RSA Web Threat Detection System Administration Guide Provides Information About How to Administer Web Threat Detection Once It Has Been Installed and Configured
Total Page:16
File Type:pdf, Size:1020Kb
RSA® Web Threat Detection Version 6.4 System Administration Guide Copyright © 2018 RSA, The Security Division of EMC All rights reserved. Published May 2018 Dell believes the information in this publication is accurate as of its publication date. The information is subject to change without notice. THE INFORMATION IN THIS PUBLICATION IS PROVIDED “AS-IS.“ DELL MAKES NO REPRESENTATIONS OR WARRANTIES OF ANY KIND WITH RESPECT TO THE INFORMATION IN THIS PUBLICATION, AND SPECIFICALLY DISCLAIMS IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. USE, COPYING, AND DISTRIBUTION OF ANY DELL SOFTWARE DESCRIBED IN THIS PUBLICATION REQUIRES AN APPLICABLE SOFTWARE LICENSE. Dell, EMC, and other trademarks are trademarks of Dell Inc. or its subsidiaries. Other trademarks may be the property of their respective owners. Published in the USA. EMC Corporation Hopkinton, Massachusetts 01748-9103 1-508-435-1000 In North America 1-866-464-7381 www.EMC.com 2 RSA Web Threat Detection 6.4 System Administration Guide CONTENTS Preface 7 About This Guide.......................................................................................... 7 RSA Web Threat Detection Documentation..................................................7 Support and Service..................................................................................... 7 Before You Call Customer Support.................................................. 8 Chapter 1 Introduction 9 RSA Web Threat Detection Applications.....................................................10 Configuration Manager.................................................................. 10 RSA Web Threat Detection Users................................................................11 User Permissions............................................................................ 11 Chapter 2 Configuration Manager Safe Mode 13 Save the Safe Mode Configuration File....................................................... 14 Work in Safe Mode......................................................................................14 Chapter 3 Certificate Management 15 Web Traffic Encryption...............................................................................16 Managing Certificates Using the Hardware Security Module (HSM Card)..............................................................................................16 Managing Certificates in the Certificate Management Interface (CMI)............................................................................................. 19 Adding Certificates to Taps Via the Command Line....................... 22 Encryption of Data within the RSA Web Threat Detection System.............25 Set the Encryption Type for Transaction Log Files........................ 25 Replace the Security Certificates for the Web Applications.......... 25 Replace Self-Signed Security Certificates for Internal Components ...................................................................................................... 26 Replace the Security Certificates for Cassandra SSL.................... 28 Replace the Security Certificates for Kafka SSL........................... 29 Chapter 4 LDAP Authentication 31 LDAP Authentication Fields........................................................................ 32 Configuring Authentication Sources........................................................... 32 Chapter 5 Configuring the SilverTaps 33 Filter Traffic by Page Extension Type.........................................................34 Filter Traffic by Page Name........................................................................34 Chapter 6 Configuring Attributes and Keys 35 Attributes................................................................................................... 36 Extractors......................................................................................37 Define an Attribute Whose Value is Derived from Another Attribute.. 38 RSA Web Threat Detection 6.4 System Administration Guide 3 CONTENTS Dynamically Change Regular Expressions(regEx) in Matcher Attributes...................................................................................... 39 Keys........................................................................................................... 40 Sample Key.................................................................................... 41 Chapter 7 JSON and JSON Web Token (JWT) Transactions 43 Create a Selector....................................................................................... 44 Selector Fields...............................................................................44 Configure Data Scrubbing.......................................................................... 45 Xpath Syntax.................................................................................46 Add a J-Class Attribute to the Schema.......................................................48 Chapter 8 Data Streaming 51 Data Streaming Output.............................................................................. 52 Transaction JSON Format............................................................. 53 Alert JSON Format........................................................................59 Kafka Consumer Tool................................................................................. 60 Configure Data Streaming with RabbitMQ................................................. 60 MQ Broker Settings....................................................................... 61 AUTH and SSL Settings.................................................................62 Chapter 9 System Level Monitoring 63 Process Monitoring.................................................................................... 64 Starting and Stopping Processes.................................................. 65 Transaction Logs........................................................................................65 Syslog........................................................................................................ 66 Enabling Debug or Setting the Logging Level................................ 66 Auditing......................................................................................................66 Audit Tracking Capabilities.............................................................67 Configure the Audit Service...........................................................67 Managing File System and Disk Space........................................................68 File Systems and Backup and Restore Point Locations..................68 Using Task Scheduler to Maintain Disk Space............................... 68 Removing Log Files........................................................................70 Removing Failed Task Files............................................................ 70 Chapter 10 Action Server 71 Configure the Action Server....................................................................... 72 Action Server Logging................................................................................ 74 Set Up the Syslog Service............................................................. 74 Add an Action Service.................................................................................74 Email Action Service...................................................................... 77 Alert Files....................................................................................................77 Creating Rules with Custom Actions...........................................................78 Custom Action Scripts...................................................................80 Chapter 11 Cassandra Database Management 81 Configure TTL Settings.............................................................................. 82 Upgrade Cassandra.................................................................................... 82 Chapter 12 CentOS Upgrades 85 4 RSA Web Threat Detection 6.4 System Administration Guide CONTENTS Chapter 13 Hardening Tasks 87 Hardening Postgres....................................................................................88 Disable Configuration Manager and Scout..................................................88 Verify Configuration Manager and Scout are Disabled................................90 Revert Disabled Configuration Manager and Scout.................................... 90 Chapter 14 Back Up the ANNODB Postgres Database 93 Backing Up and Restoring the Database.....................................................94 Chapter 15 Integration with Additional RSA Products 95 RSA eFraudNetwork Integration.................................................................96 Install the RSA eFraudNetwork Integration................................... 96 Configure RSA eFraudNetwork Integration................................... 97 RSA eFraudNetwork External Data Source Format....................... 98 Sample Rule Using RSA eFraudNetwork Data............................... 98 RSA FraudAction Intelligence Service Integration...................................... 99 RSA FraudAction Intelligence Service Feeds................................. 99 Integrated Service System Flow.................................................. 100 Integrate the FraudAction Script in Web Threat Detection ......... 100 Script Variables.............................................................................101 Transaction Scoring in RSA Adaptive Authentication................................102 Configure