Previous Topic: Operating EnvironmentNext Topic: New and Changed Features in r12.6 SP2


Features

This section contains the following topics:

Log Collection

Log Storage

Standardized Presentation of Logs

Compliance Reporting

Policy Violation Alerting

Role-Based Access

Subscription Management

Support for IPv6 IP Addresses

Log Collection

The CA User Activity Reporting Module server can be set up to collect logs using one or more supported techniques. The techniques differ in the type and location of the component that listens for and collects the logs. These components are configured on agents.

The following illustration depicts a single-server system, where agent locations are indicated with a dark (green) circle.

Single-server illustration showing agent deployment

The numbers on the illustration refer to these steps:

  1. Configure the default agent on the CA User Activity Reporting Module to fetch events directly from the syslog sources you specify.
  2. Configure the agent installed on a Windows collection point to collect events from the Windows servers you specify and transmit them to the CA User Activity Reporting Module.
  3. Configure agents installed on hosts where event sources are running to collect the configured type of events and perform suppression.

Note: Traffic from the agent to the destination CA User Activity Reporting Module server is always encrypted.

Consider the following advantages of each log collection technique:

More information:

Planning Agent-Based Log Collection

Planning Agentless Log Collection

Planning Direct Log Collection

Log Storage

CA User Activity Reporting Module provides managed embedded log storage for recently archived databases. Events collected by agents from event sources go through a storage lifecycle as illustrated by the following diagram.

Event lifecycle illustration

The numbers on the illustration refer to these steps:

  1. New events collected by any technique are sent to the CA User Activity Reporting Module. The state of incoming events depends on the technique used to collect them. Incoming events must be refined before being inserted into the database.
  2. When the database of refined records reaches the configured size, all records are compressed into a database and saved with a unique name. Compressing log data reduces the cost of moving it and reduces the cost of storage. The compressed database can either be moved automatically based on auto-archive configuration or you can back it up and move it manually before it reaches the age configured for deletion. (Auto-archived databases are deleted from the source as soon as they are moved.)
  3. If you configure auto-archive to move the compressed databases to a remote server on a daily basis, you can move these backup to off-site long-term log storage at your convenience. Retaining backups of logs enables you to comply with the regulations that state that logs must be securely collected, centrally stored for a certain number of years, and available for review. (You can restore database from long-term storage at any time.)

More information:

Configuring the Event Log Store

Log Storage

Example: Auto-Archiving Across Three Servers

Standardized Presentation of Logs

Logs generated by applications, operating systems, and devices all use their own formats. CA User Activity Reporting Module refines the collected logs to standardize the way the data is reported. The standard format makes it easier for auditors and upper management to compare data collected from different sources. Technically, the CA Common Event Grammar (CEG) helps implement event normalization and classification.

The CEG provides several fields which are used to normalize various aspects of the event, including the following:

More information:

Mapping and Parsing

Suppression and Summarization

Normalizing and Categorizing Events

Compliance Reporting

CA User Activity Reporting Module lets you gather and process security-relevant data and turn it into reports suitable for internal or external auditors. You can interact with queries and reports for investigations. You can automate the reporting process by scheduling report jobs.

The system provides:

Its focus is on compliance reporting rather than real-time correlation of events and alerts. Regulations demand reporting that demonstrates compliance with industry-related controls. CA User Activity Reporting Module provides reports with the following tags for easy identification:

You can review predefined log reports or perform searches based on criteria you specify. New reports are provided with subscription updates.

Log view capabilities are supported by the following:

More information:

Queries and Reports

Policy Violation Alerting

CA User Activity Reporting Module lets you automate the sending of an alert when an event occurs that requires near-term attention. You can also monitor action alerts from CA User Activity Reporting Module at any time by specifying a time interval, such as from the last five minutes to the last 30 days. Alerts are automatically sent to an RSS feed that can be accessed from a web browser. Optionally, you can specify other destinations, including email addresses, a CA IT PAM process such as one that generates help desk tickets, and one or more SNMP trap destination IP addresses.

To help you get started, many predefined queries are available for scheduling as action alerts, as is. Examples include:

Some queries use keyed lists, where you supply the values used in the query. Some keyed lists include predefined values that you can supplement. Examples include default accounts and privileged groups. Other keyed lists, such as that for business critical resources, have no default values. After you configure them, alerts can be scheduled for predefined queries such as:

Keyed lists can be updated manually, by importing a file, or by running a CA IT PAM dynamic values process.

More information:

Action Alerts

Role-Based Access

CA User Activity Reporting Module provides three predefined application groups or roles. Administrators assign the following roles to users to specify their access rights to CA User Activity Reporting Module features:

The Auditor has access to few features. The Analyst has access to all Auditor features plus more. The Administrator has access to all features. You can define a custom role with associated policies that limit user access to resources in the way that suits your business needs.

Predefined roles - shown as subsets

Administrators can customize access to any resource by creating a custom application group with associated policies and assigning that application group, or role, to user accounts.

More information:

User Role Planning

Custom Roles and Policies

Subscription Management

The subscription module is the service that enables subscription updates from the CA Technologies Subscription Server to be automatically downloaded on a scheduled basis and distributed to CA User Activity Reporting Module servers. When a subscription update includes the module for agents, users initiate the deployment of these updates to agents. Subscription updates are updates to CA User Activity Reporting Module software components and operating system updates, patches, and content updates such as reports.

The following illustration depicts the simplest direct Internet connection scenario:

Simple subscription connection scenario

The numbers on the illustration refer to these steps:

  1. The CA User Activity Reporting Module server, as the default subscription server, contacts the CA Subscription server for updates and downloads any new available updates. The CA User Activity Reporting Module server creates a backup, then pushes content updates to the embedded component of the management server that stores content updates for all other CA User Activity Reporting Modules.
  2. The CA User Activity Reporting Module server, as a subscription client, self-installs the product and operating system updates it needs.

More information:

Subscription

Support for IPv6 IP Addresses

Previously, specification of IP Addresses was limited to IPv4 dotted decimal notation. With the current release, you can now specify IPv6 addresses in any IP Address field. IPv6 uses 128-bit IP addresses instead of the 32-bit addresses used by IPv4. Any policies that are based on the IP address version support IPv6 and IPv4.

You can use IPv4-mapped IPv6 addresses or the traditional IPv6 format. The IPv4-mapped IPv6 address format allows the IPv4 address of an IPv4 node to be represented as an IPv6 address as follows:

The following is a valid IPv6 address written in traditional format.

2001:0db8:85a3:08d3:1319:8a2e:0370:7334

If one or more four-digit groups are 0000, the zeros can be omitted and replaced with two colons(::). Leading zeros in a group can also be omitted. The following example IP addresses are equivalent:

If you are replacing IPv4 addresses with IPv4-mapped addresses, use the following examples as guidelines:

Alternatively, you can use the following compressed form: