Converse agora com nosso suporte
Chat com o suporte

One Identity Safeguard for Privileged Sessions 7.0.5.1 LTS - Safeguard for Privileged Analytics Configuration Guide

Enable One Identity Safeguard for Privileged Analytics

Prerequisites

A license that has One Identity Safeguard for Privileged Analytics (SPA) enabled.

The following describes how to enable SPA.

To enable SPA

  1. Go to Basic Settings > Local Services > Privileged Account Analytics.

    Figure 1: Basic Settings > Local Services > Privileged Account Analytics

  2. Select the Enable checkbox.

  3. Click .

Configure analytics

Select the analytics (also called algorithms) that you wish to use to analyze session data and enable them in SPS.

Session data is scored by any combination of algorithms that you enable. The scores given by algorithms are aggregated to create a single score.

During the aggregation process, the lowest and highest scores are removed. This is required in order to lower the number of false positives and false negatives. A typical attack is indicated by signs of unusual user behavior, unusual from multiple points of view. However, some things are usually perfectly normal about even the strangest sessions. This is why removing scores at the two extremes helps minimize the number of false positives and false negatives.

The following describes how to configure algorithms in SPS.

To configure algorithms in SPS

  1. In SPS, go to Policies > Analytics Policies.

  2. Enter a name for your analytics policy.

  3. For each algorithm, select one of the following values:

    • Disable: Select this value if you do not want to use a particular algorithm.

    • Use: Select this value if you want to use a particular algorithm.

    • Trust: Select this value if you want to use a particular algorithm, and wish to include in the final aggregated score all the scores given by this algorithm.

      Remember that during score aggregation, the lowest and highest scores are removed. You can choose to override this principle by selecting Trust for those algorithms that you wish to have a bigger weight in the final, aggregated, single score.

  4. The Scripted session detection option is enabled by default. Decide whether or not you want to enable the detection of scripted sessions.

    Scripted session detection is currently done by the clockmaster and gapminder algorithms.

  5. Click .

    Figure 2: Policies > Analytics Policies — Recording an analytics policy

  6. Go to <Protocol name> Control > Connections, and in the Analytics policy field, select the policy that you want to use for your connections.

    Figure 3: <Protocol name> Control > Connections > Analytics policy — Adding an analytics policy to a connection policy

  7. Click .

Analyze data using One Identity Safeguard for Privileged Analytics

Prerequisites

Make sure that you have session data from network traffic that:

  • contains real, unique usernames linked to users other than root/administrator or a shared account

    To check this, navigate to Search, and check whether the Username column contains data. This is important, because session data will be linked to users.

    If you do not have unique usernames in your session data, review your authentication settings and consult with the One Identity Professional Services team to learn about your options to tie accounts to users.

  • has commands extracted (using lightweight or full indexing, or in real-time through content policies)

    For instructions on how to configure indexing and include commands in the scope of indexing, see Indexing audit trails in the Administration Guide.

    For details on how to configure real-time command extraction using a content policy, see Creating a new content policy in the Administration Guide.

  • has keystrokes extracted (using lightweight or full indexing, or in real-time through content policies)

    The minimum required amount of data for reliable insight is 5 sessions with approximately 200 keystrokes each.

    For instructions on how to configure indexing and include typing biometrics in the scope of indexing, see Indexing audit trails in the Administration Guide.

    For details on how to configure real-time extraction of keystroke-related data using a content policy, see Creating a new content policy in the Administration Guide.

  • has pointing device (mouse) biometrics extracted (using lightweight or full indexing, or in real-time through content policies)

    For instructions on how to configure indexing and include pointing device biometrics in the scope of indexing, see Indexing audit trails in the Administration Guide.

    For details on how to configure real-time extraction of pointing device-related data using a content policy, see Creating a new content policy in the Administration Guide.

  • has window titles extracted (using lightweight or full indexing, or in real-time through content policies)

    For instructions on how to configure indexing and include window titles in the scope of indexing, see Indexing audit trails in the Administration Guide.

    For details on how to configure real-time window title extraction using a content policy, see Creating a new content policy in the Administration Guide.

The following describes how to start using SPA.

To start using SPA

  1. Build the first baseline.

    You can do this in either of the following ways:

    • Wait for the daily periodic building to kick in (run by cron).

    • Log in through SSH into the core-shell, and then issue /opt/pam-pipeline/bin/build-baselines.

      For the first run, running it with -ld (log to console and debug) is a good idea, it will not affect performance.

      It might take a while for baseline building to complete if there is a lot of data, so it makes sense to run it in screen from a fixed node.

    Baseline building is a periodical asynchronous process, meaning that incoming sessions do not immediately change the baseline.

  2. Check whether the baselines have been built.

    1. Connect to PostgreSQL, the database that permanently stores the outcome of any analyses performed by SPA for later display on the Search interface:

      psql -U paa paa
    2. Issue SQL queries to get a list of users for whom a baseline has been built:

      • For the keystroke algorithm, use:

        select distinct user_id from keystroke;
      • For the mouse algorithm, use:

        select distinct user_id from mouse;
      • For the command algorithm, use:

        select distinct user_id from command;
      • For the login time algorithm, use:

        select distinct user_id from logintime;
      • For the host login algorithm, use:

        select distinct user_id from hostlogin;
      • For the fis algorithm, use:

        select distinct user_id from fis;
      • For the window title algorithm, use:

        select distinct user_id from windowtitle;
      • For the clockmaster algorithm, use:

        select distinct user_id from clockmaster;

    To generate scores after a successful baseline build, restart the pipeline by entering the following command: systemctl restart pam-pipeline.

  3. Start getting scores.

    Scoring happens in real-time, meaning that as soon as new data (even data from an ongoing session) is available, SPA immediately scores it.

    TIP: When data is not immediately available to you and you are unable to wait until sufficient amount of data comes in from production traffic, you can resort to manually reindexing historical sessions. For details, see Reindex historical sessions in the Safeguard for Privileged Analytics Configuration Guide.

    Scores represent an aggregated amount. Session data is scored by multiple algorithms independent from each other. Scores given by individual algorithms are aggregated to create a single score.

  4. Search for sessions with high scores.

    1. Go to Search.

      Sessions are displayed sorted by date. For ongoing sessions, the Search interface is updated in real-time to always show the most up-to-date information.

    2. In the Search query field, type analytics.score.aggregated: [80 TO 100], and click Search.

      A score between 80 and 100 indicates unusual user behavior.

      Figure 4: Searching for sessions with unusual user behavior using a search query

      Results that show sessions with high scores are displayed.

      Figure 5: Sessions with high scores — table view

      Figure 6: Sessions with high scores — card view

    For detailed instructions on how to search effectively and replay audit trails that contain interesting events, see Using the Search interface in the Administration Guide.

  5. Alternatively, search for scripted sessions.

    In the Search query field, type analytics.scripted:true, and click Search.

Reindex historical sessions

When data is not immediately available to you and you are unable to wait until sufficient amount of data comes in from production traffic, you can resort to manual reindexing. For more information, contact our Professional Services Team.

Documentos relacionados

The document was helpful.

Selecione a classificação

I easily found the information I needed.

Selecione a classificação