- play_arrow Event Collection from Third-party Devices
- play_arrow Introduction to Log Source Management
- Introduction to Log Source Management
- Adding a Log Source
- Adding a Log Source by using the Log Sources Icon
- Adding Bulk Log Sources
- Adding Bulk Log Source by using the Log Sources Icon
- Editing Bulk Log Sources
- Editing Bulk Log Sources by using the Log Sources icon
- Adding a Log Source Parsing Order
- Testing Log Sources
- Log Source Groups
- play_arrow Gateway Log Source
- play_arrow Log Source Extensions
- play_arrow Manage Log Source Extensions
- play_arrow Threat Use Cases by Log Source Type
- play_arrow Troubleshooting DSMs
- play_arrow Protocols
- play_arrow Universal Cloud REST API Protocol
- play_arrow Protocols that Support Certificate Management
- play_arrow 3Com Switch 8800
- play_arrow AhnLab Policy Center
- play_arrow Akamai KONA
- Akamai Kona
- Configure an Akamai Kona Log Source by using the HTTP Receiver Protocol
- Configure an Akamai Kona Log Source by using the Akamai Kona REST API Protocol
- Configuring Akamai Kona to Communicate with JSA
- Creating an Event Map for Akamai Kona Events
- Modifying the Event Map for Akamai Kona
- Akamai Kona Sample Event Messages
- play_arrow Amazon AWS Application Load Balancer Access Logs
- Amazon AWS Application Load Balancer Access Logs
- Amazon AWS Application Load Balancer Access Logs DSM Specifications
- Publishing Flow Logs to an S3 Bucket
- Create an SQS Queue and Configure S3 ObjectCreated Notifications
- Configuring Security Credentials for your AWS User Account
- Amazon AWS S3 REST API Log Source Parameters for Amazon AWS Application Load Balancer Access Logs
- Amazon AWS Application Load Balancer Access Logs Sample Event Message
- play_arrow Amazon AWS CloudTrail
- play_arrow Amazon AWS Elastic Kubernetes Service
- Amazon AWS Elastic Kubernetes Service
- Amazon AWS Elastic Kubernetes Service DSM Specifications
- Configuring Amazon Elastic Kubernetes Service to Communicate with JSA
- Configuring Security Credentials for your AWS User Account
- Amazon Web Services Log Source Parameters for Amazon AWS Elastic Kubernetes Service
- Amazon AWS Elastic Kubernetes Service Sample Event Messages
- play_arrow Amazon AWS Network Firewall
- Amazon AWS Network Firewall
- Amazon AWS Network Firewall DSM Specifications
- Create an SQS Queue and Configure S3 ObjectCreated Notifications
- Configuring Security Credentials for Your AWS User Account
- Amazon AWS S3 REST API Log Source Parameters for Amazon AWS Network Firewall
- AWS Network Firewall Sample Event Messages
- play_arrow Amazon AWS Route 53
- Amazon AWS Route 53
- Amazon AWS Route 53 DSM Specifications
- Configuring an Amazon AWS Route 53 Log Source by using the Amazon Web Services Protocol and CloudWatch Logs
- Configuring an Amazon AWS Route 53 Log Source by using an S3 Bucket with an SQS Queue
- Configuring an Amazon AWS Route 53 Log Source by using an S3 Bucket with a Directory Prefix
- Amazon AWS Route 53 Sample Event Messages
- play_arrow Amazon AWS Security Hub
- play_arrow Amazon AWS WAF
- play_arrow Amazon GuardDuty
- Amazon GuardDuty
- Configuring an Amazon GuardDuty Log Source by using the Amazon Web Services Protocol
- Creating an EventBridge Rule for Sending Events
- Creating an Identity and Access (IAM) User in the AWS Management Console
- Configuring an Amazon GuardDuty Log Source by using the Amazon AWS S3 REST API Protocol
- Configuring Amazon GuardDuty to Forward Events to an AWS S3 Bucket
- Amazon GuardDuty Sample Event Messages
- play_arrow Ambiron TrustWave IpAngel
- play_arrow Amazon VPC Flow Logs
- play_arrow APC UPS
- play_arrow Apache HTTP Server
- play_arrow Apple Mac OS X
- play_arrow Application Security DbProtect
- play_arrow Arbor Networks
- play_arrow Arpeggio SIFT-IT
- play_arrow Array Networks SSL VPN
- play_arrow Aruba Networks
- play_arrow Avaya VPN Gateway
- play_arrow BalaBit IT Security
- play_arrow Barracuda
- play_arrow BeyondTrust PowerBroker
- play_arrow BlueCat Networks Adonis
- play_arrow Blue Coat SG
- Blue Coat
- Blue Coat SG
- Creating a Custom Event Format for Blue Coat SG
- Creating a Log Facility
- Enabling Access Logging
- Configuring Blue Coat SG for FTP Uploads
- Syslog Log Source Parameters for Blue Coat SG
- Log File Log Source Parameters for Blue Coat SG
- Configuring Blue Coat SG for Syslog
- Creating Extra Custom Format Key-value Pairs
- Blue Coat SG Sample Event Messages
- play_arrow Blue Coat Web Security Service
- play_arrow Box
- play_arrow Bridgewater
- play_arrow Broadcom
- play_arrow Brocade Fabric OS
- play_arrow Carbon Black
- play_arrow Centrify
- Centrify
- Centrify Identity Platform
- Centrify Identity Platform DSM specifications
- Configuring Centrify Identity Platform to communicate with JSA
- Centrify Infrastructure Services
- Configuring WinCollect Agent to Collect Event Logs from Centrify Infrastructure Services
- Configuring Centrify Infrastructure Services on a UNIX or Linux Device to Communicate with JSA
- play_arrow Check Point
- play_arrow Cilasoft QJRN/400
- play_arrow Cisco
- Cisco
- Cisco ACE Firewall
- Configuring Cisco Aironet to Forward Events
- Cisco ACS
- Cisco ASA
- Cisco AMP
- Cisco CallManager
- Cisco CatOS for Catalyst Switches
- Cisco Cloud Web Security
- Cisco CSA
- Cisco Firepower Management Center
- Cisco Firepower Threat Defense
- Cisco FWSM
- Cisco Identity Services Engine
- Cisco IDS/IPS
- Cisco IOS
- Cisco IronPort
- Cisco Meraki
- Cisco NAC
- Cisco Nexus
- Cisco Pix
- Cisco Stealthwatch
- Cisco Umbrella
- Cisco VPN 3000 Concentrator
- Cisco Wireless LAN Controllers
- Cisco Wireless Services Module
- play_arrow Citrix
- play_arrow Cloudera Navigator
- play_arrow Cloudflare Logs
- Cloudflare Logs
- Cloudflare Logs DSM Specifications
- Configure Cloudflare to send Events to JSA when you use the HTTP Receiver Protocol
- Configuring Cloudflare Logs to Send Events to JSA when you use the Amazon S3 REST API Protocol
- Create an SQS Queue and Configure S3 ObjectCreated Notifications
- Configuring Security Credentials for Your AWS User Account
- HTTP Receiver Log Source Parameters for Cloudflare Logs
- Amazon AWS S3 REST API Log Source Parameters for Cloudflare Logs
- Cloudflare Logs Sample Event Messages
- play_arrow CloudPassage Halo
- play_arrow CloudLock Cloud Security Fabric
- play_arrow Correlog Agent for IBM Z/OS
- play_arrow CrowdStrike Falcon
- play_arrow CRYPTOCard CRYPTO-Shield
- play_arrow CyberArk
- play_arrow CyberGuard Firewall/VPN Appliance
- play_arrow Damballa Failsafe
- play_arrow DG Technology MEAS
- play_arrow Digital China Networks (DCN)
- play_arrow Enterprise-IT-Security.com SF-Sherlock
- play_arrow Epic SIEM
- play_arrow ESET Remote Administrator
- play_arrow Exabeam
- play_arrow Extreme
- Extreme
- Extreme 800-Series Switch
- Extreme Dragon
- Extreme HiGuard Wireless IPS
- Extreme HiPath Wireless Controller
- Extreme Matrix Router
- Extreme Matrix K/N/S Series Switch
- Extreme NetSight Automatic Security Manager
- Extreme NAC
- Configuring Extreme Stackable and Stand-alone Switches
- Extreme Networks ExtremeWare
- Extreme XSR Security Router
- play_arrow F5 Networks
- play_arrow Fair Warning
- play_arrow Fasoo Enterprise DRM
- play_arrow Fidelis XPS
- play_arrow FireEye
- play_arrow Forcepoint
- play_arrow ForeScout CounterACT
- play_arrow Fortinet FortiGate
- Fortinet FortiGate Security Gateway
- Configuring a Syslog Destination on Your Fortinet FortiGate Security Gateway Device
- Configuring a Syslog Destination on Your Fortinet FortiAnalyzer Device
- Fortinet FortiGate Security Gateway Sample Event Messages
- Configuring JSA to Categorize App Ctrl Events for Fortinet Fortigate Security Gateway
- play_arrow Foundry FastIron
- play_arrow FreeRADIUS
- play_arrow Generic
- play_arrow Google Cloud Audit Logs
- play_arrow Genua Genugate
- play_arrow Google Cloud Platform Firewall
- play_arrow Google G Suite Activity Reports
- Google G Suite Activity Reports
- Google G Suite Activity Reports DSM Specifications
- Configuring Google G Suite Activity Reports to Communicate with JSA
- Assigning a Role to a User
- Creating a Service Account with Viewer Access
- Granting API Client Access to a Service Account
- Google G Suite Activity Reports Log Source Parameters
- Google G Suite Activity Reports Sample Event Messages
- Troubleshooting Google G Suite Activity Reports
- play_arrow Great Bay Beacon
- play_arrow H3C Technologies
- play_arrow HBGary Active Defense
- play_arrow HCL BigFix (formerly known as IBM BigFix)
- play_arrow Honeycomb Lexicon File Integrity Monitor (FIM)
- play_arrow Hewlett Packard Enterprise
- play_arrow Huawei
- play_arrow HyTrust CloudControl
- play_arrow ISC BIND
- play_arrow Illumio Adaptive Security Platform
- play_arrow Imperva Incapsula
- play_arrow Imperva SecureSphere
- play_arrow Infoblox NIOS
- play_arrow IT-CUBE AgileSI
- play_arrow Itron Smart Meter
- play_arrow Juniper Networks
- Juniper Networks
- Juniper Networks AVT
- Juniper Networks DDoS Secure
- Juniper Networks DX Application Acceleration Platform
- Juniper Networks EX Series Ethernet Switch
- Juniper Networks IDP
- Juniper Networks Infranet Controller
- Juniper Networks Firewall and VPN
- Juniper Networks Junos OS
- Juniper Networks Network and Security Manager
- Juniper Networks Secure Access
- Juniper Networks Security Binary Log Collector
- Juniper Networks Steel-Belted Radius
- Juniper Networks VGW Virtual Gateway
- Juniper Networks Junos OS WebApp Secure
- Juniper Networks WLC Series Wireless LAN Controller
- play_arrow Kaspersky
- play_arrow Kisco Information Systems SafeNet/i
- play_arrow Kubernetes Auditing
- play_arrow Lastline Enterprise
- play_arrow Lieberman Random Password Manager
- play_arrow LightCyber Magna
- play_arrow Linux
- play_arrow LOGbinder
- play_arrow McAfee
- play_arrow MetaInfo MetaIP
- play_arrow Microsoft
- Microsoft
- Microsoft 365 Defender
- Microsoft Azure Active Directory
- Microsoft Azure Platform
- Microsoft Azure Security Center
- Microsoft DHCP Server
- Microsoft DNS Debug
- Microsoft Endpoint Protection
- Microsoft Exchange Server
- Microsoft Hyper-V
- Microsoft IAS Server
- Microsoft IIS Server
- Microsoft ISA
- Microsoft Office 365
- Microsoft Office 365 Message Trace
- JDBC Log Source Parameters for Microsoft Operations Manager
- Microsoft SharePoint
- Microsoft SQL Server
- JDBC Log Source Parameters for Microsoft System Center Operations Manager
- Microsoft Windows Security Event Log
- play_arrow Motorola Symbol AP
- play_arrow Name Value Pair
- play_arrow NCC Group DDoS Secure
- play_arrow NetApp Data ONTAP
- play_arrow Netgate pfSense
- play_arrow Netskope Active
- play_arrow NGINX HTTP Server
- play_arrow Niksun
- play_arrow Nokia Firewall
- play_arrow Nominum Vantio
- play_arrow Nortel Networks
- Nortel Networks
- Nortel Multiprotocol Router
- Nortel Application Switch
- Nortel Contivity
- Nortel Ethernet Routing Switch 2500/4500/5500
- Nortel Ethernet Routing Switch 8300/8600
- Nortel Secure Router
- Nortel Secure Network Access Switch
- Nortel Switched Firewall 5100
- Nortel Switched Firewall 6000
- Nortel Threat Protection System (TPS)
- Nortel VPN Gateway
- play_arrow Novell EDirectory
- play_arrow Observe IT JDBC
- play_arrow Okta
- play_arrow Onapsis Security Platform
- play_arrow OpenBSD
- play_arrow Open LDAP
- play_arrow Open Source SNORT
- play_arrow OpenStack
- play_arrow Oracle
- play_arrow OSSEC
- play_arrow Palo Alto Networks
- play_arrow Pirean Access: One
- play_arrow PostFix Mail Transfer Agent
- play_arrow ProFTPd
- play_arrow Proofpoint Enterprise Protection and Enterprise Privacy
- play_arrow Pulse Secure
- play_arrow Pulse Secure Infranet Controller
- play_arrow Pulse Secure Pulse Connect Secure
- play_arrow Radware
- play_arrow Raz-Lee ISecurity
- play_arrow Redback ASE
- play_arrow Red Hat Advanced Cluster Security for Kubernetes
- Red Hat Advanced Cluster Security for Kubernetes
- Red Hat Advanced Cluster Security for Kubernetes DSM Specifications
- Configuring Red Hat Advanced Cluster Security for Kubernetes to Communicate with JSA
- HTTP Receiver Log Source Parameters for Red Hat Advanced Cluster Security for Kubernetes
- Red Hat Advanced Cluster Security for Kubernetes Sample Event Messages
- play_arrow Resolution1 CyberSecurity
- play_arrow Riverbed
- play_arrow RSA Authentication Manager
- play_arrow SafeNet DataSecure
- play_arrow Salesforce
- play_arrow Samhain Labs
- play_arrow SAP Enterprise Threat Detection
- SAP Enterprise Threat Detection
- SAP Enterprise Threat Detection DSM Specifications
- SAP Enterprise Threat Detection Alert API Log Source Parameters for SAP Enterprise Threat Detection
- Creating a Pattern Filter on the SAP Server
- Troubleshooting the SAP Enterprise Threat Detection Alert API
- SAP Enterprise Threat Detection Sample Event Message
- play_arrow Seculert
- play_arrow Sentrigo Hedgehog
- play_arrow SolarWinds Orion
- play_arrow SonicWALL
- play_arrow Sophos
- play_arrow Sourcefire Intrusion Sensor
- play_arrow Splunk
- play_arrow Squid Web Proxy
- play_arrow SSH CryptoAuditor
- play_arrow Starent Networks
- play_arrow STEALTHbits
- play_arrow Sun
- play_arrow Suricata
- play_arrow Sybase ASE
- play_arrow Symantec
- play_arrow SysFlow
- play_arrow ThreatGRID Malware Threat Intelligence Platform
- play_arrow TippingPoint
- play_arrow Top Layer IPS
- play_arrow Townsend Security LogAgent
- play_arrow Trend Micro
- play_arrow Tripwire
- play_arrow Tropos Control
- play_arrow Universal CEF
- play_arrow Universal LEEF
- play_arrow Vectra Networks Vectra
- play_arrow Venustech Venusense
- play_arrow Verdasys Digital Guardian
- play_arrow Vericept Content 360 DSM
- play_arrow VMware
- play_arrow Vormetric Data Security
- play_arrow WatchGuard Fireware OS
- play_arrow Websense
- play_arrow Zscaler Nanolog Streaming Service
- play_arrow Zscaler Private Access
- play_arrow JSA Supported DSMs
IBM Security Trusteer Apex Advanced Malware Protection
The IBM Security Trusteer Apex Advanced Malware Protection DSM collects event data from a Trusteer Apex Advanced Malware Protection system to JSA.
JSA can collect the following items from the Trusteer Apex Advanced Malware Protection system:
Syslog events
Log files (from an intermediary server that hosts flat feed files from the system.)
Syslog events through SSL/TLS authentication
The following table lists the specifications for the IBM Security Trusteer Apex Advanced Malware Protection DSM:
Specification | Value |
---|---|
Manufacturer | IBM |
DSM name | IBM Security Trusteer Apex Advanced Malware Protection |
RPM file name | DSM-TrusteerApex-JSA_version-build_number.noarch.rpm |
Supported versions | Syslog/LEEF event collection: Apex Local Manager 2.0.45 LEEF: Flat File Feed: v1, v3, and v4 |
Protocol | Syslog Log File TLS Syslog |
Recorded event types | Malware Detection Exploit Detection Data Exfiltration Detection Lockdown for Java Event File Inspection Event Apex Stopped Event Apex Uninstalled Event Policy Changed Event ASLR Violation Event ASLR Enforcement Event Password Protection Event |
Automatically discovered? | Yes |
Includes identity? | No |
Includes custom properties? | No |
More information | IBM Security Trusteer Apex Advanced Malware Protection website |
To configure IBM Security Trusteer Apex Advanced Malware Protection event collection, complete the following steps:
If automatic updates are not enabled, download and install the most recent version of the following RPMs from the Juniper Downloads onto your JSA console:
DSMCommon RPM
Log File Protocol RPM
TLS Syslog Protocol RPM
IBM Security Trusteer Apex Advanced Malware Protection DSM RPM
Choose one of the following options:
To send syslog events to JSA, see "Configuring IBM Security Trusteer Apex Advanced Malware Protection to send syslog events to JSA".
To collect log files from IBM Security Trusteer Apex Advanced Malware Protection through an intermediary server, see "Configuring a Flat File Feed service". For JSA to retrieve log files from IBM Security Trusteer Apex Advanced Malware Protection, you must set up a flat file feed service on an intermediary SFTP-enabled server. The service enables the intermediary server to host the flat files that it receives from IBM Security Trusteer Apex Advanced Malware Protection and allows for connections from external devices so that JSA can retrieve the log files.
If JSA does not automatically discover the log source, add an IBM Security Trusteer Apex Advanced Malware Protection log source on the JSA console.
The following table describes the parameters that require specific values for IBM Security Trusteer Apex Advanced Malware Protection syslog event collection:
Table 2: IBM Security Trusteer Apex Advanced Malware Protection Log Source Parameters for Syslog Parameter
Value
Log Source type
IBM Security Trusteer Apex Advanced Malware Protection
Protocol Configuration
Syslog
Log Source Identifier
The IP address or host name from the syslog header. If the syslog header does not contain an IP address or a host name, use the packet IP address.
TLS Listen Port
The default port is 6514.
Authentication Mode
TLS
Certificate Type
Select the Provide Certificate option from the list.
Maximum Connections
The Maximum Connections parameter controls how many simultaneous connections the TLS Syslog protocol can accept for each Event Collector. For each Event Collector, there is a limit of 1000 connections across all TLS syslog log source configurations. The default for each device connection is 50.
Note:Automatically discovered log sources that share a listener with another log source count only one time towards the limit. For example, the same port on the same event collector.
TLS Protocols
Select the version of TLS installed on the client from the drop down list.
Provided Server Certificate Path
Absolute path of server certificate. For example, /opt/qradar/conf/trusted_certificates/apex-almtls. cert
Provided Private Key Path
Absolute path of PKCS#8 private key. For example, /etc/pki/tls/private/apex-alm-tls.pk8
Note:When you use the TLS syslog, and you want to use an FQDN to access the system, you must generate your own certificate for the listener, and then specify it in the TLS syslog configuration.
The following table describes the parameters that require specific values for IBM Security Trusteer Apex Advanced Malware Protection TLS syslog event collection:
Table 3: IBM Security Trusteer Apex Advanced Malware Protection Log Source Parameters for TLS Syslog protocol Parameter
Value
Log Source type
IBM Security Trusteer Apex Advanced Malware Protection
Protocol Configuration
TLS Syslog
Log Source Identifier
The IP address or host name from in syslog header. If the syslog header does not contain an IP address or host name, use the packet IP address.
TLS Listen Port
The default port is 6514.
Authentication Mode
TLS
Authentication Mode
Select the Provide Certificate option from the list.
Maximum Connections
The Maximum Connections parameter controls how many simultaneous connections the TLS Syslog protocol can accept for each Event Collector. For each Event Collector, there is a limit of 1000 connections across all TLS syslog log source configurations. The default for each device connection is 50.
Note:Automatically discovered log sources that share a listener with another log source count only one time towards the limit. For example, the same port on the same event collector.
TLS Protocols
Select the version of TLS installed on the client from the drop down list.
Provided Server Certificate Path
Absolute path of server certificate For example /opt/qradar/conf/trusted_certificates/apex-almtls. cert.
Provided Private Key Path
Absolute path of PKCS#8 private key. For example /etc/pki/tls/private/apex-alm-tls.pk8
Note:When you use the TLS syslog, and you want to use an FQDN to access the system, you must generate your own certificate for the listener, and then specify it in the TLS syslog configuration
The following table describes the parameters that require specific values for IBM Security Trusteer Apex Advanced Malware Protection Log File collection:
Table 4: IBM Security Trusteer Apex Advanced Malware Protection Log Source Parameters for Log File Protocol Parameter
Value
Log Source Type
IBM Security Trusteer Apex Advanced Malware Protection
Protocol Configuration
Log File
Log Source Identifier
The IP address or host name of the server that hosts the flat file feed.
Service Type
SFTP
Remote IP or Hostname
The IP address or host name of the server that hosts the flat file feed.
Remote Port
22
Remote User
The user name that you created for JSA on the server that hosts the flat file feed.
SSH Key File
If you use a password, you can leave this field blank.
Remote Directory
The log file directory where the flat feed files are stored.
Recursive
Do not select this option.
FTP File Pattern
"trusteer_feeds_.*?_[0-9]{8}_[0-9]*?\.csv"
Start Time
The time that you want your log file protocol to start log file collection.
Recurrence
The polling interval for log file retrieval.
Run On Save
Must be enabled.
Processor
None
Ignore Previously Processed Files
Must be enabled.
Event Generator
LINEBYLINE
File Encoding
UTF-8
Configuring IBM Security Trusteer Apex Advanced Malware Protection to Send Syslog Events to JSA
Configure IBM Security Trusteer Apex Advanced Malware Protection to send syslog events to JSA.
Install an Apex Local Manager on your Trusteer Management Application (TMA).
For more information about configuring your IBM Security Trusteer Apex Advanced Malware Protection to communicate with JSA, use the following documentation from the Juniper Networks Knowledge Center:
IBM Security Trusteer Apex Advanced Malware Protection Local Manager - Hybrid Solution Reference Guide
IBM Security Trusteer Apex Advanced Malware Protection Feeds Reference Guide
SSL/TLS authentication is not supported.
Log in to Trusteer Management Application (TMA).
Select Apex Local Manager & SIEM Settings.
If the Apex Local Manager wizard does not automatically display, click Add.
Type the name of the Apex Local Manager.
Check the Enable box and click Next.
Type the server settings for JSA and click Next.
If you use a separate syslog server for the Apex Local Manager system events, type the settings.
Click Finish.
Configuring IBM Security Trusteer Apex Advanced Malware Protection to Send TLS Syslog Events to JSA
You can configure IBM Security Trusteer Apex Advanced Malware Protection to send syslog events through secure socket layer (SSL) or transport layer security (TLS) to JSA.
Complete the following steps to establish a secure channel for transmitting logs between Apex Trusteer and JSA:
Create TLS/SSL Server Certificates and private key.
Create Client Authentication certificates in a PKCS#12 container for Apex Local Manager.
Configure the JSA log source for IBM Security Trusteer Apex Advanced Malware Protection.
Configure the Apex Local Manager(ALM).
- Creating a TLS/SSL Server Certificate and Private Key
- Creating Client Authentication Certificates and Keys for Apex Local Manager
- Configuring the Apex Local Manager
- Configuring the ALM Instance
Creating a TLS/SSL Server Certificate and Private Key
To establish a communication between JSA and Apex Local Manager (ALM) by using TLS encryption, you must create a self-signed certificate with public and private key pairs.
Log in to JSA as a root user by using SSH.
Create a self-signed certificate. For example,
openssl req -new -x509 -newkey rsa:2048 -days 3650 -sha512 -nodes -x509 -subj "/C=US/ST=Georiga/L=Atlanta/O=IBM/OU=IBM Security/CN=JSA FQDN or ip address" -keyout apex-alm-tls.key -out apex-alm-tls.cert
Convert the private key to the required DER encode PKCS#8 format:
openssl pkcs8 -topk8 -inform PEM -outform DER -in apex-alm-tls.key -out apex-alm-tls.pk8 -nocrypt
Note:Use a unique filename if a certificate needs to be changed or updated.
Put the certificate file in /opt/qradar/conf/trusted_certificates.
Do not place the PKCS#8 formatted key file in /opt/qradar/conf/trusted_certificates.
Creating Client Authentication Certificates and Keys for Apex Local Manager
Configuring an ALM for TLS Syslog authentication requires a PKCS#12 file that contains the certificate and private key.
Create a self-signed certificate and private key. For example,
openssl req -new -x509 -newkey rsa:2048 -days 3650 -sha512 -nodes -x509 -subj "/C=US/ST=Georiga/L=Atlanta/O=IBM/OU=IBM Security/CN=ALM FQDN or IP Address" -keyout alm-client-syslog-tls.key -out alm-client-syslog-tls.cert
Create the PKCS#12 container:
openssl pkcs12 -export -inkey alm-client-syslog-tls.key -in alm-client-syslog-tls.cert -out alm-client-syslog-tls.p12 -name "alm-client-syslog-tls"
Note:Make note of the password that you entered. The password is required when you configure the Apex Local Manager.
Configuring the Apex Local Manager
Configure the Apex Local Manager through a customer-assigned Apex Trusteer Management Application (TMA) original server.
Log in to the Apex TMA.
From the left navigation menu, click the Administration accordion to expand the options available.
Click the Apex Local Manager & SIEM Settings.
Click Add and complete the following steps:
Select the option to enable this Apex Local Manager.
Enter a unique name.
Click Next.
From the SIEM/Syslog Server Settings page, provide a value for the following parameters:
Table 5: Apex Local Manager SIEM/Syslog Server Setting Parameters Parameter
Description
Type
JSA SIEM (LEEF)
Hostname
<fqdn of the JSA appliance>
Port
Default is 6514.
Protocol
TCP with SSL/TLS
PKCS#12 Upload File
Upload the local PKCS#12 file
Encryption Password
The password that was entered during the creation of the client authentication certificates for Apex Local Manager.
CA Certificate Upload File
Upload local certifcate file. For example, apex-alm-tls.cert
Click Next.
From the System Events Setting page, provide a value for the following parameters:
Table 6: System Events Setting Parameters Parameter
Description
Hostname
<JSA FQDN or IP Address>
Port
Default is 6514
Protocol
Syslog with SSL/TLS
PKCS#12 Upload File
Upload the local PKCS#12 file. For example, alm-client-syslog.tls.p12
Encryption Password
The password that was entered during the creation of the client authentication certificates for Apex Local Manager.
CA Certificate Upload File
Upload local certifcate file. For example, apex-alm-tls.cert
Click Finish to save the configuration.
Select the new entry.
Copy the Provisioning key.
Configuring the ALM Instance
Configure the ALM instance by using the provisioning key copied from the Apex Local Manager.
Log in to the Apex Local Manager at:
https://ipaddress:8443
From the General Settings page, paste the provisioning key into the field and click the Synchronize Settings.
Note:A message will be displayed that states that the settings synchronized successfully.
Click the Test Connection to send test event to JSA and validate the connection.
Configuring a Flat File Feed Service
For JSA to retrieve log files from IBM Security Trusteer Apex Advanced Malware Protection, you must set up a flat file feed service on an intermediary SFTP-enabled server. The service enables the intermediary server to host the flat files that it receives from IBM Security Trusteer Apex Advanced Malware Protection and allows for connections from external devices so that JSA can retrieve the log files.
To configure IBM Security Trusteer Apex Advanced Malware Protection to send flat file feed to the intermediary server, contact IBM Trusteer support.
Flat File Feeds use a CSV format. Each feed item is written to the file on a separate line, which contains several comma-separated fields. Each field contains data that describes the feed item. The first field in each feed line contains the feed type.
Enable an SFTP-enabled server and ensure that external devices can reach it.
Log on to the SFTP-enabled server.
Create a user account on the server for IBM Security Trusteer Apex Advanced Malware Protection.
Create a user account for JSA.
Enable SSH key-based authentication.
After you set up the intermediary server, record the following details:
Target SFTP server name and IP addresses
SFTP server port (standard port is 22)
The file path for the target directory
SFTP user name if SSH authentication is not configured
Upload frequency (from 1 minute to 24 hours)
SSH public key in RSA format
IBM Trusteer support uses the intermediary server details when they configure IBM Security Trusteer Apex Advanced Malware Protection to send flat feel files.