INTOUCH® INSA
Network Security Agent


Previous Contents Index

4.5 Example: Creating an Alert Incident

INTOUCH INSA is now constantly scanning for a PAYROLL alert incident to occur.

If the PAYROLL example was a real situation, incidents would occur when the payroll program was run. However, to cause a PAYROLL incident right now, you can perform these steps:

  1. You or another user can log on to any terminal that is on the network.
  2. After logging on, type in the following line exactly as shown:

    Corp Internal - Salary Maintenance
    and press the [Return] key. Be sure that the words are entered exactly as they appear above because that is what you told INTOUCH INSA to look for.
  3. Enter some other miscellaneous commands.
  4. Remain logged on.

Typing in "Corp Internal - Salary Maintenance" caused an incident.

The next example sections tell what actions INTOUCH INSA takes and how to get incident information.

4.6 Example: INTOUCH INSA E-mail Action

After two to three minutes have elapsed (it takes INTOUCH INSA a couple of minutes to cycle through its scanning process), INSA Manager receives an E-mail message. The message contains information about the PAYROLL alert incident. For example:



From:   TEST::SYSTEM  "NSA: PAYROLL, IP 204.182.52.233:1973 (USERXX)" 23-JAN-199 
7 00:16:18.47 
To:     nsa_manager 
CC: 
Subj:   NSA: PAYROLL, IP 204.182.52.233:1973 (USERXX) 
 
***************** Session Incident on January 23, 1997 16:18:47 **************** 
Alert type : PAYROLL 
Description: Audit corp salary maintenance 
Pattern    : Corp Internal - Salary Maintenance 
Alert text : Corp Internal - Salary Maintenance 
Location   : IP 204.182.52.233:1973 
Username   : Probably USERXX 
******************************************************************************** 
 
                     ( text which caused the incident ) 

The E-mail message was sent because you specificed "email" as one of the PAYROLL alert actions.

4.7 Example: INTOUCH INSA Flagging the Incident

You can now display the active sessions as you did in the first example (see Section 4.2, Example: Displaying Active Sessions).

Here are the steps:

  1. Select Security from the main menu.
  2. Select Sessions from the Security menu.
  3. Since you know who the user is, select User names from the "Select Sessions" menu. (You could also select Sessions with incidents since you know there is an active session with an incident.)
  4. If you selected User names, you are asked for the user name. Type in the user name and then press [Return].


    
    User names (AAA,BBB,...)? USERXX_____________________________________________ 
    

  5. You see one active session listed for the user name you entered. For example:


    
    +-----------------------------------Security-----------------------------------+ 
    |  Sessions    Clear    Exit                                                   | 
    +------------------------------------------------------------------------------+ 
    +-----------------1 active session as of 23-Jan-1997 16:23:27------------------+ 
    | Refresh                                                                      | 
    |                                                                              | 
    | Source Location         Destination Loc Type  User    Last   Cnct Ins Status | 
    | LAT 2.22:97             LAT 97.1        INTER USERXX  09:23  1:30   1  (r)   | 
    +------------------------------------------------------------------------------+ 
    

    On the session line to the right, you see "1" which tells that one incident has occurred. There is also an "(r)" which tells that the session is currently being recorded. The session is being recorded because "record" is one of the PAYROLL alert actions.

  6. To get more information and watch the session, use the mouse to select the session line. The session screen is displayed:


    
    +-------------------------------Session Security-------------------------------+ 
    |  Refresh    Actions    Incidents    Exit                                     | 
    +------------------------------------------------------------------------------+ 
     
       +-------------------Session as of 23-Jan-1997 16:25:04-------------------+ 
       |                                                                        | 
       | LAT 2.22:97 --> LAT 97.1                                               | 
       |                                                                        | 
       | Type               : INTER                                             | 
       | User name          : probably USERXX                                   | 
       | Incidents          : 1                                                 | 
       | Last login         : 23-Jan-1997 16:15:10                              | 
       | Last activity      : 23-Jan-1997 16:20:13                              | 
       | Watch status       : Recording...                                      | 
       +------------------------------------------------------------------------+ 
    

    The information shows that 1 incident has been detected and the session is being recorded.

  7. You are going to stop recording the session. Use the mouse to select the Stop Recording item from the Actions submenu.


    
    +-------------------------------Session Security-------------------------------+ 
    |  Refresh    Actions    Incidents    Exit                                     | 
    +-----------+------Actions------+----------------------------------------------+ 
                |  Watch            | 
                |  Unwatch          | 
                |  Snapshot         | 
                |  Playback         | 
                |  Start Recording  | 
                |  Stop Recording   | 
                |  Disconnect       | 
                +-------------------+ 
    

    This tells INTOUCH INSA to stop recording this session.

  8. If you want to watch this session, you can select the Watch option and ask the user to type in some data so you can watch their keystroke activity.
  9. When you are finished with this session, select Exit to get back to the sessions list. Select Exit to get back to the main menu.

4.8 Example: Reports

Now that you are getting familiar with the menus and how to select items, you can go back to the main menu and select Reports.



+-----------------INTOUCH INSA - Network Security Agent V1.5-------------------+ 
|  Security    Status    Reports    Maintenance    General    Advanced    Exit | 
+----------------------+-------Reports-------+---------------------------------+ 
                       |  Incident           | 
                       |  Alert              | 
                       |  Recordings         | 
                       |  Browser Accesses   | 
                       |  URL Accesses       | 
                       |  Active Browsers    | 
                       |  Audit              | 
                       |  Page               | 
                       |  Top              [>| 
                       |  Archive          [>| 
                       +---------------------+ 

You can run the Incident, Alert and Recordings options to get information about the PAYROLL incident that has occurred.

To run the reports, go to Chapter 10, Report Menu Procedures, and follow the steps for each report. You can select the default prompts or enter data if you wish. If you need help, press the [Help] key at any prompt or menu item.

Chapter 6, Using the INTOUCH INSA Utilities and Desktop Management, provides general information on INSA Manager, how to get around, and what to expect in various situations.

4.9 Example: Playing Back a Recorded Session

Since the PAYROLL incident was recorded, you can play back the recording and see exactly what the user was doing when the incident occurred and afterward until the recording was stopped. To play back the recording, select Security from the main menu. Then, select the Playback item from the Security menu.



+-----------------INTOUCH INSA - Network Security Agent V1.5-------------------+ 
|  Security    Status    Reports    Maintenance    General    Advanced    Exit | 
++------Security-------+-------------------------------------------------------+ 
 |  Sessions           | 
 |  Playback           | 
 |  Archive Playback   | 
 +---------------------+ 

Go to Section 9.2, Playback Option, and follow the steps to play back the recording.


Chapter 5
Using INTOUCH INSA as a Surveillance Tool - Some Scenarios

For the most part, you know what users should be doing on your network, but you also want to be made aware of suspicious activity. Computer policies and what is "suspicious" activity vary from site to site. INTOUCH INSA allows you to tailor surveillance to your site needs. You can use INTOUCH INSA as an alarm system to alert you to inappropriate activity, or to monitor specific user activities, or to gather statistical information on certain procedures.

To use INTOUCH INSA as a surveillance tool or an alarm system, you need to tell it what to look for. You need to define the incidents or activities you do NOT want on your network and what you want to do when they are detected. For example, if you have a home alarm system, you might have it programmed to call the police if an intruder opens a locked door or window. In this same manner, you can tell INTOUCH INSA what to look for (opened door or window) and what to do about it (call).

The alert that was set up in Chapter 4 shows one example of how INTOUCH INSA can be used. This chapter provides other generic scenarios of INTOUCH INSA surveillance usage and how to set up the alerts.

5.1 Scenarios and Setting Up the Alerts

5.1.1 Example 1

You have a special equipment file that is updated by two authorized users. You want to know if and when anyone, other than the two authorized users, touches the equipment file and what they do to it.

You will provide INTOUCH INSA with:

  1. a piece of information (or pattern) that identifies equipment file usage (e.g. E-Part No:)
  2. identification of the two authorized users to exclude (e.g. LAT 2.248:2 and IP 205.232.159.106:1913)
  3. the action to take if an unauthorized user touches the file - in this case you want to record the unauthorized session so you know what changes are made to the file; you can also have INTOUCH INSA alert you by sending an E-mail message

To actually set up this alert, you would select "Alerts" from the Maintenance Menu and enter the following alert and rules data:

Alert record data:



 INTOUCH INSA               Alert File Maintenance                  25-Jan-1997 
 
  Alert name   : EQUIP 
  Description  : Equipment file non-authorized changes 
  Action       : email,record 
  Priority     : 1 

Rules data:



  exclude "2.248:2"                     <-- authorized user 1 
  exclude "205.232.159.106:1913"        <-- authorized user 2 
  alert equip "E-Part No:" 
                  ^ 
                  | 
        pattern that identifies equipment file maintenance 

INTOUCH INSA will scan for "E-Part No:" and ignore incidents for the two authorized users, but it will send an E-mail message and record the session if there is any other user accessing the equipment file. The "Playback" option on the Security menu is used to play back recorded sessions. Also, incident and alert reports would show detected alerts.

5.1.2 Example 2

When your users log on to your system, they are automatically placed into a menu which controls their activities. Should any user get to the system prompt, you want to know how that occurred and what they are doing - NOW!

You will provide INTOUCH INSA with:

  1. what the system prompt looks like (e.g. "ABC>>")
  2. the actions to take - in this case, you want to watch the user's keystroke activity, and record the session so you have a record of what the user did; you also want to find out how the user got to the system prompt

To set up this alert, you would enter the following alert and rules data:

Alert record data:



 INTOUCH INSA               Alert File Maintenance                  25-Jan-1997 
 
  Alert name   : USERS 
  Description  : Questionable activity 
  Action       : watch,record 
  Priority     : 1 

Rules data:



  alert users "ABC>>" 

If a user gets to the system prompt, INTOUCH INSA will open a window and start displaying the user's keystroke activity; the session will also be recorded. To find out how the user got to the system prompt, you can run an incident report using the "Session Text" report type. The session text includes some user activity just prior to the incident which will show what the user was doing.

5.1.3 Example 3

Your company provides computer services to customers who have terminals in their offices and dial up to your system. One of your customers thinks that someone is creating unauthorized transactions, and wants a list of users who enter specific data.

You will provide INTOUCH INSA with:

  1. the identifying pattern of the customer's specific transaction code (e.g. DM?*SP)

To set up this alert, you would enter the following alert and rules data:

Alert record data:



 INTOUCH INSA               Alert File Maintenance                  25-Jan-1997 
 
  Alert name   : CUSTOMERS 
  Description  : Customer activity 
  Action       : 
  Priority     : 5 

Rules data:



  alert customers "{|nocase|}DM?*SP" 

INTOUCH INSA would log incidents if it detected "DM2648SP", "dm452sp", etc.

At the end of the day, you would run detail and session text Incident reports. The report selection criteria would include alert name "CUSTOMERS" and the day's date. These two reports would provide your customer with information on who created the questionable transactions.

5.2 Summary

When you are trying to determine what alerts to set up, you need to think about the things that are "sacred" to your system and how can someone tamper with them; what are the things/situations you do NOT want on your system; what events can occur that will corrupt your system? These "unwanted" things/situations are what you set up as alerts for INTOUCH INSA to monitor.

Once you determine what you want to be alerted to, you can set up the alerts and the rule patterns to scan for. The alert data identifies the alert and tells INTOUCH INSA what to do when an incident is detected. The rule pattern data tells INTOUCH INSA what to look for.

Alerts can be given names that describe what you are monitoring (i.e. logins, payroll, etc.), or the names might describe departments that you are monitoring for (i.e. sys_manager, engineering, accounts, etc.). Alert names can be anything that you think is appropriate.

When you are setting up alert rule patterns, you can set up one or more rule patterns for an alert name. When setting up rule patterns, you must keep in mind that INTOUCH INSA scans for "exactly" the patterns you provide. For example, if a user can input a pattern in either upper or lowercase, you need to specify "nocase".

INTOUCH INSA logs ALL incidents regardless of whether you take any immediate action (i.e. E-mail, watch, record, etc.) or not. The Incident and Alert reports provide information on ALL incidents that have been detected. You could monitor file accesses to determine who is using a certain file and run an Incident report to get the information. In this case, you probably would not want to take any immediate action when incidents occur.

Section 8.2, Alert File Maintenance, and Section 8.3, Rules Maintenance, provide detailed information on alerts and rules.


Chapter 6
Using the INTOUCH INSA Utilities and Desktop Management

The INTOUCH INSA utilities, controlled by INSA Manager, allow you to review session information, maintain alerts and rules data, create incident, alert and other reports, watch sessions, play back recorded sessions, etc. All of these procedures can be executed by selecting options from the INTOUCH INSA --- Network Security Agent menu system.

6.1 The INTOUCH INSA Menu

After INSA Manager is initialized, the INTOUCH INSA --- Network Security Agent main menu is displayed. (Appendix A, Summary of INSA Manager Menus, describes other menus.)



+-----------------INTOUCH INSA - Network Security Agent V1.5-------------------+ 
|  Security    Status    Reports    Maintenance    General    Advanced    Exit | 
++------Security-------+-------------------------------------------------------+ 
 |  Sessions           | 
 |  Playback           | 
 |  Archive Playback   | 
 +---------------------+ 

The main menu selections are:
  Security display and watch active sessions, play back recorded sessions
  Status display status information for the network, INTOUCH INSA, security
  Reports create incident, alert, recordings and other reports
  Maintenance maintain alert, rules and page data, create and edit E-mail distribution and page distribution lists, purge and archive records
  General miscellaneous procedures
  Advanced perform system procedures
  Exit Exit INSA Manager

6.2 Selecting Menu Items

Menu items or options are displayed on the INTOUCH INSA - Network Security Agent menu screen.

To select a specific item, use the mouse to locate the item and then click to execute that item.

An item can also be selected by entering the item name. You need enter only as many characters of the item name as is necessary to distinguish the item from all other items on the menu.

Some menu items have submenus. To select an item from a submenu, use the mouse to select an item and click to execute the item.

If you select the wrong menu or submenu item, press the "\" (backslash) key and you are returned to the menu or submenu.

6.3 Exiting and Backing Up

From anywhere within INTOUCH INSA you can EXIT the current procedure or BACK UP to a previous prompt or menu.

Select the EXIT option or enter the word EXIT to get out of a menu procedure and return to the previous menu. To exit out of the INTOUCH INSA menu, select the "Exit" option on the main menu.

Press the "\" key to back up to the previous prompt, or if at the first prompt of a menu item, to go back to the menu.

6.4 Entering Dates

In some procedures, such as when creating an Incident report, you are asked to enter dates. For example:



Begin date (MMDDYYYY)? ___________ 

You can enter the date in MMDDYYYY format as the prompt shows, or use another date format. The following date formats are allowed:
Format Example
MMDDYYYY 01251997
MMDDYY 012597
DD-MON-YYYY 25-Jan-1997
DD-MON-YY 25-Jan-97

6.5 On-line Help System

Extensive HELP is always available. The help system provides help for menu items as well as input prompts.

To get help at any time, just press the [Help] key. The screen clears and the help text is displayed.

In some cases you are also presented with a list of related help topics. If you are interested in a related topic, just enter the topic name when prompted. You need enter only as many characters of the topic as is necessary to distinguish the topic from all other topics.

When you have finished getting the help that you need, press [Return] or enter EXIT at the "Topic?" prompt. The help screen is replaced with the screen that was displayed before you requested help information.

6.5.1 Examples

To get help on a menu or submenu item, use the arrow keys to highlight the item or type the menu item name and press [Return] to move the cursor to that item, and then press the [Help] key. The help system displays information about that item.

For example, if you highlight Maintenance and press [Help], the following information is displayed:



MAINTENANCE 
 
The MAINTENANCE menu option displays a submenu of items that include: 
 
    Alerts  - add, change, delete, inquire on alert file records 
    Rules   - add, change, delete text data in the rules file 
    E-mail Distribution Lists - create and maintain E-mail distribution lists 
    Page    - add, change, delete, inquire on page file records 
    Page Distribution Lists - create and maintain page distribution lists 
    Purge and Archive Records - purge and/or archive incident, recording 
                                and/or audit records 
 
 
Related topics: 
 
alert_maint    rules_maint    em_maint       page_maint 
page_dist_maint               purge          help_topic 
menu_navigation               nsa_main_menu 
 
 
 
Topic? 

The help text tells about the Maintenance submenu items. It also shows a list of related topics. If you want information on alerts, you can type in alert_maint and press [Return]. If you want information on how to move around in the menu system, you can enter menu_nav. You can enter topics whenever the "Topic?" prompt is displayed. To get out of the help system, press [Return] or type EXIT at the "Topic?" prompt.

To get help when at an input prompt (where you type in data or select an item from a pop-up menu), just press the [Help] key.

For example, if you are at the following prompt:



Begin date (MMDDYYYY)? Earliest___ 

and press the [Help] key, you see:



INC_ASK_BEGIN_DATE 
 
You are asked for a begin date. 
 
    To specify a begin date, enter the date in MMDDYYYY format. 
 
    Enter EARLIEST to start with the oldest date and time. 
 
    Press RETURN to accept the default. 
 
 
 
 
 
 
 
Topic? 

Or, if you are at this prompt:



                             +-Proceed-+ 
                             |  Yes    | 
                             |  No     | 
                             |---------| 
                             |  Exit   | 
                             +---------+ 

and press [Help], you see:



INC_ASK_PROCEED 
 
Select one of the following options: 
 
    Select YES to create the report. 
 
    Select NO to go back to the report type prompt. 
 
    Select Exit to abandon the report and go back to the Reports menu. 
 
 
 
 
 
 
 
 
Topic? 


Previous Next Contents Index