Configuring DSMs
36
CA T
ECHNOLOGIES
You are now ready to configure the log source and log file protocol in SIEM:
To configure SIEM to receive events from the CA ACF2:
Step 1
From the
Log Source Type
drop-down list box, select the
CA ACF2
option.
Step 2
From the
Protocol Configuration
drop-down list box, select the
Log File
protocol
option.
Step 3
Configure the log file protocol options.
For more information on configuring log sources and protocols, see the
Log
Sources User Guide
.
CA Top Secret
The CA Top Secret DSM allows you to integrate with an IBM zOS mainframe to
collect events and audit transactions. SIEM records all relevant and available
information from the event.
To integrate CA Top Secret events into SIEM:
1
The IBM mainframe records all security events as Service Management
Framework (SMF) records in a live repository.
2
At midnight, the CA Top Secret data is extracted from the live repository using the
SMF dump utility. The SMF file contains all of the events and fields from the
previous day in raw SMF format.
3
The
qextopsloadlib
program pulls data from the SMF formatted file. The
qextopsloadlib
program only pulls the relevant events and fields for SIEM and
writes that information in a condensed format for SIEM compatibility. The
information is saved in a location accessible by SIEM.
4
SIEM uses the log file protocol source to retrieve the output file information for
SIEM on a scheduled basis. SIEM then imports and processes this file.
This document includes:
•
Configuring CA Top Secret to Integrate with SIEM
•
Pulling Data Using Log File Protocol
Configuring CA Top
Secret to Integrate
with SIEM
To integrate CA Top Secret with SIEM:
Step 1
From the Enterasys Extranet website, download the following compressed file:
qextops_bundled.tar.gz
Step 2
On a Linux-based operating system, extract the file:
tar -zxvf qextops_bundled.tar.gz
The following files are contained in the archive:
qextops_jcl.txt
Summary of Contents for Security Information and Event Manager
Page 2: ......
Page 8: ......
Page 20: ......
Page 22: ......
Page 24: ......
Page 26: ......
Page 32: ......
Page 34: ......
Page 36: ......
Page 38: ......
Page 44: ......
Page 58: ......
Page 90: ......
Page 92: ......
Page 94: ......
Page 114: ......
Page 116: ......
Page 122: ......
Page 124: ......
Page 126: ...Configuring DSMs 110 FIREEYE...
Page 128: ......
Page 130: ......
Page 132: ......
Page 136: ......
Page 140: ......
Page 144: ......
Page 172: ......
Page 176: ...Configuring DSMs 160 ISC BIND...
Page 180: ......
Page 182: ......
Page 184: ......
Page 204: ......
Page 224: ......
Page 246: ......
Page 250: ......
Page 256: ......
Page 260: ......
Page 276: ......
Page 282: ......
Page 284: ......
Page 306: ......
Page 308: ......
Page 318: ......
Page 322: ......
Page 324: ......
Page 346: ......
Page 356: ......
Page 366: ......
Page 384: ......
Page 392: ......
Page 394: ......
Page 396: ......
Page 398: ......
Page 404: ......
Page 426: ......