This section provides an overview of the Frequent Item Sets (FIS) flow view feature on the Search interface. It describes the underlying component (that is, the FIS algorithm), the elements of the FIS flow view visual, and possible scenarios (depending on your session details and pattern option choice).
From One Identity Safeguard for Privileged Sessions (SPS) version 6.2., a visual overview of Frequent Item Set (FIS) analysis is available on the Search interface. The FIS flow view is essentially similar to the flow view analytics overview, except that the FIS flow view only displays data narrowed down to a single user's previous sessions in the analysis period (which is the previous 90 days by default).
The component behind the analysis is the FIS algorithm, which examines multiple attributes of sessions and attempts to find values that frequently appear together, forming a set. Using this information, the algorithm can discover patterns in user behavior.
For the FIS algorithm to be able to score a user's sessions, the user needs at least 1 FIS baseline built. Algorithm baselines (including the FIS baselines) are built automatically every day (usually during hours with less heavy traffic).
To access the FIS flow view feature, click on of the session of your choice in Search > Sessions list, then click Analytics.
Figure 257: Search — The FIS flow view on the Analytics tab
Figure 258: Search — The FIS flow view (close-up)
The layout of the FIS flow view is similar to the attributes-grouped flow view, with the sessions forming a flow line (from here on referred to as a Connection). The relevant examined attributes (including the attribute nodes) are visible on the left hand side, while the irrelevant attributes (including the attribute nodes) are on the right hand side of the flow line visual.
The continuous line, with circles representing attribute nodes (that can be gray ( ) or contain the
or the
mark), displays the current session. Each attribute node represents that particular attribute's value in the current session. The FIS algorithm attempts to match these attribute values to the patterns in the user's baseline.
The different attribute node markings stand for:
: session data for this attribute is irrelevant for pattern match comparison (or session data is part of the Default option)
: session data for this attribute is a match for the selected pattern
: session data for this attribute is not a match for the selected pattern
Similarly to the flow view, session data in the FIS flow view is grouped according to attributes (such as Protocol, Client name, Server hostname, Server port, and so on) that come from session data. The two attributes in the FIS flow view that do not come from session data as-is, but are further grouped instead:
Bucketed starting hour: the most frequently used session starting hours grouped into intervals of 3 hours each
Bucketed duration: the most frequently occurring session duration values, grouped into intervals of various length
As a rule, the relevant attributes and attribute nodes (marked with or
) are located on the left hand side of the flow line visual, while the irrelevant attribute nodes (marked with
) are located on the right hand side of the flow line visual. The number of relevant attributes for the pattern match comparison, as well as the attribute groups' (and, as a result, the attribute nodes') relative position and relative order (going from left to right) changes from pattern to pattern on the flow line visual.
The FIS score gauge (located in the upper right corner of the FIS flow view visual) indicates the FIS score of the selected session.
Figure 259: Search — The FIS score gauge
The FIS score is assigned to the session after the FIS algorithm analyzes it in comparison with the latest available baseline. If the session has a high amount of matches to the user's baseline, the FIS score's value will be low (indicating normal user behavior).
The closer the FIS score gets to 100, the more it indicates unusual user behavior. For more information about normal and unusual user behavior, see Analyzing data using One Identity Safeguard for Privileged Analytics, Viewing session details, and this section.
The value of the FIS score (also visible on the Search > Sessions list, as well as in the aggregated score summary, usually above the FIS flow line visual) is one of the several components of the session's aggregated score.
Figure 260: Search — The FIS score visible on Search > Sessions list
For more information about analytics algorithms and scores, see this section.
The pattern selection drop-down list (by default set to the Default option) offers the available patterns that the FIS algorithm generates after baseline analysis.
Figure 261: Search — The pattern selection drop-down list (set to the Default option)
Figure 262: Search — The pattern selection drop-down list (further options)
Depending on which available pattern option you select, the visual will display one of these cases:
The Default option is the set of values that the FIS algorithm takes as a reference point. If you select the Default option, the flow line visual displays the user's previous sessions in the observed analysis period, with no patterns selected yet. The flow line visual below (set to the Default option) displays all possible attributes, marked with in all attributes.
Figure 263: Search — FIS flow view - the Default option (no patterns displayed yet)
The example below displays a pattern that appears in 100% of the user's previous sessions during the analysis period. As mentioned before, the relevant attribute nodes (marked with the or the
sign, depending on whether that attribute value matches or does not match the Default option in that particular session) are arranged on the left-hand side, while the irrelevant ones (marked with
) are arranged on the right-hand side of the flow line visual. There are 3 attribute matches (namely, Protocol, Recording Connection policy, and Server port) to this particular pattern in this particular session.
Figure 264: Search — FIS flow view - a pattern with a 100% match
The example below displays a pattern that appears in 92% of the user's previous sessions during the observed analysis period. Similarly to the previous example, the relevant attribute nodes are arranged on the left-hand side, while the irrelevant ones are arranged on the right-hand side of the flow line visual. This example contains different relevant attribute nodes than the previous example, with 4 attribute matches to this particular pattern in this particular session.
Figure 265: Search — FIS flow view - a pattern with a high match percentage
The example below displays a pattern with a low match percentage, appearing in only 12% of this user's previous sessions during the observed analysis period. There are 3 attribute nodes that match ( marked with ) and 3 attribute nodes that do not match ( marked with
) this particular pattern in this particular session.
Figure 266: Search — FIS flow view - a pattern with a low match percentage
With the baseline generated every day on average (usually during hours with less heavy traffic), the baseline itself is continuously changing. As a result, the available patterns are also continuously changing over time.
The pattern match percentage is a percentage value displayed under the pattern selection drop-down list, next to the pattern name (for example, Pattern 0 | Pattern 1, and so on).
Figure 267: Search — FIS flow view - the pattern match percentage
The percentage value always matches the value displayed next to the Pattern options (other than the Default option) in the drop-down list. The percentage indicates to what percent the selected pattern matches this user's sessions during the observed analysis period. Patterns that appear in less than 10% of this user's sessions during the observed analysis period are not displayed in the drop-down list as Pattern options (but may appear in the overall sum of Total count data, as mentioned in Displaying further details of individual Connection segments.
Hovering on an individual Connection segment of the visual displays the exact number of occurrences of that particular attribute value during the observed analysis period. When the Connection splits to several branches (for example, in the example below, the Connection splits into separate branches according to Bucketed starting hour), hovering over the branched Connection segment of your choice will display that particular attribute's further details (namely, the attribute data (for example, IP addresses), and the Total count).
The Total count values include session data originating from patterns that appear in less than 10% of the user's sessions during the observed analysis period.
Figure 268: Search — Hovering on particular Connection segments to display further details
The following describes how to create and replay an audit trail in your browser.
|
Caution:
You can replay audit trails in your browser, or using the Safeguard Desktop Player application. Note that there are differences between these solutions.
For details on the Safeguard Desktop Player application, see Safeguard Desktop Player User Guide. |
|
Caution:
Even though the One Identity Safeguard for Privileged Sessions (SPS) web interface supports Internet Explorer and Microsoft Edge in general, to replay audit trails you need to use Internet Explorer 11, and install the Google WebM Video for Microsoft Internet Explorer plugin. If you cannot install Internet Explorer 11 or another supported browser on your computer, use the the Safeguard Desktop Player application. For details, see "Replaying audit trails in your browser" in the Administration Guide and Safeguard Desktop Player User Guide. |
To replay an audit trail in your browser
On the Search page, find the audit trail you want to replay.
Click to display the details of the connection.
Click to generate a video file from the audit trail you want to replay. Depending on the load of the indexer and the length and type of the audit trail, this can take several minutes.
When the video is available, changes to
and
. You can use the
button if you want to remove the generated video. After you remove the video file, the
button is available and you can use it to recreate the video file.
To replay the video, click .
The Player window opens.
Figure 269: Replaying audit trails in your browser
You can quickly zoom in or out by clicking anywhere in the Player window.
The Player window has the following controls:
: Play, Pause
,
: Jump to previous event, Jump to next event
: Adjust replay speed
: Time since the audit trail started / Length of the audit trail. Click on the time to show the date (timestamp) of the audit trail.
: List of keyboard events. Special characters like ENTER, F1, and so on are displayed as buttons. If the upstream traffic is encrypted, upload your permanent or temporary keys to the User menu > Private keystore to display the keyboard events. This will not be displayed if your upstream traffic is encrypted but not unlocked.
: Active mouse button
: Create a screenshot
: Show / hide events. Select the types of events to display. Depending on the protocol used and how the audit trail was processed, One Identity Safeguard for Privileged Sessions (SPS) can display keyboard events, commands, mouse events, and window titles. Commands and window titles are displayed as subtitles at the top of the screen. This will not be displayed if your upstream traffic is encrypted but not unlocked.
: Fullscreen mode
: Progress bar
: Shows the distribution of events. Blue - commands, green - keyboard events, yellow - mouse events, orange - window title. This will not be displayed if your upstream traffic is encrypted but not unlocked.
: Close the player, and return to the Connection details page.
To view encrypted screenshots in the Search interface, you have to upload the necessary encryption key to your keystore. Only RSA keys (in PEM-encoded X.509 certificates) can be uploaded to the private keystore.
One Identity recommends using 2048-bit RSA keys (or stronger).
The private key is stored in your browser.
NOTE: If you clear your browser’s data, your keystore could be deleted. If your keystore is deleted, reupload your private keys.
To create a key for viewing encrypted screenshots
Click User Menu > Keystores > Add new key.
Figure 270: User Menu > Add new key — Add new key
Click Browse key, select the file containing the key in PEM format, and click Open. Alternatively, you can also copy-paste or drag your key into the Key content field and click Add key.
Create a master password.
The master password protects your keys from unauthorized use, for example, if you share a computer with anyone. This password cannot be changed. If you forget your master password, delete the key and add a new key as well as a new master password.
To use the keys in a keystore protected by a master password, you have to unlock the keystore first by providing the master password. The keystore then remains unlocked for the duration of your session.
Figure 271: User Menu > Add new key — Add a master password
Once you added a key to view encrypted screenshots, and unlocked the keystore by providing the master password, you can view the encrypted screenshots in the Search interface.
To replay encrypted audit trails in your browser, you have to upload the necessary certificates and corresponding private keys to your private keystore. Depending on the encryption, decrypting the upstream part of an audit trail may require an additional set of certificates and keys.
Only RSA keys (in PEM-encoded X.509 certificates) can be uploaded to the private keystore.
One Identity recommends using 2048-bit RSA keys (or stronger).
Certificates are used as a container and delivery mechanism. For encryption and decryption, only the keys are used.
Use every keypair or certificate only for one purpose. Do not reuse cryptographic keys or certificates (for example, do not use the certificate of the One Identity Safeguard for Privileged Sessions (SPS) webserver to encrypt audit trails, or the same keypair for signing and encrypting data).
For more information on audit trail encryption, see Encrypting audit trails and for more information about replaying audit trails in your browser, see Replaying audit trails in your browser.
You can upload certificates permanently or temporarily. The temporary certificates are deleted when you log out of SPS.
The certificates and private keys in your keystore can be protected with a passphrase. To use the certificates and private keys in a passphrase-protected keystore for decrypting audit trails, you have to unlock the keystore first by providing the security passphrase. The keystore then remains unlocked for the duration of your session.
To replay encrypted audit trails in your browser
Click User Menu > Keystores > Manage keys for encryted videos.
Figure 272: User Menu > Keystores > Manage keys for encryted videos — Keystore for encrypted videos
(Optional) Create a security passphrase, if you have not configured one yet.
In Security passphrase, click Change.
In the New: field, enter your new security passphrase. Repeat the same passphrase in the Confirm: field.
SPS accepts passwords that are not longer than 150 characters. The following special characters can be used: !"#$%&'()*+,-./:;<=>?@[\]^-`{|}
Click Apply.
If you forgot your security passphrase, contact our Support Team.
Click to add a new certificate. A new empty row is added.
Figure 273: Adding certificates
Click the first (under Certificate) to upload the new certificate. A pop-up window with the header Changing certificate is displayed.
Figure 274: Uploading certificates
Click Choose File, select the file containing the certificate, and click Upload. Alternatively, you can also copy-paste the certificate into the Certificate field and click Set.
To upload the private key corresponding to the certificate, click the second icon (under Key). A pop-up window with the header Changing key is displayed.
Figure 275: Uploading the private key
Click Choose File, select the file containing the private key, provide the Password if the key is password-protected, and click Upload. Alternatively, you can also copy-paste the private key into the Key field, provide the Password there, and click Set. Note that for passwords, Unicode characters are also supported.
To add more certificate-key pairs, click and repeat the steps above.
To finish uploading certificates and keys to your private keystore, click Apply.
© ALL RIGHTS RESERVED. Feedback Terms of Use Privacy