Micro Focus Security Arcsight Esm: Installation Guide
Micro Focus Security Arcsight Esm: Installation Guide
Micro Focus Security Arcsight Esm: Installation Guide
ArcSight ESM
Software Version: 7.3
Installation Guide
Legal Notices
Copyright Notice
© Copyright 2001-2020 Micro Focus or one of its affiliates
Confidential computer software. Valid license from Micro Focus required for possession, use or copying. The
information contained herein is subject to change without notice.
The only warranties for Micro Focus products and services are set forth in the express warranty statements
accompanying such products and services. Nothing herein should be construed as constituting an
additional warranty. Micro Focus shall not be liable for technical or editorial errors or omissions contained
herein.
No portion of this product's documentation may be reproduced or transmitted in any form or by any means,
electronic or mechanical, including photocopying, recording, or information storage and retrieval systems,
for any purpose other than the purchaser's internal use, without the express written permission of Micro
Focus.
Notwithstanding anything to the contrary in your license agreement for Micro Focus ArcSight software, you
may reverse engineer and modify certain open source components of the software in accordance with the
license terms for those particular components. See below for the applicable terms.
U.S. Governmental Rights. For purposes of your license to Micro Focus ArcSight software, “commercial
computer software” is defined at FAR 2.101. If acquired by or on behalf of a civilian agency, the U.S.
Government acquires this commercial computer software and/or commercial computer software
documentation and other technical data subject to the terms of the Agreement as specified in 48 C.F.R.
12.212 (Computer Software) and 12.211 (Technical Data) of the Federal Acquisition Regulation (“FAR”) and
its successors. If acquired by or on behalf of any agency within the Department of Defense (“DOD”), the U.S.
Government acquires this commercial computer software and/or commercial computer software
documentation subject to the terms of the Agreement as specified in 48 C.F.R. 227.7202-3 of the DOD FAR
Supplement (“DFARS”) and its successors. This U.S. Government Rights Section 18.11 is in lieu of, and
supersedes, any other FAR, DFARS, or other clause or provision that addresses government rights in
computer software or technical data.
Trademark Notices
Adobe™ is a trademark of Adobe Systems Incorporated.
Microsoft® and Windows® are U.S. registered trademarks of Microsoft Corporation.
UNIX® is a registered trademark of The Open Group.
Support
Contact Information
Phone A list of phone numbers is available on the Technical Support
Page: https://softwaresupport.softwaregrp.com/support-contact-
information
l Aggregators: Each aggregator in the cluster is a single process; there can be multiple
aggregators on each node in the cluster.
l Message Bus Control and Message Bus Data: Handles the messaging among the
cluster components.
l Repository (Repo): Contains the state of each member of the cluster among all of the
nodes.
l Distributed Cache: Manages the short-term storage of data needed for cluster
operation.
Here is a conceptual view of the cluster services and their interactions with each other
and ESM:
Note: SSL is not supported in any mode. TLS is supported for all modes. For TLS
version support see TLS Support.
The following table outlines some of the basic differences between the three modes that
ESM supports:
Keystore/
Mode Default cipher suites truststore
Using PKCS#11
ESM supports the use of a PKCS#11 token such as 90Meter or the Common Access
Card (CAC) (which is used for identity verification and access control) to log into the
Console. PKCS#11 is Public-Key Cryptography Standard (PKCS), published by RSA
Laboratories which describes it as “a technology-independent programming interface,
called Cryptoki, for cryptographic devices such as smart cards and PCMCIA cards.”
PKCS#11 authentication is not supported with Radius, LDAP, and Active Directory
authentication methods.
Port Directory
References to ARCSIGHT_HOME
<ARCSIGHT_HOME> in the paths represents:
Note: When you specify the global event ID generator ID for ESM, it is important to
verify that this ID does not conflict with the global event ID generator ID for other
ArcSight components in your environment.
The global event ID generator ID will be used to generate global event IDs for the
events that are generated within the ESM installation.
During installation, you must specify a global event ID generator ID that is an integer
between 0 and 16384 (0 and 16384 are not valid IDs). When you assign a global event
ID generator ID to an ArcSight component, it should remain the same throughout the
lifetime of the component. Should it become necessary to change the generator ID, do
not attempt to change it without contacting Technical Support.
Note: If you are installing in a distributed correlation environment, you only need to
specify a global event ID generator ID on the persistor node.
If you specified a valid global event ID generator ID but for some reason ESM failed to
store the ID, the installation proceeds but the ArcSight Manager will not start. This
situation is not expected. In the event that this situation does occur, complete the
following steps to resolve the issue:
1. Shut down the ArcSight Manager.
2. As user arcsight, run the following script:
./arcsight setgeidgenid <Global_Event__ID_Generator_ID>
where Global_Event_ID_Generator_ID is an integer between 0 and 16384 (0 and
16384 are not valid)
Note: In a distributed correlation environment, only run the script on the persistor
node.
ESM installation does not comply with CIS benchmark 1.1.2, which states that /tmp
should be a separate partition with the noexec mount option. This means that you cannot
run a program underneath /tmp.
As a workaround, create the directory <tmpdir> as user arcsight and add the following
lines to /home/arcsight/.bashrc:
export IATEMPDIR=<tmpdir>
export _JAVA_OPTIONS=-Djava.io.tmpdir=<tmpdir>
export _JAVA_OPTIONS=-Djava.io.tmpdir=<tmpdir>
Before you run the installation, log out and then log in.
Micro Focus recommends using /home/arcsight/tmp for <tmpdir>, but you can use an
alternate choice as appropriate for your environment.
Create a directory named "custom" in the extracted installation directory and ensure that
the unzip rpm is installed on the operating system.
Note: The operating system image provided on a G10 appliance does not include X
Window. Since the X Window system is not present on ESM on an appliance, the
installation and configuration of ESM on an appliance is performed using the
command line. No GUI wizard is available for installation and configuration of ESM
on an appliance.
6. Specify 1 for a static IPv6 networking setup (in which you will provide the IP
address).
7. Specify the appliance IP address.
8. Specify the default gateway.
9. Specify the primary DNS IP Address.
10. Specify the secondary DNS IP Address (optional).
11. Specify the DNS Search Domains.
12. Specify the time zone. You can start to type and press Tab and the system will
attempt to auto-fill the time zone. For example you can type A, Tab and it fills in
"America_". Press the Tab key twice for a list of time zone entries that starts with
"America_".
13. Enter the Date.
The date and time are optional. If you specify an NTP server, it overrides these
date/time values. If there is no NTP server, these date/time values reset the
appliance system clock and if you leave them blank, the system clock determines
the date time.
14. Enter the Time.
15. Specify the NTP servers. List one NTP server per line. You can use IP addresses or
host names. Using an NTP server is recommended.
When you are done, the FBW provides a list of what you have specified, for you to
review. If you say No, it starts over.
If you accept the specifications, type y and press Enter to end the installation session
and automatically start the Configuration Wizard.
"America_". Press the Tab key twice for a list of time zone entries that starts with
"America_".
8. Enter the Date.
The date and time are optional. If you specify an NTP server, it overrides these
date/time values. If there is no NTP server, these date/time values reset the
appliance system clock and if you leave them blank, the system clock determines
the date time.
9. Enter the Time.
10. Specify the NTP servers. List one NTP server per line. You can use IP addresses or
host names. Using an NTP server is recommended.
When you are done, the FBW provides a list of what you have specified, for you to
review. If you say No, it starts over.
If you accept the specifications, type y and press Enter to end the installation session
and automatically start the Configuration Wizard.
License file: Once the IP address is defined you can log in to the appliance from the
machine where you downloaded the license file and copy it to the appliance. The
Configuration Wizard segment, which is next, asks you to specify the location of the
license file on the appliance.
License file: Once the IP address is defined you can log in to the appliance from the
machine where you downloaded the license file and copy it to the appliance. The
Configuration Wizard segment, which is next, asks you to specify the location of the
license file on the appliance.
o The IP address that is used on the peering page if a host name is given.
o Whether an IPv4 or an IPv6 address is used for the manager asset.
l The Manager might have more than one host name, and the default name might not
be the same as the name returned by the hostname command. If you are using the
High Availability Module, use the service host name that is common to both servers
(primary and secondary) as the Manager host name. Otherwise, choose the name that
you expect to work and that is convenient for configuring connectors, consoles, and
other clients.
Micro Focus recommends using the fully-qualified domain name.
l If you do not want the host name on your DNS server, add a static host entry to the
/etc/hosts file to resolve the host name locally.
You can use the Manager Configuration Wizard to specify more email
addresses. For more information, see the Administrator's Guide on the ESM
documentation page.
b. Specify an email address for the sender of notification emails.
Notification emails will be sent in the following situations:
l The subsystem status changes. The email includes information about the the
change and who made it.
l The report is successfully archived.
l The account password is reset.
l The archive report generation fails.
l A destination receives too many notifications.
l The event archive location reaches the cap space. The notification requests that
you free up space by moving the event archives to another location.
l The user elects to email the ArcSight Console settings.
l The user sends a partition archival command.
l An archive fails because there is not enough space.
l The connection to the database fails.
7. Provide the path and file name of the license file that you downloaded.
8. Select whether to install in default mode or FIPS mode.
Caution:
l If you choose to install in FIPS mode, you must also install the ArcSight
Console in FIPS mode. For more information, see Installing the ArcSight
Console in FIPS Mode.
l After you configure ESM in FIPS mode, you cannot convert it to default mode
without reinstalling it.
l Converting from default mode installation to FIPS-140-2 mode is supported.
For more information, see the Administrator's Guide on the ESM
documentation page.
l By default, ESM uses a self-signed certificate. To use a CA-signed certificate,
you must import the CA-signed certificate manually after the configuration
wizard completes successfully. For information about using a CA-signed
certificate, see the Administrator's Guide.
Suite B defines two security levels of 128 and 192 bits. The security levels are
based on the Advanced Encryption Standard (AES) key size that is used instead of
the overall security provided by Suite B. At the 128-bit security level, the 128 bit
AES key size is used. However, at the 192-bit security level, a 256 bit AES key size
is used. Although a larger key size means more security, it also means
computational cost in time and resource (CPU) consumption. In most scenarios, the
128-bit key size is sufficient.
10. Specify the following information for the ArcSight Manager:
a. Host name
b. Credentials for the admin user
For considerations that apply to the Manager host name, see Specifying the
ArcSight Manager Host Name.
By default, the Manager uses a self-signed certificate. To use a CA-signed
certificate, you must import the CA-signed certificate manually after the
configuration wizard completes successfully. For information about using a CA-
signed certificate, see the Administrator's Guide on the ESM documentation page.
11. Specify the global event ID generator ID that will be used to generate global event
IDs.
You must specify an integer between 0 and 16384 (0 and 16384 are not valid). For
more information, see Specifying a Global Event ID Generator ID.
12. If Transformation Hub is part of your ESM implementation, select whether to set up a
connection to it.
For more information, see the applicable topic:
l Configuring Transformation Hub Access - Non-FIPS Mode
l Setting Up SSL Client-Side Authentication Between Transformation Hub and
ESM - Non-FIPS Mode
l Configuring Transformation Hub Access - FIPS Mode (Server Authentication
Only)
l Setting Up SSL Client-Side Authentication Between Transformation Hub and
ESM - FIPS Mode
Note: If ESM will connect to Kafka using SASL/PLAIN authentication, skip this
step and use managersetup to configure the connection after you complete the
initial configuration. For more information, see Completing Post-Installation
Tasks.
b. Specify the topics in Transformation Hub from which you want to read. These
topics determine the data source.
For more information, see the Transformation Hub Administration Guide on the
Transformation Hub documentation page.
Note: You can specify up to 25 topics using a comma-separated list (for
example: topic1,topic2).
14. Select whether to integrate with the ServiceNow® IT Service Management (ITSM)
application.
If you select Yes, specify the mandatory ServiceNow URL and the optional
ServiceNow Proxy URL.
For information about completing the configuration, see Configuring Integration with
ServiceNow®.
15. If you are not licensed to use optional packages, press Enter to advance to the next
screen. Otherwise, select the optional packages that you are licensed to use. In
addition to these optional packages, default standard content packages are installed
automatically on the ArcSight Manager. These default packages provide essential
system health and status operations, and you can use them immediately to monitor
and protect your network.
For more information about packages, see the ArcSight Administration and ArcSight
System Standard Content Guide on the ESM documentation page.
16. Select to continue with the installation. You will receive a message when the
installation is complete.
17. Log in as user root and run the following script to set up and start the required
services:
/opt/arcsight/manager/bin/setup_services.sh
18. Check the location and size of your storage volumes and use ArcSight Command
Center to make any necessary changes. For more information, see the Command
Center User's Guide on the ESM documentation page.
Enable Peering
This topic is for appliance installation using an ESM license that includes peering.
By default appliances ship with port 9000 disabled. Peering requires this port. For
peering to work on an appliance, enable port 9000 using the following commands:
Note that peering works between ESM Managers that use the same IP version.
However, if an ESM Manager is on a dual-stack machine, see the Command Center
User's Guide on the ESM documentation page.
Note: <ARCSIGHT_HOME> is the root directory for a component. For example for the
Manager component, <ARCSIGHT_HOME> is: /opt/arcsight/manager.
On the firewall, block everything except the following ports. Ensure that you restrict the
remote IP addresses that might connect to those that actually need to talk.
Built-In Security
ESM user accounts have user types that control the functions which users can access in
the ArcSight Manager. The "Normal User" type has the most privileges. Where possible,
use more restrictive types, such as "Manager SmartConnector," "Management Tool," or
"Archive Utility" for automated user accounts. This is particularly important when user
passwords must be stored in scripts for unattended execution.
Apply the principle of least privilege when creating user accounts in ESM and when
granting access to resources or events. Users should not have more privileges than
their tasks require.
By default, the minimum length for passwords is six characters and the maximum length
is 20 characters. For information about password restrictions, see the Administrator's
Guide on the ESM documentation page.
Use a firewall and intrusion detection systems to secure the network that the ArcSight
Manager CORR_Engine use.
Preparing to Install
Before you run the Software ESM installation file, you must prepare your system.
System Requirements
The hardware requirements for ESM 7.3 are as follows:
Hard Disk Six 600 GB disks (1.5 TB) 20 1 TB disks (10 TB) 12 TB
(RAID 10) (RAID 10) (RAID 10)
10,000 RPM 15,000 RPM Solid state
Caution: The "Minimum" values apply to systems running base system content at
low EPS (typical in lab environments). It should not be used for systems running
high number of customer-created resources, or for systems that need to handle high
event rates. Use the "Mid Range" or "High Performance" specifications for
production environments that handle a sizable EPS load with additional content and
user activity.
Using Threat Detector (formerly known as Pattern Discovery) or large numbers of
Assets and Actors puts additional load on the system that can reduce the search and
event processing performance. For further assistance in sizing your ESM
installation, contact your Sales or Field Representative.
If you anticipate that you will have large lists, ensure that your system meets the Mid-
Range requirements or better.
Login Banners
Login banners might interfere with a distributed cluster installation. The following types
of login banners are safe to use:
l "Message of the day" (/etc/motd) and other banners that do not appear when running
a remote command
l SSH login banners that you configure in /etc/ssh/sshd_config
Other login banners (for example, echo statements in ~/.bashrc) might cause ESM to
fail during or after a distributed cluster installation.
Monitor Requirement
For displaying the ArcSight Command Center, use a monitor that has a width of at least
1450 pixels. This is the minimum width needed to display all of the top-menu items
without cutting any of them off. This minimum width also applies on a larger monitor
when reducing the size of the browser window.
Supported Platforms
ESM 7.3 is supported on 64-bit Red Hat Enterprise Linux (RHEL), CentOS, and SUSE
Linux Enterprise Server (SLES). For supported versions, see the Support Matrix on the
ESM documentation page. Install the operating system using at least the Web Server
option with added Compatibility Libraries and Development Tools. ESM is sensitive to
the operating system and version.
If you plan to install ESM on SLES, run the following commands to install the required
RPM packages (libaio and libaiodevel):
zypper install libaio
zypper install libaio-devel
Run the following command to verify that the packages are installed:
rpm -qa | grep libaio
To install the time zone update package after you complete the ESM
installation:
1. Use the procedure above to install the correct time zone update package.
2. As user arcsight, shut down all ArcSight services:
/etc/init.d/arcsight_services stop all
3. As user arcsight, run the following command (all on one line):
/opt/arcsight/manager/jre/bin/java -jar /opt/arcsight/manager/lib/jre-
tools/tzupdater/ziupdater-1.0.1.2.jar –V
4. As user arcsight, start all ArcSight services:
/etc/init.d/arcsight_services start all
Note: Any events that are brought from an offline archive into the online archive
count as part of the total 12 TB (or license determined) storage limit. You do not want
the offline archives that you bring back online to encompass the entire storage limit.
Use discretion when bringing offline archives online, and be sure to make them
offline again when you are done working with them.
System Storage - non-event storage, for example, resources, trends, and lists
Event Storage - storage for events
Event Archive Size - archive of online events
System The default is about one sixth of Usable Space, from at least 3 GB 3 GB 1,500 GB
Storage up to a maximum of 1,500 GB. During installation, it is
Size recommended that you accept the default.
Event Specify about two thirds of the Usable Space shown during 10 GB 12 TB
Storage installation.
Size
Event You may specify the remaining space after the System and Event 1 GB Limit is
Archive storage have been allocated. predicated on
Size your file
system size.
The system reserves 10 percent of the /opt/arcsight partition for its own use.
During installation, the system will show the size of the /opt/arcsight partition as
Available Space, and the size of that partition less 10 percent reserved space
designated as Usable Space. The maximum event storage volume size is calculated by
the system using this formula:
Maximum Event Storage = /opt/arcsight partition x 0.9 - system storage -
event archives.
After installation, the allocated event storage space consists of a default storage group
and an internal storage group whose size is initially set by the installer. These storage
groups do not fill the maximum size of the event storage volume. You may expand the
size of these storage groups or add up to four of your own storage groups until the
allocated size of the event storage reaches the maximum size of the event storage
volume. Use the ArcSight Command Center user interface to add or change the size of
storage groups.
In the ArcSight Command Center, select Administration > Storage and Archive to see
and change the storage allocations. For more information, see the Command Center
User's Guide on the ESM documentation page.
The following diagrams clarify the various terms used in the configuration wizard and in
the ArcSight Command Center user interface:
Caution: If you plan to install the High Availability module on the persistor node, do
not configure a message bus data instance on the persistor node. Otherwise, the
cluster is likely to fail when ESM swaps the primary and secondary systems.
The total number of information repository (repo) instances must be either one or three
for the cluster.
The total number of distributed cache (dcache) instances should be an odd number.
Micro Focus recommends starting with a four-node or five-node cluster, as these cluster
sizes have been tested. You are not limited to five nodes and can add more nodes later
if needed. For information about adding nodes after the initial installation, see the
Administrator's Guide on the ESM documentation page.
l 128 GB RAM
l 6 TB disk
l 24 cores
l 10 Gbit network
The nodes have the following software requirements:
l Node 1:
o One persistor
o One distributed cache
o One information repository
l Node 2:
o One correlator
o One aggregator
o One distributed cache
o One message bus control
o One message bus data
l Node 3:
o One correlator
o One aggregator
o One message bus control
o One message bus data
o One information repository
l Node 4:
o One correlator
o One aggregator
o One distributed cache
o One message bus control
o One message bus data
o One information repository
l 256 GB RAM
l 8 TB disk
l 32 cores
l 10 Gbit network
The nodes have the following software requirements:
l Node 1:
o One persistor
o One distributed cache
o One information repository
l Node 2:
o One correlator
o One aggregator
o One distributed cache
o One message bus control
o One message bus data
l Node 3:
o One correlator
o One aggregator
o One distributed cache
o One message bus control
o One message bus data
o One information repository
l Node 4:
o One correlator
o One aggregator
o One distributed cache
o One message bus control
o One message bus data
o One information repository
l Node 5:
o One distributed cache
o One message bus data
o One correlator
o One aggregator
Note:
l To run in GUI mode, X Window must be running. If it is not, the installer
automatically runs in Console mode. GUI mode is entirely optional.
l To run in Console mode, make sure X Windows is not running. GUI mode
requests the same information as console mode and is not documented
separately.
l The log files for this installation appear in the /home/arcsight directory.
You must specify an integer between 0 and 16384 (0 and 16384 are not valid). For
more information, see Specifying a Global Event ID Generator ID.
12. If Transformation Hub is part of your ESM implementation, select whether to set up a
connection to it.
For more information, see the applicable topic:
l Configuring Transformation Hub Access - Non-FIPS Mode
l Setting Up SSL Client-Side Authentication Between Transformation Hub and
ESM - Non-FIPS Mode
l Configuring Transformation Hub Access - FIPS Mode (Server Authentication
Only)
l Setting Up SSL Client-Side Authentication Between Transformation Hub and
ESM - FIPS Mode
Note: If ESM will connect to Kafka using SASL/PLAIN authentication, skip this
step and use managersetup to configure the connection after you complete the
initial configuration. For more information, see Completing Post-Installation
Tasks.
b. Specify the topics in Transformation Hub from which you want to read. These
topics determine the data source.
Note: You can specify up to 25 topics using a comma-separated list (for
example: topic1,topic2).
For more information, see the Transformation Hub Administration Guide on the
Transformation Hub documentation page.
c. Import the Transformation Hub root certificate to ESM's client truststore.
Transformation Hub maintains its own certificate authority (CA) to issue
certificates for individual nodes in the Transformation Hub cluster. ESM needs
that CA certificate in its truststore so that it will trust connections to
Transformation Hub. For information about obtaining the certificate, see the
information about viewing and changing the certificate authority in the
Transformation Hub Deployment Guide on the Transformation Hub
14. (Conditional) If you want to integrate with the ServiceNow® IT Service Management
(ITSM) application, click Yes, and then complete the following:
a. Specify the mandatory ServiceNow URL and the optional ServiceNow Proxy
URL.
For information about completing the configuration, see Configuring Integration
with ServiceNow®.
b. (Conditional) If you want to use a global ID to authenticate connections to
ServiceNow, click Yes, and then specify the user name and password.
15. If you are not licensed to use optional packages, press Enter to advance to the next
screen. Otherwise, select the optional packages that you are licensed to use. In
addition to these optional packages, default standard content packages are installed
automatically on the ArcSight Manager. These default packages provide essential
system health and status operations, and you can use them immediately to monitor
and protect your network.
For more information about packages, see the ArcSight Administration and ArcSight
System Standard Content Guide on the ESM documentation page.
16. Select to continue with the installation. You will receive a message when the
installation is complete.
17. Log in as user root and run the following script to set up and start the required
services:
/opt/arcsight/manager/bin/setup_services.sh
18. Check the location and size of your storage volumes and use ArcSight Command
Center to make any necessary changes. For more information, see the Command
Center User's Guide on the ESM documentation page.
During the installation, the wizard prompts you to specify the ArcSight Manager host
name. Keep the following points in mind when specifying the host name:
l The Manager host name is used to generate a self-signed certificate. The Common
Name (CN) in the certificate is the host name that you specify when prompted.
l The Manager host name is the IP address (for IPv4 only) or the fully-qualified domain
name of the server where the Manager is installed. All clients (for example, the
ArcSight Console) use this name to connect to the Manager. For flexibility, Micro
Focus recommends using a fully-qualified domain name instead of an IP address.
l If you are installing on a dual-stack system, the wizard prompts you to select the
preferred IP protocol. Your selection controls the following:
o The IP address that third-party software uses if a host name is given. For example,
the email server in Manager Setup.
o The IP address that is used on the peering page if a host name is given.
o Whether an IPv4 or an IPv6 address is used for the manager asset.
l The Manager might have more than one host name, and the default name might not
be the same as the name that the hostname command returns. If you are using the
High Availability module, use the service host name that is common to both systems
(primary and secondary) as the Manager host name. Otherwise, choose the name that
you expect to work and that is convenient for configuring connectors, consoles, and
other clients.
Micro Focus recommends using the fully-qualified domain name.
l If you do not want the host name on your DNS server, add a static host entry to the
/etc/hosts file to resolve the host name locally.
11. Provide the path and file name of the license file that you downloaded.
12. Select whether to install in default mode or FIPS mode.
Caution:
l If you choose to install in FIPS mode, you must also install the ArcSight
Console in FIPS mode. For more information, see Installing the ArcSight
Console in FIPS Mode.
l After you configure ESM in FIPS mode, you cannot convert it to default mode
without reinstalling it.
l Converting from default mode installation to FIPS 140-2 mode is supported.
For more information, see the Administrator's Guide on the ESM
documentation page.
l By default, ESM uses a self-signed certificate. To use a CA-signed certificate,
you must manually import the CA-signed certificate after the configuration
wizard completes successfully. For information about using a CA-signed
certificate, see the Administrator's Guide.
13. If you selected to install in FIPS mode, select the cipher suite.
Suite B defines two security levels of 128 and 192 bits. The security levels are
based on the Advanced Encryption Standard (AES) key size that is used instead of
the overall security provided by Suite B. At the 128-bit security level, the 128 bit
AES key size is used. However, at the 192-bit security level, a 256 bit AES key size
is used. Although a larger key size means more security, it also means
computational cost in time and resource (CPU) consumption. In most scenarios, the
128-bit key size is sufficient.
14. Specify the following information for the ArcSight Manager:
a. Host name
b. Credentials for the admin user
For considerations that apply to the Manager host name, see Installing ESM on the
Persistor Node.
By default, the Manager uses a self-signed certificate. To use a CA-signed certificate,
you must manually import the CA-signed certificate after the configuration wizard
completes successfully. For information about using a CA-signed certificate, see the
Administrator's Guide on the ESM documentation page.
15. Specify the global event ID generator ID that will be used to generate global event
IDs.
You must specify an integer between 0 and 16384 (0 and 16384 are not valid). For
more information, see Specifying a Global Event ID Generator ID.
16. If Transformation Hub is part of your ESM implementation, select whether to set up a
connection to it.
For more information, see the applicable section:
l Configuring Transformation Hub Access - Non-FIPS Mode
l Setting Up SSL Client-Side Authentication Between Transformation Hub and
ESM - Non-FIPS Mode
l Configuring Transformation Hub Access - FIPS Mode (Server Authentication
Only)
l Setting Up SSL Client-Side Authentication Between Transformation Hub and
ESM - FIPS Mode
Note: If ESM will connect to Kafka using SASL/PLAIN authentication, skip this
step and use managersetup to configure the connection after you complete the
initial configuration. For more information, see Completing Post-Installation
Tasks.
b. Specify the topics in Transformation Hub from which you want to read. These
topics determine the data source.
For more information, see the Transformation Hub Administration Guide on the
Transformation Hub documentation page.
Note: You can specify up to 25 topics using a comma-separated list (for
example: topic1,topic2).
Note: ArcSight ESM versions 7.3 and 7.2 Service Pack 1 require ArcSight
Investigate 3.1. Previous versions of ArcSight ESM are compatible with ArcSight
Investigate 3.0.
18. (Conditional) If you want to integrate with the ServiceNow® application, click Yes,
and then complete the following:
a. Specify the mandatory ServiceNow URL and the optional ServiceNow Proxy
URL.
For information about completing the configuration, see Configuring Integration
with ServiceNow®.
b. (Conditional) If you want to use a global ID to authenticate connections to
ServiceNow, click Yes, and then specify the user name and password.
19. If you are not licensed to use optional packages, press Enter to advance to the next
screen. Otherwise, select the optional packages that you are licensed to use. In
addition to these optional packages, default standard content packages are installed
automatically on the ArcSight Manager. These default packages provide essential
system health and status operations, and you can use them immediately to monitor
and protect your network.
For more information about packages, see the ArcSight Administration and ArcSight
System Standard Content Guide on the ESM documentation page.
20. Select the distributed correlation services to implement:
l 0: Distributed Cache - configures silently
l 1: Correlation - allows you to add aggregators and correlators to the cluster on
the node you are installing. The wizard runs later in the installation.
21. Select to continue with the installation. You will receive a message when the
installation is complete.
If you chose to add aggregators and correlators to the cluster, the ArcSight
Correlation Configuration Wizard runs. For information about completing the wizard,
see the Administrator's Guide on the ESM documentation page.
22. To set up the services, log in as user root and run the following script:
/opt/arcsight/manager/bin/setup_services.sh
8. Select to continue with the installation. You will receive a message when the
installation is complete.
If you chose to add aggregators and correlators to the cluster, the ArcSight
Correlation Configuration Wizard runs. For information about completing the wizard,
see the Administrator's Guide on the ESM documentation page.
9. To set up the services, log in as user root and run the following script:
/opt/arcsight/manager/bin/setup_services.sh
After you add nodes to the cluster, see Configuring the Cluster for information about
additional tasks.
Note: At this point in the cluster configuration, you have one information
repository instance. Most configurations benefit from three information repository
instances. A cluster can have either one repository instance or three instances,
with one repository instance per node. Other numbers of repository instances
are not supported.
arcsight . Only arcsight user to arcsight user passwordless SSH is supported, and only
from the persistor node to other cluster nodes.
If a node needs configuration, the command prompts you for the user arcsight password
on the node, so it can log in and complete the setup.
If you want to configure a new node and add services, as user arcsight, you must
stop and start all of the ESM services:
/etc/init.d/arcsight_services stop all
/etc/init.d/arcsight_services start all
Before you remove a service, you must stop the service.
For more information about adding cluster services, see the Administrator's Guide
on the ESM documentation page.
5. Install ArcSight Fusion.
ArcSight Fusion enables you to visualize, identify, and analyze potential threats by
incorporating intelligence from the multiple layers of security sources that might be
installed in your security environment:
l Real-time event monitoring and correlation with data from ESM
l Analyzing end-user behavior with Interset
To help you get started, Fusion provides a Dashboard with a set of out-of-the-box
widgets and dashboards. Users can organize the widgets into personalized
dashboards.
For information about deploying, configuring, and maintaining this product, see the
ESM Release Notes on the ESM documentation page and the Administrator Guide
for ArcSight Fusion, which is posted with the documentation for ArcSight Fusion.
Note: This release allows you to connect to a single ESM instance.
6. If you want the ability to view Command Center from Fusion, install ESM in Fusion
and then configure the ESM host in Fusion. For more information, see the
documentation for ArcSight Fusion.
This feature allows you to view Command Center from Fusion without having to
switch to the ESM host for Command Center. After you install ESM and configure
the host in Fusion, refresh the dashboard to display the Command Center menu in
Fusion. Click the menu to start Command Center. To go back to the Fusion
dashboard from Command Center, use the Fusion menu from the Dashboard menu
in Command Center. For information about limitations to Command Center
functionality when using it from Fusion, see the ESM Release Notes on the ESM
documentation page.
7. Configure Transformation Hub access.
For more information, see the applicable topic:
l Configuring Transformation Hub Access - Non-FIPS Mode
l Setting Up SSL Client-Side Authentication Between Transformation Hub and
ESM - Non-FIPS Mode
4. On the ArcSight Console host operating system, install the Arial Unicode MS font if
6. From the console Preferences menu (Edit > Preferences > Global Options > Font),
set Arial Unicode MS as the default font.
7. Set font preferences for your reports.
For more information, see the ArcSight Console User's Guide on the ESM
documentation page.
l QPI power management (the link between physical CPU sockets) is disabled.
l PCIe support is forced to Gen 2.
l C-states are disabled.
l Lower speed settings on the CPUs are disabled so that the CPUs constantly run
at high speed.
Note: You must specify the host name and not the IP address.
Transformation Hub can only accept IPv4 connections from ESM.
If the Kafka cluster is configured to use SASL/PLAIN authentication, ensure
that you specify the port configured in the cluster for the SASL_SSL listener.
b. Specify the topics in Transformation Hub from which you want to read. These
topics determine the data source.
For more information, see the Transformation Hub Administration Guide on the
Transformation Hub documentation page.
Note: You can specify up to 25 topics using a comma-separated list (for
example: topic1,topic2). ESM will read Avro-format events from any topic
where the name contains "avro" in lower case. For example, th-arcsight-
avro.
l Filter out desired events from Connectors so that ESM does not process them.
l Filter out ESM's correlation events that were forwarded (CEF events that the
Forwarding Connector sent to th-cef) so that ESM does not re-process its
own events.
If you do not configure filtering, ESM must consume from the th-arcsight-avro
topic. If you configure filtering, ESM must consume from the mf-event-avro-
esmfiltered topic. For information about configuring filters in Transformation
Hub, see the Transformation Hub documentation.
The wizard validates the connection to Transformation Hub. If there are any issues,
you will receive an error or warning message. If the wizard does not generate error
or warning messages and you are able to advance to the next screen, the
connection is valid.
4. Advance through the wizard and complete the configuration.
For more information about managersetup, see the Administrator's Guide on the
ESM documentation page.
5. As user arcsight, restart the ArcSight Manager:
/etc/init.d/arcsight_services start all
6. To verify that the connection to Transformation Hub is working, look for the following
line in server.log:
Transformation Hub service is initialized
Note: You must specify the Transformation Hub host name and not the IP address
when configuring Transformation Hub access.
Note: Before completing the steps below, verify whether the Transformation Hub
root certificate has previously been imported into ESM. If it has, you do not need to
re-import it.
l /tmp/intermediate.key.pem
l /tmp/ca.cert.pem
For example:
openssl x509 -req -CA /tmp/intermediate.cert.pem -CAkey
/tmp/intermediate.key.pem -in /tmp/ebkey.csr -out
/tmp/signedIntermediateEBkey.crt -days 3650 -CAcreateserial -sha256
You must specify all file locations with the full path.
10. Import the intermediate certificate from Transformation Hub into the ESM client
truststore:
For example:
/opt/arcsight/manager/bin/arcsight keytool -store clientcerts -alias
ebcaroot -importcert -file /tmp/intermediate.cert.pem
11. On the ESM server, run the following command to import the signed certificate (the -
out parameter in the above openssl command):
/opt/arcsight/manager/bin/arcsight keytool -store clientkeys -alias ebkey
-importcert -file <path to signed cert> -trustcacerts
For example:
/opt/arcsight/manager/bin/arcsight keytool -store clientkeys -alias ebkey
-importcert -file /tmp/signedIntermediateEBkey.crt -trustcacerts
12. To verify that the configuration is complete and that the connection to
Transformation Hub is valid, run managersetup and ensure that there are no errors.
13. Start the ArcSight Manager:
/etc/init.d/arcsight_services start all
a. Specify the host name and port information for the nodes in Transformation Hub.
Include the host and port information for all nodes and not just the master node.
Use a comma-separated list (for example: <host>:<port>,<host>:<port>).
Note: You must specify the host name and not the IP address.
Transformation Hub can only accept IPv4 connections from ESM.
If the Kafka cluster is configured to use SASL/PLAIN authentication, ensure
that you specify the port configured in the cluster for the SASL_SSL listener.
b. Specify the topics in Transformation Hub from which you want to read. These
topics determine the data source.
For more information, see the Transformation Hub Administration Guide on the
Transformation Hub documentation page.
Note: You can specify up to 25 topics using a comma-separated list (for
example: topic1,topic2). ESM will read Avro-format events from any topic
where the name contains "avro" in lower case. For example, th-arcsight-
avro.
The wizard uses this information to connect to the Schema Registry, read the
Avro schemas for the Avro topics that you specified, and verify that the topics
contain Avro events that are compatible with ESM. If ESM cannot retrieve the
Avro schemas for the Avro topics that you specified and compare them to the
schema that is packaged with ESM, or if incompatible schemas are detected, the
wizard generates warning messages but allows you to continue. In some cases,
you might already know that Transformation Hub will use a compatible schema
when the Manager is running.
If you choose to configure the Forwarding Connector to forward CEF events to
Transformation Hub and then configure Transformation Hub to filter Avro events,
use filters to ensure that ESM does not receive duplicate events. You might want
to use filters to accomplish the following:
l Filter out desired events from Connectors so that ESM does not process them
l Filter out ESM's correlation events that were forwarded (CEF events that the
Forwarding Connector sent to th-cef) so that ESM does not re-process its
own events.
If you do not configure filtering, ESM must consume from the th-arcsight-avro
topic. If you configure filtering, ESM must consume from the mf-event-avro-
esmfiltered topic. For information about configuring filters in Transformation
Hub, see the Transformation Hub documentation.
The wizard validates the connection to Transformation Hub. If there are any issues,
you will receive an error or warning message. If the wizard does not generate error
or warning messages and you are able to advance to the next screen, the
connection is valid.
6. Advance through the wizard and complete the configuration.
7. As user arcsight, restart the ArcSight Manager:
/etc/init.d/arcsight_services start manager
8. To verify that the connection to Transformation Hub is working, look for the following
line in server.log:
Transformation Hub service is initialized
Hub intermediate certificate into the ESM keystore. Before you begin this task, verify
whether the certificates have previously been imported into ESM. If they have, you do
not need to re-import them.
Transformation Hub maintains its own certificate authority (CA) to issue certificates for
individual nodes in the Transformation Hub cluster. ESM needs that CA certificate in its
truststore so that it will trust connections to Transformation Hub. For information about
obtaining the certificate, see the information about viewing and changing the certificate
authority in the Transformation Hub Deployment Guide on the Transformation Hub
documentation page. You might need to contact the Transformation Hub administrator to
obtain the CA certificate if you do not have sufficient privileges to access the
Transformation Hub cluster.
Note: You must specify the Transformation Hub host name and not the IP address
when configuring Transformation Hub access.
a. Specify the host name and port information for the nodes in Transformation Hub.
Include the host and port information for all nodes and not just the master node.
Use a comma-separated list (for example: <host>:<port>,<host>:<port>).
Note: You must specify the host name and not the IP address.
Transformation Hub can only accept IPv4 connections from ESM.
If the Kafka cluster is configured to use SASL/PLAIN authentication, ensure
that you specify the port configured in the cluster for the SASL_SSL listener.
b. Specify the topics in Transformation Hub from which you want to read. These
topics determine the data source.
For more information, see the Transformation Hub Administration Guide on the
Transformation Hub documentation page.
Note: You can export multiple events at the same time. Use the
export.external.ticketsystem.ui.events.max parameter in the
console.properties file to specify the maximum number. The default is 10, but you
can increase or decrease that setting to meet the needs of your environment. For
more information, see the ArcSight Console User's Guide on the ESM
documentation page.
display_name the display name for the field on the export form
The name must be less than 20 characters. You can use this field for localization.
show_in_ui the format for the field on the export form
Valid values are FULL_ROW , HALF_ROW , TEXT_AREA , and NONE . To hide a field,
specify NONE .
required whether the field is required
Valid values are true and false .
options format the field as a drop-down selection list with the specified values
There are two methods for formatting a field as a drop-down list. If the display
name and the value are the same, use the short form. If the display name and the
value are different, use the long form.
Example 1 (short form):
"options": [
"New",
"In progress",
"On hold",
"Resolved",
"Closed",
"Canceled",
]
In the short form example above, the label for the first selection in the drop-down
list is "New," and the actual value that is assigned is "New."
Example 2 (long form):
"options": [
{
"display": "Low",
"value": 3
},
{
"display": "Medium",
"value": 2
},
{
"display": "High",
"value": 1
}
]
In the long form example above, the label for the first selection in the drop-down
list is "Low," and the actual value that is assigned is "3."
Minimum
For the most current information on supported platforms and browsers, see the Support
Matrix on the ESM documentation page.
libXft-2.1.13-4.1.el6.i686.rpm
libXext-1.1-3.el6.x86_64.rpm
libXext-1.1-3.el6.i686.rpm
libXrender-0.9.7-2.el6.i686.rpm
gtk2-engines-2.18.4-5.el6.x86_64.rpm
gtk2-2.18.9-6.el6.x86_64.rpm
compat-libstdc++-33-3.2.3-69.el6.x86_64.rpm
compat-libstdc++-33-3.2.3-69.el6.i686.rpm
compat-db-4.6.21-15.el6.x86_64.rpm
compat-db-4.6.21-15.el6.i686.rpm
Note: On Linux:
Do not attempt to install the Console as the root user on Linux machines. If you do,
the installer prompts you to change ownership of certain directories after the
installation completes, so we recommend you perform all of the following steps as a
non-root user.
This issue does not apply to Windows machines.
Note: On Macintosh:
l Keep in mind that keytoolgui does not work on the Mac, so use keytool
commands when you need to manage the keystore or certificates. For more
information, see the Administrator's Guide on the ESM documentation page.
l Before you start the Console, make sure to set up a default printer to which to
print. if you open a channel, select some rows, right-click on them and select Print
Selected Rows from the resulting menu, the Console will crash if a default printer
is not set up.
Make sure that ESM is installed before installing the ArcSight Console.
1. To install ArcSight Console, run the self-extracting archive file that is appropriate for
your target platform. Go to the directory where the ArcSight Console Installer is
located. Note that nnnn stands for the build number.
Linux ArcSight-7.3.0.nnnn.0-Console-Linux.bin
Windows ArcSight-7.3.0.nnnn.0-Console-Win.exe
Macintosh ArcSight-7.3.0.nnnn.0-Console-MacOSX.zip
Linux /home/<user>
Windows C:\Users\<user>
Macintosh /Users/<user>
7. On the Choose Shortcut Folder panel, select where you would like to create a
shortcut for the Console and uninstall icons and click Next.
8. View the summary in the Pre-Installation Summary screen and click Install if you
are satisfied with the paths listed. If you want to make any changes, use the
Previous button to do so.
You can view the installation progress in the progress bar.
Note: On Windows, when the installer is configuring the Console (the Please Wait
panel), you might see a message that the TZData update was not successful. If you
get that message, click OK and continue. The Console installs successfully. Usually,
TZData is correctly updated regardless of this message. To make sure check that
the time stamp on the files in the <ARCSIGHT_HOME>\current\jre\lib\tzdb.dat
directory matches the date and time when you installed the Console. If the time
stamp is old or the files are missing, uninstall then re-install the Console.
Click Next.
4. Select Use direct connection option and click Next. You can set up a proxy server
and connect to the Manager using that server if you cannot connect to the Manager
directly.
If you select the Use proxy server option, you will be prompted to enter the proxy
server information Proxy Host Name and Proxy Host.
Enter the Proxy Host name and click Next.
5. The ArcSight Console configuration wizard prompts you to choose the type of client
authentication you want to use. The choices are:
l Password Based Authentication
l Password Based and SSL Client Based Authentication
Note: This option supports only client keystore for SSL based authentication.
Using PKCS#11 token as your SSL Client Based authentication method with
this option is not currently supported.
If you select Client Key Store, you will see a message reminding you to set up the
client certificate after the installation completes:
Manual setup of the client certificate will be required.
Do you wish to proceed?
After completing the Configuration Wizard, follow the procedure described in the
Administrator’s Guide on the ESM documentation page to set up the client certificate.
6. The ArcSight Console configuration wizard prompts you to specify the default web
browser you want to use to display reports, Knowledge Centered Support articles,
and other web page content. Specify the location of the executable for the web
browser that you want to use to display the Knowledge Centered Support articles
and other web pages launched from the ArcSight Console. Browse to and select the
Browser Executable and click Next.
7. Select whether this installation of the Console will be used by a single user or
multiple users.
You can choose from these options:
l This is a single system user installation. (Recommended)
Select this option when:
l There is only one system account on this machine that one or more Console
users will use to connect to the Console. For example, a system account,
admin, is used by Console users Joe, Jack, Jill, and Jane.
OR
l All Console users who will use this machine to connect to the Console have
their own user accounts on this machine AND these users have write
permission to the ArcSight Console’s \current directory.
Advantage: Logs for all Console users are written to one central location in
ArcSight Console’s \current\logs directory. The user preferences files
(denoted by username.ast) for all Console users are located centrally in
ArcSight Console’s \current.
Disadvantage: You cannot use this option if your security policy does not allow
all Console users to share a single system user account or all users to write to
the ArcSight Console’s \current directory.
l Multiple users will use this installation
Select this option when:
l All Console users who will be using this machine to connect to the Console
have their own user accounts on this machine
AND
Note: The location from which the Console accesses user preference files and to
which it writes logs depends on the option you select above. Therefore, if you
switch between these options after the initial configuration, any customized user
preferences may appear to be lost. For example, your Console is currently
configured with the “This is a single system user installation” option on a
Windows machine. Console user Joe’s customized preferences file is located in
the Console’s <ARCSIGHT_HOME>\current. Now, you run the consolesetup
command and change the setting to ‘Multiple system users will use this
installation.’ Next time the user Joe connects to the Console, the Console will
access Joe’s preference file from Document and
Settings\joe\.arcsight\console, which will contain the default preferences.
8. You have completed configuring your ArcSight Console. Click Finish on the final
panel to close the configuration wizard.
9. Click Done in the next screen.
10. For best results, install the ArcSight Console on an operating system that is set to
the same locale as the Manager. During startup, the ArcSight Console and the
Manager automatically detect and use the locale from the operating system.
However, if you are installing the Console on a Linux machine, edit the file
/home/arcsight/.bash_profile by adding the line:
export LANG=[language].UTF-8
If the Console encoding does not match and a user ID contains other characters, that
user should not save any custom shortcut key (hot key) schema. The user ID is not
properly encoded in the keymap .xml file and that makes it impossible to establish the
user’s shortcut schema during login. In that circumstance, all logins fail on that Console.
If you must use a non-UTF-8 encoding, and you must have user IDs with other
characters in them, custom shortcut keys are not supported on any Console where these
users would log in. In that situation, add the following property to the
console.properties file: console.ui.enable.shortcut.schema.persist=false. This
property prevents custom shortcut key schema changes or additions.
If the Console encoding does not match and a password contains other characters, that
user cannot log in from that Console, as the password hash won’t match the one created
on the Manager when the password was created.
On Unix:
./arcsight console
Depending on the client authentication method you selected when installing the
Console, you will see the following buttons on the login screen:
Password Based or SSL Client If you selected Client Keystore as your authentication method, you
Based Authentication will see
l Login (username and password)
l SSL Client Login
l Cancel
If you selected PKCS#11 Token, you will see
l PKCS#11 Login
l Login
l Cancel
SSL Client Only Authentication If you selected Client Keystore as your authentication method, you
will see
l The user ID and Password fields are grayed out (disabled) because
login authentication is by client keystore.
l Login
l Cancel
If you selected PKCS#11 Token, you will see
l PKCS#11 Login (SSL client authentication)
l Cancel
Note: Under certain circumstances, you might see a Login Failed message that, for
the cacerts folder, access is denied. Ensure that the arcsight user has write access
to the cacerts file. If this does not clear the problem, and you are on a Windows
system, the cause may be due to file locks on the cacerts file. These may be cleared
by rebooting your computer.
To start the Console, click Login. When you start the Console for the first time, after you
click Login, you will get a dialog asking you whether you want to trust the Manager’s
certificate. The prompt will show details specific to your settings. Click OK to trust the
Manager’s certificate. The certificate will be permanently stored in the Console’s
truststore and you will not see the prompt again the next time you log in.
To uninstall on Unix hosts, run the uninstaller program from either the directory where
you created the links while installing the product or if you had opted not to create links,
then run this from the /opt/arcsight/console/current/UninstallerData directory:
./"Uninstall ArcSight ESM Console Installation"
Alternatively, you can run one of the commands below from /home/arcsight (or
wherever you installed the shortcut links) directory.
./"Uninstall_ArcSight ESM Console_7.3.01.0"
or
./Uninstall\ Uninstall ArcSight ESM Console Installation
Uninstalling ESM
This section describes how to uninstall ESM in compact mode and in distributed
correlation mode.
If you are uninstalling ESM in distributed correlation mode, start with the persistor node.
After you successfully uninstall the persistor node, uninstall the remaining nodes.
Note: If you are not uninstalling the persistor node, first run the mbussetup utility to
stop and delete message bus data and message bus control instances from the
cluster. Also, run other setup utilities to delete other services from the node. Only run
remove_services.sh after you run the setup utilities.
2. As user arcsight, shut down any ArcSight processes that are still running:
a. Check for running ArcSight processes:
ps -elf | grep "/opt/arcsight"
b. Shut down any running processes:
kill -9 <process_id_number>
3. Run the uninstallation program from either the directory where you created the links
during installation or, if you did not create links, from the
/opt/arcsight/suite/UninstallerData directory:
./Uninstall_ArcSight_ESM_Suite_7.3.0.0
4. Verify that the /tmp and /opt/arcsight directories do not contain ESM-related files.
If the directories do contain ESM-related files, remove them:
2. As user arcsight, shut down any ArcSight processes that are still running:
a. Check for running ArcSight processes:
ps -elf | grep "/opt/arcsight"
b. Shut down any running processes:
kill -9 <process_id_number>
3. Run the uninstallation program from either the directory where you created the links
during installation or, if you did not create links, from the
/opt/arcsight/suite/UninstallerData directory:
./Uninstall_ArcSight_ESM_Suite_7.3.0.0
4. Verify that the /tmp and /opt/arcsight directories do not contain ESM-related files.
If the directories do contain ESM-related files, remove them:
a. As user arcsight, kill all ArcSight processes.
b. Delete remaining ESM-related directories and files from /opt/arcsight/ and
/tmp.
c. Delete any links that were created during installation.
5. After you uninstall ESM from the persistor node, repeat the process on the
remaining nodes. Ensure that you run remove_services.sh script on each
remaining node.
Important: When you re-run the configuration wizard, the wizard prompts you to
select whether to run ESM in compact or distributed mode.
Accept the default and continue through the wizard. You cannot change the ESM
mode after the initial installation. For information about changing ESM from compact
to distributed mode, see the Upgrade Guide on the ESM documentation page.
Conversion from distributed correlation mode to compact mode is not supported.
2. To run the First Boot Wizard, run the following command from the
/opt/arcsight/manager/bin directory as user arcsight:
In GUI mode:
./arcsight firstbootsetup -boxster -soft
In console mode:
./arcsight firstbootsetup -boxster -soft -i console
If you are running the First Boot Wizard in console mode, ensure that X-Window is
not running.
If you encounter a failure during the configuration stage, uninstall and reinstall ESM.
On an appliance, restore the appliance to the factory settings and start over. For
more information, see Restore Appliance Factory Settings.
Case 1 – If your installation became corrupted after running setup_services.sh, run the
following script as root user:
remove_services.sh
3. Follow the prompts on the wizard screens. See the Administrator’s Guide on the
ESM documentation page for information about specific screens.
4. Restart the Manager and services after the wizard completes by running:
/etc/init.d/arcsight_services start all
General Settings
Setting
CORR-Engine Settings
The following are some of the default values that have been pre-configured in the
CORR-Engine for you:
Manager Settings
Note: The Manager uses a self-signed certificate, which gets generated for you
when you configure the system using the First Boot Wizard. When you log into the
Console for the very first time you will be prompted to accept the Manager’s
certificate. You can either click Yes in that dialog or optionally import the Manager’s
certificate manually at a later time.
The following are some of the default values that have been pre-configured in the
Manager for you:
E-mail Notification Internal SMTP server. If you want to use an External SMTP server,
1. Stop the Manager by running the following command (as user arcsight):
/etc/init.d/arcsight_services stop manager
PKCS#11
PKCS#11, one of the PKCS standards, is an API defining a generic interface to
cryptographic tokens, software tokens and hardware tokens such as hardware security
modules and smartcards. A cryptographic token is a security device that is used to
authorize the use of the software or hardware, such as the smartcard, Common Access
Card (CAC), or 90Meter. The credentials of the authorized user are stored on the
hardware itself. ESM uses the PKCS#11 interface provided by the Network Security
Services (NSS) cryptographic module to communicate with it (the NSS cryptographic
module). The use of PKCS#11 is an example of client-side authentication.
You can use a PKCS#11 token regardless of the mode in which the ESM client is
running (FIPS 140-2 mode or default mode). However, you must configure the
ESM Manager to use “Password or SSL Authentication” when communicating with
clients, which you set up by running the Manager Configuration Wizard. For more
information about running the wizard, see the Administrator's Guide on the ESM
documentation page.
To use a PKCS#11 token, make sure that the token’s CA’s root certificate and the
certificate itself are imported into the ArcSight Manager’s truststore. In the ArcSight
Command Center, you can edit the External ID to match the common name on the
Admin tab.
e. Click on the Advanced tab and copy the contents in the Common name text box.
You will have to copy it by hand on to a sheet of paper. Using the context menu to
copy is not supported.
2. You can make the external ID match the CN in the ArcSight Console:
a. In the ArcSight Console, go to Resources > Users > [user group] and double-
click the user whose External ID you want to map to the CAC/90Meter card
common name. This opens the Inspect/Edit pane for that user.
b. Enter the CN you obtained in step 1 into the External User ID field and click
Apply.
keystore so that you can extract the root CA and any intermediate certificates from this
certificate.
If your certificate is issued by an intermediate CA, export not only the issuer (the
intermediate root CA) certificate, but also its top root CA certificate.
Option 1:
You can obtain the CAC/90Meter card’s certificate signer’s root CA certificate and any
intermediate signers’ certificates from the PKI administrator.
Option 2:
You can export the CAC/90Meter card’s certificate and any intermediate signers’
certificates from its keystore and then extract the root CA certificate from this certificate.
The steps to extract the CAC/90Meter card’s certificate from the card are:
1. Insert the CAC/90Meter card into the reader if not already inserted.
2. Start the ActivClient Software by clicking Start->ActivIdentity->ActivClient->User
Console.
6. Enter a name for the certificate in the File name box and navigate to a location on
your machine where you want to export it to and click Save.
7. When you see the success message, click OK.
8. Exit the ActivClient window.
5. The Certificate Export Wizard opens. Follow the prompts in the wizard screens and
accept all the defaults.
6. Enter a name for the CAC/90Meter root CA certificate file when prompted and
continue with the wizard by accepting all the defaults. The certificate is exported to
the same location as the CAC/90Meter certificate from which you extracted it.
7. Exit the Certificate dialog.
On 64-bit Windows:
C:\Program Files\ActivIdentity\ActivClient\acpkcs211.dll
(this is the 32-bit version of the ActivClient library)
Or, for ActivClient 7.1 and later:
C:\Program Files (x86)\HID Global\ActivIdentity\ActivClient\acpkcs211.dll
For 90Meter, always use the 32-bit library:
C:\Program Files\90meter\CACPIVMD\pkcs11\x86\LitPKCS11.dll
8. Complete the setup program by accepting all the defaults.
9. Restart any running ArcSight Consoles.
Note: When the Manager is installed in FIPS mode, all other components must also
be installed in FIPS mode.
If you are using FIPS mode, you cannot use the ArcSight Console on a Mac.
What is FIPS?
FIPS is a standard published by the National Institute of Standards and Technology
(NIST) and is used to accredit cryptographic modules in software components. A
cryptographic module is either a piece of hardware or a software or a combination of the
two which is used to implement cryptographic logic. The US Federal government
requires that all IT products dealing with Sensitive, but Unclassified (SBU) information
should meet the FIPS 140-2 standard. For FIPS compliance, ESM uses Bouncy Castle
Java cryptography as the cryptographic module.
Note: To be FIPS 140-2 compliant, you need to have all components configured in
the FIPS 140-2 mode. Even though an ArcSight Manager running in FIPS mode can
accept connections from non-FIPS mode components, if you opt for such a mixed
configuration, you will not be considered FIPS 140-2 compliant. We recommend that
you run all components in FIPS mode in order to be fully FIPS 140-2 compliant.
For FIPS compliance, ESM uses Bouncy Castle Java cryptography, which replaces
Mozilla Network Security Services (NSS). Bouncy Castle enables support of TLS 1.2 in
FIPS mode as well as in Default mode.
What is Suite B?
Suite B is a set of cryptographic algorithms put forth by the National Security Agency
(NSA) as part of the national cryptographic technology. While FIPS 140-2 supports
sensitive but unclassified information, FIPS with Suite B supports both unclassified
information and most classified to top secret information. In addition to AES, Suite B
includes cryptographic algorithms for hashing, digital signatures, and key exchange.
Note:
l Not all ESM versions support the FIPS with Suite B mode. See the Support Matrix
on the ESM documentation page for supported platforms for FIPS with Suite B
mode.
l When the Manager is installed in FIPS with Suite B compliant mode, all
components (ArcSight Console, SmartConnectors, and Logger, if applicable) must
be installed in FIPS with Suite B compliant mode, and the browser used to access
ESM must have TLS enabled (SSL protocols are not supported). For information
about configuring your browser to support TLS, see Completing Post-Installation
Tasks.
l Before installing ESM in FIPS with Suite B mode, keep in mind that pre-v4.0
Loggers will not be able to communicate with a FIPS-enabled ArcSight Manager.
For FIPS cipher suite information, see "Choosing between FIPS Mode or Default Mode"
on page 10.
TLS Support
The version of TLS you must implement depends on ESM/Logger peering, FIPS or non-
FIPS implementation, or use of standalone ESM configurations.
Note that:
l For compliance with the Payment Card Industry Data Security Standard (PCI DSS)
3.2, use TLS 1.2. This requires ESM peers to also be running ESM 6.11.0 or later,
and Logger peers to be running Logger 6.4 or later
l If you are running a standalone ESM implementation (no peering with other Managers
or Logger), use TLS 1.2 for FIPS or non-FIPS configurations.
l For ESM releases prior to ESM 6.11.0 and ESM 7.0.0.1, instances of ESM/Logger
that are peering must use TLS 1.0 or TLS 1.1 . Note that use of TLS 1.0 means these
systems are not PCI DSS 3.2 compliant.
l For ESM releases prior to ESM 6.11.0 and ESM 7.0.0.1, instances of ESM/Logger
that are standalone (non-peering) must use TLS 1.1.
l As of ESM 6.11.0, TLS 1.0, 1.1, and 1.2 are all supported for ESM in FIPS and default
(non-FIPS) modes. The SSL protocols are no longer supported.
Also, the following matrix clarifies TLS support for ESM 7.0.0.1 systems that are peering
with ESM or Logger:
*Note that the use of TLS 1.0 is does not comply with PCI DSS 3.2.
Note: The -file specifies the absolute path to the location where you want the
exported ArcSight Manager’s certificate to be placed. If you do not specify the
absolute path the file will be exported to the /opt/arcsight/manager directory by
default.
This will export the ManagerCert.cer file, the ArcSight Manager’s certificate, in the
/opt/arcsight/manager directory.
Many utility functions for the Manager (for example, arcsight archive or arcsight
managerinventory) are clients for the Manager. In FIPS mode, the Manager certificate is
not automatically imported. In order to use the utilities, import the certificate by running:
./arcsight keytool -importcert -store clientcerts -alias <hostname> -file
<path_to_manager_certificate.cer>
If you do not plan to use a PKCS#11 token with the ArcSight Console, select Client
Key Store, you will see a message reminding you to set up the client certificate after
the installation completes.
Alternatively, 90Meter is available at:
C:\Program Files\90meter\CACPIVMD\pkcs11\x86\litpkcs11.dll
After completing the Configuration Wizard, follow the procedure about setting up
client-side authentication in the Administrator’s Guide, available on the ESM
documentation page.
10. Follow the prompts in the next few wizard screens to complete the ArcSight Console
installation. For information about specific screens, see Installing the Console .
When you start the ArcSight Console, you should see a message saying that the
ArcSight Console is being started in FIPS mode.
Note: You cannot connect a default mode ArcSight Console to an ArcSight Manager
using FIPS Suite B.
SmartConnector documentation) select Enable FIPS Mode. Then continue until you see
the screen that offers you the choice to Continue or Exit. Select Exit and click Next. On
the next screen, click Done. You have to import the ArcSight Manager's certificate to
allow the connector to trust the ArcSight Manager before adding a new connector. See
the SmartConnector documentation for the specific SmartConnector you are installing
for details. Also, for details on FIPS mode settings for SmartConnectors, see
Configuring FIPS and Non-FIPS Compliant Modes for ESM and SmartConnectors,
available on Micro Focus Community .
To import the Manager's certificate, run the following command from the connector's
<ARCSIGHT_HOME>/current/bin directory:
Code Point
Each character value within a code set is referred to as a code point.
Code Set
Each character in a character set is assigned a unique value. Collectively, these values
are known as a code set.
Encoding
Encoding specifies how each character's code point is stored in memory or disk files.
Internationalization
Internationalization is the process of designing an application so that it can be adapted
to various languages and regions without further engineering changes.
Locale
Locale refers to the region where you are running ArcSight ESM. A locale can include
language, number format, date-time format, and other settings.
Localization
Localization is the process of adding language specific files to an internationalized
application so that the application supports that language.
Region Code
Currently, the region code standard that is used is ISO 3166-2. Previous versions of
ESM used the FIPS 10-4 region-code standard, which is no longer supported. As a
result, there is a change in the way region is represented in the geographical
information for IP Addresses. For example, ESM 6.9.1 and earlier would report 54 as the
region code for the IP address 176.62.127.255. In later releases, it is reported as OMS.
Unicode
Unicode is a universal character set that assigns a unique code point to characters from
all major languages of the world.
UTF-8
The version of Unicode supported by ESM.
ArcSight SmartConnectors
If a device is configured to use a language-specific encoding (not Unicode), the
Connector receiving events from this device should be configured to use the same
encoding as the device.
Change the encoding to match the log files' encoding only if the log files use an
encoding other than the default.
Connectors that do not specifically support an encoding specification use the default
encoding of the operating system on which they reside.
ar Arabic
be Belarusian
bg Bulgarian
ca Catalan
cs Czech
da Danish
de German
el Greek
en English
es Spanish
et Estonian
fi Finnish
fr French
hr Croatian
hu Hungarian
is Icelandic
it Italian
iw Hebrew
ja Japanese
ko Korean
lt Lithuanian
lv Latvian
mk Macedonian
nl Dutch
no Norwegian
pl Polish
pt Portuguese
ro Romanian
ru Russian
sk Slovak
sl Slovanian
sq Albanian
sv Swedish
th Thai
tr Turkish
uk Ukranian
vi Vietnamese
zh Chinese
CAUTION: Factory reset irrevocably deletes all event and configuration data.
Use the following procedure to restore the appliance to its original, factory settings:
1. Attach a keyboard, monitor, and mouse directly to the appliance and open an
operating system console session.
2. Reboot the appliance.
3. After a few minutes, when the Linux boot menu appears, use the down arrow key to
select System Restore <build_num> from the menu that appears, then press Enter.
System Restore automatically detects and displays the archive image.
The image is named following this pattern:
YYYY-MM-DD_<model>_<build_num>.ari
where YYYY-MM-DD is the date, <model> is the appliance model, and <build_
num> is the build number of the image being restored. If you encounter any issues
with the image, contact Customer Support.
4. Press F10 (VERIFY) to check the archive for damage before performing the restore.
5. Press F1 (AUTOSELECT) to automatically map the source image.
6. Press F2 (RESTORE) to begin the restore process.
7. When the restore process is completed, press F12 to reboot the appliance.