Previous Topic: Windows Agent DeploymentNext Topic: Learning More about CA User Activity Reporting Module


Key Capabilities

This section contains the following topics:

Log Collection

Log Storage

Standardized Presentation of Logs

Compliance Reporting

Policy Violation Alerting

Entitlement Management

Role-Based Access

Subscription Management

Out-of-the-Box Content

Log Collection

The CA User Activity Reporting Module server can be set up to collect logs using one or more supported techniques. The techniques differ in the type and location of the component that listens for and collects the logs. These components are configured on agents.

The following illustration depicts a single-server system, where agent locations are indicated with a dark (green) circle.

Single-server illustration showing agent deployment

The numbers on the illustration refer to these steps:

  1. Configure the default agent on the CA User Activity Reporting Module to fetch events directly from the syslog sources you specify.
  2. Configure the agent installed on a Windows collection point to collect events from the Windows servers you specify and transmit them to the CA User Activity Reporting Module.
  3. Configure agents installed on hosts where event sources are running to collect the configured type of events and perform suppression.

Note: Traffic from the agent to the destination CA User Activity Reporting Module server is always encrypted.

Consider the following advantages of each log collection technique:

More information:

Planning Agent-Based Log Collection

Planning Agentless Log Collection

Planning Direct Log Collection

Log Storage

CA User Activity Reporting Module provides managed embedded log storage for recently archived databases. Events collected by agents from event sources go through a storage lifecycle as illustrated by the following diagram.

Event lifecycle illustration

The numbers on the illustration refer to these steps:

  1. New events collected by any technique are sent to the CA User Activity Reporting Module. The state of incoming events depends on the technique used to collect them. Incoming events must be refined before being inserted into the database.
  2. When the database of refined records reaches the configured size, all records are compressed into a database and saved with a unique name. Compressing log data reduces the cost of moving it and reduces the cost of storage. The compressed database can either be moved automatically based on auto-archive configuration or you can back it up and move it manually before it reaches the age configured for deletion. (Auto-archived databases are deleted from the source as soon as they are moved.)
  3. If you configure auto-archive to move the compressed databases to a remote server on a daily basis, you can move these backup to off-site long-term log storage at your convenience. Retaining backups of logs enables you to comply with the regulations that state that logs must be securely collected, centrally stored for a certain number of years, and available for review. (You can restore database from long-term storage at any time.)

More information:

Configuring the Event Log Store

Log Storage

Example: Auto-Archiving Across Three Servers

Standardized Presentation of Logs

Logs generated by applications, operating systems, and devices all use their own formats. CA User Activity Reporting Module refines the collected logs to standardize the way the data is reported. The standard format makes it easier for auditors and upper management to compare data collected from different sources. Technically, the CA Common Event Grammar (CEG) helps implement event normalization and classification.

The CEG provides several fields which are used to normalize various aspects of the event, including the following:

More information:

Mapping and Parsing

Suppression and Summarization

Normalizing and Categorizing Events

Compliance Reporting

CA User Activity Reporting Module lets you gather and process security-relevant data and turn it into reports suitable for internal or external auditors. You can interact with queries and reports for investigations. You can automate the reporting process by scheduling report jobs.

The system provides:

Its focus is on compliance reporting rather than real-time correlation of events and alerts. Regulations demand reporting that demonstrates compliance with industry-related controls. CA User Activity Reporting Module provides reports with the following tags for easy identification:

You can review predefined log reports or perform searches based on criteria you specify. New reports are provided with subscription updates.

Log view capabilities are supported by the following:

More information:

Queries and Reports

Policy Violation Alerting

CA User Activity Reporting Module lets you automate the sending of an alert when an event occurs that requires near-term attention. You can also monitor action alerts from CA User Activity Reporting Module at any time by specifying a time interval, such as from the last five minutes to the last 30 days. Alerts are automatically sent to an RSS feed that can be accessed from a web browser. Optionally, you can specify other destinations, including email addresses, a CA IT PAM process such as one that generates help desk tickets, and one or more SNMP trap destination IP addresses.

To help you get started, many predefined queries are available for scheduling as action alerts, as is. Examples include:

Some queries use keyed lists, where you supply the values used in the query. Some keyed lists include predefined values that you can supplement. Examples include default accounts and privileged groups. Other keyed lists, such as that for business critical resources, have no default values. After you configure them, alerts can be scheduled for predefined queries such as:

Keyed lists can be updated manually, by importing a file, or by running a CA IT PAM dynamic values process.

More information:

Action Alerts

Entitlement Management

When you configure the user store, you choose whether to use the default user store on the CA User Activity Reporting Module for setting up user accounts or reference an external user store where user accounts are already defined. The underlying database is exclusive to CA User Activity Reporting Module and does not use a commercial DBMS.

Supported external user stores include CA SiteMinder and LDAP directories such as Microsoft Active Directory, Sun One, and Novell eDirectory. If you reference an external user store, user account information is automatically loaded in read-only format as shown by the arrow in the following diagram. You define only application-specific details to selected accounts. No data is moved from the internal user store to the referenced external user store.

User store illustration

The numbers on the illustration refer to these steps:

  1. The internal user store performs entitlement management by authenticating the credentials supplied by users at login and authorizing users to access different features of the user interface based on the policies associated with the roles assigned to their user accounts. If the user name and password of the user attempting to log in have been loaded by an external user store, the credentials entered must match the loaded credentials.
  2. The external user store has no function other than to load its user accounts into the internal user store. These are loaded automatically when the reference to the user store is saved.

Note: See the CA User Activity Reporting Module Implementation Guide for details on configuring basic user access. See the CA User Activity Reporting Module Administration Guide for details on policies supporting predefined roles, creating user accounts, and assigning roles.

More information:

Configuring Basic Users and Access

User Accounts

Policies

Role-Based Access

CA User Activity Reporting Module provides three predefined application groups or roles. Administrators assign the following roles to users to specify their access rights to CA User Activity Reporting Module features:

The Auditor has access to few features. The Analyst has access to all Auditor features plus more. The Administrator has access to all features. You can define a custom role with associated policies that limit user access to resources in the way that suits your business needs.

Predefined roles - shown as subsets

Administrators can customize access to any resource by creating a custom application group with associated policies and assigning that application group, or role, to user accounts.

More information:

User Role Planning

Custom Roles and Policies

Subscription Management

The subscription module is the service that enables subscription updates from the CA Technologies Subscription Server to be automatically downloaded on a scheduled basis and distributed to CA User Activity Reporting Module servers. When a subscription update includes the module for agents, users initiate the deployment of these updates to agents. Subscription updates are updates to CA User Activity Reporting Module software components and operating system updates, patches, and content updates such as reports.

The following illustration depicts the simplest direct Internet connection scenario:

Simple subscription connection scenario

The numbers on the illustration refer to these steps:

  1. The CA User Activity Reporting Module server, as the default subscription server, contacts the CA Subscription server for updates and downloads any new available updates. The CA User Activity Reporting Module server creates a backup, then pushes content updates to the embedded component of the management server that stores content updates for all other CA User Activity Reporting Modules.
  2. The CA User Activity Reporting Module server, as a subscription client, self-installs the product and operating system updates it needs.

More information:

Subscription

Out-of-the-Box Content

CA User Activity Reporting Module includes predefined content that you can begin using as soon as you install and configure the product. The subscription process regularly adds new content and updates existing content.

Categories of predefined content include: