The screen content is first indexed, then processed with the search backend, and finally, the filter expressions are applied. This process is described in detail in the following sections.
Figure 230: The search and filter process
First, as a prerequisite of the search process, screen content is indexed. The indexing phase generates a database that the search and filter processes will run on.
The indexer parses the audit trail files, and builds an "inventory" of the privileged user's activity data based on what appeared on their screen.
In the case of a terminal session, screen content corresponds to the activity data that is captured in a terminal window. In the case of graphical protocols, screen content is whatever is visible in the graphical user interface of the applications the user is interacting with. In the latter case, the indexer's Optical Character Recognition (OCR) engine extracts text that appeared on the screen (for example, window titles).
|
NOTE:
If a piece of text is displayed for less than 1 second, it is not extracted. |
The indexer returns the information extracted from the parsed audit trail files to One Identity Safeguard for Privileged Sessions (SPS). In the case of a terminal session, the captured text is put in the backend database as one document per one second of screen content. Because of this, the content that you have searched for might only partially appear in the screenshot. In the case of graphical protocols, the captured text is put in the backend database as one document per screenshot.
The queries will be run on this database during the search process.
For details on indexing, see Indexing audit trails.
The search and filter process consists of three major phases:
Query phase
Grouping phase
Filter phase
In the query phase, the backend ranks and then limits the number of results.
The result of one query is the top 3000 documents, ordered by the default ranking system of the backend.
This means that if there are more than 3000 results, those of the lowest rank will not be passed to the next phase at all.
The ranking system cannot be modified, so there is no way to "upvote" those results of lower ranks.
If you want to ensure that all important results are passed to the grouping phase, use a smaller time range that you run the query on. If there are fewer than 3000 results, it is certain that the events you are interested in will be included in the grouping phase.
The grouping phase receives the results.
The grouping phase groups the results that were passed on from the query phase.
First, the results with the same trail IDs are grouped together. A trail ID group contains all search hits that are in that trail.
The trail ID groups are then further grouped by seach expression and time range. This group is essentially the time range during which the expression is displayed on the screen (for example, if the text root is displayed from 00:00:12 to 00:01:45, this will be one group).
This grouped result is displayed in the search screen as one row.
The filter phase applies filter expressions to these grouped results.
|
NOTE:
If there were screen content search results that were excluded during the query phase, the filter expressions will not be applied to them. |
For example, if you want to filter for Telnet connections where the text root was displayed, the following can happen:
You search for the Screen content: root. There are 3100 search results that consist of 3050 SSH connections and 50 Telnet connections. In this example, Telnet connections received the lowest ranks for some reason. 100 results that have received the lowest rank are excluded, and in this example it means all Telnet connections.
If you filter for protocol Telnet now, you will not see any results.
To remedy this situation, try searching in a smaller time range to make sure that there are less than 3000 search results. If you are unsure about the time range, you might want to attempt fine-tuning the backend search manually. For details, see: Fine-tuning the backend search manually.
You can fine-tune your search manually with the command line utility lucenectl. To do this, log on to the core shell. For details, see Accessing the One Identity Safeguard for Privileged Sessions (SPS) console.
Specify more exact time ranges (use Unix timestamps).
For example, to limit the time range to Thursday, June 30, 2016 11:39:51 AM - Thursday, November 3, 2016 2:44:46 PM, enter the following command:
lucenectl search --from-to 1467286791 1478184286 --text remote --limit 3000 --aggregate-by-trail --normalize-rank
|
NOTE:
For converting timestamps to Unix timestamp, use https://www.epochconverter.com/. |
Increase the query limit of 3000 to a limit of your choice.
For example, to increase the query limit of 3000 to 4500, enter the following command:
lucenectl search --from-to 1467286791 1478184286 --text <your-screen-content-search-expression> --limit 4500 --aggregate-by-trail --normalize-rank
lucenectl search --from-to 1467286791 1478184286 --text remote --limit 4500 --aggregate-by-trail --normalize-rank
|
NOTE:
If you do not receive more results with a larger query limit, it means that you have found all results with your search expression. |
However, the downside of using lucenectl to fine-tune your search is that after the cli search, you have to manually extract the trails that you find interesting with the help of the metadb.
The following example shows the output of a lucenectl search:
{ "hits": [ { "hits_count": 1, "channel_id": 1, "trail_id": "58", "rank": 0.4068610216585047 }, { "hits_count": 7, "channel_id": 761, "trail_id": "12", "rank": 1.0 }, { "hits_count": 2, "channel_id": 1, "trail_id": "139", "rank": 0.5923645275802537 } ] }
rank: the larger the number, the higher the rank
hits_count: the number of times the screen content search expression is displayed in the audit trail
trail_id: the ID of the trail
channel_id: the ID of the channel
The most relevant audit trail will probably be the one with the highest rank.
If you have determined which audit trail you are interested in, enter the following command. The value of _connection_channel_id will be the value of the trail_id from the lucenectl output that you have determined as most relevant.
psql -U scb scb -c "select audit from channels where _connection_channel_id = 12;"
The output of this command will be:
/<audittrailpath>/audit-scb_rdp-1467274538-0.zat:2 /<audittrailpath>/audit-scb_rdp-1467274538-0.zat:1
From this output, the audit trail file name path is as follows: /<audittrailpath>/audit-scb_rdp-1467274538-0.zat
|
NOTE:
If you cannot find the file at the path, check whether it has been archived and search for the file in the archive path. Use the following command: psql -U scb scb -c "select audit, _archive_path from channels where _connection_channel_id = 12;" The output of this command will be: audit | _archive_path ---------------------------------------------------------+--------------- /<audittrailpath>/audit-scb_rdp-1467274538-0.zat:2 | /<myarchive/path>/ /<audittrailpath>/audit-scb_rdp-1467274538-0.zat:1 | /<myarchive/path>/ | If you still cannot find the audit trail, contact our Support Team. |
The session info window provides in-depth information on each of the indexed session stored in the connection database. You can use it to gain contextual insight about the indexed session and its events.
Access the session info window in the following ways:
In card view, click the button in the last column of the relevant session.
In table view, click the button.
Figure 231: Search — Accessing session details
The session info window is displayed:
Figure 232: Session details
The session info window provides details about the sessions on tabs.
The Overview tab is divided into the following main areas:
The Events area displays session events in chronological order.
View the date and time of the event, the event type and event details. To filter events, use the Events tab.
The Quick look area contains user information, for example, gateway and server username, start and end time of the session, and so on.
The gateway username corresponds to the Username field of the connection metadata database, so note the following:
If the user performed inband gateway authentication in the connection, the field contains the username from the gateway authentication (gateway username).
Otherwise, the field contains the username used on the remote server.
The Interesting events area displays events selected as interesting, for example, a list of commands and window titles from the session that could be interesting from a security point of view.
The list of interesting events is currently hard-coded and cannot be modified. For terminal sessions it includes commands such as chmod, ssh, shutdown, sudo, su, mount, adduser, addgroup. For graphical sessions, it contains window titles such as Management Console, Control Panel, Server Manager, PowerShell, Security Settings, Windows Security Center.
The Network area displays session information, for example, verdict, protocol, connection policy, client and server address.
In addition to the Quick look, Interesting events, and Network screen areas, the Details tab provides monitoring information and channels information, too.
The Events tab displays the:
Session events in chronological order.
You can narrow the event list by entering the event name in the Filter events field.
Date and time of the event.
Event type (command, screen content, window title).
Event details.
The Alerts tab displays the:
Content policy alerts triggered in the session, in chronological order.
You can narrow the alert list by entering the alert name in the Filter alerts field.
Date and time of the alert.
Alert details.
Screenshots. If screenshots are available for the session, you can click each alert to view the corresponding screenshot.
Screenshots are generated for search results and alerts when the session is opened, and for subsequent searches.
Screenshots are not available for:
Ongoing sessions.
Unindexed sessions.
Trails of HTTP sessions.
Encrypted trails (without the necessary certificate).
You can search in the contents of the audit trails as follows:
From your browser: Use this method to find all the sessions containing your search query.
Enter the screen.content: expression search filter in the Search query field. For example: screen.content="exit". The search returns all the sessions where exit was on the screen.
From the Safeguard Desktop Player application: Use this method to find the exact location of the search query within a specific audit trail.
Download the relevant audit trail, open it in the Safeguard Desktop Player application, and use the Search feature. You can also search in the contents of the audit trails for trails of graphical sessions created and indexed with One Identity Safeguard for Privileged Sessions (SPS) 6.0.
For more information, see Searching in the contents of audit trails.
If you use the One Identity Safeguard for Privileged Analytics, you can view detailed analyses provided by the configured algorithms. For more information, see Analyzing data using One Identity Safeguard for Privileged Analytics.
If a connection is not closed and is still active, the label is displayed in the session info window.
To close an active connection, click the label.
You can also view the live connection as follows:
Click the label.
Download the audit trail.
Trail data is exported in .srs
format, which you can open with the Safeguard Desktop Player application.
For more information on the Safeguard Desktop Player, see Safeguard Desktop Player User Guide.
Session tags allow you to get basic information about the session and its contents at a glance.
Scripted session tag: One Identity Safeguard for Privileged Sessions (SPS) currently supports the scripted session tag. SPS uses One Identity Safeguard for Privileged Analytics to detect if sessions are generated using human interaction or automation. If sessions are generated using automation, SPS displays the scripted tag in the search interface as shown below:
Scripted sessions are shown on the main search screen.
Figure 233: Scripted sessions — cards view
Scripted sessions are shown on the Overview tab.
Figure 234: Scripted sessions — Overview tab
The following describes how to create and replay an audit trail in your browser.
|
Caution:
You can replay audit trails in your browser, or using the Safeguard Desktop Player application. Note that there are differences between these solutions.
For details on the Safeguard Desktop Player application, see Safeguard Desktop Player User Guide. |
|
Caution:
Even though the One Identity Safeguard for Privileged Sessions (SPS) web interface supports Internet Explorer and Microsoft Edge in general, to replay audit trails you need to use Internet Explorer 11, and install the Google WebM Video for Microsoft Internet Explorer plugin. If you cannot install Internet Explorer 11 or another supported browser on your computer, use the the Safeguard Desktop Player application. For details, see "Replaying audit trails in your browser" in the Administration Guide and Safeguard Desktop Player User Guide. |
To replay an audit trail in your browser
On the Search page, find the audit trail you want to replay.
Click to display the details of the connection.
Alternatively, in the table view, click .
Click to generate a video file from the audit trail you want to replay. Depending on the load of the indexer and the length and type of the audit trail, this can take several minutes.
When the video is available, changes to and . You can use the button if you want to remove the generated video. After you remove the video file, the button is available and you can use it to recreate the video file.
To replay the video, click .
The Player window opens.
Figure 235: Replaying audit trails in your browser
|
TIP:
You can quickly zoom in or out by clicking anywhere in the Player window. |
The Player window has the following controls:
: Play, Pause
, : Jump to previous event, Jump to next event
: Adjust replay speed
: Time since the audit trail started / Length of the audit trail. Click on the time to show the date (timestamp) of the audit trail.
: List of keyboard events. Special characters like ENTER, F1, and so on are displayed as buttons. If the upstream traffic is encrypted, upload your permanent or temporary keys to the User menu > Private keystore to display the keyboard events. This will not be displayed if your upstream traffic is encrypted but not unlocked.
: Active mouse button
: Create a screenshot
: Show / hide events. Select the types of events to display. Depending on the protocol used and how the audit trail was processed, One Identity Safeguard for Privileged Sessions (SPS) can display keyboard events, commands, mouse events, and window titles. Commands and window titles are displayed as subtitles at the top of the screen. This will not be displayed if your upstream traffic is encrypted but not unlocked.
: Fullscreen mode
: Progress bar
: Shows the distribution of events. Blue - commands, green - keyboard events, yellow - mouse events, orange - window title. This will not be displayed if your upstream traffic is encrypted but not unlocked.
: Close the player, and return to the Connection details page.
To view screenshots generated for encrypted audit trails and replay encrypted audit trails in your browser, you have to upload the necessary certificates and corresponding private keys to your private keystore. Depending on the encryption, decrypting the upstream part of an audit trail may require an additional set of certificates and keys.
Only RSA keys (in PEM-encoded X.509 certificates) can be uploaded to the private keystore.
|
NOTE:
Certificates are used as a container and delivery mechanism. For encryption and decryption, only the keys are used. |
One Identity recommends using 2048-bit RSA keys (or stronger).
Use every keypair or certificate only for one purpose. Do not reuse cryptographic keys or certificates (for example, do not use the certificate of the One Identity Safeguard for Privileged Sessions (SPS) webserver to encrypt audit trails, or the same keypair for signing and encrypting data).
For more information on audit trail encryption, see Encrypting audit trails and for more information about replaying audit trails in your browser, see Replaying audit trails in your browser.
You can upload certificates permanently or temporarily. The temporary certificates are deleted when you log out of SPS.
The certificates and private keys in your keystore can be protected with a passphrase. To use the certificates and private keys in a passphrase-protected keystore for decrypting audit trails, you have to unlock the keystore first by providing the security passphrase. The keystore then remains unlocked for the duration of your session.
To replay encrypted audit trails in your browser
Click on User Menu > Private keystore.
Figure 236: User Menu > Private keystore — The private keystore
(Optional) Create a security passphrase, if you have not configured one yet.
In Security passphrase, click Change.
In the New: field, enter your new security passphrase. Repeat the same passphrase in the Confirm: field.
|
NOTE:
SPS accepts passwords that are not longer than 150 characters. The following special characters can be used: !"#$%&'()*+,-./:;<=>?@[\]^-`{|} |
Click Apply.
If you forgot your security passphrase, contact our Support Team.
Click to add a new certificate. A new empty row is added.
Figure 237: Adding certificates
Click the first (under Certificate) to upload the new certificate. A pop-up window with the header Changing certificate is displayed.
Figure 238: Uploading certificates
Click Choose File, select the file containing the certificate, and click Upload. Alternatively, you can also copy-paste the certificate into the Certificate field and click Set.
To upload the private key corresponding to the certificate, click the second icon (under Key). A pop-up window with the header Changing key is displayed.
Figure 239: Uploading the private key
Click Choose File, select the file containing the private key, provide the Password if the key is password-protected, and click Upload. Alternatively, you can also copy-paste the private key into the Key field, provide the Password there, and click Set.
To add more certificate-key pairs, click and repeat the steps above.
To finish uploading certificates and keys to your private keystore, click Apply.
© 2024 One Identity LLC. ALL RIGHTS RESERVED. 이용 약관 개인정보 보호정책 Cookie Preference Center