6.4 Analytics Guide For Cloud-136-335
6.4 Analytics Guide For Cloud-136-335
6.4 Analytics Guide For Cloud-136-335
NO
(Optional) Click the + Add TPI Source to add an additional TPI source to check.
1. Field to Check Against TPI: Click the drop-down and select an attribute.
2. TPI Source To Check: Click the drop-down and select a TPI source to check.
This function compares attributes in events against watch lists that were added
during the Watchlist creation.
1. Select the Field To Check Against Watchlist: Click the drop-down and select a
field to check against the Watchlist.
2. Select Watchlist: Click the drop-down and select a Watchlist.
3. Do you want to flag as Violation if it is not found in Watchlist?: Select one of
the following options:
l YES: Flags as a violation, even if the account name is not found on a watch-
list.
l NO: Does not flag as a violation if the account name is not found on a watch-
list.
This function compares attributes against an age (in days). Use this analytic to
check the age of a network domain. If the age of the domain is less than the
specified number of days, a violation will flag.
1. Select Field: Click the drop-down and select a field against which to check the
age. Example: Destination Network Domain.
2. Age (In Days): Enter a numeric value for the age in days. Example: 750
Custom Function
You can create a custom Additional Event Analytic function using a software
development package. For information about how to create Custom Functions,
contact SNYPR.
Email to Self
This function checks events for email recipients against the email sender using a
match threshold.
1. Select Field for Email Recipient: Click the drop-down and select a field for
email recipient.
2. Match Threshold (0 to 1): Specify a match threshold. The default is 0.8.
Match String
1. Select First Field to compare: Click the drop-down and select the first field to
compare.
2. Select Second Field to compare: Click the drop-down and select the second
field to compare.
3. Match Threshold (0 to 1): Enter a threshold. The default is 0.8.
Risk Boosters
Risk Boosters increase risk scores for a policy based on specified criteria.
Do the following, depending on the risk booster you select. You can select multiple
risk boosters for a policy.
Match Criteria
Match criteria increases or decreases the risk score of the policy when source criteria
matches a destination criteria.
To add (+) or delete (-) a condition, click + or - from the last column.
Watchlist Entities
Watchlist entities can increase or decrease the risk score if a specific attribute matches
a specified watchlist.
a. Check if Field: Click the drop-down and select a field to check against the
watchlist. Example: sourcename.
b. Selected above is: Select if the field to check should be Present or Not
Present.
c. In Watchlist: Click the drop-down and select the Watchlist. Example: Flight_
Risk_Users
Note: You must have added Watchlist data to use this risk booster function.
Click Get Entity Count to determine if any entities are found on the list.
After Hours Activity increases the risk score if events occur within a specified time
range.
a. After Hours Start Time: Enter the start time for after hours activity on a 24-
hour clock. Example: 2000 hours (8:00 PM.).
b. After Hours End Time: Enter the end time for after hours activity on a 24-hour
clock. Example: 0700 hours (7:00 AM.).
Lookup Table
Lookup Table increases the risk score if an event attribute matches a value in the
specified lookup table.
a. Lookup Table: Select an existing lookup table from the dropdown. Example:
CompetitorDomains.
b. Row Key: Specify the condition by which to specify the Row Key. Example: The
Destination Hostname must be equal to a value under the key in the lookup
table.
a. Condition: Select the condition the event attribute must meet compared to
the Row Key in the lookup table. Example: Equal To.
b. Select the Event Attribute to Check Against Lookup Table Field: Example:
Destination Hostname.
c. Value: Specify the condition that must be present to increase the risk. The Email
Recipient must be Equal To a value found in the Row Key.
a. Condition: Select the condition the event attribute must meet. Example:
Equal To.
b. Select the Event Attribute to Check Against Lookup Table Field: Example:
Email Recipient.
Active List
a. Rule to check against Activelist: Provide the attributes to check. For example,
to check if an entity and a filename involved in the event is found on the File_
downloaded active list, provide the following attributes: accountname+filename.
b. In Activelist: Click the drop-down and select the existing active list. Example:
File_downloaded.
c. Do you want to check if the rule provided above is: Select if the rule to check
should be Present or Not Present.
d. Increase Risk Score by Adjustment Factor: Provide a factor by which to
increase the risk score if the condition is present in the violation.
In this step, choose the risk scoring technique and set the criticality of the policy to
determine the risk score of the violated policy.
1. Complete the following information to choose the risk score for the violation
entity:
a. Do you want to save violations and calculate risk scores for this policy?:
Select one of the following options:
l YES: Violations for this policy are searchable in Spotter and will calculate
risk scores for violators.
l NO: Violations are not be searchable and risk scores will not be calculated.
Violator receives a constant score for the policy for the Check Window,
irrespective of the number of times they violate the policy.
Check Window
Risk score is calculated as the criticality of the policy x the number of times
the policy is violated within the Check Window, up to the (optional) Cap Risk
Score.
Check Window
Cap Risk Score is used to cap the risk score of an entity for a policy to a
specified limit. When set, the entity’s risk score will continue to aggregate for
each violation of the policy up to the cap limit.
Example: If Daily Cap Risk Score is specified as 10, the entity’s risk score for
a policy with a Criticality of Low that carries a risk score of 0.2 will aggregate
for each violation within the Check Window until it reaches 10:
If the entity violates the policy 49 times, the risk score is .
If the entity violates the policy 50, the risk score is .
If the entity violates the policy 100 times, the risk score remains .
c. Criticality: Use the slider to select the criticality of the policy. The criticality
affects the risk score for the user.
l None: 0.0
l Low: 0.2
l Medium: 0.6
l High: 1.0
l Custom: A value greater than 1.
d. Do you want to escalate this policy as a Threat?: Select one of the following
options:
l YES: Escalates the policy to a threat. Violations appear in the Top Threats
dashboard of the SCC.
l NO: View violations appear in the Top Violations dashboard in the SCC.
b. Grouping Attribute: Click the drop-down and select an attribute under which
to group the information in the summary.
c. Metadata Attributes: Click the drop-down and select up to three metadata
attributes to view within the grouping attribute in the summary.
d. Level 2 Attribute: Click the drop-down and select a high-level attribute to view
independent of the Grouping Attribute.
e. Level 2 Metadata Attributes: Click the drop-down and select up to three
metadata attributes to view within the Level 2 attribute in the summary.
2. (Optional) Set Enable Response Bot to YES to choose one or more features for the
Response Bot. See Response Bot in the SNYPRSecurity Analyst Guide for more
details about Smart Response.
When you enable this setting, there will be two additional sections that display:
a. Choose one or more features for Response Bot: Click the box next to the
event features from which to learn responses.
b. Choose one or more user attributes for Response Bot: Click the box next to
the user attributes from which to learn responses.
b. Daily Violation Threshold: Enter a value after which to stop flagging violations
for the policy. When a violations exceeds the threshold, it will be skipped for
scoring and saving.
c. Do you want to generate incident for policy violators?: Enable to generate an
incident for policy violators.
f. Add Policy Violators to Watchlist?: Click the drop-down and select which
policy violators to add to the watch list.
g. Add Policy Violators to Active list?: Click to add policy violators to an active
list. The following fields display when enabled:
1. Select Active list: Click the drop-down and select an active list.
l Rule in active list
Available buttons:
l Right arrow (>): Moves the currently selected attribute to the list being
built.
l Double right arrow (>>): Moves all the fixed set of attributes to the list
being built.
l Left arrow (<): Takes the currently selected attribute from the list being
built, and moves it back to the list with the fixed set of attributes.
l Double left arrow (<<): Takes all of the attributes from the list being
built, and moves them back to the list as the fixed set of attributes.
Tip:
You can select multiple attributes by doing either of the following:
l Contiguous attributes: Click and drag to select a group of attrib-
utes that are alongside each other in the list.
l Non-contiguous attributes: Hold down Ctrl, then click your
desired attributes to select attributes that aren't close to each
other in the list.
h. CEF Output/RSA Archer CEF Output/RSA Netwitness CEF Output: Select this
option if you want the output to be in CEF format. When enabled, the following
field displays:
2. (Optional) Click the Output Field Mapping button to configure the output.
You must configure your connections for CEF output in Connection Types
before you can export from SNYPR. For information about integrating RSA
Archer, see Configure RSA® Archer GRC Platform. For information about
integrating RSA Netwitness, see Configure RSA Netwitness.
4. Click Save.
a. Create Policy:Creates real time policies that flag single or multiple events that
result in a violation. It can also create behavior-based policies that perform
frequency and rarity checks to detect behavior-based or peer-based outliers.
a. Policy Name: Provide a unique name to describe the type of violation the policy
detects.
The criticality affects the risk score for the violation entity.
e. Violation Entity: Click the drop-down and select one of the following options:
l Users: Returns list of users violating policy. Uncorrelated accounts will be
ignored. A new option will appear.
l Access Account: Returns list of access accounts (both correlated and uncor-
related) violating policy.
g. Datasource: Click the search icon and select the datasource that this
Note: You can leave this blank for policies that do not run on any data
source.
a. Owner: Click search icon to select an owner for the policy. After you
select an owner, click Add Selected Owner towards the bottom of the screen.
This can be used to send notifications and manage cases.
b. Remediator: Click search icon to select a remediator for the policy. After
you select a remediator, click Add Selected Owner. This can be used to send
notifications and manage cases.
c. Stop when violations are greater than: Specify a number to put a limit on the
number of violations flagged by the policy. The default is 1,000,000.
5. Complete the following information in the Define Risk and Threat section:
a. Category: The category is displayed on the dashboard as a widget and risk will
be aggregated for policies with the same category. All violations of the same
category will be available in the widget. Do the following, depending on which
action you want to perform:
4. Click Save.
a. Threat Indicator Name: Enter a descriptive name for the threat indic-
ator.
b. Category: Select a threat kill chain stage from the drop-down:
l Recon Stage: Attackers gather information before an attack in an
attempt to find a vulnerable point in the network.
l Exfiltration Stage: Attackers can move freely around the network and
access or remove any sensitive data at will.
Each stage represents a step in the threat kill chain. To view violations by
threat stage on the Kill Chain Analysis, navigate to Menu > Security
Center > Security Command Center. See Security Command Center for
more information.
c. What actions should be taken when this policy is violated?: Enter the
steps to take to remediate this threat. Use HTML to control the way the
steps are displayed on the Violation Summary screen.
Example:
<ol>
<li>Review the Account Name and Domain Name fields, that identify
the user who cleared the log</li><br>
<li>Additional fields of interest: Security ID, Logon ID,
Subject</li><br>
<li>Login ID allows you to correlate backwards to the logon events as
well as with other events logged during the same logon
session</li><br>
<li><a href="supportticketsite.com">Submit a ticket to
investigate</a></li>
</ol>
d. Select to Associate Playbooks: Check the box next to each playbook you
want to associate with the threat indicator.
Setting Auto Play to YES will automatically launch play book tasks upon
violation. If Auto Play is set to NO, you can launch play book tasks
manually from the Violation summary screen when an incident occurs.
3. Click Save.
Note: For a description of each of these fields, refer to the Create a new
threat indicator section.
3. Click Save.
1. (Optional) Click Filter templates, then filter your criteria by checking one or
multiple boxes.
2. Click the check-mark next to the policy template you want to use.
The check-mark will turn green when you select a policy template.
a. Object: Objects are the database tables. Click the drop-down and select an
object from the policy template.
b. Attributes: Attributes are the respective columns for the database table. Click
the drop-down and select an attribute that is associated with the object.
c. (Optional) Function on Attribute: This column only displays if Enable attribute
functions is set to YES. Click the drop-down to select the functions to use on
the attribute.
(Optional) You can also select or search for an attribute value by doing the
following:
3. Click Add.
3. Click Add.
f. (Optional) Function On Value: This column only displays when Enable value
functions is set to YES. Click the drop-down and select the functions to use on
the value.
For more information about using functions, see Appendix A: Functions in the
Data Integration Guide.
Once steps 1.a.-1.h. are complete, the rule will translate into an HQL query with
the format: [Object.Attributes <condition> Value] (e.g. For the
following settings: Object = ”User”, Attributes = ”City”,
Condition=”Equal To”, Value=”dallas”, the resulting query is:
“users.city = ‘dallas’”
2. (Optional) Add a new group by clicking Add new group. This will create a second
group below your most recent group.
b. (Optional) Select Email Template: You can create a new email template, or you
can select an existing one. This field only displays when Send Notification is set
to YES.
c. Add Policy Violators to Watchlist?: Here, you can a new watch list or select an
existing watchlist. Do the following, depending on the option you select:
1. Complete the following information in the Create New Watch List pop-up:
c. Select Tenant: Choose the same tenant that you are using in your
import job to ensure the violators are sent to the correct Watchlist in the
correct tenant.
2. Click Save.
b. Remove Violators from Watchlist: This field only displays when the Rule to
remove Violators from Watchlist field is enabled. The following options are
available:
2. Click Save.
Manage Policies
To manage policies, navigate to Menu > Analytics > Policy Violations. By default, you
will be directed to the Policy Violations screen for all policies.
View Policies
You can view a list of available policies from the left pane, as seen in the following
image:
l By Datasource: Select an option to view only policies that run on the selected data-
source.
l By Datasource Type: Select an option to view only policies that run on the selec-
ted datasource type.
l By Functionality: Select an option to view policies that run on the selected func-
tionality type.
l By Threat: Select an option to view only policies with the selected threat indicator
(configured during Step 1 of creating a policy).
l By Criticality: Select an option to view only policies configured with the selected
criticality.
l By Threat Category: Select an option to view policies by kill chain stage.
l By Sandbox Category: Select any sandbox policy type to view.
l By Label: Select a label for the policy.
Enable Policies
By default, policies are enabled to run against imported data. To disable a policy, set
the Enabled? column to NO.
Edit Policies
To edit a policy, do the following:
Icon Description
Run job.
Re-run job.
Delete job.
Run Job
To run the policy on data imported in your environment, complete the following steps:
a. Job Name: By default, the text box will auto-populate with a name. If you want
to change the name, delete the default and enter your own unique job name.
b. (Optional) Job Description: Enter a job description.
c. (Optional) Enable Job Related Notifications: Select one of the following
options:
YES
Specify notification emails to be sent when a job has successfully run, failed, or
for when error messages have been received:
l On Success
l On Failure
l On Completed with Errors
For this example, the On Success section is used. Click the drop-down and
select one of the following options:
No
a. Do you want to run job Once?: Runs the job right now.
b. Do you want to schedule this job for future?: Specify a time for the import job
to run.
To view details about a previously run job, click the View Job icon . A window
appears with the job details.
Re-run Job
Delete Job
To delete a previously run job, click the Delete Job icon and click Yes to confirm
when the window appears.
To get started with your search, navigate to Menu > Security Center > Spotter. From
here, you can:
For more details about searching Spotter, see the Spotter section in the Security
Analyst Guide.
Sandbox
The Sandbox feature is an isolated environment for the content developers to create
and test policies and threat models, without affecting the risk score of entities in the
production environment. With the use of sandbox, the content team can test and
update policies without affecting production or SOC team.
You can view violations associated with the policy from the Security Command
Center. These policies will have a sandbox tag associated to it.
When the use case is tested and verified, the content developer can publish the policy
from sandbox to production. While publishing the policy to production, the content
team can choose to remove or push the risk score, violations, and incidents associated
with the policy in sandbox.
From here, you can delete, copy, or publish the policy in production.
Before you push the policy violation to production, a pop-up displays. From
here, decide to retain or publish the risk score, violations, and incidents
associated with the policy in sandbox to the production environment.
You can create policies in sandbox using the same steps as you use to create the
policy for production.
You can perform Push to production. This icon pushes the threat models to
From here, you can decide to retain or publish the risk score, violations, and
incidents associated with the threat model in sandbox to the production
environment.
You can create threat models in sandbox using the same steps as you use to create the
threat models for production.
l Rare domains
l User agents
l Domain generated algorithm (DGA)
l Patterns of malicious or robotic behavior that indicate a sophisticated cyber attack
l Beaconing behavior to possible malicious domains
l Beaconing behavior to all proxy traffic
Configure Threshold
The following table maps the number of days required for baselining to the threshold
value that should be specified in the Traffic Analyzer configuration:
Days Threshold
0 0.0
1 0.06
2 0.12
3 0.17
4 0.22
5 0.27
6 0.31
7 0.35
8 0.39
9 0.43
10 0.46
11 0.5
12 0.53
13 0.56
14 0.58
15 0.61
16 0.63
17 0.65
18 0.67
19 0.69
20 0.71
Days Threshold
21 0.73
22 0.75
25 0.79
26 0.8
27 0.81
28 0.83
29 0.84
30 0.85
31 0.86
32 0.86
33 0.87
34 0.88
The following table describes the key configuration parameters displayed in the
previous image:
Field Parameter
The following table describes the key configuration parameters displayed in the
previous image:
Field Parameter
Field Parameter
The following table describes the key configuration parameters displayed in the
previous image:
Field Parameter
Field Parameter
The following table describes the key configuration parameters displayed in the
previous image:
Field Parameter
When configuring the check from the UI, add condition to filter for domains falling
under the usual malware categories.
The following table describes the key configuration parameters displayed in the
previous image:
Field Parameter
Field Parameter
The pre-requisite for this check is to run a domain rarity analysis. It also excludes
white-listed domains present in Redis from analysis.
The following table describes the key configuration parameters displayed in the
previous image:
Field Parameters
Field Parameters
Violation Result
User details:
l EmployeeID: ozkang01
l NetworkID: 10.198.26.281
l miledaughter.ru
Domain Presence/Rarity
l s0ibspyxtb7by8.ru
l dmud3vysja6me4.ru
l cbbze5u2m65vg8.ru
l s0ibspyxtb7by8.ru
DGA
l 3uorg03dxfy.ru
Domains detected to be
DGA with successful l n46gd0nenr1az.ru
traffic.
l dmud3vysja6me4.ru
l cbbze5u2m65vg8.ru
Threat Modeler
Threat models are used to predict, detect, and prioritize investigation and response.
Threat models combine policies and threats to detect the related behavior across
multiple data sources that might otherwise go unnoticed. Threat models can also help
you predict what may happen next. For example, if two out of five things have
happened in a threat model (ransomware), it can predict the attack in progress as well
as help you anticipate future actions and suggest remediation steps.
SNYPR provides an isolated sandbox environment for the content team to create and
test policies and threat models, without affecting the risk score of entities in the
production environment. You can create your threat models and test them in Sandbox
before pushing it to production. For more information on sandbox, see Sandbox.
Threat Modeling
Threat Models provide a security design that evaluates the possible goals of the
adversary and the vulnerabilities that exist as a result of those goals. Threat modeling
is a process by which potential threats can be identified and prioritized. It typically
involves visual diagramming to map out the various threats, motivations, and attack
paths.
Stage Definition
Risk Scoring
Threat Models boost the risk score of policies using the following risk scoring
methods:
l Static Risk Scoring: Model Score=Weight. Sets a static score for all users based on
the weight selected. For example, if the weight specified is 10, all users will have a
risk score of 10.
l Exponential Scoring: Model Score=(weight^(number of stages). Uses predictive
modeling to calculate a risk score based on the weight to the power of the number
of stages. For Example, if the predictive scoring factor specified is 5 and the number
of stages in the threat model is 3, users will have a risk score of 5^5.
While creating stages in the Threat Model, the risk can be calculated for a user if the
user violates any one of the policies. Similarly, the risk can be calculated for the user if
the user violates all the policies.
Note: Categories are applied to policies during Step 1: Enter Policy Details.
Using HTML, enter the steps to take to remediate this threat. HTML controls
the appearance of the steps that are displayed on the Violation Summary
screen.
Example:
<ol>
<li>Check the initial level privileges</li><br>
<li>Contact ITOps Administrator to get more insight into his
privileges</li><br>
<li><a href="supportticketsite.com">Submit a ticket to investigate
further</a></li>
</ol>
g. Risk Scoring: Threat Models boost the risk score of policies using Static Risk
Scoring or Exponential Scoring. Choose one of the following options for Risk
Scoring section:
This option sets a static score for all entities. For example, if the Static Score
specified is 10, all entities who violate the threat model will have a risk score of
10.
1. Provide a Static Score for the policy. Threat Model Score = Weight.
Exponential Scoring
This option uses predictive modeling to calculate a risk score based on the
scoring factor to the power of the number of stages. For example, if the scoring
factor specified is 5 and the number of stages in the threat model is 3, users will
have a risk score of 5^3.
1. Use the slider or enter a weight exponent between 1 and 10. Threat Model
Score=(weight^(number of stages)).
h. Category: Select an existing category or you can click Create New Policy
Category.
You can add Watch Lists in threat models to add flexibility in threat modeling and
eliminate noise from low-risk policy violations. When a watchlist is included in a
threat model, it is applicable to all stages of the threat model.
l Add Stage: Click to add stages to group policies together that define a
threat.
l Enter Stage Name: Provide a unique name for the stage.
l Any One/All: Select to specify if risk will increase if they violate Any One of
the policies in the stage, or if they must violate All policies in the stage to
increase risk score.
For All: Specify if the policies in the stage must be violated in sequential
order.
Note: Stages are mandatory by default, but you can toggle this off if you
want the threat model to flag violations even if the policies in the stage
are not violated.
d. Drag and drop policies from Available Policies to add them to each stage.
5. Click Save.
To enable a threat model, navigate to the Enable column on the Threat Modeler
screen and set Enabled? to YES.
Note: Threat indicator is applied to policies during Step 1: Enter Policy Details.
Using HTML, enter the steps to take to remediate this threat. HTML controls
the appearance of the steps that are displayed on the Violation Summary
screen.
Example:
<ol>
<li>Check the initial level privileges</li><br>
<li>Contact ITOps Administrator to get more insight into his
privileges</li><br>
<li><a href="supportticketsite.com">Submit a ticket to investigate
further</a></li>
</ol>
g. Risk Scoring: Threat Models boost the risk score of policies using Static Risk
Scoring or Exponential Scoring. Choose one of the following options for Risk
Scoring section:
This option sets a static score for all entities. For example, if the Static Score
specified is 10, all entities who violate the threat model will have a risk score of
10.
1. Provide a Static Score for the policy. Threat Model Score = Weight.
Exponential Scoring
This option uses predictive modeling to calculate a risk score based on the
scoring factor to the power of the number of stages. For example, if the scoring
factor specified is 5 and the number of stages in the threat model is 3, users will
have a risk score of 5^3.
1. Use the slider or enter a weight exponent between 1 and 10. Threat Model
Score=(weight^(number of stages)).
h. Category: Select an existing category or you can click Create New Policy
Category.
You can add Watch Lists in threat models to add flexibility in threat modeling and
eliminate noise from low-risk policy violations. When a watchlist is included in a
threat model, it is applicable to all stages of the threat model.
a. Add Watchlist Filters: Enable to add watchlist filters to the threat model.
b. Select Policy Category: Choose an option from the drop-down to filter avail-
able policies.
c. Define Stages: In this section, you can choose from the following options:
l Add Stage: Click to add stages to group policies together that define a
threat.
l Enter Stage Name: Provide a unique name for the stage.
l Any One/All: Select to specify if risk will increase if they violate Any One of
the policies in the stage, or if they must violate All policies in the stage to
increase risk score.
For All: Specify if the policies in the stage must be violated in Sequential
Order.
Note: Stages are mandatory by default, but you can toggle this off if you
want the threat model to flag violations even if the policies in the stage
are not violated.
d. Drag and drop threats from the Available Threats section into each stage.
l Edit Sequence: Click to rearrange stages by dragging them into the pre-
ferred order.
l Save Sequence to save the new sequence.
5. View the threat model from the Threat Modeler main screen.
a. Enabled?: Toggle to Yes to enable the threat model. The default setting is Yes
6. Click Save.
Content Management
Content Management allows detection engineers to seamlessly deploy content
(policies and parsers) in their environment. The Securonix content team has a content
library where they upload new and modified content to share with customers.
Customers have their own local content repository in the file system located at
"$SECURONIX_HOME/content/data". Content administrators or detection engineers
can efficiently download new and updated content, and deploy it in their SNYPR
application. The following types of content can be deployed using Content
Management:
l Content Update: Allows you to download and deploy content from the Securonix
content library to the local repository. The Securonix content library stores new
content and updates to the existing content.
l Commit Content: Allows you to version control your content by committing it to
the Custom content library. The Custom content library is unique for each
customer, and stores content created and modified by a customer.
Prerequisites
The following prerequisites are required to access Content Management:
Note: If these prerequisites are not configured, you cannot access Content
Management.
1. The Securonix content library access details must be configured at Menu > Admin
> Settings > Content Library.
Note: For more information, refer to the Content Library section of the
Administration guide.
Deploy Content
When you download content using Content Management, the local content folder is
updated. If any new content is available, it is displayed in the content category. You
have to deploy the content before you can use it in SNYPR.
You can download and deploy the content from the Securonix content library using
Menu > Admin > Content Management. The Content Update screen is displayed.
Downloading Content
To download the content from the Securonix content library, perform the following:
1. Navigate to Menu > Admin > Content Management. The Content Management
screen is displayed.
2. Click Check for Updates. If there are any updated or new content, the Category
displays the total number of updates and new content.
Deploying Content
You can deploy content when it is downloaded. The Content Update screen displays a
list of updated and new content available at the Securonix content library.
Parser
The Content Update screen for Parsers displays a list of updated and new parsers
available at the Securonix content library. It lists the parser details such as name,
resource group for the parser, tenant name, resource type, vendor, functionality,
ownership, the current version of the parsers deployed at production, and the new
version available at the Securonix content library. You have an option to deploy all
updates or choose a specific parser and resource group for deployment.
When you are add or edit parsers from the Activity Import screen, SNYPR application
decides if the parser is saved as an existing parser or a new parser. The following list
explains a few scenarios:
Note: For actions filters with same name, the system checks whether the filter is
enabled or disabled in Custom content library, and ensure that the status does not
change after the parser deployment. For example, if a customer has disabled any
enrichment, after the parser deployment, the enrichment remains disabled.
To deploy parsers:
1. Navigate to Menu > Admin > Content Management. The Content Management
screen is displayed.
2. Click Check for Updates. If there are any updated or new content, the Category
displays the total number of updates and new content.
3. Select the updates that you want to deploy. You can either select all or any to
deploy.
l If a line filter is modified (i.e., enabled, disabled, updated, added, or removed), save
the parser as a new parser.
l If any action filter is enabled or disabled in the original parser provided by
Securonix, change the existing parser.
l If any action filter is updated or removed in the original parser provided by
Securonix, save the parser as a new parser.
l If a new action filter is added to the original parser provided by Securonix, save the
parser as a new parser if the action filter has any of the following:
l Event Severity
l Event Category
l New Derived Attribute
l If a new action filter is added to the original parser provided by Securonix, change
the existing parser if the action filter has any of the following:
l Enable Drop events toggle
l Enrich from TPI
l Persona Builder
l Populate Activelist
l Geolocate Attributes
l Enrich from Watchlist
l Enrich from Lookuptable
l Enrich from Assetmetadata
Data Dictionary
The Content Update screen for Data Dictionary displays a list of updated and new
data dictionary available at the Securonix content library. It lists data dictionary name,
the current version, and the new version.
When you update Data Dictionary content, only entries with ownership as
SecuronixCreated and SecuronixChanged are updated. Any entry with the
ownership as ClientChanged is client defined and will not be modified using the
Content Management feature.
1. Navigate to Menu > Admin > Content Management. The Content Management
screen is displayed.
2. Click Check for Updates. If there are any updated or new content, the Category
displays the total number of updates and new content.
3. Select the updates that you want to deploy. You can either select all or any to
deploy.
Lookup
The Content Update screen for Lookup displays a list of lookup tables that are new or
updated. It lists the lookup table name, the current version of the lookup table
deployed at production, and the new version downloaded from the Securonix content
library.
1. Navigate to Menu > Admin > Content Management. The Content Management
screen is displayed.
2. Click Check for Updates. If there are any updated or new content, the Category
displays the total number of updates and new content.
3. Select the updates that you want to deploy. You can either select all or any to
deploy.
TPI
The Content Update screen for TPI displays a list of TPIs that are new or updated. It
lists the TPI name, the current version of the TPI deployed at production, and the new
version downloaded from the Securonix content library.
1. Navigate to Menu > Admin > Content Management. The Content Management
screen is displayed.
2. Click Check for Updates. If there are any updated or new content, the Category
displays the total number of updates and new content.
3. Select the updates that you want to deploy. You can either select all or any to
deploy.
Active List
The Content Update screen for Active List displays a list of active lists that are new or
updated. It lists the active list name, the current version of the active list deployed at
production, and the new version downloaded from the Securonix content library.
1. Navigate to Menu > Admin > Content Management. The Content Management
screen is displayed.
2. Click Check for Updates. If there are any updated or new content, the Category
displays the total number of updates and new content.
3. Select the updates that you want to deploy. You can either select all or any to
deploy.
Workflow
The Content Update screen for Workflow displays a list of workflow names that are
new or updated. It lists the workflow name, the current version of the workflow
deployed at production, and the new version downloaded from the Securonix content
library.
1. Navigate to Menu > Admin > Content Management. The Content Management
screen is displayed.
2. Click Check for Updates. If there are any updated or new content, the Category
displays the total number of updates and new content.
3. Select the updates that you want to deploy. You can either select all or any to
deploy.
Policy
The Content Update screen for Policies displays a list of functionalities whose policies
are updated or added. It lists the functionality, policy name, policy's signature, policy
status, ownership, current version of the policy deployed at production and the new
version downloaded from the Securonix content library.
When you deploy a policy, you are either adding a new policy, updating the existing
Securonix policy, or updating the existing Securonix policy modified by the customer.
When you update the Securonix policy that is modified by the customer, one of the
following can occur:
l The policy is updated if the customer has only made minor changes to the policy
such as updates to behavior feature attributes.
l The customer policy is not updated and a new policy is created with the same name
in the disabled state. This occurs when the customer has made major changes to
the policy such as:
Updates Description
Tier-2
Adding any tier-2 checks such as lookup, TPI, and watchlist.
Checks
Filter
Adding or updating a filter criteria.
Criteria
1. Navigate to Menu > Admin > Content Management. The Content Management
screen is displayed.
2. Click Check for Updates. If there are any updated or new content, the Category
displays the total number of updates and new content.
3. Select updates that you want to deploy. You can either select all or any to deploy.
4. Click Deploy to deploy selected policies. The Deploy Policies As Sandbox window
is displayed.
Note: When you deploy policies with multiple functionalities together, policies
can not be deployed in the Sandbox category. To deploy policies in Sandbox,
you have to deploy policies for each functionality separately.
5. Click Deploy.
6. Click New Content to deploy new policy.
7. Select a new policy and click Deploy.
Threat Model
The Content Update screen for Threat Model displays a list of threat models tables
that are new or updated. It lists the threat model name, violator type, the current
version of the lookup table deployed at production, and the new version downloaded
from the Securonix content library.
1. Navigate to Menu > Admin > Content Management. The Content Management
screen is displayed.
2. Click Check for Updates. If there are any updated or new content, the Category
displays the total number of updates and new content.
3. Select the updates that you want to deploy. You can either select all or any to
deploy.
Commit Content
When you commit your content, all information required for selected policies and
parsers are committed. However, you can decide if you want to commit any supporting
information or not. The supporting information for policies are tier-2 checks and
workflow, and for parser is data dictionary.
Note: Only user with role as ROLE_COMMIT_CONTENT can commit content from
Content Management.
Committing Policy
To commit policies to the Securonix content library, perform the following:
1. Navigate to Menu > Admin > Content Management. The Content Management
screen is displayed.
5. Select Export & Commit. The Commit Policy screen displays the list of files that
will be committed and an option to select supporting content.
6. Enter the commit message and select any supporting content that you want to
commit.
7. Click Commit. The policy is committed. Similarly, you can commit parsers.
Note: You can also commit policy updates from Menu > Analytics > Policy
Violations.
Appendix A: Conditions
Conditions contain a set of rules. The rules decide which data will be marked as a
violation. Conditions are configured for policies during Step 2: Provide Conditions.
1. Click Add Group for each condition group you would like to add.
2. Click +, then select an option from the drop-down list. The following options are
available:
Add Rule
l Check Against Named List: Select an option to check against the selected
event attribute.
Click + > Add Nested Group to add rules within each group.
Remove Group
This option deletes a Group, along with all the rules within the Group.
Operators
You can use operators in place of attributes or values.
3. Select an operator from the Available Operators list. The following operators are
available:
4. Click Epoch Time Long 1 for the operator you selected in the previous step.
This behavior-based policy detects when a user uploads an abnormally high volume of
data compared to their normal behavior. Behavior-based policies build a baseline for
the volume of bytes out by transaction on web proxy for the account.
The following example is the abnormal amount of data uploads to external storage
sites policy.
1. Ensure the upload activity was not blocked by the perimeter devices.
2. Review the destinationhost/destination address to see if the domain is
an approved domain to which data can be uploaded to.
3. Leverage network DLP or network products to additionally review the
files that were uploaded to the site to detect if the user egressed con-
fidential data.
14. Complete the following steps to add filter conditions for volume of uploads:
Note: The following values represent default values and are fully customizable
to suit the needs of your organization.
24. Toggle to YES for Do you want to save violations and calculate risk scores for
this policy?.
29. Complete the following information to appear on the Violation Summary screen:
Rule-Based Policy
This rule-based policy checks proxy traffic to detect uploads to sites categorized as
personal sites that could indicate malicious insider or cyber data exfiltration.
1. Ensure the upload activity was not blocked by the perimeter devices.
2. Review the destinationhost/destination address to see if the domain is
an approved domain to which data can be uploaded to.
3. Leverage network DLP or network products to additionally review the
files that were uploaded to the site to detect if the user egressed con-
fidential data.
8. Complete the following steps to add filter conditions for volume of uploads:
Note: The following values represent default values and are fully customizable
to suit the needs of your organization.
18. Toggle to YES for Do you want to save violations and calculate risk scores for
this policy?.
23. Complete the following information to appear on the Violation Summary screen:
Directive-based Policy
6. Complete the following information in the Define Risk and Threat section:
c. Click Edit Killchain Stage and Response Actions to add Remediation Steps or
Playbooks for this policy.
OR
Note: The following values represent default values and are fully customizable
to suit the needs of your organization.
18. Toggle to YES for Do you want to save violations and calculate risk scores for
this policy?.
23. Complete the following information to appear on the Violation Summary screen:
Rule-based Policy
This rule-based policy uses geolocation data and advanced analytics to compute land
speed to flag an activity account that performs multiple successful login attempts from
different geographic locations within unusual or impossible periods of time. This
indicates account misuse.
Landspeed Violation
Pr e r e quisite s
1. Import Geolocation data from MaxMind. For more information about importing
from MaxMind, see Import Geolocation.
2. Click +.
De fine Policy
Provide Conditions
What do y ou want to de te ct?
Filte r Conditions
5. Click +.
6. Click Add Rule.
Land S pe e d De te ction
Note: The following values represent default values and are fully customizable
to suit the needs of your organization.
10. Toggle to YES for Do you want to save violations and calculate risk scores for
this policy?.
a. Grouping Attribute: Source.
b. Metadata Attributes: None.
c. Level 2 Attribute: Destination.
d. Level 2 Metadata Attributes: None.
19. Complete the following information to appear on the Violation Summary screen
This traffic analyzer policy detects when an account visits a domain that has not been
visited by other members of the organization. This indicates a possible malicious
domain.
a. Category: Malware.
1. Look to see if there was a spike in web traffic to domains that are rare
across the organization
2. If the domains are not authorized or allowed domains, leverage endpoint
IDS/IPS logs to see if there are any alerts reported at the user's endpoint.
3. Look for other anomalies on process/service execution on the user's end-
point for any malicious presence.
4. Check for the data or the amount of data exchanged to these sites to
ensure the user did not leverage these domains to exfiltrate sensitive
data.
13. Toggle to YES for Filter Domain Visit Pattern and Common Domains.
14. Select Domain Attribute: Destination Hostname.
Note: The following values represent default values and are fully customizable
to suit the needs of your organization.
16. Toggle to YES for Do you want to save violations and calculate risk scores for
this policy?.
21. Complete the following information to appear on the Violation Summary screen:
b. (Optional) Click the policy name from Available Violations or the datasource
from Available Datasources to view events.
Identity/Access Policies
Select Create Identity Policy to create policies using a built-in template. Templates
store the underlying joins to facilitate the execution of a policy.
Access Policy
Note: This value will differ based on your environment and can be fully
customized.
a. Category:
l Account Misuse
l Rogue Access Privileges
Remediation Steps
14. Click Add New Group to add a group with the following rules:
16. Click Save & Next to proceed to Choose Action for Violation Results.
Identity Policy
This Identity Policy flags employees/users with upcoming terminations within the next
30 days. This policy is applied to user data.
d. Criticality: Low.
Note: This value will differ based on your environment and can be fully
customized.
14. Click Save & Next to proceed to Choose Action for Violation Results.
b. (Optional) Click the policy name from Available Violations or the datasource
18. Navigate to Menu > Security Center > Security Command Center to view policy
violations.
Note: Policies will only appear in the Security Command Center if violations
exist for those policies.