Last updated on August 9, 2019
ArcSight Logger is one of products from Micro Focus SIEM platform. It streams real-time data and categorizes them into specific logs and easily integrates with Security Operations. As a result, organizations of any size can use this high performance log data repository to aid in faster forensic analysis of IT operations, application development, and cyber security issues, and to simultaneously address multiple regulations.
Summary
Analyzer
Search
Live Event Viewer
Dashboard
Reports
Configuration
YouTube Video for Web Gui OverView:
Search Example:
a.
sourceAddress=1.1.1.2 and name startswith “TCP” and name contains “DEN” | fields requestUrl
b.
((name CONTAINS “Search.cgi Command Injection Vulnerability” ) and destinationAddress = “14.47.251.171”) AND deviceInboundInterface CONTAINS “11”| fields sourceAddress,destinationAddress,deviceInboundInterface
c.
CEF “failed” | dedup name
Removes duplicate events from search results. That is, events that contain the same value in the specified field. The first matching event is kept, and the subsequent events with the same value in the specified field are removed.
It will search all logs which has ‘failed’ word then listed first found one in name field.
Some Useful SIEM Use Case Reports
Daily
1. Routers/Switches/Firewalls Commands and Configuration Changes
2. Successful Device Login Summary
3. Internal IPS Permitted Events
4. Internal IPS Denied Events
5. Firewall Denials
Weekly
1. Web Security Appliance URL Detections
2. Failed Device Login Details
3. Denied outbound connections by src-dst / src -ports
4. Remote VPN Authentication Report
5. IPS Top Attacks Weekly
6. IPS Top blocked events weekly
7. IPS Top allowed events weekly
8. Top WSA Websites
9. IronPort WSA Overview Weekly Report
10. IronPort ESA Overview Weekly Report
References: