cp 3d security analysis report tool admin guide ver8.32

20
15 February 2012 Administration Guide 3D Security Analysis Report Tool Version 8.32, for R75.20

Upload: reytans

Post on 20-Apr-2015

595 views

Category:

Documents


3 download

TRANSCRIPT

Page 1: CP 3D Security Analysis Report Tool Admin Guide Ver8.32

15 February 2012

Administration Guide

3D Security Analysis Report Tool

Version 8.32, for R75.20

Page 2: CP 3D Security Analysis Report Tool Admin Guide Ver8.32

© 2011 Check Point Software Technologies Ltd.

All rights reserved. This product and related documentation are protected by copyright and distributed under licensing restricting their use, copying, distribution, and decompilation. No part of this product or related documentation may be reproduced in any form or by any means without prior written authorization of Check Point. While every precaution has been taken in the preparation of this book, Check Point assumes no responsibility for errors or omissions. This publication and features described herein are subject to change without notice.

RESTRICTED RIGHTS LEGEND:

Use, duplication, or disclosure by the government is subject to restrictions as set forth in subparagraph (c)(1)(ii) of the Rights in Technical Data and Computer Software clause at DFARS 252.227-7013 and FAR 52.227-19.

TRADEMARKS:

Refer to the Copyright page (http://www.checkpoint.com/copyright.html) for a list of our trademarks.

Refer to the Third Party copyright notices (http://www.checkpoint.com/3rd_party_copyright.html) for a list of relevant copyrights and third-party licenses.

Page 3: CP 3D Security Analysis Report Tool Admin Guide Ver8.32

Important Information Latest Software

We recommend that you install the most recent software release to stay up-to-date with the latest functional improvements, stability fixes, security enhancements and protection against new and evolving attacks.

Additional Information

For additional technical information, visit the Check Point Support Center (http://supportcenter.checkpoint.com).

Revision History

Date Description

15 February 2012 Several improvements

Feedback

Check Point is engaged in a continuous effort to improve its documentation.

Please help us by sending your comments (mailto:[email protected]?subject=Feedback on 3D Security Analysis Report Tool version 4, for R75.20 Administration Guide).

Page 4: CP 3D Security Analysis Report Tool Admin Guide Ver8.32

Contents

Important Information ............................................................................................. 3 Introduction ............................................................................................................. 5

Benefits ............................................................................................................... 5 What's New ......................................................................................................... 6

Installation ............................................................................................................... 7 System Requirements ......................................................................................... 7 Installing SmartConsole ....................................................................................... 7 Installing Server Supplement ............................................................................... 7 Upgrading ............................................................................................................ 8

Getting Started ........................................................................................................ 9 Customizing Reports ............................................................................................ 11

Customizing Time Period of Report ....................................................................11 Creating New Reports ........................................................................................11 Adding Queries to Reports .................................................................................12 Editing Queries ...................................................................................................13 Editing Generated Tables and Graphs................................................................14 Editing Generated Reports .................................................................................14 Changing the Report Template ...........................................................................14

Offline Reports ...................................................................................................... 16 Securing Reports .................................................................................................. 18 CPLogLogSender Utility ....................................................................................... 19 Known Limitations ................................................................................................ 20

Page 5: CP 3D Security Analysis Report Tool Admin Guide Ver8.32

Benefits

Introduction Page 5

Introduction

3D Security Analysis Report Tool takes Check Point PoCs into the next level. The tool generates a comprehensive security analysis report. It automatically integrates security events from different Software Blades: Application Control, URL Filtering, IPS, and DLP. The analysis report is created automatically on a Check Point Microsoft Word document report template.

3D Security Analysis Report Tool accentuates Check Point Added Value, exposing new security risks and suggesting remediations. When a Check Point Security Gateway runs for a while in a PoC environment, inline or Mirror Port, we expect logs and security events to be generated for the active Software Blades. The report gives a comprehensive security analysis that summarizes security events, their risks, and their remediations.

This tool offers several out-of-the-box recommended reports. You can customize your own reports. You can add and remove queries. You can create your own Word template.

Important - 3D Security Analysis Report Tool is a PoC tool. We highly recommend deploying it only on environments dedicated to PoC. Its deployment can change existing configurations. Therefore, is not recommended for production environments.

Benefits

Shows the value of Check Point 3D Security strategy and the benefits provided by the Software Blades Architecture

Visualizes incidents that happen in customer networks, and gives practical recommendations

Empowers you with knowledge of new security risks, and improves network security

Gives an executive summary for discussion with management

Gives detailed results for in-depth discussions with technical points of contact

Out-of-the-box reports speed information delivery and accelerate the sales processes

Supports customization for specialized reports focused on customer challenges

Page 6: CP 3D Security Analysis Report Tool Admin Guide Ver8.32

What's New

Introduction Page 6

What's New Bug fix- High Risk URL Filtering events are now being displayed in the Executive Summary section- ( in

High and Critical risk Event Summary bar chart).

Visual fix- Improved High Risk Applications/Sites Images.

Visual fix- Improved tables’ look

Admin Guide update (this document)- System Requirements, Offline Reports and Known Limitations sections updated

Page 7: CP 3D Security Analysis Report Tool Admin Guide Ver8.32

System Requirements

Introduction Page 7

Installation

3D Security Analysis Report Tool has its own version of SmartConsole, and a supplement for the R75.20 SmartEvent Server.

Note - If you use R75.20 Mirror Port Kit, this tool is already included.

Component Package

SmartConsole SmartConsole_983000032_1.exe

SmartEvent supplement 3D_ANALYSIS_REPORT_TOOL-MNG-PACK-V08.zip

System Requirements

Component Operating System

R75.20 Security Management Server with SmartEvent installed SecurePlatform

MS Office 2003 or 2010, full package, installed on computer with R75.20 SmartConsole (please note that all Office components must be installed)

Windows

Note - Reports are output to Word. Some of the data is embedded Excel files. The MS Office installation must be at least Word and Excel.

Installing SmartConsole Install the 3D Security Analysis Report Tool SmartConsole on a Windows computer with MS Office 2003 or 2010. This is a R75.20 SmartConsole. It works with any R75.20 Security Management Server.

To install the GUI of this tool:

1. Put the SmartConsole file on the Windows computer: SmartConsole_983000032_1.exe

2. Double-click the executable.

Installing Server Supplement Install 3D Security Analysis Report Tool on an existing R75.20 SmartEvent Server dedicated to PoC. When you run the installation script, cpstop and cpstart are run automatically. The tool can be installed on a standalone deployment as well (where Security Gateway, Security Management and SmartEvent running on the same machine).

Do not install this tool on a production environment.

To install this tool on a SecurePlatform server:

1. SmartEvent supplement file is located in the tool’s folder and named: 3D_ANALYSIS_REPORT_TOOL_<ver>.tgz

2. Make a new directory on the SmartEvent Server, under /var, named install.

3. Copy the .tgz file to the server /var/install directory (copy the file in binary mode).

4. Verify that the file transferred correctly by comparing the file’s MD5:

a. In the install directory on the server, run md5sum *.* command

b. Verify that MD5 for file 3D_ANALYSIS_REPORT_TOOL-MNG-PACK-V08.tgz is: C8069E2F1D556F286C2028F9B023BF00

c. In the install directory on the server, run:

d. tar xvzf 3D_ANALYSIS_REPORT_TOOL_<ver>.tgz

e. chmod 777 se_script

f. Run: ./se_script

Page 8: CP 3D Security Analysis Report Tool Admin Guide Ver8.32

Upgrading

Introduction Page 8

Upgrading To upgrade the SmartConsole of this tool from an older version, uninstall the older version and install this version.

To upgrade the SmartEvent Server supplement, install this version. It automatically overwrites the older version.

Page 9: CP 3D Security Analysis Report Tool Admin Guide Ver8.32

Upgrading

Getting Started Page 9

Getting Started After you install the new SmartConsole, you have a new button on the SmartEvent console.

To generate a report:

1. Open SmartEvent.

2. Click 3D Security Analysis Report.

3. In the Report Generator View window, select a report.

Page 10: CP 3D Security Analysis Report Tool Admin Guide Ver8.32

Upgrading

Getting Started Page 10

4. Click Generate Word.

The report can take several seconds to generate. It opens as a Word document in the background.

Predefined reports have these default sections:

Executive summary - Summarizes main results: number of events, brief list of critical and high events that need special attention, and risks.

Findings - Focuses on the security events by Software Blade.

Remediation - Recommendations to solve the main security events.

Appendix - Gives useful data, such as bandwidth consumption and internet usage statistics.

Page 11: CP 3D Security Analysis Report Tool Admin Guide Ver8.32

Customizing Time Period of Report

Customizing Reports Page 11

Customizing Reports The 3D Security Analysis Report Tool out-of-the-box reports are designed for PoCs, built on customer feedback. But if you have unique requirements from a customer, you can fulfill the request with easy customizations.

Customizing Time Period of Report The default period of time for a report is 30 days.

To change the report period:

1. In the Report Generator View window, click Edit.

2. In the Edit Report window, select the period from the Report Period list.

3. Click Save.

Creating New Reports If the out-of-the-box reports do not have the required data, you can set up a new report.

To create a new report:

1. In the Report Generator View window, click New >

Report - Create a new report.

Clone Selected Report - Create a new report based on template and queries of the selected report.

Page 12: CP 3D Security Analysis Report Tool Admin Guide Ver8.32

Adding Queries to Reports

Customizing Reports Page 12

2. In the New Report window, enter a name for the report.

3. In the Report Period list, select the time period. Data from this period is collected when the report generates.

4. Decide if this report is to be based on an existing document:

Create a report using an existing document. - Select use the following document as template. Browse to the document. If you want to select an out-of-the-box template, browse to the SmartConsole installation folder. Typically: C:\Program Files

(x86)\CheckPoint\SmartConsole\R75.20\PROGRAM\data\ClientGeneratedReports

Create a report on a blank Word document.

5. Add queries to the report ("Adding Queries to Reports" on page 12).

6. Click Save.

Adding Queries to Reports If you create a new report, you must add queries to the report. (If you do not, there will be no data to show.) You can also add queries to existing reports, to show different data.

To add queries to reports:

1. In the New Report window or Edit Report window, click Add.

The Add View window opens.

2. In the View Title field, enter the name of the query that will replace placeholder text:

If this report is based on a blank Word document, the title of the query data shows at the end of the document.

Page 13: CP 3D Security Analysis Report Tool Admin Guide Ver8.32

Editing Queries

Customizing Reports Page 13

If this report is based on an existing document, the text in this field must match, case-sensitive, the placeholder text. If the placeholder text does not exist in the document, the query output is added to the end of the document.

3. In the View Type field, define the output type. Valid values:

Image - Query results are output as JPG files. Use for Grid (Events tab in SmartEvent), Pie, or Map. Define the Image Width and Image Height in pixels.

Data - Query results are output as embedded Excel files. Use for Grid or Pie. Define an Excel workbook. It can be a blank file, or a file with content and formulas. 3D Security Analysis Report Tool puts collected data on Sheet2. The table or chart shown on the report is on Sheet1.

You can change the data or formulas as required.

You must save the Excel workbook with Sheet1 visible.

4. In the Query field, click the browse button. Select a query to collect data. You can create a new query if necessary.

5. Click Save.

Editing Queries You can change a query that you made, or a query that is predefined.

To edit a query:

1. In the Report Generator View window, double-click a report.

Page 14: CP 3D Security Analysis Report Tool Admin Guide Ver8.32

Editing Generated Tables and Graphs

Customizing Reports Page 14

2. In the Edit Report window, select a query.

3. Click Edit.

Editing Generated Tables and Graphs Some of the tables and graphs in the Word document are embedded Microsoft Excel files.

To edit tables and graphs:

1. Double-click the table or graph.

Excel opens. Usually, the Excel file has the table or graph on Sheet1, and the data on the other sheets.

2. To edit the data, open Sheet2 or higher. Change the data there. The table or chart on Sheet1 is updated automatically.

3. To edit the display of the data, edit table or graph properties on Sheet1.

4. Save the Excel file with Sheet1 visible.

If another sheet is visible when you save and close Excel, the output to the report will be incorrect.

The Report document is updated automatically.

Editing Generated Reports After 3D Security Analysis Report Tool generates a report, you can edit it. Some data is deliberately left for manually editing:

Customer details

Report date

PoC duration

Methodology details

Such data, which you must fix before you deliver the report, is marked in red.

If you see unresolved placeholders (text in < > tags):

Delete the placeholders, or

Edit queries to replace the placeholder with data and generate the report again.

Changing the Report Template The report Word templates are in the SmartConsole installation folders. The templates have placeholder text. When a report is generated, this text is replaced with the data from the queries. That data is collected,

Page 15: CP 3D Security Analysis Report Tool Admin Guide Ver8.32

Changing the Report Template

Customizing Reports Page 15

analyzed, and manipulated by 3D Security Analysis Report Tool. If you remove or change placeholder text, the generated data is shown at the end of the report.

Best Practice: Change the template only for localization (translating text that comes from the template) or formatting (font, color, size). Use the 3D Security Analysis Report Tool editing features to change the data that is shown.

Page 16: CP 3D Security Analysis Report Tool Admin Guide Ver8.32

Changing the Report Template

Offline Reports Page 16

Offline Reports You can generate reports from logs, without interacting with the customer environment. For example, if you get logs from a customer, you can use 3D Security Analysis Report Tool to deliver a professional report of the log data. Make sure the logs are exported from the customer's R75.20 Security Gateway running R75.20 Software Blades and managed by an R75.20 Security Management Server. Offline reports generate queries only of activated Software Blades.

Requirements on your local environment:

3D Security Analysis Report Tool on R75.20 environment: Security Management Server with SmartEvent and SmartDashboard. You will import the network logs to this local environment.

CPLogLogSender utility (download from the Check Point Solution Center wiki or UserCenter and put in $FWDIR/log), or R75.20 Mirror Port kit Version 2 or higher.

To export logs:

1. Open SmartView Tracker, connected to the Security Management Server that has the logs.

2. Click File > Save As.

3. Name the log file.

4. Click OK.

A number of files are created on the Security Management Server, in $FWDIR/log:

yourname.log

yourname.logaccount_ptr

yourname.loginitial_ptr

yourname.logLuuidDB

yourname.logptr

5. Copy all of these files to your computer.

To clear event history:

If your local SmartEvent has events from unrelated activities, delete event history with these commands on the server. Skip this only if you import the logs into a clean environment.

cpstop

$CPDIR/database/postgresql/util/PostgreSQLCmd start

$CPDIR/database/postgresql/bin/psql -p 18272 -U cp_postgres

postgres -c "drop database events_db"

$CPDIR/database/postgresql/util/PostgreSQLCmd stop

cpstart

To import logs:

1. On the local Security Management Server, log in and go to $FWDIR/log.

2. Put all the exported files here.

3. Run: chmod 777 CPLogLogSender

4. Run: ./CPLogLogSender -l 200 -i 1 -n forever name.log

This can take some time, depending on the number of records the log file contains.

Page 17: CP 3D Security Analysis Report Tool Admin Guide Ver8.32

Changing the Report Template

Offline Reports Page 17

5. Open SmartEvent. Wait until all events are generated.

6. Generate the 3D Security Analysis Report Tool report.

Page 18: CP 3D Security Analysis Report Tool Admin Guide Ver8.32

Changing the Report Template

Securing Reports Page 18

Securing Reports When the report is ready to deliver, make sure it secure from unauthorized changes or access.

1. Save the Word document as PDF.

2. Set the PDF security for opening and for editing.

If you have Adobe Acrobat, set the security options of the Document Properties. We recommend using Password protection.

If you use a 3rd Party product (such as primoPDF) to make the PDF, use the features of that application to set a password on the PDF.

It is best if you do not edit the PDF after it is made. To change content for audience or purpose, change the Word document and save it as a new PDF. We recommend that you password protect the Word document and keep it in secure storage (such as a Check Point GO stick).

Page 19: CP 3D Security Analysis Report Tool Admin Guide Ver8.32

Changing the Report Template

CPLogLogSender Utility Page 19

CPLogLogSender Utility The CPLogLogSender utility simulates traffic captured in the log file. The utility runs the traffic as though it were live traffic going through the Security Gateway. The Security Gateway logs new events similar to those in the log files.

To run the utility, you run a script command with required configuration parameters.

Syntax ./CPLogLogSender –l <log_amount> –i <interval> –n <cycles> <name>.log

Parameters Parameter Description

–l <log_amount> Number of logs to send in one batch. Valid value: integer Note - flag is lower-case L.

–i <interval> Batch delta time, in seconds. Sends a batch of logs every <interval> seconds. Valid value: small integer

–n <cycles> Number of cycles to repeat batch sending. Recommended value: forever. Runs until all logs are generated.

name Name of the generated log

Comments

1. Before running the Utility please let the utility privileges by running the fooling command:

chmod 777 $FWDIR/log/CPLogLogSender

2. The time it takes to generate the logs depends on the number of log records in the log file. In the example, if the log file has 100,000 records, it will take 100,000 records / 200 seconds = 500 seconds.

We recommend around 200 logs per second if you use VMware or a slow computer. If you use a strong computer, you can increase to a higher rate (1,000 - 4,000 or more) to shorten the process time.

Example ./CPLogLogSender –l 200 –i 1 –n forever MYLOGS.log

Page 20: CP 3D Security Analysis Report Tool Admin Guide Ver8.32

Changing the Report Template

Known Limitations Page 20

Known Limitations 1. If you run the report on SmartEvent Intro, you must delete empty queries before you generate a report.

Open the Edit Report window of the reports you will use.

Select a section with an empty query.

Click Remove.

Do this for all sections with empty queries.

Click Save.

2. During a report generation:

Do not use any clipboard options (Copy, Cut, Print Screen)

Do not use double screen (screenshots are taken only from main screen and not the secondary screen)

It is recommended not to use other application in the background