | - | - | Y | Y | Y | Y | Y |
direction | - | - | - | Y | Y | Y | - | - |
facility | - | - | - | - | - | Y | - | - |
file | Y | Y | Y | - | - | - | - | - |
interface | - | - | - | Y | Y | Y | - | - |
intruder_addr | - | - | - | - | - | - | Y | Y |
intruder_port | - | - | - | - | - | - | Y | Y |
method | - | Y | - | - | - | - | - | - |
name | Y | Y | Y | - | - | - | Y | Y |
origin | - | - | - | Y | Y | - | - | - |
product | - | - | - | Y | Y | - | - | - |
protocol | - | - | - | Y | Y | Y | - | - |
reason | - | - | - | - | - | Y | - | - |
received_by | Y | - | - | - | - | - | - | - |
received_from | Y | - | - | - | - | - | - | - |
rule | - | - | - | Y | Y | - | - | - |
severity | Y | Y | Y | Y | Y | Y | Y | Y |
shunned_host | - | - | - | - | - | Y | - | - |
src_addr | Y | Y | Y | Y | Y | Y | Y | Y |
src_nat_addr | - | - | - | - | - | Y | - | - |
src_port | - | - | - | Y | Y | Y | Y | Y |
timezone_offset | - | - | - | - | - | - | Y | Y |
user_id | - | Y | - | - | - | - | - | - |
username | - | - | - | - | - | Y | - | - |
victim_addr | - | - | - | - | - | - | Y | Y |
victim_port | - | - | - | - | - | - | Y | Y |
Here is the description about each field
- access-group :
this field is found in Cisco PIX firewall, and contains information about which
group is considered while taking action. Various possible values are "inside",
"inside_access_in", "outside" etc..
- action :
action taken for encountered attack, can be 'deleted', 'quarantine' for antivirus
and 'accept' or 'drop' for firewall
- date_time :
date and time of encountered log event, different devices have this value in different format,
LogMon converts it into single format.
- dest_addr :
This field is found in all security devices. And tells about destination for
which the log entry was generated.
- dest_nat_addr :
This field is found in Checkpoint firewall and tells about natted IP address of
destination.
- dest_port :
This field is found in firewall and IDS and tells about port number on
destination for which log entry was generated
- direction :
This field from Cisco PIX firewall, and tells about from direction in which
packet was traveling eg. inside to out side or inside to inside.
- facility :
PIX firewall contains field called facility, each log entry contains numeric
facility and is much similar to severity field.
- file :
this field is found in antivirus and contains information about filename found
to be infected
- interface :
This field is found in Cisco PIX firewall. tells the interface on which packet
was found and further action was taken
- intruder_addr :
This field is found in RS IDS, This IP is the IP from which the attack was
originated
- intruder_port :
This field is found in RS IDS, This port number is the port number on intruder
machine
- method :
This field is found in IWSS method can be protocol used when virus was found.
Possible values are 'http', 'https' etc..
- name :
name is name of virus found in case of Antivirus and signature name in case of
IDS
- origin :
origin is address of checkpoint server from which the log entry is originated
this field is found only in checkpoint (R55, R54)
- product :
this field contains information about Checkpoint firewall product. Not related
to actual log entry.
- protocol :
this field is found in firewall and tells about which protocol the
packet encountered was using
- reason :
there is no explicit entry in PIX firewall named reason but, PIX firewall logs
contains information about why the packet was accepted or dropped. This field is
much similar with rule field in checkpoint firewall.
- received_by :
This field is found in IMSS log file and contains information about receivers
email address.
- received_from :
This field is found in IMSS log file and contains information about senders
email address.
- rule :
rule according to which action was taken, in numerical
representation for checkpoint firewall only
- severity :
severity of received event, different possible values are 'high', 'medium', 'low',
or 'alert', 'warning', 'informational' and like.
- shunned_host :
this field is found in Cisco IDS. When any signature is detected from some host
for which shunning is requested, IDS sends shunning request to firewall so that
packets coming from this host.
- src_addr :
address from where the attack was originated can be email address in case of IMSS and
can be IP address foe IDS and firewall
- src_nat_addr :
this field is found in checkpoint firewall logs and contains information about
natted address of source of packet encountered.
- src_port :
this filed is found in firewall and IDS and contains port number on source from
where packet was sent.
- timezone_offset :
value which needs to be added in date_time to get time in IST
- user_id :
this field is found in IWSS logs and is actually IP address of machine from
which request for URL was sent.
- username
this field is found log entries of Cisco PIX firewall.
eg. Login denied from <ip/port> to <ip/port> for user "<username>"
- victim_addr :
for whom the attack was intended can be email address in case of IMSS and
IP address in case if IDS and firewall
- victim_port :
port number of victim
sample logs/reports
here are sample reports generated and log entries
click on link to view the file
IMSS | log file | report file |
IWSS | log file | report file |
Symantec | log file | report file |
Checkpoint R54 | log file | report file |
Checkpoint R55 | log file | report file |
Cisco PIX | log file | report file |
Cisco IDS | log file | report file |
RealSecure IDS | log file | report file |
- Login to post comments
- Printer-friendly version
- Send to friend