ArcMC AdminGuide 2 92
ArcMC AdminGuide 2 92
Administrator's Guide
Legal Notices
Copyright Notice
© Copyright 2013-2019 Micro Focus or one of its affiliates
Confidential computer software. Valid license from Micro Focus required for possession, use or copying. The information contained
herein is subject to change without notice.
The only warranties for Micro Focus products and services are set forth in the express warranty statements accompanying such products
and services. Nothing herein should be construed as constituting an additional warranty. Micro Focus shall not be liable for technical or
editorial errors or omissions contained herein.
No portion of this product's documentation may be reproduced or transmitted in any form or by any means, electronic or mechanical,
including photocopying, recording, or information storage and retrieval systems, for any purpose other than the purchaser's internal use,
without the express written permission of Micro Focus.
Notwithstanding anything to the contrary in your license agreement for Micro Focus ArcSight software, you may reverse engineer and
modify certain open source components of the software in accordance with the license terms for those particular components. See below
for the applicable terms.
U.S. Governmental Rights. For purposes of your license to Micro Focus ArcSight software, “commercial computer software” is defined at
FAR 2.101. If acquired by or on behalf of a civilian agency, the U.S. Government acquires this commercial computer software and/or
commercial computer software documentation and other technical data subject to the terms of the Agreement as specified in 48 C.F .R .
12.212 (Computer Software) and 12.211 (Technical Data) of the Federal Acquisition Regulation (“FAR”) and its successors. If acquired
by or on behalf of any agency within the Department of Defense (“DOD”), the U.S. Government acquires this commercial computer
software and/or commercial computer software documentation subject to the terms of the Agreement as specified in 48 C.F .R . 227.7202-
3 of the DOD FAR Supplement (“DFARS”) and its successors. This U.S. Government Rights Section 18.11 is in lieu of, and supersedes, any
other FAR, DFARS, or other clause or provision that addresses government rights in computer software or technical data.
Trademark Notices
Adobe™ is a trademark of Adobe Systems Incorporated.
Microsoft® and Windows® are U.S. registered trademarks of Microsoft Corporation.
UNIX® is a registered trademark of The Open Group.
Support
Contact Information
Phone A list of phone numbers is available on the Technical Support
Page: https://softwaresupport.softwaregrp.com/support-contact-information
Chapter 4: Dashboard 42
Overview 42
Monitoring Managed Nodes 42
The Monitoring Summary Dashboard 43
Device Health Metrics 44
Drilling Down 44
Details and Health History 45
Data Charts 45
ADP License Usage for the Last 30 Days 45
Monitoring Rules 46
Preset Rules 47
Preset Rules Description 47
Managing Rules 51
Monitoring Rules Parameters 52
Rule Verification 55
Custom Rules Examples 56
Example 1: Warning Breach 56
Example 2: Critical Breach 57
Device Rule Management 57
Device Inactive Notification 57
Managing Devices 58
Managing Device Rules 59
Configuring Email Notifications 59
Example Email Notification 60
Configuring SNMP Notifications 60
Topology View 62
Deployment View 63
Backup 225
Restore 226
Overview 330
Factory Restore Using System Restore 330
Factory Restore Using Acronis True Image 332
ArcSight Management Center (ArcMC) is a centralized management tool that simplifies security policy
configuration, deployment maintenance, and monitoring in an efficient and cost-effective manner.
ArcMC offers these key capabilities:
• Management and Monitoring: deliver the single management interface to administrate and monitor
ArcSight managed nodes, such as Connector Appliances, Loggers, Connectors, Collectors, other ArcMCs,
and Transformation Hub.
• SmartConnector Hosting: for the hardware appliance, as a platform to host and execute
SmartConnectors
ArcMC includes these benefits:
l Rapid implementation of new and updated security policies.
l Increased level of accuracy and reduction of errors in configuration of managed nodes.
l Reduction in operational expenses.
Caution: Customers may not alter any code related to the ArcMC product without direction from
ArcSight support, and customization of the code is not supported by ArcSight.
• Overview 18
• Installing ArcSight Management Center 20
• ArcSight Management Center Operations 30
• Installing the ArcSight Management Center Agent 33
• ArcSight Management Center Agent Operations 35
• Applying Multiple Licenses at Once 36
Overview
The complete process of installing Software ArcSight Management Center includes these steps.
l Console: In Console mode, a command-line process steps you through the installation and configuration
process. See "Console Mode Installation" on page 24 for detailed instructions.
l Silent: In Silent mode, the installation process is scripted. There is no need to interact with the installer,
as you provide the installation and configuration input through a file. See "Silent Mode Installation" on
page 24 for detailed instructions.
Start as a Service
If installation was performed as a root user, Software ArcSight Management Center can be configured to
start as a system service. For more information, see "Enabling/Disabling ArcSight Management Center as a
System Service" on page 27
Prerequisite Description
File Micro Focus provides a digital public key to enable you to verify that signed software you download from the
Verification software entitlement site is indeed from Micro Focus and has not been manipulated in any way by a third party.
Visit the following site for information and instructions:
https://entitlement.mfgs.microfocus.com/ecommerce/efulfillment/digitalSignIn.do
File The host on which ArcMC is installed must support a limit of 10240 file descriptors. Perform ulimit -n on
Descriptors the host to determine its current level. If the limit does not equal 10240, then do the following:
Limit 1. Open (or create) /etc/security/limits.conf.
2. Set these two parameters:
* hard nofile 10240
Unzip Package The unzip command path needs to be set before installing Software ArcSight Management Center:
yum install –y unzip
Fontconfig The fontconfig command path needs to be set before installing Software ArcSight Management Center:
yum install –y fontconfig dejavu-sans-fonts
Perl The Perl package is required for the automatic installation of the ArcMC Agent.
yum install -y perl
Prerequisite Description
Non-Root You can install ArcSight Management Center as a root or non-root user. However, when installing
Account as a root user, a non-root user account is needed in order to run some required processes.
l When installing ArcSight Management Center as a root user, you can select the port on which it listens for
secure web connections (HTTPS). When installing as a non-root user, the port must be configured to 9000.
This value cannot be changed and must be externally accessible.
l If ArcSight Management Center is installed as a non-root user, and the host is rebooted, ArcMC services will
fail to start automatically. Start them manually with this command:
<install_dir>/current/arcsight/arcmc/bin/arcmcd start
Note: If installed with a non-root account, use an initialization script to launch services automatically. See
"Starting Services Automatically for a Non-Root Installation" on page 27.
OS Upgrade Upgrade to a supported operating system before performing the ArcMC installation. Refer to the ArcSight
Management Center Release Notes, available from the ArcSight Software Marketplace, for the most current
information on supported operating systems, supported browsers, and other technical requirements.
Installation Steps
To begin the installation, select a mode in which to install Software ArcSight Management Center on your
selected machine. The three modes available are GUI Mode, Console Mode, and Silent Install.
l ./ArcSight-ArcMC-2.9.2.<installer_build_number>.0.bin
where <installer_build_number>is the build number of the latest installer.
The installation wizard starts. Review the dialog box, and then click Next.
2. Review the License Agreement details, and then scroll down to the end. Select I accept the terms of
the License Agreement. Then, click Next.
3. Specify or browse to a folder where you want to install ArcSight Management Center, as shown below.
The default installation directory is /opt. However, you should specify a new installation directory in
/opt that will easily identify ArcSight Management Center files, such as /opt/arcmc, to distinguish
them from files associated with other ArcSight products.
4. Review the summary of installation information on the Pre-Installation Summary dialog, and then
click Install.
The ArcSight Management Center installer begins the installation process.
5. When installation is complete, click Next to begin the configuration wizard.
6. If you run the ArcSight Management Center software installer as a root user, the next dialog enables
you to specify an existing non-root user and to configure a port through which ArcSight Management
Center users will connect through the UI.
For example, you can enter 443, the standard HTTPS port, or any other that suits your needs. If any
port other than 443 is specified, users will need to enter the port number in the URL they use to
access the ArcSight Management Center UI.
Enter the user name of the non-root user and the HTTPS port number, and then click Next. (These
values may not be changed later in the process.)
7. After the software is installed, click Next to begin ArcSight Management Center initialization.
8. After initialization is complete, click Done to launch the ArcSight Management Center Configuration
wizard.
Note: The Configuration wizard should launch automatically. If it does not, use this command to
launch the wizard:
<install_dir>/current/arcsight/arcmc/bin/arcsight arcmcsetup
9. If you have run the ArcSight Management Center software installer as a root user, the next dialog
enables you to configure ArcSight Management Center to run as a system service. By default, ArcSight
Management Center runs as a system service.
When you install ArcSight Management Center as a root user, a service called arcsight_arcmc can
be configured, created, and enabled at runlevel 3 and 5.
Additionally, a few libraries are added using ldconfig. For a complete list of those libraries, see
/etc/ld.so.conf.d/arcsight_arcmc.conf and <install_
dir>/current/arcsight/install/ldconfig.out.
10. You have installed ArcSight Management Center. Click Start ArcSight Management Center Now,
or click Start ArcSight Management Center later, and then click Finish.
If you have selected to start ArcSight Management Center later, read the information in "The ArcSight
Management Center Daemon (arcmcd)" on page 31 to understand how to start ArcSight
Management Center at a later time.
11. If you selected Start ArcSight Management Center Now, click Finish to exit the wizard.
Alternatively, wait for the next dialog which provides the URL to access the ArcSight Management
Center interface.
ArcSight Management Center continues to start services and processes in the background. If you
have selected to continue within the wizard, follow the instructions on the dialog or use the instructions
in "Connecting to the ArcSight Management Center User Interface" on page 31 to connect to the
ArcSight Management Center.
Note: After some initial steps in the CLI, the installation sequence is the same as the one described for
the GUI mode install in "GUI Mode Installation" on page 22. Follow the instructions provided for the GUI
mode install to complete the installation.
./ArcSight-ArcMC-2.9.2.<installer_build_number>.0.bin -i console
1. Log in to the machine on which you wish to generate the installation properties file.
If you want the silent mode installations to be done as root user, log in as root in this step. Otherwise,
log in as a non-root user.
2. Run this command:
./ArcSight-ArcMC-2.9.2.<installer_build_number>.0.bin -r <directory_
location>
where <installer_build_number> is the build number of the installer file,
and <directory_location> is the location of the directory where the generated properties file
will be placed. This cannot be the same location where ArcSight Management Center is being installed.
The properties file must be called installer.properties.
3. Install ArcSight Management Center in GUI mode, as described in "GUI Mode Installation" on page 22
Follow the steps until step 10, and proceed with the following:
a. Click Previous instead of Done to proceed further.
b. Click Cancel to stop the installation.
4. When the confirmation message appears, click Cancel. Click Quit to clear this message.
5. Navigate to the directory location you specified for the installer.properties file earlier.
The following is an example of the generated installer.properties file.
# Replay feature output
# ---------------------
# This file was built by the Replay feature of InstallAnywhere.
# It contains variables that were set by Panels, Consoles or Custom Code.
#Choose Install Folder
#---------------------
USER_INSTALL_DIR=/opt/<arcmc_installation_folder>/<build number>/installdir
#Install
#-------
-fileOverwrite_/opt/<arcmc_installation_folder>/<build
number>/installdir/UninstallerData/Uninstall_ArcSight_Management_Center_
2.9.2.lax=Yes
#Intervention Required
#---------------------
USER_AND_PORT_1=username
USER_AND_PORT_2=443
1. Start the configuration wizard with the option to record configuration properties:
<install_dir>/current/arcsight/arcmc/bin/arcsight arcmcsetup -i recorderui
When prompted to enter a file name to capture the configuration properties, enter a meaningful name;
for example, config.properties, and then browse to choose the same directory as the
installer.properties file.
2. Step through the configuration wizard, as described starting at Step 10 of "GUI Mode Installation" on
page 22.
3. After the configuration properties file is generated, append the contents of this file to the
installer.properties file generated in the previous procedure, "Generating the Silent Install
Properties File" on page 24, to create a combined file.
For example, you can use the cat command to concatenate both files:
cat installer.properties config.properties > <combinedproperties.properties>
where <directory_location> is the path of the directory where the combined file is located, and
<combined_properties_file> is the file name of the combined file you created earlier.
Use the combined file for future ArcSight Management Center silent mode installations, as described
in "Installing Using the Generated Properties File" below.
software:
l chmod +x ArcSight-ArcMC-2.9.2.<installer_build_number>.0.bin
l ./ArcSight-ArcMC-2.9.2.<installer_build_number>.0.bin -i silent -f
<combined_properties_file>
The rest of the installation and configuration proceeds silently without requiring further input.
Note: In some cases, a spurious error message may be displayed: "SLF4J: Failed to
load class "org.slf4j.impl.StaticLoggerBinder". This is a harmless error
and may be ignored.
Note: Since the initialization script runs as su, it does not log to the console.
An example script is shown here. This is only an example. Your own script will need to be tailored for your
environment.
#!/bin/sh
# processname: arcsight_arcmc
# chkconfig: 2345 99 01
DAEMON=/<install_dir>/current/arcsight/arcmc/bin/arcmcd
DAEMON_USER=<NonRootUser-with-which-arcmc-was-installed>
[ -x "$DAEMON" ] || exit 0
exit 4
fi
exit $?
The DAEMON variable is used to specify the directory where arcmcd process is running.
The DAEMON_USER variable is used to specify which non-root user ArcMC will run as.
Finally, the su command simply wraps your existing script (defined in the variable DAEMON) and passes
any parameters to the $DAEMON script/
7. Enter the command chkconfig | grep arcsight_arcmc to determine what the chkconfig
will report after you add the init script. Expected results:
arcsight_arcmc 0:off 1:off 2:on 3:on 4:on 5:on 6:off
Tip: Be sure to update the firewall configuration when you add or remove any service or function that
requires an open port, such as FTP, SNMP, or local connector.
After you first install or upgrade ArcMC, configure the firewall to be open only for the following ports,
depending on your form factor and install:
Default Inbound Ports
Service ArcMC Appliance Software ArcMC root install Software ArcMC non-root install
SSH 22 22 22
If arcfirewall is not run, and the port not opened, the connector will not receive any events.
where hostname or IP address is the system on which you installed ArcSight Management Center. If
ArcSight Management Center was installed as root and the default port was used, then <configured_port>
is optional.
To login for the first time, use the following default credentials:
Username: admin
Password: password
For security, change the default credentials immediately after you log in for the first time. For more
information on changing credentials, see "User Management" on page 290.
The arcmcd utility enables a number of management and control tasks for the ArcSight Management
Center software process, including starting, stopping and restarting. The syntax to run arcmcd is as
follows:
<install_dir>/current/arcsight/arcmc/bin/arcmcd <command>
Where <install_dir> is the installation directory of ArcSight Management Center, and <command> is
a command listed below.
If ArcSight Management Center is installed to run as a system service, you can use arcmcd to manage a
specific ArcMCprocess.
arcmcd Commands
Command Description
start Starts aps, apache, postgresql, and web processes.
stop Stops aps, apache, postgresql, and web processes.
restart Restarts aps, apache, postgresql, and web processes.
status Displays the current status of all processes.
quit Stops aps, apache, postgresql, and web processes, as well as the ArcSight
Management Center application.
start <process_name> Starts the named process. For example, start apache.
stop <process_name> Stops the named process. For example, stop apache.
restart <process_name> Restarts the named process. For example, restart apache.
2. The uninstall wizard starts. Click Uninstall to start uninstalling ArcSight Management Center and
follow the prompts in the wizard.
3. After uninstalling, manually delete the /userdata directory.
Note: If using GUI mode and uninstalling ArcSight Management Center software over an SSH
connection, make sure that you have enabled X window forwarding using the -X option, so that
you can view the screens of the uninstall wizard.
If using PuTTY, you also need an X11 client on the host from which you are connecting.
ArcMC Agent
Host Type Required? Agent Installation
ArcMC, Logger, or Connector Appliance hardware form Yes Automatically performed when adding host.
factor (all versions)
Software Connector Appliance (all versions) Yes Manual installation required; perform
before adding host.
Software Logger (before version 6.0) Yes Manual installation required; perform
before adding host.
Software Logger (version 6.0 or later) Yes Automatically performed when adding host.
Software ArcMC (before version 2.1) Yes Manual installation required; perform
before adding host.
Software ArcMC (version 2.1 or later) Yes Automatically performed when adding host.
Automatic Installation
The ArcMC Agent is automatically installed when adding any of the following host types to ArcMC:
l Any hardware appliance (ArcSight Management Center Appliance, Connector Appliance, or Logger
Appliance)
l Software Logger 6.0 or later
l Software ArcMC 2.1 or later
As part of the Add Host process, ArcSight Management Center automatically pushes the ArcSight
Management Center Agent installer to the added host, installs the Agent, and then starts the service. The
host is then ready to manage in ArcSight Management Center. You will not need to take any manual
installation steps. For more information about the Add Host process, see "About Adding a Host" on page 86.
Note: Perl is required for the automatic installation of the ArcMC Agent. Ensure that Perl is installed on
the host prior to attempting to add the host to ArcMC.
Manual Installation
You must perform a manual installation of the ArcMC Agent on any of these host types prior to adding
them to ArcMC for management:
l Software ArcSight Management Center (before version 2.1)
l Software Logger (before version 6.0)
l ./ArcSight-ArcMCAgent-.<agent_installer_build_number>.0.bin LAX_VM
<install_dir>/current/local/jre/bin/java
where <agent_installer_build_number>is the build number of the latest installer and
<install_dir> is the installation directory of the software product.
The installation wizard starts.
2. Review the dialog box, and then click Next. The required installation path is the install directory (that
is, the same directory where Software Connector Appliance or Software Logger is installed).
3. Follow the prompts to complete the installation. The ArcMC Agent is automatically started upon
completion of the installation process.
Note: If the ArcMC Agent fails to install on the localhost, localhost management will not be
enabled. To verify correct installation of the Agent, check on the Hosts tab under Issues. Follow
the instructions shown in the tooltip to install the Agent properly and resolve any issues shown.
To manually start or stop the Agent on Software ArcMC, Software Connector Appliance,
or Software Logger:
1. Run <install_dir>/current/arcsight/<conapp|logger|
arcmc>/bin/<conappd|loggerd|arcmcd> <start|stop> arcmcagent
Agent Verification
To verify that the Agent is running on a host, use one of the following procedures:
l In the managed host’s GUI, click Setup > System Admin > Process Status. The ArcSight
Management Center Agent (arcmcagent) will be shown as a process in the running state.
l (For Software ArcMC, Software Connector Appliance, or Software Logger Only) After you install the
Agent, run this command at the command line:
<install_dir>/current/arcsight/<conapp|logger>/bin/<conappd|loggerd> status
The Agent is shown as a service in the running state.
where <install_dir> is the name of the installation directory, and <version number> is the
version, of the ArcMC Agent.
The Uninstall Wizard will launch. Click Uninstall to begin the wizard. When the uninstallation completes,
click Done.
l Always stop and then uninstall any previous version of the ArcSight Management Center Agent
before installing a new version.
l If uninstalling either Software ArcMC, Software Logger, or Software Connector Appliance, make sure
that the ArcSight Management Center Agent is uninstalled from the node before beginning the
uninstall of the managed product.
Prerequisites: Before installing multiple Logger capacity licenses on ArcMC License Server, ensure that a
base ArcMC license is installed and that ArcMC is enabled as an ODP License Server.
Note: If an external authentication mechanism such as RADIUS or LDAP is used, enter the user
password for those authentication servers. If the user password for the external authentication
mechanism is not accepted or not applicable (for example, because of client certificate authentication),
try the default admin user login name and local password.
• Overview 38
• The Menu Bar 38
• Stats (EPS In/Out) 40
• Job Manager 40
• Site Map 41
• History Management 41
Overview
This chapter provides a general overview of the ArcSight Management Center interface. ArcSight
Management Center uses a browser-based user interface. Refer to the ArcSight Management Center
Release Notes for the latest information on supported browsers.
Monitoring Summary
The Monitoring Summary page displays information on all monitored products.
l The aggregated health status for products of each type is displayed in pie graph format, showing total
number of nodes, as well as the number corresponding to each status. A summary table shows the same
data in percentage format.
l The management panel displays the Monitoring Summary table, showing all products which are
currently reporting issues.
l The navigation panel enables you to display a monitoring summary for individual product types in the
management panel. Click the product type to display the product’s monitoring summary.
For more information on viewing and configuring monitoring, see "Dashboard" on page 42.
Node Management
Use Node Management to manage any of the following node types:
l Connectors or Collectors
l Hardware or Software Connector Appliances
l Hardware or Software Loggers
l Hardware or Software ArcSight Management Centers
l Transformation Hub
For more information on adding and managing nodes, see "Managing Nodes" on page 72. From the same
menu, you can also perform selected management tasks on managed ArcSight products. See "Managing
ArcSight Products" on page 101.
Configuration Management
Use Configuration Management to create and manage node configurations, synchronization (pushing)
of configurations across multiple nodes, and expedite the initial configuration of Loggers. You can manage
any of these configuration types:
l Subscriber configurations for:
o ArcSight Management Center
o Connectors
o Connector Appliances
o Destinations
o Loggers
o System administration
l Other configurations are also managed here:
o Logger Initial configurations
User Management
User management enables you to manage users across all of your managed nodes. You can create and
edit users, user lists, their associations, and roles. You can also check to see if each node complies with a list
of authorized users on the managing ArcMC.
For more information about user management, see "Overview" on page 215
Administration
The Administration menu contains these items:
l Backup: Enables you to back up your current ArcSight Management Center configuration. For more
information, see "Managing Backups and Restores" on page 225.
l Repositories: Enables you to manage repositories that store files, such as logs, certificates, and drivers.
For more information, see "Managing Repositories" on page 231.
l Snapshot: Enables you to take a snapshot image of ArcSight Management Center, to produce logs that
are useful in troubleshooting. For more information, see " Snapshots" on page 228.
l Restore: Enables you to restore your configuration from a saved backup. For more information, see
"Managing Backups and Restores" on page 225.
l System Admin: Describes the system administration tools that enable you to create and manage users
and user groups, and to configure security settings for your system. For more information, see "System
Administration" on page 248.
l Consumption Report: Generates a report on Logger data consumption for selected managed nodes.
Job Manager
The Job Manager shows all deployment jobs processed in a specified time frame. Using the Job Manager,
you can identify issues that occurred during deployments.
The Job Manager shows the following for each job:
l Name of the Job: The job name (must be smaller than 255 characters).
l Started By: The user who ran the job.
1. On the menu bar, click the Job Manager (notepad) icon . By default, the Job Manager displays all
deployment jobs for the last 5 days. A red numeral on the Job Manager icon, if any, indicates the
number of jobs currently in the In-Progress state.
l To change the time frame for job data displayed, enter the date criteria in the date boxes in the upper
right corner, and then click Show Results.You may specify any time frame in the last 180 days (6
months).
l To search for a specific job, enter the search criteria in the Search box.
l If a job is in progress, you can click Refresh on the menu bar to refresh the display.
Site Map
For ease of accessibility and convenience, the Site Map links to all pages in the ArcSight Management
Center UI.
To access the site map: on the main ArcMC toolbar, click Site Map. Select the desired link to navigate.
History Management
History management enables you to quickly and easily access previously-navigated pages. History
management is available for Node Management, Configuration Management, User Management pages,
and for some Administration pages.
In Node Management, the navigation tree shows the full path for any item selected on the tree. Click any
node in the path to navigate directly to the corresponding page.
You also can return to any previously-browsed page by clicking the corresponding link in the breadcrumb
trail.
In addition, you can use your browser's Back and Forward buttons to navigate to previously visited pages.
• Overview 42
• Monitoring Managed Nodes 42
• Monitoring Rules 46
• Topology View 62
• Deployment View 63
Overview
Using ArcSight Management Center, you can monitor the health status of all managed nodes. You can also
configure warnings and alerts for issues of importance to you.
Note: In order for products to be monitored, they must be added as nodes to ArcSight Management
Center. For more information on managing nodes, see "Managing Nodes" on page 72.
Monitoring is displayed on the Dashboard > Monitoring Summary page. ArcSight Management Center
automatically monitors all managed nodes.
You can also configure notifications (email, SNMP, and through audit forwarding) about the status of
managed nodes.
You can view a complete list of monitored parameters in "Monitoring Rules Parameters" on page 52 , and
use them in creating your own custom rules. These rules breaches will also be displayed on the Health
History and Hardware Status panels. Note that the layout and selection of the data panels in the Monitoring
Summary is not customizable.
Tile Count
ArcMC/CHA Includes managed ArcMCs and Connector Hosting Appliances, in both hardware and software form factors.
Nodes Nodes on the managed Transformation Hub. (Note that if Transformation Hub is upgraded, the Monitoring
Summary will not reflect the correct Transformation Hub information until you import the new Transformation
Hub certificate into ArcMC. See "Downloading and Importing Host Certificates" on page 211 for more
information.)
To see the details of a node type, click the title corresponding to the node type. For example, to view the
details of all Collectors, click Collectors.
Note: The selection and layout of the panels on the Monitoring Summary is not customizable. You can,
however, customize the issues reported for a given node type by creating custom breach rules, which
can be viewed on the Severity Issue Summary. See "Monitoring Rules" on page 46
Drilling Down
You can view the details of problematic nodes, and then take action to rectify any issues.
To view all details of a problematic node, select it in the upper table. The lower table shows issues
associated with that node. Each issue is shown with these identifiers:
l Metric Type: Metric assigned to the issue.
l Metric Name: Name of the metric.
l First Occurrence: Local time of the issue's first occurrence.
l Last Occurrence: Local time of the issue's last occurrence.
l Severity: Issue severity.
l Description: Brief description of the issue.
Data Charts
Each data chart represents values of the parameter over time. Use the drop-down list to change the
interval shown from the last 4 hours, the last day, or the last week. Data charts can include any of the
metrics shown under the Valid Values for Metric Types table.
Click the data legend to toggle display of the corresponding line from the chart. Hiding some lines may
be helpful to clarify a chart with many lines.
Each day, ArcMC collects the daily ingestion information from each Connector and ADP Logger. Connectors
and Loggers give an accumulated ingestion total when not reachable by ArcMC at the time of ingestion
collection (daily at 1:00:00 ArcMC local time by default). This scenario could be caused by any of the
following:
l The ADP Logger or Connector was down.
l The ADP Logger or Connector’s server certificate has changed.
l The ADP Logger or Connector was not managed by the ArcMC.
If any managed nodes (Connector, ADP logger) are not reachable during ingestion collection time, the daily
consumption of these nodes will be counted and reflected in the consumption number on a daily report,
when ArcMC license server has successfully pulled the consumption data from the affected nodes.
Note: Daily ingestion collection only applies to License Server ArcMCs and ArcMCs that are managed by
the License Server.
The ingestion report on an individual ADP Logger includes its previous day’s ingestion during the time
window of [00:00:00 – 23:59:59] GMT. For license usage calculation, ArcMC collects the previous ADP
Logger’s ingestion during the time window of [01:00:00 – 24:59:59] ArcMC local time. The time window
used for individual Logger ingestion tracking and ingestion calculation are different; hence, it is not
recommended to compare these two reports because they will report different numbers.
Monitoring Rules
Monitoring rules are defined to generate monitoring warnings for each managed product type. ArcMC
includes many preset monitoring rules for your use. You can use these rules as written, or customize them
for your own use. In addition, you can create your own custom monitoring rules.
A monitoring rule comprises a set of logical, performance, health, or other criteria. All criteria in the rule are
evaluated together to determine the rule’s total effect, which generates an alert from ArcMC.
Rules breaches will be displayed in the Warning Severity Issue Summary, which you can view by clicking
one of the ring meters on the Monitoring Dashboard.
For example, a rule could check for the number of input events per second (criterion #1) that reach a
certain type of device (criterion #2). Should this number exceed (criterion #3) a specified level (criterion
#4), then a warning (alert) should be returned.
Breach Function
The breach function checks the backend monitor metric data table. The metric data table is updated every
3 minutes, and the breach check function runs every four minutes at the 45th second. Reducing the rule's
time range to a smaller number (e.g. 1 or 2) could result in an undetected breach.
Alerts can be delivered by email or by SNMP, or can be recorded in audit logs. Only when there is new
breach detected (i.e. not found on the previous run), ArcMC sends the notification/alert if the notification
option is enabled. If the breach keeps coming on the subsequent calls, the alert will only be sent the first
time.
For more information on managing and creating rules, see "Managing Rules" on page 51.
Preset Rules
ArcSight Management Center includes preset rules to assist in monitoring. You can use these preset rules
as written or customize them as needed for your own use. You can also create custom rules of your own.
By default, ArcMC preset rules are disabled. You must enable a preset rule in order for it to apply and
trigger alerts.
Note: For customers with previous versions of ArcMC and who already have a list of existing rules,
preset rules included in ArcMC are appended to your existing rules.
MM_DD_YYYY_RAID_ Displays a critical alert when the Raid Battery has ArcMC ConApp Logger
BATTERY_Failed_ArcMC_ failed during the last 5 minutes.
ConApp_Logger
MM_DD_YYYY_POWER_ Displays a critical alert when the Power supply has ArcMC ConApp Logger
SUPPLY_Failed_ArcMC_ failed during the last 5 minutes.
ConApp_Logger
MM_DD_YYYY_ Displays a critical alert when the temperature ArcMC ConApp Logger
TEMPERATURE_Failed_ reaches a certain level during the last 5 minutes.
ArcMC_ConApp_Logger
MM_DD_YYYY_POWER_ Sends a warning when the power supply has been ArcMC ConApp Logger
SUPPLY_Degraded_ArcMC_ degraded during the last 5 minutes.
ConApp_Logger
MM_DD_YYYY_VOLTAGE_ Displays a critical alert when the voltage levels have ArcMC ConApp Logger
Failed_ArcMC_ConApp_Logger been failing during the last 5 minutes.
MM_DD_YYYY_FAN_Failed_ Displays a critical alert when the fan has failed during ArcMC ConApp Logger
ArcMC_ConApp_Logger the last 5 minutes.
MM_DD_YYYY_HARD_DRIVE_ Sends a warning when the hard drive has been ArcMC ConApp Logger
Rebuilding_ArcMC_ConApp_ rebuilding during the last 5 minutes.
Logger
MM_DD_YYYY_RAID_ Displays a critical alert when the RAID controller has ArcMC ConApp Logger
CONTROLLER_Failed_ArcMC_ failed during the last 5 minutes.
ConApp_Logger
MM_DD_YYYY_CURRENT_ Sends a warning when the current has been ArcMC ConApp Logger
Degraded_ArcMC_ConApp_ degraded during the last 5 minutes.
Logger
MM_DD_YYYY_RAID_ Sends a warning when the raid controller has been ArcMC ConApp Logger
CONTROLLER_Degraded_ degraded during the last 5 minutes.
ArcMC_ConApp_Logger
MM_DD_YYYY_VOLTAGE_ Sends a warning when the voltage has been ArcMC ConApp Logger
Degraded_ArcMC_ConApp_ degraded during the last 5 minutes.
Logger
MM_DD_YYYY_ALL_EPS_OUT_ Displays a critical alert when all outgoing events per ArcMC ConApp Logger
ArcMC_ConApp_Logger second have failed during the last 5 minutes.
MM_DD_YYYY_HARD_DRIVE_ Displays a critical alert when the hard drive has failed ArcMC ConApp Logger
Failed_ArcMC_ConApp_Logger during the last 5 minutes.
MM_DD_YYYY_Queue Files Displays a critical alert when files have accumulated Connector
Accumulated in queue during the last 5 minutes.
MM_DD_YYYY_Receiver Down Sends a warning when the receiver has been down Logger
during the last 5 minutes.
MM_DD_YYYY_Events Dropped Displays a fatal alert when the connector events Connector
from Cache dropped from cache have been down during the last
5 minutes.
MM_DD_YYYY_Files Dropped Displays a critical alert when the connector files Connector
From Cache dropped from cache have been down during the last
5 minutes.
MM_DD_YYYY_Logger Not Displays a fatal alert when logger hasn't recevied Logger
Receiving Data data during the last 30 minutes.
MM_DD_YYYY_Storage Disk Sends a warning when the storage limit goes over Logger
Usage above 85% 85% during the last 5 minutes.
MM_DD_YYYY_JVM_ Sends a warning when the jvm memory reaches 800 ArcMC ConApp Logger
MEMORY_ArcMC_ConApp_ GB during the last 5 minutes.
Logger
MM_DD_YYYY_Memory Red Displays a critical alert when the Connector JVM Connector
Zone memory has gone over 90% during the last 5
minutes.
MM_DD_YYYY_Memory Yellow Sends a warning when the Connector JVM memory Connector
Zone has gone over 80% during the last 5 minutes.
MM_DD_YYYY_Events Dropped Displays a fatal alert when more than 100 Connector
From Queue Connector queue events dropped during the last 5
minutes.
MM_DD_YYYY_Files Dropping Displays acritical alert when Connector files dropped Connector
From Queue from queue during the last 5 minutes.
MM_DD_YYYY_RAID_ Sends a warning when the raid battery has been ArcMC ConApp Logger
BATTERY_Degraded_ArcMC_ degraded during the last 5 minutes.
ConApp_Logger
MM_DD_YYYY_ Sends a warning when the temperature has been ArcMC ConApp Logger
TEMPERATURE_Degraded_ degraded during the last 5 minutes in
ArcMC_ConApp_Logger
MM_DD_YYYY_EPS_OUT_ Displays a critical alert when the outgoing events per Connector
Connector second have been degraded during the last 5
minutes.
MM_DD_YYYY_FAN_Degraded_ Sends a warning when the fan's RPMS have failed ArcMC ConApp Logger
ArcMC_ConApp_Logger during the last 5 minutes.
MM_DD_YYYY_HARD_DRIVE_ Sends a warning when the hard drive has been ArcMC ConApp Logger
Degraded_ArcMC_ConApp_ degraded during the last 5 minutes.
Logger
MM_DD_YYYY_ALL_EPS_IN_ Displays a critical alert when all incoming events per ArcMC ConApp Logger
ArcMC_ConApp_Logger second have failed during the last 5 minutes.
MM_DD_YYYY_CPU_USAGE_ Sends a warning when the cpu usage has exceeded ArcMC ConApp Logger
ArcMC_ConApp_Logger 50% during the last 5 minutes.
MM_DD_YYYY_CURRENT_ Displays a critical alert when the current has failed ArcMC ConApp Logger
Failed_ArcMC_ConApp_Logger during the last 5 minutes.
Managing Rules
To create a custom rule:
1. Click Dashboard > Rules.
2. In the toolbar, click New.
3. Select values for the rule parameters.
4. Click Save.
To delete a rule:
1. Click Dashboard > Rules.
2. Under Monitoring Rules, select the rule you wish to delete.
3. Click Delete.
4. Click OK to confirm deletion.
To import a rule:
1. Click Dashboard > Rules.
2. In the toolbar, click Import. A new window will pop-up, click Browse, find the location of the file, select
it, and click Import.
Caution: Do not partially delete a rule from the exported breach rules file. The rules file to be
uploaded should have all the properties for all the rules in the file. Before uploading a new breach
rules file create a backup of the existing file.
Rule Settings
1. Click Dashboard > Settings.
2. In the toolbar, click Settings. The following settings are displayed: SNMP Notifications, Email
Notifications, and Audit Notifications. These settings enable or disable notifications to be sent by
ArcMC.
Metric Type Criterion being measured. For valid values of Metric Type, see the Valid Values for Metric Type
table, below. Each metric type has a Value Type constraining the kind of value which may be assigned
to it.
Product Type(s) Managed product type (or types) to which the rule applies. These are automatically selected based on
the Metric Type.
For example, if you selected a metric type that applied only to hardware, such as Voltage, only products
with hardware form factors would be available for selection.
You can also deselect types to which to apply the rule, as applicable.
Specific Node Selector Click View/Choose, and then select one or more specific nodes to which the rule applies. If none are
chosen, then the rule applies to all nodes of the selected Product Types.
Severity Breach severity. Valid values are Healthy, Warning, Critical and Fatal. Thresholds for each of these
values are defined by the administrator.
Aggregation Aggregation function applied to Metric Type data points. Valid values:
l ANY: any value
l AVG: average value (numeric values only)
l MIN: minimum value (numeric values only)
l MAX: maximum value (numeric values only)
Value Threshold value for comparison. Valid values are dependent on Metric Type.
l Percentage: Number from 1-100 (with no %-sign).
l Numeric: Numeric string.
l Boolean: true/false (case-insensitive)
l Literal Status: Status of the appliance component, and can be one of the following values: Ok,
Degraded, Rebuilding, Failed, Unavailable.
Notify Me Select one or more notification mechanisms for alerts about the rule (Email, SNMP, or Audit
Forwarding).
Status If Enabled, the rule will apply and produce alerts, as specified in Notify Me. (ArcMC rule presets are
Disabled by default.)
Time Range Evaluation interval, in hours and minutes. The total of hours and minutes must not exceed 168 hours (7
days).
Description Brief description of the rule. (Max. length 300 characters.) What kind of
value this is.
Events/Sec (SLC) Events Per Second (EPS) in (Since Last Checked) Numeric
Disk Space Hardware disk space status. Disk space will be reported as "degraded" if storage Literal Status
reaches 75% of its capacity. Other statuses are not used.
Transformation Hub All bytes received by the Transformation Hub cluster. Numeric
All Bytes In
Transformation Hub All bytes transmitted by the Transformation Hub cluster. Note that due to the Numeric
All Bytes Out replication of each topic, Bytes Out will always exceed Bytes In.
Transformation Hub Count of events per second received by Transformation Hub's Stream Processor. Numeric
SP EPS
Transformation Hub Count of events per second wating to be processed received by Transformation Hub's Numeric
SP Error Stream Processor which produced an error.
Transformation Hub Count of events per second waiting to be received by Transformation Hub's Numeric
SP Lag Stream Processor.
Rule Verification
It is possible to create syntactically valid rules that return confusing or meaningless alerts. For example, you
could create a syntactically valid rule to trigger an alert if CPU usage is below 101%, but this rule would not
return useful alerts (since it would alert you constantly).
Always verify your rules to ensure that they return meaningful values, to help you best detect problems
and issues.
Note: Custom Polling Intervals: ArcSight Management Center uses three polling intervals (4
hours, 1 day, and 1 week) associated with metric data archive types across ArcSight products. These
intervals can be adjusted for proper usage, if required.
It is strongly recommended that you adjust these intervals only if you fully understand the impact of
the changes.
Polling intervals can be specified in the file logger.properties using a text editor.
l 4-hour data (minimum allowed interval 1 minute):
monitoring.data.poll.4hour.cron=10 0/3 * * * ?
This property indicates a poll at 3 minute intervals.
l 1-day data (minimum allowed interval 5 minutes):
monitoring.data.poll.1day.cron=15 0/10 * * * ?
This property indicates a poll at 10 minute intervals.
l 1-week data (minimum allowed interval 1 hour):
monitoring.data.poll.1week.cron=20 2 * * * ?
This property indicates a poll at 2 hour intervals.
After making the changes and saving the edited file, a server restart is required for the changes to
take effect.
Note: Email alerts do not include issues with connectors or Collectors. However, containers may be the
subject of email alerts.
Before configuring email notifications, ensure that values are specified for your SMTP settings under
Administration > System Admin > System > SMTP. For more information on SMTP settings, see
"SMTP" on page 253.
Once configured, email notifications must be configured for each of the notification rules you wish to trigger
an alert.
[email protected],
[email protected]
//Default/<URI>/<Node1>
//Default/<URI>/<Node2>
snmp.version=V3
snmp.port=161
snmp.v3.authprotocol=SHA
snmp.v3.authpassphrase=<password>
snmp.v3.privacyprotocol=AES128
snmp.v3.privacypassphrase=<password>
snmp.user=<SNMP username>
snmp.community=public
snmp.system.location=<SNMP location>
snmp.trap.enabled=true
snmp.trap.version=V3
snmp.trap.port=162
snmp.trap.community=public
snmp.trap.v3.authprotocol=SHA
snmp.trap.v3.authpassphrase=<password>
snmp.trap.v3.privacyprotocol=AES128
snmp.trap.v3.privacypassphrase=<password>
----------------------------------------
5. Give the file permission: 644 and owner: arcsight.
6. Copy the file ARCSIGHT-EVENT-MIB.txt file from $ARCSIGHT_
HOME/current/arcsight/aps/conf/ to location /usr/share/snmp/mibs. Give the file permission:
644 and owner: root:root.
7. Run the script arcsight_snmpconf script as a root user, as follows:
<ArcSight_Home>/current/arcsight/aps/bin/arcsight_snmpconf <ArcSight_Home>
/userdata/platform/snmp.properties trap
This script will setup /etc/snmp/snmpd.conf file and restart the SNMP service.
9. Restart SNMP services: service snmpd restart
10. In the rules editor, open the notification rule you wish to trigger an SNMP alert, and under Notify Me,
select SNMP. Repeat for each rule you wish to trigger an SNMP alert.
Topology View
The Topology View displays your end-to-end data flow in browseable format. Shown are the logical
relationships between network devices (event producers), connectors and Collectors, and their destinations
in each of your ArcMC locations.
As your environment scales to thousands of source devices, you can use logical groupings (locations) to
model subsystems, and datacenters can quickly trace issues and drill down on details.
To display the Topology View, click Dashboard > Topology View.
The left column highlights the current topology view. The available views are based on the locations
defined in ArcMC.
Each of monitor icons represents a Device Product type, and the bubbles on the left of each monitor icon
indicate the number of devices for each Device Product type.
The severity status of each item in the topology view is indicated by its color. Item status may be Healthy
(green), Fatal (red), Critical (amber), Warning (yellow), or Unknown (gray).
The status indicates the severity as reported by the managed product. Hovering over the device product
show more details of the severity status. Clicking on any of the severity levels opens the device details
filtered by that product type and severity combination.
The Devices area shows any devices which are forwarding events in your network.
l To view the EPS (events per second) traffic to and from a device, mouse over the device.
The Connectors/Collectors area shows connectors and Collectors in the current topology view, specific to
the location.
l To view the EPS (events per second) traffic to and from a connector, and get an overview of the
connector status, mouse over the connector. Also shown are name, Device Type, Status, Path, Rule
Violation (if any), Version, and ArcMC Managed.
l To drill down and view the health of the connector in detail, including health history, click the connector.
l In some cases, such as immediately following adding a connector node, an unmanaged connector may
be displayed. This will be replaced with the connector data within a few collection cycles as data from the
new connector is collected.
l Connectors displayed with the symbol are included in a different location from the one currently
selected for viewing.
Note: Transformation Hub drill-down mode is ArcMC-location specific.
Note: If any are present, unmanaged connectors (or other nodes) in your network are noted as such
in the Topology View. ArcMC will have no visibility into unmanaged connectors, nor any visibility of
traffic from those nodes. Various scenarios for such views, and the results of each scenario, are detailed
here. To get the most complete and accurate picture of your network, you are strongly encouraged to
use ArcMC to manage all connectors which are part of your logical topology.
Deployment View
The Deployment View shows the physical relationships between network devices (event producers),
connectors, their hosts, and their destinations in each of your ArcMC locations.
To display the Deployment View, click Dashboard > Deployment View.
The left column highlights the current deployment view. The available views are based on the physical
hosts.
Each of the monitor icons represents a Device Product type, and the bubbles on the left of each monitor
icon indicate the number of devices for each Device Product type.
The severity status of each item in the topology view is indicated by its color. Item status may be Healthy
(green), Fatal (red), Critical (amber), Warning (yellow), or Unknown (gray).
The status indicates the severity as reported by the managed product. Hovering over the device product
shows more details of the severity status. Clicking on any of the severity levels opens the device details
filtered by that product type and severity combination.
The Devices area shows any devices which are forwarding events in your network.
l To view the EPS (events per second) traffic to and from a device, mouse over the device.
The Connectors/Collectors area shows connectors and Collectors in the current topology view.
l To view the EPS (events per second) traffic to and from a connector, and get an overview of the
connector status, mouse over the connector. Also shown are name, Device Type, Status, Path, Rule
Violation (if any) and ArcMC Managed.
l To drill down and view the health of the connector in detail, including health history, click the connector.
l In some cases, such as immediately after adding a connector node, an unmanaged connector may be
displayed. This will be replaced with the connector data within a few collection cycles as data from the
new connector is collected.
l Connectors displayed with the symbol are included in a different location from the one currently
selected for viewing.
The Destinations area shows connector destinations.
l To drill down and view the health of an ArcMC-managed destination in detail, click the destination.
The Topology View refreshes automatically once per minute. (You can toggle automatic data refresh with
the Auto Refresh control.) To refresh the view manually, click Refresh in the toolbar.
You can also toggle the display of legends for the graphic with the Legends control.
Click Topology View to show the topological relationships in your environment.
l In addition, it is strongly suggested you consult the Configuration Guide for the connector you plan to
deploy before deployment, to understand any special considerations or features of the connector being
installed.
You can track and manage deployment jobs and issues using the Job Manager.
Note: If you later connect to a host where Connectors were installed through Instant Deployment, and
run the Connector setup wizard from the command line, you should run agent setup by setting the
mode with option, -i, such as: ./runagentsetup.sh -i console or bin/runagentsetup.sh -
i swing, where options are swing, console, silent, and so on. For more information on options, see the
Smart Connectors User's Guide.
# ============================================================
configuration.cth.end.port=39010
To deploy a CTH:
Note: To use the Global ID feature, Generator ID Manager has to be enabled in the ArcMC so that
Generator ID can be set on the CTH.
Acknowledgment
Mode Description Performance Speed
5. Under Destination Topics, click the down arrow, then select one or more destination topics (CEF or
binary) for the CTH.
6. Select the corresponding ESM version. This is required for CTH to support Global ID when sending
events to ESM 7.2
7. Click Deploy.
Note: Please allow a few minutes after deploying or updating the CTH for the new values to be
displayed.
Note: Destination topics must always be grouped the same for multiple CTHs. For example, if a CTH is
sending events to both th-cef and th-esm topics, then any other CTH that sends events to one of these
topics must also send events to the other topic, or events will be duplicated.
Editing a CTH
To edit a CTH:
1. Click Dashboard > Deployment View.
2. In the Transformation Hub column, next to the managed Transformation Hub icon, click the edit
(pencil) icon.
3. On the CTH Parameters dialog, modify the name or destination topics, as needed.
4. Click Redeploy. The CTH is re-deployed. The job progress can be viewed in Job Manager.
Undeploying CTHs
To undeploy one or more CTHs:
1. Click Dashboard > Deployment View.
2. Click on the Transformation Hub box to drill down.
3. Click the edit (pencil) icon.
4. On the CTH Parameters dialog, click X next to any CTHs to be undeployed.
5. Click Redeploy. The job progress can be viewed in Job Manager.
SecureData Encryption
To enable SecureData encryption, you must provide the SecureData server details in the Deployment
Template for a connector.
If any proxy settings are required, these must also be provided in the Deployment Template.
To explicitly specify that no proxy be used for the SecureData client, no parameters are needed in the
Deployment Template. In addition, edit the file /etc/profile.d/proxy.sh (or its equivalent on
Windows VM) and add/edit the line “export no_proxy and export NO_PROXY” with your SecureData server
details.
If your SecureData client needs a certificate, then upload the valid certificate to ArcMC's cacerts repository
when creating the deployment template.
After all settings are configured, and a connection is ensured from the connector host to the SecureData
server, you can deploy the connector using the Instant Connector Deployment process.
Warning: SecureData settings may only be updated once. Once encryption is turned on, it may not be
turned off. Make sure you wish to use encryption before activating it.
• Overview 72
• Node Management 73
• The Navigation Tree 73
• The Management Panel 74
• Locations 85
• Hosts 86
Overview
A node is a networked ArcSight product that can be centrally managed throughArcSight Management
Center. Each node is associated with a single networked host which has been assigned a hostname, an IP
address, or both.
Node types can include any of the following ArcSight products:
l Connector Appliances or Software Connector Appliances
l Logger Appliances or Software Loggers
l Containers, connectors, or Collectors
l Other ArcSight Management Centers, either software or Connector Hosting Appliances
l Transformation Hub
A single host, such as a single deployed Transformation Hub, can comprise multiple nodes for
management purposes. In addition, a node can be in a parent or child relationship with other nodes.
You can perform any of the following node management tasks:
l View managed nodes by location, by host, or by node type.
l Add, view, edit, and delete locations for hosts.
l Add nodes from a host, import hosts from a CSV file, view and delete hosts, view all hosts in a location,
update software on hosts, move hosts to different locations, and scan hosts for new connectors or
containers.
For more information on adding hosts, see "About Adding a Host" on page 86.
Node Management
To manage nodes, on the menu bar, click Node Management > View All Nodes. The Node
Management UI displays. The Node Management UI comprises two panels:
l The left side displays the navigation tree.
l The right side displays the management panel, enabling you to perform management operations on
items selected in the navigation tree.
Management Tabs
The tabs displayed in the management panel depend on the type of item selected in the navigation tree.
The management tabs displayed will show detailed information associated with the selected item,
depending on its position in the hierarchy.
For example, if you selected a location item from the navigation tree, the Hosts, Containers, Connectors,
Collectors, ConApps, Loggers ArcMCs and TH Nodes tabs would be shown. Each tab would display the
items of the named type associated with the selected location, including details on those items.
Tab Controls
These controls are commonly displayed on all tabs in the management panel:
l Toolbar Buttons: Toolbar buttons enable operations related to the items on the tab.
l Items Table: Items corresponding to the tab header are displayed in a table. For example, locations are
listed in tabular format on the Locations tab.
l Bulk Operations Buttons: On most tabs, bulk operations buttons enable you to perform operations on
one or more items. Choose one or multiple items in the list, and then click the button to perform the
indicated operation. For example, to delete multiple items such as hosts, select one or more hosts on the
Hosts tab, and then click Delete. The selected hosts would be deleted.
In addition, each tab may have controls individual to that item type. For example, the Connectors tab
includes controls related to the management of connectors (see "Managing Connectors" on page 125).
Add Location Adds a new location. For more information, see "Adding a Location" on page 85
Delete Deletes one or more selected locations from ArcMC. For more information, see
"Deleting a Location" on page 86
Add Adds a host. Available on the Hosts tab when a location is selected in the navigation tree. For more
Host information on adding a host, see "About Adding a Host" on page 86.
Move Moves selected hosts to a new location. For more information, see "Moving a Host to a Different
Location" on page 213
Update Updates the ArcMC Agent on selected hosts. If the Agent is not currently installed, this button will
Agent install the Agent. For more information, see "Updating (or Installing) the ArcMC Agent " on page 99.
Delete Deletes selected hosts from ArcMC. For more information, see "Deleting a Host" on page 214
l Make sure the user has the permission rights for the Transformation Hub operations.
l Make sure the valid ArcMC certificate (with FQDN and .crt extension) is present in the
Transformation Hub's location: /opt/arcsight/k8s-hostpath-volume/th/arcmccerts
l Make sure that the ArcMC URL is updated with correct FQDN and port in ArcSight Installer
> Transformation Hub Configuration > ArcMC_Monitoring field.
l Note that each time the user replaces the ArcMC certificate to the TH's location, the TH's
webservice pod has to be restarted for the new certificate to be read and updated in the trust store.
l Model: If the host is an appliance, this shows the ArcSight model number of the appliance. If the host is
not an appliance, the label Software is shown.
l Type: Type of installation, either ArcMC Appliance or Software.
l Version:Version number of the software on the host.
l Action: Drop-down shows controls for executing host management tasks, which include:
o Scanning a host
o Downloading certificate details
o Updating host credentials
For more information on host management, see "Hosts" on page 86.
Properties This operation previously performed on this tab, is now performed on the new Bulk
Operations page.
Certificates Manage certificates on selected containers. For more information, see "Managing
Certificates on a Container" on page 120.
FIPS Enable or disable FIPS on selected containers. For more information, see "Enabling FIPS
on a Container" on page 118.
Upgrade Upgrades all connectors in selected containers. For more information, see "Upgrading All
Connectors in a Container" on page 114.
Credentials Manage credentials on selected containers. For more information, see "Changing
Container Credentials" on page 113.
Logs Manage logs on selected containers. For more information, see "Viewing Container Logs"
on page 117.
Restart Restart all connectors in selected containers. For more information, see "Restarting a
Container" on page 116.
Delete Deletes the selected containers from ArcSight Management Center. For more
information, see "Deleting a Container" on page 113.
The Connectors tab includes these buttons, which perform operations on one or more selected connectors:
Add (Only shown when a container is selected in the navigation tree.) Adds a connector to the selected container.
Connector
Runtime Edit the runtime parameters on selected connectors. For more information, see "Editing Connector Parameters"
Parameters on page 128.
Destinations Sets the destinations of selected connectors. For more information, see "Managing Destinations" on page 130.
Parameters Sets parameters for selected connectors. For more information, see "Editing Connector Parameters" on
page 128.
Delete Deletes connectors from ArcSight Management Center. For more information, see "Deleting a Connector" on
page 137.
The Connectors table displays the following parameters for each connector:
l Name: Name of the connector.
l Path: Path to the connector.
l Type: Type of connector.
l EPS In: Events per second received by the connector.
l EPS Out: Events per second sent by the connector to its destination.
l Cache: Connector cache size. For more information on cache files, see the SmatConnectors User Guide .
To access this document, go to https://community.softwaregrp.com/t5/ArcSight-
Connectors/tkb-p/connector-documentation.
l Last Check: Date and time of the last status check.
l Action: Drop-down shows a variety of controls for executing connector management tasks. These
include:
o Send Connector Command
Connector Sends a command to the connector. For more information, see "Sending a Command to a Connector" on
Command page 137.
Remove Removes the connector. For more information, see "Deleting a Connector" on page 137.
Connector
Run Logfu Run Logfu diagnostics on the connector. For more information, see "Running Logfu on a Connector" on
page 138.
Share Shares the connector through ArcExchange. For more information, see "Sharing Connectors in
ArcExchange" on page 144.
Tables below the toolbar show connector specifics, including basic connector data, parameters, and
connector destinations. These tables include the following columns:
Connector Data
l Type: Type of connector.
l Status: Connector status.
l Input Events (SLC): Total number of events received by the connector since it was last checked
(generally once per minute).
l Input EPS (SLC): Events per second received by the connector since it was last checked (generally
once per minute).
l In addition, the columns to the right include tools for editing a connector, editing runtime parameters,
adding a failover destination, and sending a destination command.
Connector Parameters
Click Connector Parameters to toggle display of this table. The Connector Parameters table includes:
Destinations
Click Destinations to toggle display of this table. The Destinations table includes:
Set Sets the configuration for selected Connector Appliances. For more information, see "Setting a Configuration on
Configuration ConApps" on page 103
The Connector Appliances table displays these parameters for each Connector Appliance:
l Name: Name of the Connector Appliance.
l Path: Path to the Connector Appliance.
l Port: Port number through which the Connector Appliance is communicating.
l Version: Software version of the Connector Appliance.
l Status: Status of the Connector Appliance.
l Last Check: Date and time of last status check.
l Action: Drop-down shows a variety of controls for executing Connector Appliance management tasks,
including the following:
o Rebooting
o Shutting down
o Editing or removing a configuration
For more information on Connector Appliance management, see "Managing Connector Appliances
(ConApps)" on page 101.
Set Sets the configuration for selected Loggers. For more information, see "Setting a Configuration on Loggers"
Configuration on page 111.
Upgrade Upgrades selected Loggers. For more information, see "Upgrading a Logger " on page 109
Logger
Set Sets the configuration for selected ArcMCs. For more information, see "Setting a Configuration on Managed
Configuration ArcMCs" on page 107
Upgrade Upgrades selected ArcMCs. For more information, see "Upgrading ArcMC" on page 105
ArcMC
For more information on managing other ArcSight Management Centers in ArcSight Management Center,
see "Managing Other ArcSight Management Centers" on page 103.
Locations
A location is a logical grouping of hosts. The grouping can be based on any criteria you choose, such as
geographical placement or organizational ownership. Locations are a useful way to organize a set of hosts.
For example, you could group all hosts in New York separately from hosts in San Francisco and assign them
to locations named “New York” and “San Francisco”. Similarly, you could group hosts in a location named
“Sales” and others in the location “Marketing”.
A location can contain any number of hosts. For information on adding hosts to locations, see "About
Adding a Host" on the next page.
Note: ArcSight Management Center includes one location by default (called Default) but you may add
any number of locations. The name of the Default location may be edited, and the location itself may be
deleted.
Adding a Location
You can add any number of locations.
To add a location:
1. Click Configuration Management > Bulk Operations.
2. In the navigation tree, click System and click the Location tab.
3. Click Add.
4. Enter the name of the new location, and click Save.
Editing a Location
You can edit the name of a location.
To edit a location:
1. Click Configuration Management > Bulk Operations.
2. In the navigation tree, click System, and then click the Location tab.
3. On the Locations tab, choose a location to rename.
4. Click Edit.
5. Enter the new name of the location, and click Save. The location is renamed.
Deleting a Location
When you delete a location from ArcSight Management Center, any hosts in the location (and their
associated nodes) are also deleted.
Tip: If you want to delete a location but still want to keep its hosts in ArcSight Management Center,
relocate the hosts before deleting the location. See "Moving a Host to a Different Location" on
page 213.
To delete a location:
1. Click Configuration Management > Bulk Operations.
2. In the navigation tree, click System, and then click the Location tab.
3. On the Location tab, choose one or more locations to delete.
4. Click Delete.
5. Click Yes to confirm deletion. The selected locations are deleted.
Hosts
A host is a networked system associated with a unique IP address or hostname. A host can be an ArcSight
appliance, or a system running an ArcSight software product, such as Software Logger.
For information on adding hosts to manage, see "About Adding a Host" below.
Note: In ArcMC 2.2 and later, the ArcMC localhost is added automatically for remote management. You
will be able to manage the localhost as you would any other node.
Appliance with Local l Hostname (FQDN) or IP address . Hostname or IP must be resolvable by ArcSight Management
Connectors Center: either through DNS for a hostname, or directly for an IP address. If hostname is used, the
(includes ArcSight hostname entered must match the hostname from the host’s SSL certificate. (If the FQDN fails to
Management Center resolve, restart the web service.)
Appliance, Connector l Authentication credentials (username and password) for logging into the host. If the host is
Appliance, or Logger configured for external authentication, such as LDAP or RADIUS, use the external authentication
Appliance (L3XXX)) credentials, if possible, or use the fall back credentials.
Note: See "Node Authentication Credentials" on page 90 for more information about
authentication credentials.
l Authentication credentials (username and password) for any local containers. If the appliance
includes multiple containers, then the credentials for each container must be identical. For example, if
the username and password for one container managed by a Connector Appliance is myusername
and mypassword, then myusername and mypasswordmust be the credentials for all local containers
managed by the same Connector Appliance.
Appliance without l Hostname (FQDN) or IP address . Hostname or IP must be resolvable by ArcSight Management
Local Connectors Center: either through DNS for a hostname, or directly for an IP address. If hostname is used, the
(includes Logger hostname entered must match the hostname from the host’s SSL certificate. (If the FQDN fails to
Appliance (non- resolve, restart the web service.)
L3XXX)) l Authentication credentials (username and password) for logging into the host. If the host is
configured for external authentication, such as LDAP or RADIUS, use the external authentication
credentials, if possible, or use the fall back credentials.
Note: See "Node Authentication Credentials" on page 90 for more information about
authentication credentials.
Software Form l Hostname (FQDN) or IP address. Hostname or IP must be resolvable by ArcSight Management
Factor Center: either through DNS for a hostname, or directly for an IP address. If hostname is used, the
(includes Software hostname entered must match the hostname from the host’s SSL certificate. (If the FQDN fails to
ArcSight Management resolve, restart the web service.)
Center, Software l Authentication credentials (username and password) for logging into the host. If the host is
Connector Appliance, configured for external authentication, such as LDAP or RADIUS, use the external authentication
or Software Logger) credentials if possible, or use the fall back credentials.
Note: See "Node Authentication Credentials" on page 90 for more information about
authentication credentials.
Note: See "Node Authentication Credentials" on page 90 for more information about
authentication credentials.
l Optionally, specify an inclusive port range separated by a hyphen (such as 9004-9008) to scan a
port range for all connectors.
Note: If the port range includes multiple connectors, then the credentials for each connector in the
range must be identical. For example, if the username and password for one connector in the range
was myusername and mypassword, then myusername and mypasswordmust be the credentials for
every connector in the port range.
Note: Prior to adding a software-based SmartConnector as a host, you must prepare the
Smart Connector as explained in SmartConnectors on ArcMC.
Note: See "Node Authentication Credentials" on page 90 for more information about
authentication credentials.
l Optionally, specify an inclusive port range separated by a hyphen (such as 9004-9008) to scan a
port range for all Collectors.
Note: If the port range includes multiple Collectors, then the credentials for each Collector in
the range must be identical. For example, if the username and password for one connector in
the range was myusername and mypassword, then myusername and mypasswordmust be
the credentials for every Collector in the port range.
Transformation Hub l Hostname (FQDN) or IP address. Hostname or IP must be resolvable by ArcSight Management
2.01 or earlier, or Center: either through DNS for a hostname, or directly for an IP address. (If the FQDN fails to resolve,
TH-DoK restart the web service.)
(Transformation l Port number for the Transformation Hub (default 38080)
Hub Deployment
In order to add Transformation Hub as a host, the active user must belong to an ArcMC permission
on Kafka)
l
group with rights to do so. By default, the admin user has such rights.
Note: Prior to performing the Add Host process, you will need to generate the ArcMC certificate
with complete FQDN and download the .crt file, and then copy the certificate file to your
Kubernetes master node. See Preparing to Add Transformation Hub as a Host for details on this
process.
l An SSL Certificate: An SSL certificate must be generated for any of the following host types to be
managed:
o Connector Appliance or Software Connector Appliance
o Logger Appliance or Software Logger
o Transformation Hub (any version)
o ArcSight Management Center Appliance or Software ArcSight Management Center
The hostname in the certificate must match the hostname you will add to ArcSight Management
Center. For more information on generating certificates for these host types, consult the ArcSight
Administrator’s Guide for each product. (If a host to be added already has a certificate installed, you
can use the existing certificate, as long as the hostname on the certificate matches the hostname of the
host you will be adding.)
Note: If the hostname does not match the hostname in the SSL certificate, you can regenerate a
matching certificate by doing one of the following:
l For a hardware appliance, in System Admin > Network, click the NICS tab. Under Host
Settings, note the entry in the Hostname field. (This is the value you should use to add the
host to ArcSight Management Center.) Click Restart Network Service. Then, in the
navigation menu, under Security, pick SSL Server Certificate. Click Generate Certificate.
A new certificate will be generated that matches the hostname from the NICS tab.
l For software form factor, in System Admin > SSL Server Certificate, under Enter
Certificate Settings, verify that the hostname from the NICS tab noted previously is entered
in the Hostname field. Then, click Generate Certificate. A new certificate will be generated
that matches the hostname from the NICS tab.
l Check for Agent Installation: Check the table under "Installing the ArcSight Management Center
Agent" on page 33 to determine if the ArcMC Agent needs to be installed on a host prior to adding it to
ArcMC. For some host types, the Agent will be installed automatically upon adding a host.
Note: Perl is required for the automatic installation of the ArcMC Agent. Ensure that Perl is installed
on the host prior to attempting to add the host to ArcMC.
continue management of node on which the credentials have changed or expired, use the Update Host
Credentials feature.
Dynamic Credentials
If authentication credentials are configured to change dynamically (such as with RADIUS one-time
passwords), then instead of providing external authentication credentials, you can provide the credentials
of a local user on the managed node who is permitted to use fallback authentication. ArcSight Management
Center will then try to authenticate to the managed node using the external authentication method first,
and if this fails, it will try to authenticate to the managed node using the local user credentials.
Adding a Host
Before adding a host, ensure that you have the required information for the host on hand. For more
information, see "Prerequisites for Adding a Host (for each Host Type)" on page 87.
6. Enter values for the required settings. (See About Adding a Host for the specific information required,
based on the different type of nodes.)
l In Host Credentials or Connector Credentials, enter the username and password required for
authentication.
l In Port, if required, enter the value of the port on which ArcSight Management Center will connect to
the host.
7. Click Add. The host is added to ArcSight Management Center.
Note: You can quickly deploy a Connector or Collector directly to a host in the ArcMC Deployment
View. For more information, see "Instant Connector Deployment" on page 65.
Note: On ArcSight Management Center Appliance, all local containers are added automatically as
hosts of type Software Connector.
2. Get a copy of the ArcMC server certificate, with the extension *.crt from the system where ArcMC is
running.
3. Copy the ArcMC certificate file and paste it on /opt/arcsight/th/current/cert/webservice/ directory.
4. Restart the THNC services.
5. In ArcMC, go to Node Management > View All nodes
6. From the left navigation tree, select the location where you want to add the THNC.
7. Click Add Host.
8. In the Hostname/IP field, type the fully qualified name of the THNC.
9. In the Type field, select Transformation Hub - Non-Containerized Deployment.
10. In the Port field, type 8080 and click Add.
Note: ArcSight Management Center 1.0 used a slightly different file format for importing connector
hosts. That file format is not supported by ArcSight Management Center 2.1. Use the file format
described here instead.
Each subsequent line represents one host to be imported. Each line must include values for the following
comma-separated fields for each host:
<Location>, <Hostname>,<Host Type>,<Host Username>,<Host Password>,
<Connector Username>,<Connector Password>,<Port/Port Range>,<Collector
Username>,<Collector Password>,<Collector Port/Port Range>
Some host types require values for all fields, and some are optional. An optional field with no value specified
must still include a comma to represent the empty field.
Field Description
Connector Username and password used to authenticate to the connector. Required for hosts of type Appliance with Local
Username/ Connector and Software Connector; otherwise optional.
Password
Note: See "Node Authentication Credentials" on page 90 for more information about authentication credentials.
Field Description
Port/Port Starting port or port range for connector scan. Valid values:
Range
l Port number
l Port range
l Comma-separated port numbers (for example, 9000,9004,9007)
Notes:
l For software form factors, port is required.
l For appliance form factors, to add all local containers, leave the field blank. However, if any port numbers are
entered, then certificates will be downloaded only for the specified port numbers, and only those containers will
be imported.
l For connectors, either a port or port range is required. If using port range, specify an inclusive port range, using a
hyphen between starting and ending port. For example, a specified port range of 9001-9003 would scan ports
9001, 9002, and 9003.
Note: If the port range includes multiple connectors, then the credentials for each connector in the range must
be identical. For example, if the username and password for one connector in the range was myusername and
mypassword, then myusername and mypasswordmust be the credentials for every connector in the port
range.
CorpHQ,hostname.example.com,software_connector,username,password,connector__
username,connector_password,9001-9005,collector_username,collector_
password,9006
EMEA,hostname2.example.com,appliance_without_local_connectors,
logger_user,logger_pword,,,,,
In this example, the first line would represent the required header line, the second line a Software
Connector, and the third line would represent a Logger Appliance.
Note: Importing Transformation Hub host in ArcMC is not supported. Please add Transformation Hub
host to ArcMC through the "Adding a Host" on page 91 process.
Note: Before beginning the import, stop the Agent processes on any hosts running version 1.0 of the
ArcMC Agent.
Each entry in the log will show the success or failure of each host import attempt, in the following format:
<User initiating job>, <CSV filename>, <Time of import host job
start>,<Hostname>,<Success/failure result>
For example:
admin, my_csv_file.csv, Tue Apr 08 14:16:58 PDT 2015, host.example.com, Host
added successfully
If the import hosts job has failed due to one or more invlaid entries in the CSV file, the result file will show the
parsing error details with the line number and error.
For example:
Line [1] has [connector password] field empty. [connector password] field is
required for this host type.
Exporting Hosts
Exporting hosts from an ArcSight Management Center will create a CSV list of hosts managed by that
ArcSight Management Center. (Password information is not included in this file.)
After adding passwords for each host to the file, you can then import this list of hosts into another ArcSight
Management Center, using the Import Hosts feature described under "Importing Multiple Hosts" on
page 94
Exporting hosts is most useful when you are reassigning management of hosts from one ArcMC to another.
For example, consider two ArcSight Management Centers, called ArcMC East and ArcMC West. ArcMC East
currently manages 50 hosts. However, you are consolidating management of all hosts to the new ArcMC
West. To do this quickly and easily, you would export the hosts from ArcMC East into a CSV file. Then, you
would add an additional entry for ArcMC East to the CSV file.
After adding in password data for each host, you would import the resulting CSV file into ArcMC West. At
the end of the process, all of ArcMC East’s hosts, and ArcMC East itself, would be managed by ArcMC West.
Tip: Check the version of the Agent on each host by clicking the Hosts tab and reviewing the Agent
Version column.
2. Download the new Marketplace certificate in your browser. Browse to the Marketplace website
(https://marketplace.microfocus.com/arcsight). A security exception will be noted.
3. Click More Information, then click View Certificate
Note: The exact procedure for downloading the certificate will depend on your browser. The
procedure given here applies to Firefox. Consult your browser documentation for exact steps.
4. On the Details tab, click Export, and save the certificate as X.509 Certificate (PEM).
5. Save the downloaded certificate at the following location:
For software form factor:
<install_dir>/current/arcsight/arcmc/config/certs
• Overview 101
• Managing Connector Appliances (ConApps) 101
• Managing Other ArcSight Management Centers 103
• Managing Loggers 108
• Managing Containers 111
• Managing Connectors 125
Overview
ArcSight Management Center enables management tasks on a variety of ArcSight products, including the
following:
l Hardware and Software Connector Appliances
l Hardware and Software ArcSight Management Centers
l Hardware and Software Loggers
l Containers
l Software connectors
l Transformation Hub
This chapter discusses the remote management of these products.
Rebooting a ConApp
To remotely reboot a managed Connector Appliance:
1. Click Node Management.
2. In the navigation tree, click System.
3. In the management panel, click ConApps.
4. In the list of Connector Appliances, locate the Connector Appliance to be rebooted.
5. In the Action drop-down of the Connector Appliance, select Reboot ConApp.
6. Click Next to confirm reboot.
7. The Connector Appliance is rebooted. Click Done.
Rebooting an ArcMC
To remotely reboot a managed ArcSight Management Center:
1. Click Node Management.
2. In the navigation tree, click System.
3. In the management panel, click ArcMCs.
4. In the list of ArcSight Management Centers, locate the ArcSight Management Center to be rebooted.
5. In the Action drop-down of the ArcMC, select Reboot ArcMC
6. Click Next to confirm reboot.
7. The ArcSight Management Center is rebooted. Click Done.
Upgrading ArcMC
Note: Prior to upgrading a production (PROD) system, make sure to have a Backout Plan to minimize
PROD down time. This plan will be how to restore an ArcMC to its working state prior to the Upgrade.
See Appendix E: Restoring Factory Settings if using an Appliance. See Chapter 9: Managing Backups
and Restores for restoring the working Configuration Backup.
If there are any unexpected issues during or after the Upgrade, implement the Backout Plan. Restore
the Configuration Backup of PROD in to a Staging Environment (STAGE). Test the upgrade in the
STAGE environment to troubleshoot further.
In ArcMC, you can remotely upgrade any of the following managed ArcMC types and versions.
Can
Form Upgrade File Upgrade Can Upgrade
Factor Name From... To... Comments
Software arcmc-sw- ArcMC Any later Remote operating system upgrade is not supported for
<build version 2.1 ArcMC version. software ArcMC, and, if required, must be performed
number>- manually.
remote.enc
Note: Although the filename for software ArcMC upgrade includes the word 'remote' (arcmc-sw-
<build number>-remote.enc),this file should be used for local upgrades as well.
To manage software-based SmartConnectors with ArcMC, you need to enable remote management on
each connector, as follows:
1. In a text editor, in the installation directory for the SmartConnector, open the file /<install_
dir>/user/agent/agent.properties.
2. Add the line: remote.management.enabled=true
3. If desired, customize the connector's listening port. The default is 9001. To change this value, add the
line: remote.management.listener.port=<port_number>, where <port_number> is the
new port number.
4. Save the file.
5. Restart the SmartConnector for changes to take effect.
Managing Loggers
You can perform any of the following management tasks on managed Logger Appliances or Software
Loggers using ArcSight Management Center.
l Reboot or shut down.
l Edit or remove a configuration.
l Set a configuration on one (or multiple) Loggers.
l Remotely upgrade a Logger.
Note: Not all Logger functionality is manageable through ArcSight Management Center. For a
complete discussion of Logger features, see the Logger Administrator’s Guide.
Rebooting a Logger
To remotely reboot a managed Logger:
1. Click Node Management.
2. In the navigation tree, click System.
3. In the management panel, click Loggers.
4. In the list of Loggers, locate the Logger to be rebooted.
5. In the Action drop-down of the Logge, click Reboot Logger.
6. Click Next to confirm reboot.
7. The Logger is rebooted. Click Done.
Upgrading a Logger
In ArcMC, you can remotely upgrade any of the following managed Logger types.
Can
Can Upgrade Upgrade
Form From To
Factor Upgrade File Name Version... Version... Comments
Appliance logger-<build 6.0 or later 6.1 or later The filename format for the remote upgrade file for
number>.enc Logger Appliance is logger-<build number>.enc
Software logger-sw-<build 6.0 or later 6.1 or later l The filename format for the remote upgrade file for
number>- software Logger is logger-sw-<build
remote.enc number>-remote.enc
l Remote operating system upgrade is not supported
for software Logger, and, if required, must be
performed manually.
Note: Upgrading to Logger version 6.0 requires ArcMC Agent 1167.1 or later to be running on the
managed Logger. Upgrade the Agent on the managed Logger before performing the upgrade to
Logger 6.0.
Managing Containers
A container is a single Java Virtual Machine (JVM) that can run up to four connectors. The exact number of
connectors depends on your current service agreement and the type of connector.
Containers may run on ArcMCs, on Connector Appliances, and on L3XXX model Loggers. The number of
containers that can be run at one time is based on the product license. Check under System Admin >
License & Update for this information.
Scanning a managed host will ensure all currently running containers on the host (and the connectors
associated with them) are accurately inventoried. For more information, see "Scanning a Host" on page 212.
Note: A connector of any of the following types must be the single connector running in its container:
Note: For Microsoft Windows Event Log (WINC), only one connector can be created on an ArcMC
appliance.
Editing a Container
The default name for a container is Container N, where N is a sequential number that indicates the order in
which the container was added. However, you can edit a container’s default name.
To edit a container:
1. Click Node Management.
2. In the navigation tree, navigate to the host with container you wish to rename.
3. In the list of containers, locate the container you wish to edit.
Deleting a Container
When you delete a container, the connectors that it contains are also deleted.
To delete a container:
1. Click Node Management.
2. In the navigation tree, navigate to the host on which the container resides.
3. Click the Containers tab.
4. On the Containers tab, select one or more containers to delete.
5. Click Delete.
6. Click OK to confirm deletion. The selected containers are deleted.
Caution: A container's default user name is connector_user and the default password is change_
me. ArcSight strongly recommends that for optimal security, you should change each container’s
credentials to a non-default value before deploying it to production.
6. On the upgrade page, under Select Upgrade Type, choose either Parser upgrade or Framework
upgrade.
7. Under Select Upgrade Version, from the drop-down list, choose the version to which you want to
upgrade the selected containers. (You can control the number of parser upgrade versions displayed
in the drop-down, as described in Modifying logger.properties.)
a. For a parser upgrade, if the selected parser version is from the Marketplace and not the local
repository, save your Marketplace credentials in ArcMC. This is a one-time task unless you wish to
update these credentials.
8. Click Upgrade. The upgrade is performed on all containers.
Note: If you are performing parser upgrades through a proxy server, additional configuration is
required. See Modifying logger.properties for more information.
Modifying logger.properties
To enable or modify some functionality, such as performing you may need to edit the file <install_
dir>/userdata/arcmc/logger.properties with additional parameters in any text editor.
Finally, restart the web process after making any edits to logger.properties.
After adding the previous line, owner and permissions need to be changed:
chown <non-root user>:<non-root user> logger.properties
Finally, restart the web process after making any edits to logger.properties.
proxy.port=<server port>
#Enter the proxy server credentials if the proxy server needs authentication
proxy.username=<username>
proxy.password=<password>
If set to false, parser upgrade versions from the Marketplace will not be shown in the drop-down list. In
addition, the Parser Out of Date status (on Node Management > Containers tab, Parser Version
column) will not be available.
Restarting a Container
Restarting a container will restart all the connectors in the container. You can restart multiple containers in
bulk.
Note: A 32-bit FIPS connector enabled cannot be remotely managed if it is installed on a 64-bit Linux
system.
Before you perform the following procedure, make sure FIPS mode is enabled on ArcSight Management
Center, as described in "FIPS 140-2" on page 279.
Note: Whenever you enable or disable FIPS mode on a container, check that the required certificates
are present in the trust store and add them if necessary.
Click the icon next to the container name to see the type of certificate applied to it. Click Display
Certificates from the action drop down to see the list of available certificates on the container.
Before you perform the following procedure, make sure the certificate you want to add is loaded in the CA
Certs repository.
Caution: Use caution when deleting certificates. When you delete a certificate on a container but the
connector destination is still using that certificate, the connector can no longer communicate with the
destination.
8. Select one or more certificates from the certificate list, and then click Next. The certificates are removed
from the list of certificates and no longer used. When you remove a certificate from a container in FIPS
mode, the container restarts automatically.
9. The Certificate Management wizard displays the certificates that are removed successfully in a
comma-separated list. Certificates that cannot be removed are shown in a comma-separated list
together with a reason why the certificate removal failed.
Caution: When you apply a CA Certs file, the entire trust store on the container is overwritten. All
previously-added certificates are overwritten.
Before you follow the procedure below, make sure that the CA Certs file you want to add is loaded in the CA
Certs repository.
Note: Enable a demo certificate on a container in non-FIPS mode for testing purposes only. Using a
demo certificate in a production environment is a serious security issue because the demo certificate is
not unique.
Note: Whenever you enable or disable FIPS mode on a container, check that the required certificates
are present in the trust store and add them if necessary.
Click the icon to display a list of the certificates available on the container.
Note: Diagnostic tools are also provided under Administration > System Admin.
7. From the list of available files, select the file you want to edit. The file displays in the Edit File panel.
Make your edits, and then click Next to save your edits and restart the container.
Note: When you click Next, ArcSight Management Center saves the updated file in the
Managing Connectors
A connector (also known as a SmartConnector) is an ArcSight software component that collects events and
logs from various sources on your network. A connector can be configured on ArcSight Management
Center, on a Logger platform with an integrated Connector Appliance, or installed on a computer on your
network, managed remotely. For a complete list of supported connectors, go to the ArcSight Customer
Support site.
Note: The maximum number of selected entries when managing Connectors/Collectors is 50.
Adding a Connector
Prerequisites
Before you add a connector, review the following important information.
l Make sure that the container, host, and location to which you want to add the connector exist in ArcSight
Management Center. If any of these elements do not exist, create them.
l Follow the configuration best practices described in "Configuration Suggestions for Connector/Collector
Types" on page 148.
If you are configuring the Check Point OPSEC NG Connector, see "Configuring the Check Point OPSEC
NG Connector" on page 149 and refer to the SmartConnector Configuration Guide for Check Point
OPSEC NG.
If you are configuring a database connector that requires the MS SQL Server Driver for JDBC, follow
instructions in "Adding the MS SQL Server JDBC Driver " on page 151.
Caution: This connector type has special requirements concerning JDBC and authentication setup.
Refer to the SmartConnector Configuration Guide for Microsoft SQL Server Multiple Instance Audit
DB for this important information before installing the connector.
l If you are adding a software-based connector, make sure that the username and password for the
connector match the username and password for the container to which you are adding the connector. If
necessary, refer to "Changing Container Credentials" on page 113.
Caution: Each connector's default user name is connector_user and the default password is
change_me. A connector with these default values still in place should be considered non-secure.
ArcSight strongly recommends that for optimal security, you should change each connector’s
credentials to non-default values before deploying the connector to production.
l File-based connectors use the Common Internet File System (CIFS) or Network File System (NFS). These
stipulations apply when creating a local connector to run as part of ArcMC.
o On a Windows system, a CIFS share needs to be configured before you add a file-based connector.
o For all other connectors, an NFS mount needs to be established before a file-based connector can be
added. In addition, when entering the connector parameters, enter the configuration file name
without an extension in the Configuration File field. The extension
.sdkrfilereader.properties is appended automatically.
l For detailed information about individual connector parameters, refer to the specific ArcSight
SmartConnector Configuration Guide for the type of connector chosen. The configuration guide also
describes how to set up the source device for use with the connector
To add a connector:
Tip: If you are adding a connector for the Check Point FW-1/VPN-1 system, see a more detailed
procedure in "Configuring the Check Point OPSEC NG Connector" on page 149.
Note: When entering parameters that include a file path, enter the path in POSIX format (for
example, /folder/filename).
For file-based connectors on Windows systems, specify the name of the CIFS mount point you created
for the connector. (You need to specify /opt/mnt/CIFS_share_name.)
Some connectors include table parameters. For example, the Microsoft Windows Event Log includes
parameters for each host in the domain and one or more log types (security, application, system,
directory service, DNS, file replication, and so on). You can import table parameters from a CSV file that
was exported from another connector, as long as you export it and import it from the same containers.
If the CSV file was exported from a different container, you need to change the secret parameters, such
as the password, which appear in obfuscated format in the CSV file to plain text before you import the
CSV file.
Note: For connectors that query Microsoft Active Directory to detect devices (for example,
Microsoft Windows Event Log - Unified), if the “Network Security: LDAP Server Signing
Requirements” policy is set to “Signing Required” on the Domain Controller, ArcSight
Management Center will be unable to connect to the Active Directory or browse for devices. You
see an error when selecting Windows Host Browser as the connector device browser type.
9. Choose a primary destination for the connector and enter destination-specific parameters on the
following page(s), and then click Next. Destinations can be:
l ArcSight Logger SmartMessage (encrypted)
l ArcSight Manager (encrypted)
l CEF Syslog (plaintext, that is, unencrypted)
Note: FIPS Suite B certificates are not retrieved automatically and must be uploaded manually.
To see certificate details, hover over the certificate.
l Select Import the certificate to the connector from the destination, and then click
Next to import the certificate and continue.
l Select Do not import the certificate to the connector from the destination, and then
click Next if you do not want to import the certificate. The destination will not be added.
Device Location The location of the device that sends events to the connector.
Note: The maximum number of selected entries when managing Connectors/Collectors is 50.
6. When complete, click Done. The updated parameters display in the Connector Parameters table of
the Connector summary tab.
.
5. When complete, click Done. The updated table parameters display in the Table Parameters section of
the Connector page.
Note: You can import a CSV file that was exported from another connector as long as you export
and import the CSV file from the same container. If the CSV file was exported from a different
container, you need to change the secret parameters, such as the password, which appear in
obfuscated format in the CSV file to plain text before you import the CSV file.
might have additional parameters. In this case, only those parameters shared by all connectors
are displayed for updating.
Managing Destinations
Connectors can forward events to more than one destination, such as ArcSight Manager and ArcSight
Logger. You can assign one or more destinations per connector. You can assign multiple destinations to a
connector and specify a failover (alternate) destination in the event that the primary destination fails.
The following procedures describe how to perform these actions on a specific connector or for multiple
connectors at the same time:
l Add a primary or failover destination
l Edit destination parameters and destination runtime parameters
l Remove destinations
l Re-register destinations
l Manage alternate configurations for a destination
l Send a command to a destination
For containers running 5.1.2 and earlier, upload the certificate on the container and then add the
destination.
FIPS Suite B certificates are not retrieved automatically and must be uploaded manually.
To see certificate details, hover over the certificate.
l Select Import the certificate to the connector from the destination, and then click Next
to import the certificate and continue.
l Select Do not import the certificate to the connector from the destination and click
Next if you do not want to import the certificate. The destination will not be added.
Tip: UDP connections cannot detect transmission failure. Use Raw TCP for CEF Syslog destinations.
Removing Destinations
You can remove a destination from a connector at any time. Each connector must have at least one
destination; as a result, you may not remove all destinations from a connector.
Re-Registering Destinations
At certain times, you might need to re-register the destinations for one or more connectors; for example,
after you upgrade ESM, or if a Logger appliance or ESM appliance becomes unresponsive.
Note: When enabling the demo CA for one or more connectors, use the Certificate button, instead of
editing the ESM destination.
If you have not set up alternate configurations, click next to the Default. For more information
about alternate configurations, see "Managing Alternate Configurations " below.
5. Specify or update values for the listed parameters, and then click Save.
To edit destination runtime parameters for multiple connectors at the same time:
1. Click Node Management.
2. In the navigation tree, browse to the container where the connectors reside.
3. In the management panel, click the Connectors tab.
4. From the list of connectors, select all connectors for which you wish to edit destination runtime
parameters.
5. Click Runtime Parameters to open the wizard.
6. Follow these steps in the wizard to edit the runtime parameters:
a. Select the destinations whose runtime parameters you want to modify.
b. Select the configurations to be affected (default or alternate configurations).
c. Select the group of parameters you want to modify (for example, batching, cache, network,
processing).
d. Modify the parameters.
ranges specified for other alternate configurations do not span 24 hours. For example, if you specify an
alternate configuration, Alternate#1 that is effective from 7 a.m. to 8 p.m., the Default configuration is
used from 8 p.m. to 7 a.m.
If you need to apply the same alternate configuration for multiple destinations, you need to define an
alternate configuration (with the same settings) for each of those destinations.
Hour.
6. Scroll down to the end of the page and click Save.
Deleting a Connector
To delete one or more connectors:
1. Click Node Management.
2. In the navigation tree, browse to the container where the connectors reside.
3. In the management panel, click the Connectors tab.
4. From the list of connectors, select all the connectors you want to delete.
5. Click Delete.
6. Click OK to confirm deletion.
7. Reboot the Connector Appliance or Logger system that each connector was associated with.
Note: You can also delete a specific connector from its Connector summary tab. Click at the
top of the tab to delete the connector.
CIFS (Windows) l A user account that has access to the shared drive exists on the Windows system.
l The folder to which you are establishing the mount point is configured for sharing.
l Note: NTLMv2 and NTLMv2i authentication are supported.
NFS l Grant your ArcSight system read and write permission on the NFS system.
l The account used for mounting must use the numeric ids 1500 for uid , or 750 for gid .
NFS Settings
Name A meaningful name for the mount point. The name cannot contain spaces. This name is used locally on your
system to refer to the mount point, and needs to be specified when configuring archive settings for data that
will be stored on the share.
Hostname / The name or IP address of the host to which you are creating the mount.
IP Address
Remote The folder on the remote host that will act as the root of the network file system mount. For example,
Path (for /public/system_logs.
NFS) Make sure that only this system can write to the location you specify in this field. If multiple systems (or other
systems) mount this location and write to it, data on this location will be corrupted.
Mount AutoFS options. For example, ro for read-only from the remote host, rw for read-write, or hard to keep
Options retrying until the remote host responds.
Note: Even if you configure rw permission at your mount point, rw permission is not granted to the remote
host if the host is configured to allow read-only access.
Note: NTLMv2 and NTLMv2i authentication are supported.
Parameter Description
CIFS Settings
Name A meaningful name for the mount point. The name cannot contain spaces. This name is used locally on your
system to refer to the mount point, and needs to be specified when configuring archive settings for data that
will be stored on the share.
Mount Autofs options. For example, ro for read-only from the remote host, rw for read-write, or hard to keep retrying
Options until the remote host responds.
Note: Even if you configure rw permission at your mount point, rw permission is not granted to the remote
host if the host is configured to allow read-only access.
Important: For log file connectors (for example, the Symantec AntiVirus connector), you need to enable the
directio option so that ArcSight Management Center can process new events. Enter rw,directio in the File
System Mount Options field.
Username The name of the user account with read-write privileges to the Windows share.
Make sure the username is prefixed with the domain information. For example, tahoe\arcsight.
4. Click Add.
All mount points are created under /opt/mnt. Note the name of the mount point you create. You
need to specify this name when adding a connector that will use this share to ArcSight Management
Center.
Note: You cannot edit a mount point if it is in use. The Edit link is displayed only if the mount point
can be edited.
1. Click Setup > System Admin from the top-level menu bar.
2. Click Remote File Systems in the Storage section in the left panel.
3. Select the mount point you want to edit, and click Edit from the top left side of the page.
4. Change the field values.
5. Click Save.
Note: You cannot delete a mount point that is in use. The Delete link is displayed only if the mount
point can be deleted. Once stopped, expect up to a two minute delay before the mount can be edited
or deleted.
1. Click Setup > System Admin from the top-level menu bar.
2. Click Remote File Systems in the Storage section in the left panel.
3. Select the mount point you want to delete, and click Delete from the top left side of the page.
To use a specific network interface address for events, add the parameter
connector.network.interface.name to the Connector’s agent.properties file. For example, to
use the IP address for eth1, specify the following parameter:
connector.network.interface.name=eth1
Developing FlexConnectors
FlexConnectors are custom, user-designed SmartConnectors that can read and parse information from
third-party devices and map that information to ArcSight’s event schema.
ArcSight Management Center provides a FlexConnector Development wizard that enables you to quickly
and easily develop a FlexConnector by creating a parser file, and enables you to test and package your
new FlexConnector before deploying it. The wizard generates regular expressions and provides event field
mapping suggestions automatically so you do not need to be an expert in regular expression authoring,
parser syntax, or ArcSight event schema.
Use the FlexConnector Development wizard to develop FlexConnectors for simple log files. For complex log
files, use the FlexConnector SDK (available from the ArcSight Customer Support site)
The FlexConnector Development wizard supports Regex Files, Folder Follower, and Syslog (Daemon, File,
Pipe) FlexConnectors only.
The FlexConnector Development wizard does not support the extra processors property or multiple sub-
messages. If you need these features, use the FlexConnector SDK to create your FlexConnector.
Caution: A FlexConnector that you develop with the FlexConnector Development wizard might
perform more slowly than an ArcSight SmartConnector.
To develop a FlexConnector:
1. Click Node Management.
2. In the navigation tree, browse to the container where you wish to develop the connector.
3. In the management panel, click the Connectors tab.
4. On the Connectors tab, in the Action drop-down, click Edit FlexConnector. The FlexConnector
Development wizard is launched.
5. Provide the vendor and product name of the device for which you are creating a FlexConnector, and
then click Next.
6. Select the data source type, and then click Next:
l Select Syslog to create a Syslog FlexConnector to read events from Syslog messages.
l Select File to create a FlexConnector to parse variable-format log files using regular expressions
(ArcSight FlexConnector Regex File) or to parse variable-format log files in batch mode (ArcSight
FlexConnector Folder Follower).
7. Upload a sample log file for the data source type you selected in the previous step, and then click
Next.
8. The wizard finds the first unparsed line in the log file, generates a regular expression to match and
extract tokens from that line, and displays the suggested field mappings for each extracted token in
the Mappings table.
Note: The mappings are displayed in descending order of probability (based on ArcSight
training data). You can change the mappings by selecting from the list.
The percentage of parsed lines in the file is shown in the top right of the panel. You can use this
percentage to estimate where you are in the log file. The percentage of unparsed lines skipped in
the file is also shown in the top right of the panel.
l To change the regular expression in the Regex box and recalculate the mappings, edit the
expression and then click the Recalculate button.You can set the regular expression back to the
suggested value by clicking the Reset button.
l Field mappings that do not correspond directly to the extracted tokens in the unparsed line of the
log file are displayed in the Extra Mappings table. You can change the Event Field and provide a
token operation. To add a new Event Field, click Add Row.
You can use extra mappings to:
l Remap an extracted token to a different Event Field in addition to the existing mapping. For
example, you can add an Event Field with the value $3 where $3 is the third token in the list of
suggested mappings.
l Map a modified token or combination of tokens to an Event Field. For example, you can add an
Event Field with the value __operation($1,$3).
l Map an Event Field to a constant string or integer. For example, you can add an Event Field with
the value __stringConstant(constant).
For a list of the token operations used when tokens are mapped to ArcSight event fields, refer to
the FlexConnector Developer’s Guide (available from the ArcSight Customer Support site).
9. Click Next to save the mapping to the parser file and display the next unparsed line in the log file.
After all unparsed lines in the log file have corresponding regular expressions and mappings, the
wizard displays the parser file for review.
10. Review the parser file and make changes, if necessary, directly in the Review Parser File panel.
11. Click Next to save and package the parser file.
12. Choose how you want to deploy the FlexConnector:
l Select Deploy parser to existing connector in container, and then click Next to use the parser
file with an existing connector. Click Done to close the FlexConnector wizard and re-display the
Container tab.
Note: The Deploy parser to existing connector in container option displays only if the
container already contains a connector of the same type.
l Select Add new connector to container, and then click Next to add the parser as a new
connector. Follow the steps to add the connector to the container.
You can share FlexConnectors with other users. See "Sharing Connectors in ArcExchange" on the next
page.
Editing FlexConnectors
After you have developed a FlexConnector with the FlexConnector wizard and have deployed it in a
container, you can edit the FlexConnector to make changes to the parser file when needed.
The FlexConnector Edit wizard is available on the Connectors tab in the Action drop-down.
Click Edit Connector in the Action drop-down for the FlexConnector to open the wizard, then edit the
parser file.
Caution: Only edit a FlexConnector that is created with the FlexConnector wizard. Editing manually-
created FlexConnectors might produce unpredictable results.
Note: ArcExchange will not be able to reach the ArcSight Protect724 Community if access is
attempted through a proxy server.
l To upload to ArcExchange, you must have a valid username and password for Protect 724.
l Make sure that you have configured network settings under Administration > System Admin >
Network and that ArcSight Management Center can communicate with the Protect 724 server.
e. If you previously selected Advanced mode for a FlexConnector, select the configuration parameters
you want to display when the connector is deployed and then provide default values for these
parameters. Parameters you do not select are pre-configured with the current values.
If any advanced connector parameters were previously modified from their defaults, the wizard
displays these parameters so that you can select which ones you want to be configured
automatically during deployment.
Note: Configuration parameters are not displayed for parser overrides. If the connector has
table parameters, they are not displayed during packaging. However, when the connector is
downloaded to a container, you are prompted to provide values for all the table parameters.
f. Provide a description of the AUP package and instructions on how to configure the device used by
the connector.
g. Provide the vendor, product, and version of the device used by the connector.
If the wizard can determine the vendor, product, and version of the device, the information is
displayed in the fields provided. You can change the information to meet your needs.
h. Upload the created AUP package to ArcExchange or to your local machine. You will require a
username and password for the Micro Focus Community.
Downloading Connectors
You can download a FlexConnector or parser override that is available from ArcExchange on the Micro
Focus Community or from your local computer. You download a FlexConnector or parser override directly to
a container.
You can download only one FlexConnector per container using the download wizard. However, there is no
limit to the number of parser overrides you can download to a container.
l When downloading a parser override to a container, the download wizard overwrites any existing
parser override with the same name in the container without prompting for confirmation. To avoid
overwriting an existing parser override, send a Get Status command to the existing parser
override to check the parser information before you download a new one. For information on
sending a Get Status command, refer to "Sending a Command to a Connector" on page 137.
l Always back up the container to the Backup Files repository before downloading a connector or
parser override so you can revert to the previous configuration if the download produces
unexpected results.
Syslog Due to the nature of UDP (the transport protocol typically used by Syslog), these
connectors/Collectors can potentially lose events if the configurable event rate is exceeded.
This is because the connector delays processing to match the event rate configured, and
while in this state, the UDP cache might fill and the operating system drops UDP messages.
Note: Do not use the Limit CPU Usage option with these connectors because of the
possibility of event loss.
SNMP Similar to Syslog connectors, when the event rate is limited on SNMP connectors, they can
potentially lose events. SNMP is also typically UDP-based and has the same issues as Syslog.
Database Because connectors follow the database tables, limiting the event rate for database
connectors can slow the operation of other connectors. The result can be an event backlog
sufficient to delay the reporting of alerts by as much as minutes or hours. However, no events
will be lost, unless the database tables are truncated. After the event burst is over, the
connector might eventually catch up with the database if the event rate does not exceed the
configured limit.
File Similar to database connectors, file-based connectors follow files and limiting their event rates
causes an event backlog. This can eventually force the connector to fall behind by as much
as minutes or hours, depending on the actual event rate. The connectors might catch up if
the event rate does not exceed the configured rate.
Asset Scanner All connectors on ArcSight Management Center run as a service (not as an application).
Therefore, asset scanner connectors running onConnector Appliance are notsupported in
Interactive mode.
To run the asset scanner connector in Interactive mode, install the connector on a standalone
system and manage it as a software-based connector.
Proprietary API The behavior of these connectors depends on the particular API, (for example, OPSEC
behaves differently than PostOffice and RDEP). But in most cases, there will be no event loss
unless the internal buffers and queues of the API implementation fill up. These connectors
work much like database or file connectors.
Included FlexConnectors
ArcSight ArcSight Management Center Connector Applianceincludes these prototype FlexConnectors:
l ArcSight FlexConnector File
l ArcSight FlexConnector ID-based Database
l ArcSight FlexConnector Multiple Database
l ArcSight FlexConnector Regular Expression File
l ArcSight FlexConnector Regular Expression Folder File
l ArcSight FlexConnector Simple Network Management Protocol (SNMP)
l ArcSight FlexConnector Time-based Database
l ArcSight FlexConnector XML File
You can use these prototypes to develop your own FlexConnectors, and these can be shared with other
users. Refer to "Sharing Connectors in ArcExchange" on page 144.
For more information, consult the FlexConnector Developer’s Guide, available from ArcSight Customer
Support.
Note: The following stipulations apply to configuring the Check Point OPSEC NG Connector:
l This procedure is supported only for ArcSight connector release 4.6.2 or later.
l A hostname is called an Application Object Name on Check Point. A password is a Communication
Activation Key on Check Point.
Parameter Description
Name A meaningful name for the application object you are creating; for example, ArcSightLea-1.
This name is used to pull the OPSEC certificate.
Host The hostname of the ArcSight Management Center system managing the connector.
Secure Internal If a DN string is not present, initialize the communication by providing an activation key. The activation
Communication key is used when the certificate is pulled. This is the SIC Name.
Click Communication > Initialize.
After the object is created, note down the following information, which you will need to provide when
continuing configuration.
l SIC Name: DN string that you obtain after initializing communication as described below.
l SIC Entity Name: Double-click the Check Point Gateway name in the SmartDashboard to view its
general properties. The SIC Entity Name is the SIC string configured in the general properties
window.
l Check Point IP address or hostname.
2. Pull the Check Point certificate.
To do so, run the Pull OPSEC Certificate command on the container to which you will be
adding the connector. For detailed information about running a command on a container, see
"Sending a Command to a Container" on page 113. You need to provide this information when running
the command:
Parameter Description
Application object name The OPSEC Application object name you specified in the previous step. This parameter is
case sensitive.
Password The activation key you entered when creating the OPSEC application object in the previous
step.
Note down the OPSEC SIC Name (CN=ArcSightLea-1,0=cpfw1.5ad8cn in the above example) and the
file name (ArcSightLea-1.opsec.p12 in the above example).
Tip: If the certificate is not pulled successfully, check to ensure that the Application object name
you specified is correct (including the case) and the container on which you are running the
command is up and running.
3. Install Policy on the LEA client for the Check Point Gateway using the SmartDashboard.
On Connector Appliance:
1. Add a Check Point connector by following instructions described in "Adding a Connector" on page 125.
You need to provide the following information.
Parameters Values to input
Connection SSLCA
Type
The new driver file is added to the repository, as shown in the following example.
After you have installed the JDBC driver, you need to upload the driver file to the containers that will
hold the SQL Server database Connectors. Follow the instructions in "Uploading Files to a Repository"
on page 239.
After the driver file has been uploaded to a container, follow the instructions in "Adding a Connector"
on page 125 to add a connector that requires a JDBC driver.
• Overview 153
• Global Event ID 154
• Generator ID Management 154
• Configuration Management 156
• Managing Subscribers 161
• Pushing a Subscriber Configuration 163
• Checking Subscriber Compliance 165
• Comparing Configurations 166
• Configuration Management Best Practices 167
• Subscriber Configuration Types 167
• Logger Initial Configuration Management 189
• Managing Logger Event Archives 192
• Managing Logger Peers 194
• Managing Transformation Hub 197
• Deployment Templates 199
• Bulk Operations 202
Overview
A configuration is a group of related appliance or software settings and their associated values, which
applies to one or more node types. A configuration created for a node can be pushed to nodes of the same
type managed by ArcSight Management Center, assuring uniformity across a group of nodes.
Configurations come in these kinds:
l A subscriber configuration is for the routine management of multiple managed ArcSight products. You
can easily assign values to, propagate, and maintain the same settings across multiple nodes of the same
type, including connectors, Collectors, Connector Appliances, Loggers, or other ArcMCs.
l A initial configuration is for the rapid, uniform setup of multiple ArcSight Loggers (only). Use an initial
configuration to expedite the initial deployment of ArcSight Loggers to a production environment.
Configuration management tasks include:
l Configuration Creation: A configuration for a node type can be created (as well as edited or deleted) in
ArcSight Management Center.
l Configuration Import: A configuration can be created directly on a managed node, exported, and then
imported into ArcSight Management Center for sharing with nodes of the same type.
l Configuration Push: A configuration can be pushed from ArcMC to managed nodes. This copies the
configuration from ArcMC and changes the settings on each destination node.
l Subscriptions: Managed nodes can be subscribed to a subscriber configuration, so they can receive a
new or updated configuration pushed from ArcSight Management Center.
l Compliance Checks: Check whether the settings and their values on a managed node match the ones for
a configuration type specified in ArcSight Management Center. If so, the node is said to be in compliance
with the configuration.
l Comparisons: Compare two configurations of the same type quickly, with a field by field breakdown of
each setting, its value, and any differences. You can compare the values of a configuration on a
subscriber node to the values of the baseline or reference configuration on an ArcMC which manages it.
You can also compare two configurations of the same type on a single ArcMC.
For example, a typical workflow for a subscriber configuration might work as follows: you can create a
suitable DNS configuration for an appliance, specifying primary DNS server, secondary DNS server, and
search domains for the appliance. (See "Destination Configuration Types" on page 174.) You can then push
your DNS configuration to subscribing appliances, and so ensure that DNS settings for all subscribed
nodes are configured identically with a single action.
If you later updated the configuration to use a new primary DNS server, you could push the new
configuration to all subscribers, and all of them would be updated for the new DNS server with one action.
At any time, you could verify any managed node’s compliance with the configuration to determine if its
settings were assigned the desired values.
Global Event ID
Every event generated by an ArcSight component will have a unique Global Event ID. This will help in
identifying the events in case the same event is seen in multiple ArcSight components like Logger, ESM,
and Transformation Hub.
Generator ID Management
This new feature allows users to generate an ID to assign it to a non-managed product.
3. Enter the numeric values between 1 and 16384 for the Generator ID range (Start and End) and click
Save. ArcMC will set the generator ids for itself if not set already.
4. Restart all ArcMC processes to continue.
Logger
l Remote Upgrade: Upgrade from and to Logger version 6.7 or later.
l Adding a Host version 6.7 or later.
ArcMC
l Remote Upgrade: Upgrade from and to ArcMC version 2.9 or later.
l Adding a Host version 2.9 or later.
l Scanning a Host.
l Setting the Generator IDs on localhost by enabling the Generator ID Manager.
Configuration Management
To create or manage configurations, on the menu bar, click Configuration Management. To manage a
specific configuration type, select the configuration type from the sub-menu.
For example, to access subscriber configurations for Loggers, click Configuration Management
> Subscriber Configurations > Logger Configurations.
Click any column header to sort the Configurations table by that column.
To view the details of any configuration, click its name in the list. The Details and Subscribers tabs will
display additional information.
Tip: To select multiple items from any list, Shift+Click or Ctrl+Click while selecting.
Configuration Name
Each configuration has a unique name. A configuration may be up to 255 characters in length.
General
General details describe the basics of the configuration, as follows:
l Configuration Type: The type of the configuration. For details of configuration types, see " Subscriber
Configuration Types" on page 167.
l Last Edited By: The most recent user to edit the configuration.
Properties
A property is a group of one or more settings for the configuration. For example, for the NTP Server
configuration, the property includes two settings: Enable as NTP Server (a Boolean value indicating
whether to enable the product as an NTP server), and NTP Servers (a list of NTP servers).
The specific parameters included in each property are pre-defined for each configuration type. ArcSight
Management Center prompts for values of each setting when the property is selected. Each parameter
must be assigned a valid value corresponding to its data type. For instance, if the data type is integer, you
must specify an integer value. A red asterisk (*) indicates a required parameter.
List Configurations
A configuration type that can include more than one property is known as a list configuration. A list
configuration represents a configuration with multiple instances of data values of the same kind. Each
instance is known as a property.
For example, the Connector Map File configuration could include information on multiple map files. Each
Property would represent a different map file (with different values for file path and content).
Note: A pushed list configuration will override any existing configuration of the same type on the
managed node. To append data to an existing configuration, use the bulk management tools (Set
Configuration)
For a description of supported configuration types, the parameters associated with each type, and their
data types, see "The Configurations Table" on the previous page.
Check Compliance Checks the compliance of all subscribers with the baseline configuration.
Unsubscribe Removes one or more selected subscribers from the subscriber list.
Non-Compliance Reports
You can determine why a compliance status is Non-Compliant.
For a compliance status of Non-Compliant, click the status to display the Configuration Comparison
dialog, which compares all setting values for the configuration on ArcMC and on the managed node.
Click Push Configuration to push the configuration to the managed node in order to make it Compliant.
Note: The following subscriber configuration types cannot be created in ArcSight Management
Center, but can only be imported from managed nodes:
l Logger Storage Group
l Logger Filter
To create a configuration:
1. Click Configuration Management > Subscriber Configurations > All Configurations.
Tip: To filter for a specific subscriber configuration type, select the desired configuration type
from the Subscriber Configurations sub-menu.
To edit a configuration:
1. Click Configuration Management > Subscriber Configurations > All Configurations.
Tip: To filter for a specific subscriber configuration type, select the desired configuration type
from the Subscriber Configurations sub-menu.
2. From the Configurations table, click the name of the configuration to be edited.
3. On the Details tab, click Edit.
Note: If configuration import to the localhost fails, restart the web service on the localhost.
4. Click Continue.
5. On the Import Configuration dialog:
a. Select a configuration type for the imported configuration from the Type drop-down list. (The
entries in the list depend on the configuration types which apply to the node chosen in Step 3.)
b. In Name, enter a name for the imported configuration.
6. Click Import. The configuration is imported into ArcSight Management Center and is shown in the
Configurations table.
Note: In order to import a backup configuration from a Connector Appliance, Logger, or ArcMC
node, the node must have a scheduled backup to begin with.
Managing Subscribers
A subscriber is a managed node to which a configuration may be pushed. A subscriber to which a
configuration is pushed will receive and process the pushed configuration and apply it to the managed
node, so that the managed node's settings are the same as the settings specified in the configuration.
Each node can subscribe to only one configuration of each configuration type.
For example, a Logger appliance could subscribe to one Logger Storage Group configuration, but the same
appliance could also subscribe to a Logger Filter configuration as well as a Logger Transport Receiver
configuration.
Viewing Subscribers
To view subscribers for a configuration:
1. Click Configuration Management > All Configurations.
2. From the list of configurations, locate the configuration for which you wish to view subscribers.
3. Click the name of the configuration.
4. Click the Subscribers tab. The current subscribers are displayed.
Adding a Subscriber
A subscriber (that is, a subscribed node) can receive a pushed configuration.
2. From the Configurations table, click the name of the configuration to which you wish to add
subscribers.
3. Click the Subscribers tab.
4. Click Add Subscribers.
5. On the Add Subscribers dialog, select a node to add as a subscriber. The list of potential subscribers
is determined by the selected configuration type. To select multiple nodes for subscription, Ctrl+Click
each node.
Note: A node may only subscribe to one configuration of each type; for example, one DNS
configuration.
If you attempt to add a subscriber which is already subscribed to a configuration of the same type,
the following message is displayed: No available subscribers have been found for the selected
configuration.
Unsubscribing a Subscriber
After being unsubscribed, a node can no longer receive a pushed configuration.
2. From the Configurations table, click the name of the configuration from which you wish to remove
subscribers.
3. Click the Subscribers tab.
4. Select one or more subscriber from the list of subscribers.
5. Click Unsubscribe.
6. Click OK to confirm. The selected subscribers are unsubscribed.
Note: If a configuration push to the localhost fails, restart the web service on the localhost.
2. From the Configurations table, select a configuration to be pushed, and click the name of the
configuration.
3. On the Configuration Details and Subscribers page, click the Subscribers tab.
4. On the Subscribers tab, select one or more subscribers to which to push the configuration.
5. Click Push.
6. Click Yes to confirm the push. The configuration is pushed to the selected subscribers. A compliance
check is automatically performed on each recipient.
Push Validation
During a push to subscribers, the configuration is automatically validated by ArcSight Management Center.
Validation ensures that a pushed configuration contains appropriate, meaningful values for all settings. If
any configuration values are found to be invalid, the push will fail, and an error message will be returned.
Hover over the subscriber’s entry on the Subscribers tab, in the Push Status column, to show the cause
of the failed push. In addition, a compliance check is automatically performed after the push.
Push Remediation
If a push to a subscriber fails, you may be able to remedy the failure by following these steps:
l The Last Compliance Check column is updated to show the most recent check.
Automatic compliance checks will run every 12 hours. So this will be the date and time of the
latest automatic check.
Comparing Configurations
You can compare two configurations of the same type to verify whether they contain the same settings. The
following two comparisons are possible:
l Comparing two configurations on a single ArcMC. You can compare two configurations of the same
type on a single ArcMC. For example, you could compare the settings for two different SMTP
configurations.
l Comparing the configuration on a subscriber to the same configuration on its managing
ArcMC. You can quickly check to see how the settings for a configuration on a subscribing node differs
from the same configuration on its managing ArcMC.
3. In the configurations list, select the configuration you wish to compare between ArcMC and the
subscriber.
4. Under Configuration Details & Subscribers, click the Subscribers tab.
5. In the Compliance column, click the status link.
The Configuration Comparison dialog shows each setting for the configuration and the current value for
each compared item.
Optionally, if the subscriber is Non-compliant with the configuration on its managing ArcMC, click Push
Configuration to push the configuration to the subscriber (which will make it compliant).
To export the comparison as a PDF report, click Export to PDF.
Row Number* Integer Row number of the table parameter to which the configuration is pushed.
Log File Type* String Log file type. Valid values are:
l main
l im
l ssl
l streaming
Processing Mode String Processing mode. Valid values are Batch and Real time.
Processing Threshold Integer Interval, in hours, after which the log file will be marked as processed.
Processing Limit Integer Number of files that can be read in the directory at the same time.
FIPS Configuration
A FIPS configuration enables or disables FIPS mode on a container.
Note: After pushing a FIPS configuration, the destination container will be restarted.
After adding the previous line, owner and permissions need to be changed:
Protocol* Enum Protocol of the syslog connector (either UDP or Raw TCP).
Active Directory String Hostname for the Active Directory server, if one is used.
Host o If specified, values for User, User Password, Base DN, Protocol, and Port must be specified in
subsequent entries.
Global Catalog String Hostname for the Global Catalog server, if one is used.
Server o If specified, values for User Name, User Password, and Base DN must be specified in
subsequent entries.
WEF Collection* String Indicates if Windows Event Format collection is enabled. Valid values are:
o Disabled
o Enabled (use Active Directory for sources)
o Enabled (do not use Active Directory for sources)
Note: WEF collection is only supported for Connector versions 6.0.6 or later. Otherwise,
compliance checks for checks for WUC External Parameters configurations will always fail.
Enable GUID Translation* Boolean If true, Globally Unique Identifier translation is enabled.
Enable SID Translation Boolean If true, SID translation is used even for events Windows does not translate.
Always*
Global Catalog Security Enum Security protocol used by Global Catalog server.
Protocol
Host Browsing Threads Integer Time in milliseconds between host browsing queries.
Sleep Time
Inactivity Sleep Time Integer Time in milliseconds to sleep if no events are retrieved from the configured hosts
Log Rotation Check Interval Integer Time in milliseconds to wait before checking for log rotation.
Reconnect Interval Integer Time in milliseconds after which the connection to a previously down host is to be
retried.
Rotation Retry Count Integer Number of times to check that log has been rotated.
Sleep Time Integer Time, in milliseconds, to sleep before collecting more events from hosts (-1 means
disable sleep time).
Backup String IP address of the remote system where the backup will be saved.
Server IP
Address*
Base String Destination directory on the remote system. Must be manually created on remote system prior
Remote to push. After a push, the destination host name is appended to this, to give it a unique value
Directory* across all nodes.
Days of the List of comma- Comma-delimited list of days of the week on which the backup will be performed. Valid values are
Week* separated Su, M, T, W, Th, F, Sa.
strings
Hours of List of comma- Comma-delimited list of hours of the day at which the backup will be performed. Valid values are
Day* separated integers from 0 to 23, where 0 is 12:00 midnight. For example, a value of 14 would correspond to
integers 2 PM.
Note: Destination Configuration Parameters configurations can only be imported from managed
Collectors/Connectors, not created in ArcSight Management Center. See "Importing a Subscriber
Configuration" on page 160 for more information.
For a description of the parameters for this configuration type, see "Destination Runtime Parameters " on
page 313.
Note: So as not to interfere with ESM connector management, ArcMC will not push Network and
Zones AUPs to a connector's ESM destination folder.
Networks CSV Comma-separated Value (CSV) file. Click Upload to upload a valid CSV file, or click Download to
CSV Content* download an existing file.
Creating a CSV File
The CSV must include the literal header line:
#Type,Name,Parent Group URI,Customer URI
Then, each line describes a Network. Each line must comprise values for the following fields, and end with
a hard return (no white spaces). Begin the first of these network lines with the # character before Type.
<Type>,<Name>,<Parent Group URI>,<Customer URI>
Zones CSV Comma-separated Value (CSV) file. Click Upload to upload a valid CSV file, or click Download to
CSV Content* download an existing file.
Creating a CSV File
The CSV must include the literal header line:
#Name,Start Address,End Address,Parent Group URI,Network URI
Then, each line describes a Zone. Each line must comprise values for the following fields, and end with a
hard return (no white spaces). Begin the first of these zone lines with the # character before Name.
<Name>,<Start Address>,<End Address>,<Parent Group URI>,<Network URI>
SCP Port* String Port of the remote system. Default value is 22.
Backup String IP address of the remote system where the backup will be saved.
Server
IP Address*
Base String Destination directory on the remote system. After a push, the destination host name is
Remote appended to this, to give it a unique value across all nodes.
Directory*
Days of the List of comma- Comma-delimited list of days of the week on which the backup will be performed. Valid values are
Week* separated Su, M, T, W, Th, F, Sa.
strings
Hours of List of comma- Comma-delimited list of hours of the day at which the backup will be performed. Valid values are
Day* separated integers from 0 to 23, where 0 is 12:00. For example, a value of 14 would correspond to 2 PM.
integers
Backup String Type of content to be included in the backup. Valid values are:
Content*
l All: includes all backup data.
l Report_Content_Only: includes only report data.
Note: Logger Connector Forwarder configurations can only be imported from managed Loggers, not
created in ArcSight Management Center. See "Importing a Subscriber Configuration" on page 160 for
more information.
Filter Type* Enum Filter type that was selected while creating a forwarder on logger. Valid types are Unifiedor
Regex.
Query String Used to filter events that the forwarder will forward.
Unified Query Filters String Select from the default and user-defined Unified filters on the source Logger. Only visible if
Filter Type is Unified.
Regular String Select from the default and user-defined Regex filters on the source Logger. Only visible if
Expression Filters Filter Type is Regex.
IP/Host* String IP address or host name of the destination that will receive forwarded events.
Port* Integer Port number on the destination that will receive forwarded events. Ensure this port is open
on the destination.
Note: Logger ESM Forwarder configurations can only be imported from managed Loggers, not
created in ArcSight Management Center. See "Importing a Subscriber Configuration" on page 160 for
more information.
Filter Type* Enum Filter type that was selected while creating a forwarder on logger. Valid types are Unifiedor
Regex.
Query String Used to filter events that the forwarder will forward.
Unified Query Filters String Select from the default and user-defined Unified filters on the source Logger. Only visible if
Filter Type is Unified.
Regular String Select from the default and user-defined Regex filters on the source Logger. Only visible if
Expression Filters Filter Type is Regex.
IP/Host* String IP address or host name of the destination that will receiveforwarded events.
Port* Integer Port number on the destination that will receive forwarded events. Ensure this port is open on
the destination.
Note: Logger Filter configurations can only be imported from managed Loggers, not created in
ArcSight Management Center. See "Importing a Subscriber Configuration" on page 160 for more
information.
Filter String Category of filter. Valid values are Shared, System and SearchGroup.
Category
Filter Type* String Type of filter. Valid values are RegexQuery or UnifiedQuery.
Permission String Permission group which with the Logger filter is associated. When the configuration is
Group pushed:
l If the permission group is not present on the target Logger, the permission group will be
created during the push.
l If the permission group of the same name is already present on the target, but has
different rights, the rights of the permission group on the target Logger will not be
overwritten, and the association between the filter and the permission group will be
removed.
Note: Logger Storage Group configurations can only be imported from managed Loggers, not created
in ArcSight Management Center. See "Importing a Subscriber Configuration" on page 160 for more
information.
Note: Logger TCP Forwarder configurations can only be imported from managed Loggers, not
created in ArcSight Management Center. See "Importing a Subscriber Configuration" on page 160 for
more information.
Filter Type* Enum Filter type that was selected while creating a forwarder on logger. Valid types are Unified
or Regex.
Query String Used to filter events that the forwarder will forward.
Unified Query Filters String Select from the default and user-defined Unified filters on the source Logger. Only visible if
Filter Type is Unified.
Regular String Select from the default and user-defined Regex filters on the source Logger. Only visible if
Expression Filters Filter Type is Regex.
IP/Host* String IP address or host name of the destination that will receive forwarded events.
Port* Integer Port number on the destination that will receive forwarded events. Ensure this port is open
on the destination.
Preserve System Boolean If Yes, the timestamp showing original event receipt time is preserved.
Timestamp*
Preserve Original Syslog Boolean If Yes, event is sent as is, without inserting Logger's IP address in the hostname (or
Sender* equivalent) field of the syslog event.
Connection Retry Integer The time, in seconds, to wait before retrying a connection.
Timeout*
A pushed Transport Receiver type configuration will overwrite any existing UDP, TCP, CEF UDP, or CEF
TCP receiver. Any other type of receivers, such as SmartMessage receivers, are not affected.
Logger Transport Receiver Configuration Parameters
Parameter Data Type Description
Port* Integer Port number. Must be a non-zero positive number. Ensure this port is open on the destination.
Note: Logger UDP Forwarder configurations can only be imported from managed Loggers, not
created in ArcSight Management Center. See "Importing a Subscriber Configuration" on page 160 for
more information.
Filter Type* Enum Filter type that was selected while creating a forwarder on logger. Valid types are Unified
or Regex.
Query String Used to filter events that the forwarder will forward.
Unified Query Filters String Select from the default and user-defined Unified filters on the source Logger. Only visible if
Filter Type is Unified.
Regular String Select from the default and user-defined Regex filters on the source Logger. Only visible if
Expression Filters Filter Type is Regex.
IP/Host* String IP address or host name of the destination that will receive forwarded events.
Port* Integer Port number on the destination that will receive forwarded events. Ensure this port is open
on the destination.
Preserve System Boolean If Yes, the timestamp showing original event receipt time is preserved.
Timestamp*
Preserve Original Syslog Boolean If Yes, event is sent as is, without inserting Logger's IP address in the hostname (or
Sender* equivalent) field of the syslog event.
SecureData Configuration
A SecureData configuration sets values for the SecureData encryption client on a managed Logger.
SecureData Configuration Parameters
Data
Parameter Type Description
Event String Comma-separated list of event fields to be encrypted. Default data for event fields will be populated from
Fields* the connector bin file uploaded in the repository. If there is no such file, then the default field will be defined
by ArcMC.
Authentication External
An Authentication External configuration defines values and behavior for a hardware or software system
requiring authentication to an external server, such as LDAP or RADIUS.
After changing the Authentication Method on a host, you must delete the host from ArcSight Management
Center, and then re-add it using Node Management.
Note: Authentication External configurations can only be imported from managed Loggers, not
created in ArcSight Management Center. See "Importing a Subscriber Configuration" on page 160 for
more information.
Allow Local Password Fallback for Boolean If Yes, the authentication server will fall back to local passwords for
Default Admin Only* authentication for administrators.
Allow Local Password Fallback for All Boolean If Yes, the authentication server will fall back to local passwords for
Users* authentication for all users.
LDAP Backup Server Hostname [port] String LDAP backup server hostname and port.
LDAP Server Request Timeout Integer LDAP server request timeout, in seconds.
(seconds)
RADIUS Backup Server Hostname[port] String RADIUS backup server hostname and port.
RADIUS Server NAS IP Address String RADIUS server Network Access Server IP address .
RADIUS Request Timeout (seconds) Integer RADIUS server request timeout, in seconds.
RADIUS Retry Request Integer Number of times to retry RADIUS server requests.
Enable Account Lockout* Boolean If Yes, account lockouts are enabled after an incorrect password
entry.
Lock Out Account after N Failed Integer Number of failed attempts before lockout.
Attempts*
Remember Failed Attempts For Integer Time, in seconds, between failed attempts that will trigger a lockout.
(seconds)*
Lockout Account for (minutes)* Integer Time, in minutes, that the account will be locked out.
Password Expires in (days)* Integer Interval, in days, after which a password expires.
Notify User (Days Before Integer Days before password expiration that the user is notified.
Expiration)*
Users Exempted from Password List of comma- Comma-separated list of users whose passwords will never expire.
Expiration Policy separated strings
Password Must Be At Least* Integer Minimum number of characters a new password must differ from
the user’s previous password.
Include “Forgot Password” link on Boolean If Yes, a link is provided where the user can recover a password.
Login Screen*
Authentication Session
An Authentication Session configuration defines values for a hardware or software system’s authentication
sessions.
Max Simultaneous Logins Per User* Integer Maximum number of simultaneous logins per user.
Logout Inactive Session After (seconds)* Integer Inactivity session timeout, in seconds.
Disable Inactive Account After (days)* Integer Number of days of inactivity after which an account will be disabled.
DNS Configuration
A DNS Configuration defines values for a hardware appliance’s Domain Name Service.
DNS Configuration Parameters
Parameter Data Type Description
DNS Search Domains List of comma-separated strings Comma-separated list of DNS search domains.
FIPS Configuration
A FIPS configuration enables or disables FIPS mode on a managed node.
Note: After pushing a FIPS configuration, the destination node will be restarted.
Network Configuration
A Network Configuration defines values for a hardware appliance’s default gateway setting.
Note: Values for these network settings cannot be changed through ArcSight Management Center:
hostname, IP addresses for the network interfaces, static routes, /etc/hosts file, and time settings.
NTP Configuration
An NTP Configuration defines values for a hardware appliance’s Network Time Protocol.
NTP Configuration Parameters
Parameter Data Type Description
NTP Servers* List of comma-separated Comma-separated list of NTP servers. Required even if Enable as NTP
strings Server is false.
SMTP Configuration
An SMTP Configuration defines values for a hardware or software system’s Simple Mail Transfer Protocol.
SMTP Configuration provides for authentication and security. This is implemented through the primary
STMP server port, primary username, primary password, primary certificate, backup STMP server port,
backup username, backup password, and backup certificate fields, along with the primary STMP server,
backup STMP server, and outgoing email address fields.
SMTP Configuration Parameters
Parameter Data Type Description
Enable Auth/TLS Boolean Enable/Disable secure authenticated mode of communication with SMTP
server
Primary SMTP Server Port Integer Primary SMTP Server Port. Required if Auth/TLS is enabled.
Primary SMTP Server Username String Primary SMTP Server Username. Required if Auth/TLS is enabled.
Primary SMTP Server Password String Primary SMTP Server Password. Required if Auth/TLS is enabled.
Primary SMTP Server Certificate String Upload Primary SMTP Server Certificate. Required if Auth/TLS is enabled.
Content
Secondary SMTP Server Port Integer Secondary SMTP Server Port. Required if Auth/TLS is enabled.
Secondary SMTP Server String Secondary SMTP Server Username. Required if Auth/TLS is enabled.
Username
Secondary SMTP Server Password String Secondary SMTP Server Password. Required if Auth/TLS is enabled.
Secondary SMTP Server String Upload secondary SMTP Server Certificate. Required if Auth/TLS is enabled.
Certificate Content
SNMP Version* String Version of SNMP supported.Valid values are v2c and v3.
Community String String SNMP community string. Required for V2c only.
Authentication Protocol* String Authentication protocol. Valid values are MD5 and SHA. Required for V3 only.
Privacy Protocol String Privacy protocol. Valid values are DES and AES128. Required for V3 only.
SNMP Version* String Version of SNMP supported.Valid values are v2c and v3.
Community String String SNMP community string. Required for V2c only.
Authentication Protocol* String Authentication protocol. Valid values are MD5 and SHA. Required for V3 only.
Privacy Protocol String Privacy protocol. Valid values are DES and AES128. Required for V3 only.
Attribute Description
Product Type Type of Logger to which the configuration may be pushed: either Logger (appliance) or SWLogger
(software)
Source Host IP address of the host from which the configuration was imported.
Source Model For appliances, the model number of the source host Logger. (For software Logger, this is shown as
Software.)
Note: Before performing a push, ensure that the destination Logger's storage volume is set up, and
that it exceeds that of any source Logger.
To push an initial configuration to one or more managed Loggers of version 6.1 or later:
1. Click Configuration Management > Logger Initial Configurations.
2. From the Configurations table, select a configuration to be pushed.
3. Click Push.
4. On the Make Selections for Push dialog, under Available Nodes, the nodes eligible for receiving a
push are displayed by location. Browse to the recipient node and click Add. The selected node is
shown under Selected Nodes. (To select multiple nodes to receive a push, Ctrl+click each selected
node.)
5. Click Push.
6. Click Yes to confirm the push and change settings on the destinations. The configuration is pushed to
the selected destination nodes.
Tip: In order to correctly view push status, click Refresh, even if the status is shown as In Progress.
l Archive storage settings Blank: These settings will be blank on the destination, even if they are included in the pushed initial
l Audit logs configuration. Also, all configurations on the destination Logger related to these settings will also be
blanked.
l ESM destinations
l Event archives
l Finished tasks
l Forwarders
l Peer Loggers
l Alerts Disabled: These settings are disabled on the destination Logger, but are editable through the
l User-created receivers destination Logger's UI.
(RFSFileReceiver,
FileTransfer,
FolderFollowerReceive
r)
l Hosts file Copied From Source: These values are copied from the initial configuration and overwritten on
l Groups the target.
l Users This may include user credentials that the Logger uses to authenticate to ArcMC, which could break
the management link between ArcMC and the destination Logger (which requires these
credentials). If an overwrite of these credentials occurs, to enable management, delete the host
from ArcMC, and then re-add the Logger as a host (with the new credentials).
l All other settings Copied From Source: Values are copied from the initial configuration and overwritten on the
target.
Event History
The Event History list records all imports, pushes, and deletes transactions related to initial configuration
pushes. Each event in the history displays the following information:
Column Description
Event Type Type of event recorded for the initial configuration. Event types include Push, Import, and Delete.
Source Host URI of the host on which the initial configuration was created.
Destination URI for If the event is of type Push, this is the URI of the destination node to which the initial configuration was
Push pushed.
To search for a specific event by any of these criteria, click the drop-down in the corresponding column
header. Then, in Filters, select or enter the specific criterion for which you wish to show events. Only events
matching the filter will be displayed in the Event History list.
For example, to see all pushes, in the Event Type column, click the header drop-down. Then, in Filters,
select Push.
The following parameters are shown on the Logger Event Archives list:
Parameter Description
Peers For Loggers, the number of peers of the Logger. To see the Logger's peers in detail, click the number shown.
Event The status of a current archiving job, where status is one of the following values:
Status
l Loading: The archive is being loaded on the managed Logger.
l Loaded: The archive is currently loaded on the managed Logger.
l Unloading: The archiving job is currently executing.
l Archived: The archiving job is complete.
l Failed: The archiving job was not successful.
Index Status The status of a current indexing job, where status is one of the following values.
l None: No indexing status is available.
l Pending: The indexing job is about to begin. A pending job can be canceled by clicking in the Cancel column of the
table.
l Indexing: The indexing job is in process.
l Indexed: The indexing job is complete.
l Failed: The indexing job was unsuccessful.
Note: For more information about Logger peering, please refer to the ArcSight Logger Administrator's
Guide.
Note: If you remove a Logger not managed by ArcMC as a peer, you will not be able to add it back to
the group unless you import the peer group including the Logger into ArcMC, or you add the removed
Logger to ArcMC management.
About Topics
A topic is a metadata tag that you can apply to events in order to categorize them. Transformation Hub
ships with several pre-set topics, and you can define any number of additional topics as needed.
A topic includes these components:
l Name: The name of the topic.
l Partition: A segment of a topic. There can be one or more partitions for each topic. The number of
partitions limits the maximum number of consumers in a consumer group.
l Replication Factor: The number of copies of each partition in a topic. Each replica is created across one
Transformation Hub node. For example, a topic with a replication factor of 3 would have 3 copies of each
of its partitions, across 3 Transformation Hub nodes.
You can currently only use ArcMC to add topics, not edit or delete them.
For more information on managing topic partitions and replication, see the Transformation Hub
Administrator's Guide.
Adding a Topic
To add a topic:
1. Click Configuration Management > Transformation Hub.
2. On the Transformation Hub Configurations page, click Add Topic.
3. On the Add New Topic dialog, inTopic Name, enter a name for the new topic.
4. In # of Partitions, enter the number of partitions the topic will have.
5. In Replication Factor, enter the number of copies that will be made for each partition.
6. Click Save.
Best Practice: When creating a topic, use a value for replication factor of at least 2. In addition, the
number of partitions should be equal to the number of consumers which will be subscribed to the topic
(now and in future). If Vertica will be a consumer, the number of partitions should be a multiple of the
number of Vertica nodes.
About Routes
A route is a method of retrieving events in a topic that meet certain criteria and then copying them into a
new topic. Use routes to filter events into your topics for your own requirements, such as selecting a group
of events for more detailed examination.
A route comprises these components:
l Name: Name of the route.
l Routing Rule: A logical filter that defines criteria by which events will be categorized into topics. The
criteria are defined in terms of CEF fields.
l Source Topic: The topic being filtered for events which match the routing rule.
l Destination Topic: The topic to which a copy of an event matching the routing rule should be copied.
(A copy of the event will remain in the source topic.)
l Description: A short description of the route.
You can add, edit, or delete routes in ArcMC. Routes only apply to CEF topics. Routes created to or from a
binary topic (such as th-esm) will not function.
Creating a Route
Before creating a route, ensure that your source and destination topics already exist. If not, create them
before creating a route that uses them.
To create a route:
1. Click Configuration Management > Transformation Hub.
2. On the Transformation Hub Configurations page, click Add.
3. In Route Name, enter a name for the route.
4. From the Source Topic drop-down list, select the topic from which events will be filtered.
5. From the Destination Topic drop-down list, select the destination to which events will be copied.
6. In Description, enter a short description of the route.
7. Under Add Routing Rule, use the Rule Editor to define the criteria for the routing rule.
l Define a criterion by using the drop-downs to select a Field, Operator, and Value as a filter. Fields are
taken from the Transformation Hub SuperSchema, which are described in detail in "SuperSchema" on
page 334.
l Click + to add a new conjunction (& AND, || OR), or the right arrow to add a dependent conjunction. Then
define any new required criteria as needed.
l You can create nested conjunctions by clicking the right arrow at the same level as the current
conjunction.
l To change a conjunction, right-click the conjunction and select your choice from the drop-down menu.
l To delete a conjunction, right-click the conjunction and pick Delete. Note that deleting a conjunction will
delete all the criteria associated with the deleted conjunction.
The rule is shown in the rule field as you construct it. When the rule is complete, click Save.
Editing a Route
To edit a route:
1. Click Configuration Management > Transformation Hub.
2. On the Transformation Hub Configurations page, select the route to edit, and then click Edit.
3. Edit the route as needed, and then click Save.
Deleting a Route
To delete a route:
1. Click Configuration Management > Transformation Hub.
2. On the Transformation Hub Configurations page, select one or more routes to delete, and then
click Delete.
3. Click Yes to confirm deletion.
Deployment Templates
A deployment template is a pre-set collection of settings and parameters for a connector or Collector.
When you deploy that connector or Collector type using the Instant Connector Deployment process, and
specify a deployment template, all of the settings you have predefined in the template are applied during
the deployment.
You may specify any number of deployment templates for each connector type.
Note: During the deployment process, you are prompted to use the predefined template settings, but
may choose to overwrite any of the predefined template settings to custom-fit a particular deployment.
Prior to managing any deployment templates, first upload the appropriate 64-bit connector or Collector
installer file to your ArcMC repository. Only the Linux and Windows 64-bit installers are supported. The
installer contains a list of currently supported connectors or Collectors and is used in the creation of the
connector or Collector list in ArcMC. This upload only needs to be done in preparation to manage
deployment templates.
Additional Files
Note that some connector types may require additional, supplementary files to function correctly, such as
Windows DLLs. Such files are not included in the connector installer file.
If additional files are required for a connector type, you must also upload these files to an ArcMC repository
before attempting to deploy them using the Instant Connector Deployment process. After uploading the
installer file as described, upload additional files (in ZIP format) to the following repositories:
SecureData server certificate cacert. Note: The certificate must be Base 64 encoded. For Linux plarforms (only), it must
(Certificate_FPE) include the .pem extension.
You will be able to specify the location of these additional files when you create the deployment template.
• Location 202
• Host Tab 203
• Container Tab 204
• Collector Tab 205
• Transformation Hub Tab 206
• Updating Collector Properties 206
• Retrieving Collector Logs 206
• Updating Collectors Parameters 207
• Updating Collector Destinations 207
• Updating Collector Credentials 207
• Restarting Collectors 208
• Deleting Collectors 208
• Enabling SecureData Encryption on Managed Connectors 208
• Prerequisites for Addition of SecureData Client to Multiple Containers 209
• Adding SecureData to Multiple Containers 209
• Updating Host Credentials 211
• Downloading and Importing Host Certificates 211
• Scanning a Host 212
• Moving a Host to a Different Location 213
• Deleting a Host 214
Location
The Location tab displays all locations defined in ArcSight Management Center. The Location tab
includes these buttons:
Add Adds a new location. For more information, see "Adding a Location" on page 85
Edit Edits the name of a location. For more information, see "Editing a Location" on page 85
Delete Deletes one or more selected locations from ArcMC. For more information, see "Deleting a
Location" on page 86
The Manage Locations table displays these parameters for each location.
l Name: Location name.
l Number of Hosts: Number of hosts assigned to the location.
Host Tab
The Host tab displays all hosts associated with the location selected in the navigation tree. The Hosts tab
includes these buttons:
Update Updates the host’s credentials. For more information, see "Updating Host Credentials" on page 211
Credentials
Download Downloads the host’s current certificates. For more information, see "Downloading and Importing Host
Certificate Certificates" on page 211
Scan Host Scans each port on non-appliance based hosts. For more information, see "Scanning a Host" on page 212
Move Moves selected hosts to a new location. For more information, see ""Moving a Host to a Different Location"
on page 213
Delete Deletes selected hosts from ArcMC. For more information, see "Deleting a Host" on page 214
o ArcMC Agent Upgrade Recommended: The host's Agent version is older than the one on the
managing ArcMC. An Agent upgrade is recommended.
o ArcMC Agent Uninstalled: The Agent on the host has been uninstalled.
o ArcMC Agent Down: The Agent on the host is not running.
o Update the authentication credentials on the localhost, and then install the ArcMC Agent: For a
localhost added for remote management, authentication credentials need to be updated to ensure
authentication, and then the ArcMC Agent needs to be installed to enable management. Take both of
these steps to correct this issue.
o Error in REST Authentication: The Transformation Hub node lacks the ArcMC certificate,
ArcMC session ID, or ArcMC URL and port. To resolve this issue:
l Make sure the user has the permission rights for the Transformation Hub operations.
l Make sure the valid ArcMC certificate (with FQDN and .crt extension) is present in the
Transformation Hub's location: /opt/arcsight/k8s-hostpath-volume/th/arcmccerts
l Make sure that the ArcMC URL is updated with correct FQDN and port in ArcSight Installer
> Transformation Hub Configuration > ArcMC_Monitoring field.
l Note that each time the user replaces the ArcMC certificate to the TH's location, the TH's
webservice pod has to be restarted for the new certificate to be read and updated in the trust store.
l Model: If the host is an appliance, this shows the ArcSight model number of the appliance. If the host is
not an appliance, the label Software is shown.
l Type: Type of installation, either ArcMC Appliance or Software.
l Version:Version number of the software on the host.
Container Tab
The Containers tab includes the Properties button, it allows you to modify the properties of Containers.
The Containers table includes the following columns:
l Name: Name of the container.
l Path: Path to the container.
l Issues: Status of any issues associated with the container.
l Port: Port number through which the container is communicating.
l Framework Ver: Framework version number of the container.
l Parser Ver: Parser version number of the container.
l Status: Status of the container. Possible values for container status are:
o Improper configuration: Initial default state.
o Initializing connection: The connector has a resolvable URL, but ArcSight Management Center has not
logged in to the connector yet.
o Down: There was an exception trying to execute the login command.
o Unauthorized: The login command was executed, but login has failed.
o Connecting: The login is in progress.
o Connected: The login was successful.
o Empty: Login successful, but the container doesn't have connectors.
o Initialized: Login successful and the container has connectors.
o Unknown: No information on status. To resolve, manually SSH to the system and restart the container.
l Last Check: Date and time of last status check.
Collector Tab
The Collector tab displays all Collectors associated with the item selected in the navigation tree. For
example, if you selected a host in the navigation tree, the Collectors tab would show all Collectors
associated with that host.
A Collector is a standalone System component in charge of processing efficiency improvements and the
collection of raw data.
Note: The maximum number of selected entries when managing Connectors/Collectors is 50.
The Collectors tab includes the following buttons, which operates on one or more selected Collectors:
Properties Update the properties of the selected Collectors. For more information, see "Updating Collector Properties" on
the next page
Retrieve Logs Retrieves Collector logs. For more information, see "Retrieving Collector Logs" on the next page
Update Update the parameters of the selected Collectors. For more information, see "Updating Collectors
Parameters Parameters" on page 207
Destinations Manage Collector destinations. For more information, see "Updating Collector Destinations" on page 207
Credential Manage Collector credentials. For more information on managing Collector credentials, see "Updating
Collector Credentials" on page 207
Restart Restart the selected Collectors. For more information on restarting Collectors, see "Restarting Collectors" on
page 208.
Delete Deletes the selected Collectors. For more information, see "Deleting Collectors" on page 208
The Collectors table displays the following parameters for each connector:
l Name: Name of the Collector.
l Port: Collector port.
l Type: Type of Collector.
l Syslog Lines Received: Number of events received.
l Custom Filtering: Types of messages filtered out.
Restarting Collectors
To restart one or more Collectors:
1. Click Configuration Management > Bulk Operations.
2. On the Manage Collectors page, select one or more items which you wish to restart.
3. Click Restart.
4. Click Yes to confirm restart. The Collectors are restarted.
Deleting Collectors
To delete Collectors:
1. Click Configuration Management > Bulk Operations.
2. On the Manage Collectors page, select one or more items which you wish to delete.
3. Click Delete.
4. Click Yes to confirm delete. The items are deleted.
The process must have a dedicated port numbered higher than 1024.
Bulk SecureData client install is supported for accounts using SSH key authentication, but not supported
for SSH with passphase authentication. To enable SSH key authentication, the SSH key needs to be set
up between a non-root user of ArcMC and a user of the remote host.
l You should consult and review the Format Preserving Encryption Environment Setup Guide for proxy
settings.
l All the selected container host machines need to have same SSH credentials (username:password).
l The voltage client install path on all the selected containers hosts must be the same.
l You can only push voltage client in bulk to all the container hosts that are on the same platform e.g. all
Linux, or all Windows.
l The selected containers must meet all prerequisites for adding SecureData.
l All selected container hosts must have the same user credentials (username and password), and must
be the same platform (that is, all Windows or all Linux.)
l The SecureData client installation path on all container hosts will be the same.
l If a certificate is needed, upload the required certificate before proceeding to Repositories > CA Certs.
Note: CTHs cannnot be configured with SecureData encryption.
8. If needed, from the SecureData Cert drop-down, select a previously-uploaded certificate for
SecureData.
9. In Username and Password, enter the common user credentials for all selected container hosts.
(Password is not needed if SSH is enabled in Step 7.)
10. Click Save.
The SecureData client is pushed to the selected containers, and each one is restarted. To see if the
encryption properties were updated successfully, wait on this page. The Job Manager shows the status of
client installation on the containers.
Scanning a Host
Scanning a host will inventory all currently running containers on the host and the connectors associated
with them.
To ensure accuracy and currency of container inventory, you will need to manually scan for new containers
in any of the following circumstances:
l Additional containers or connectors are added to a remote host after it has been added to ArcSight
Management Center.
l Containers and connectors are removed from a remote host managed in ArcSight Management Center.
l Any containers which were down when the initial, automatic scan was performed have since come back
up.
l The license for a managed ArcSight Management Center (managed by another ArcSight Management
Center) is upgraded to increase the number of licensed containers.
Any host that includes containers is scanned automatically when first added to ArcSight Management
Center.
You can manually scan any host types that can run containers. These types include:
l Connector Appliances
l Loggers (L3XXX models only)
l ArcSight Management Center Appliances
l Connectors
Starting Port The port number on the host on which ArcSight Management Center starts scanning for containers.
Ending Port The port number on the host on which ArcSight Management Center ends scanning for containers.
Connector Username The Connector user name to authenticate with the host.
Collector Username The Collector user name to authenticate with the host.
6. Connector certificates are retrieved automatically so that the ArcSight Management Center can
communicate with each connector in a container. The Host Scan wizard lists the certificates. (To see
certificate details, hover over the certificate.)
l To continue the scan, select Import the certificates, and then click Next to import the certificates
and continue.
l Otherwise, select Do not import the certificates, and then click Next. The Host Scan wizard
discontinues the scan.
Deleting a Host
When you delete a host, any nodes associated with the host are also deleted. Deleting a host removes its
entry from ArcSight Management Center, but otherwise leaves the host machine unaffected.
Note: Use caution when deleting a host. Deleting a host will delete its associated nodes from any node
list, association, peers listing, or subscribers listing that includes those nodes.
• Overview 215
• Users and User Lists 216
• Permission Groups 218
• Roles 220
• Node Lists 221
• Associations 222
• Compliance Report 223
Overview
Role-based access control (RBAC) user management enables you to manage product user access with
custom roles across specified nodes.
Previous versions of ArcMC included user management across nodes as part of Configuration
Management (where user information was defined in a Users configuration). In ArcMC 2.1, user
management across nodes is now a separate, greatly improved RBAC (role-based access control)
functionality.
Users can be grouped into named user lists, which can also be assigned access rights in the same way as
individual users.
You can also import users from managed nodes.
Users are defined by these parameters:
Parameter Description
Email* User email address. Users pushed to nodes as part of an association will receive email confirmation of their new
access to nodes at this address, along with a randomly generated password. (Please verify that this is the correct
email address. Once pushed, the password will not be resent to a corrected email address.) Note: To ensure
email alerts are sent, enable SMTP services and then restart the web services.
To create a user:
1. Click User Management > Users and User Lists.
2. Click New User.
3. Enter values for the user details.
4. Click Save.
To import users from a managed node:
Note: Only US ASCII characters are supported for import.
You can only delete a user list if it is not part of any association. To delete a user list that is part of an
association, delete the association first.
Permission Groups
A permission group is a set of access privileges. Access privileges are organized functionally, enabling you
to assign different functions or different product access across users.
Permission groups are the building blocks of roles. In themselves, permission groups do not enable access
for any users. Permission groups can be bundled into roles, and when users are assigned to those roles,
they will gain the privileges which the individual permission groups grant them.
Permission groups can be created, imported from managed nodes, edited, and deleted in ArcMC.
Logger Rights Logger general functionality. Does not include Logger Reports and Logger Search permissions.
You can create different permission groups to reflect different management access levels. For example, you
could create two System Admin permissions groups, one with access to reboot and update privileges, and
the other with access to global settings. However, a role can only be assigned one permission group per
group type.
You can only delete a permission group that is not currently assigned to any roles, nor is part of any
Filter configuration.
To delete a permission group that is part of a role, delete the role first.
To delete a permission group that is part of a Filter configuration, remove it from the configuration.
Roles
A role is a bundled set of permission groups. By assigning a role to an association, you grant all privileges
enabled by the role's component permission groups to all of the users or user lists in the association.
You can create and delete roles in ArcMC.
To create a role:
Note: Prior to creating a role, create any permission groups it will include.
4. In the Available Permission Group(s) column, select one or more permission groups. Use the Add
button to move selected permission groups from the Available Groups column to the Selected
Permission Group(s) column.
5. Click Save.
Before deleting a role, edit any associations of which it is a part to remove the role from each
association.
Node Lists
A node list is a named set of managed nodes. Using node lists allows you to organize nodes for the purpose
of managing users of those nodes in a group.
All nodes in a node list included in an association will receive pushes of the association from ArcMC.
An association is pushed only to nodes (or node lists) which it includes. To push an association to a
particular node, make sure the node is included in the association, either directly or as part of a node
list.
You can only delete a node list if it is not assigned to any associations. To delete a node list that is part
of an association, first remove it from the association or delete the association.
Associations
An association is a bundled group of users (or user lists), along with any number of non-overlapping roles,
and any number of nodes (or node lists). Associations are managed in ArcMC and then pushed to
managed nodes, in order to grant permissions to users of those nodes.
You can create associations, push them to included nodes, and delete associations.
To create an association:
Note: Prior to creating an association, create all users (or user lists), node lists, and roles to be included
in the association.
9. In the Available Nodes and Node Lists column, select multiple nodes or node lists to include. Use
the Add button to move the selections to the Selected Nodes and Node Lists column.
10. Click Check Conflicts. A conflict is returned if the permissions assigned in the association conflict with
any other association that also assigned the same permission groups types. For example, if an existing
association assigns read/write access to User A, and your newly-created new association assigns read-
only rights to User A, then a conflict would be returned.
l If a conflict was found in the association, edit the association to correct the conflict shown.
l If no conflict was found, click Yes to push the new association to all nodes included in the association.
To edit an association:
1. Click User Management > Associations.
2. Click the name of the association you wish to edit.
3. Edit the components of the association as needed.
4. Click Save.
Compliance Report
The Compliance Report verifies and displays the compliance status of users on a managing ArcMC with the
same users on managed nodes, to which associations including those nodes have been pushed.
Compliance status includes permissions, names, and other user data.
Matches Indicates that the value on the managed node matches the value on the managing ArcMC.
Does Not Match Indicates a discrepancy between the value on the managed node and the managing ArcMC.
Missing Value(s) The value or values are missing and cannot be compared.
Note: Use the column headers to sort the tabular results across columns.
• Overview 225
• Backup 225
• Restore 226
Overview
The Backup and Restore menu items enable you to back up and restore your ArcSight Management
Center configuration. A complete backup includes all data on managed nodes, configurations, system
administration, and connector data (in agentdata folders), as well as all repository files. You can also
choose to include a selection of this data in a given backup file, to make your backup file smaller and more
manageable.
Backup
You can back up the current ArcSight Management Center configuration as often as needed, either to a
remote system on the network, or to your local system.
Protocol Select SCP to use Secure Copy to save the backup file on a remote system on your network. You need to
specify the IP address or hostname, your user name and password, and the destination directory in the
appropriate fields.
Select Save to Local to save the backup file on your local system. When you select this option, the Port,
IP/Host, User, Password, and Remote Directory fields are disabled (grayed out) as they are not needed.
Backup SCP only. The IP address of the destination to receive the backup file.
Server
IP Address
Parameter Description
Password SCP only. The password for the user name you specify.
Remote SCP only. The subdirectory on the specified destination to receive the configuration backup file.
Directory
Backup l Select All to create a backup file that contains all data on managed nodes, configurations, system
administration, connectors, Collectors, and repositories.
Tip: Choosing All can potentially create a .tar.gz file so large that the restoration of data is unsuccessful.
To prevent this, you may want to exclude connector data and repository data from your backup file.
l Select Exclude Repository Data to create a backup file that does not include files in the repositories.
l Select Exclude Connector Data to create a backup file that does not include connector data. (ArcMC
Appliance only.)
l Select Exclude Connector and Repository Data to create a backup file that does not include
repository files and connector data. (ArcMC Appliance only.)
3. Click Save to back up the configuration, and then select a location to save the file.
Restore
You can restore your ArcSight Management Center configuration from a previous backup. These
stipulations apply to restoring:
l The version of ArcSight Management Center used to restore the backup must be the same version used
to create it.
l A backup performed on a root installation cannot be used to restore a non-root installation.
l For Software ArcSight Management Center, the install path of a restored Software ArcMC must be the
same as the path of the backup, and the same root or non-root user must perform the installation as did
the backup.
l A Restore from one ArcMC backup may be performed to a different IP or hostname, subject to the
stipulations above.
5. On software ArcMC, restart the ArcSight Management Center web process. On ArcMCappliance,
reboot the appliance.
6. Optionally, re-import the SSL certificate for each container. Click the icon to run the Certificate
Download wizard and import the valid certificates. In addition, if a certificate mismatch is shown for
any remote node, re-import the server certificate for the node.
• Overview 228
• Creating a Snapshot 228
Overview
ArcSight Management Center records audit and debug information, including details of any issues that can
occur during normal operations. These system logs form a snapshot of your ArcSight Management Center
activity. System logs are helpful in troubleshooting issues.
ArcSight Customer Support may ask you to retrieve and submit system logs as part of an incident
investigation.
Creating a Snapshot
Creating a snapshot of ArcSight Management Center creates a set of zipped log files, which you can
download locally.
To create a snapshot:
1. Click Administration > Application > Snapshot.
2. The Retrieve Snapshot Status page displays. Depending on the size of the log files, the snapshot
may take a few moments to generate.
3. When ready, click Download to download the ZIP file locally.
Submit the snapshot file as instructed by ArcSight Customer Support.
Note: An ArcSight Management Center snapshot does not include information on the activity of the
Report Data
The report displays the licensed value and actual value for data consumption by managed Loggers.
Value Description
Licensed Shows the data consumption to which your license entitles you. For individual ADP Loggers, the license limit will
Consumption be shown as Not Applicable, since ArcMC tracks the overall data limit, not those of individual Loggers.
Note: If an ADP Logger is managed by a version of ArcMC earlier than 2.5, then the license limit will be
incorrectly shown in the report as Unlimited.
Actual Shows the current value of data consumption. Click the value to display the Consumption Chart, which shows
Consumption data consumption in detail.
Status Click any status hyperlink to view individual Logger data for the last 30 days. Status values are shown as follows:
OK if the actual value is less than or equal to the license value.
In Violation indicates that the actual value exceeds the license value, which constitutes a violation of the terms of
your license. Your license permits you a number of violations for each 30-day period, which is shown on the
Violations Last 30 Days line.
Click any hyperlink to view individual Logger data for the last 30 days.
• Overview 231
• Logs Repository 232
• CA Certs Repository 232
• Upgrade Files Repository 234
• Content AUP Repository 235
• Emergency Restore 236
• User-Defined Repositories 237
• Pre-Defined Repositories 241
Overview
Certain management operations require a specific upgrade or content update (.enc) file, or a certificate.
Other operations, such as viewing logs, require you to load the logs to a Log repository. ArcSight
Management Center can also maintain centralized repositories for files needed for host configuration and
management.
By default, a number of pre-defined repositories are provided. However, you can create more repositories to
suit your needs. Any repositories you create are referred to as user-defined repositories.
The following controls are used for repository functions:
l Retrieve Container Files copies a file from one or more managed hosts to the repository.
l Upload to Repository sends a file from your local computer (the computer running the browser) or a
network host accessible from your local computer to the repository.
l Retrieve downloads a file from the repository.
l Upload copies a file from the repository to one or more managed nodes.
You can perform these operations using repositories:
l Manage logs in the Logs repository
l Manage CA certificates in the CA Certs repository
l Upgrade a connector using an upgrade file available in the Upgrade repository
l Apply a Content ArcSight Update Pack (AUP) on one or more connectors
l Maintain centralized repositories of files for connector configuration and management
Logs Repository
To view logs, you need to first Load the logs of the container that contains the connector to the Logs
repository, and then Retrieve the logs to view them.
Note: If a container contains more than one connector, logs for all connectors are retrieved.
For information on loading, retrieving, and deleting container logs, see "Viewing Container Logs" on
page 117.
CA Certs Repository
Connectors require a Certificate Authority (CA) issued or self-signed SSL certificate to communicate
securely with a destination. The CA Certs repository (shown below) enables you to store CA Certs files (that
contain one or multiple certificates) and single CA certificates. When certificates are stored in the CA Certs
repository, you can add the certificates to a container so that the connectors in the container can validate
their configured destinations.
You can add a single certificate to a container that is in FIPS or non-FIPS mode. You can only add a CA Certs
file to a container that is in non-FIPS mode.
To associate a CA certificate to a connector, you need to:
l Upload the CA certificate or CA Certs file to the CA Certs repository, as described below.
l Add a CA certificate from the CA Certs repository to the container that contains the connector, as
described in "Managing Certificates on a Container" on page 120.
Tip: Before you upload a single CA certificate, change the name of the certificate on the local computer
to a name that you can recognize easily. This helps you distinguish the certificate when it is displayed
in the Certificate Management wizard.
Note: When you delete a CA Certs file or a single certificate from the CA Certs repository, containers
are not affected; the connectors continue to use the certificates, which are located in a trust store after
being added to a container. For information about adding a CA certificate to a container, see
"Managing Certificates on a Container" on page 120.
Note: Logger ENC files are required for the remote upgrade of a Logger Appliance. For more
information, see "Upgrading a Logger " on page 109.
Emergency Restore
The Emergency Restore can be used to restore a severely damaged local container on an appliance. This
feature is supported only for containers on the localhost, for the hardware appliance version of ArcSight
Management Center
Users can now reimage and restore from a backup at once in multiple containers. In G8 appliances it allows
the user to migrate from 32 bits to 64 bits (rollback can't be performed).
Note: Backed up files can be retrieved by accesing the Backup Files option.
ArcSight recommends that you use this process only when a container is severely damaged and is no
longer available. The Emergency Restore process deletes all information about that container and renders
it empty. The connector is restored to the AUP version that you select.
User-Defined Repositories
A user-defined repository is a user-named collection of settings that control upload and download of
particular files from connectors to the repository. Each repository uses a specified path, relative to
$ARCSIGHT_HOME/user/agent, for files to be uploaded or downloaded. ArcSight connectors use a
standard directory structure, so map files, for example, are always found in $ARCSIGHT_
HOME/user/agent, (that is, the root directory, $ARCSIGHT_HOME, of the installation path) in a folder
called map/.
After they are created, user-defined repositories are listed on the left-side menu, under the New
Repository heading, and appear with the user-specified display name.
User-defined repositories should be grouped by file type and purpose, such as log files, certificate files, or
map files. Each user-defined repository has a name, a display name, and an item display name, which are
described under the repository Settings tab.
Files viewed in a user-defined repository can be bulk processed with specified hosts and can be
exchanged with the user’s browser host.
Name A unique name for the repository, typically based on the type of files it contains.
Display Name The name that will be displayed on the left-side menu and for tabs: Process names, View names, Settings
for names. Typically plural.
Filename Prefix An identifying word that is included in the names of retrieved files. For example, map files are identified by
Map in the file name: localhost_Container_-1.Map-2009-04-06_12-22-25-607.zip
Relative path The path for download, relative to $ARCSIGHT_HOME , for example, user/agent/map or
(Download) user/agent/flexagent . Leave this field blank to specify files in $ARCSIGHT_HOME .
Note: The relative path is used for download only.
Include Regular A description of filenames to include. Use .* to specify all files. The following example selects properties
Expression files that consist of map . followed by one or more digits, followed by .properties :
map\.[0-9]+\.properties$
Exclude Regular A description of filenames to exclude. The following example excludes all files with a certain prefix or in the
Expression agentdata folder.
(agentdata/|cwsapi_fileset_).*$
Parameter Description
Delete Relative Whether the directory specified in Relative Path (Upload) and its contents should be removed when a
Path file is uploaded from the repository.
4. Follow the Upload Container Files wizard instructions to upload the file to the containers of your choice.
5. Verify that the file was uploaded correctly:
l If you have SSH access to the connectors, connect to them and check the file structure.
l Obtain the connector logs and check the contents of the Directory.txt file for each connector.
Pre-Defined Repositories
You can define repositories for any connector-related files. The following repositories are pre-defined:
l Backup Files: connector cloning (see " Backup Files" on page 246).
l Map Files: enrich event data
l Parser Overrides: customize the parser (see "Adding Parser Overrides" on page 246)
l FlexConnector Files: user-designed connector deployment
l Connector Properties: agent.properties; subset of cloning
l JDBC Drivers: database connectors
To view the settings for a pre-defined repository, click the name of the repository and then click the
Settings tab in the management panel. Settings for a pre-defined repository are read-only.
Name backup
Sort Priority 0
Name map
Sort Priority 5
Name parseroverrides
Sort Priority 10
FlexConnector Settings
Name Default Setting
Name flexconnectors
Sort Priority 15
Name connectorproperties
Sort Priority 20
Name jdbcdrivers
Sort Priority 25
Filename Prefix
Backup Files
Using the Backup Files repository, you can quickly copy a container to other containers. As a result, all
connectors in the source container are copied to the destination container. This process is called cloning a
container configuration. You can clone a container to several containers at once. The contents of the source
container replace the existing contents of the destination container.
Caution: Containers on ArcSight Management Center are pre-installed with the latest connector
release. Do not clone older, software-based connectors (such as build 4.0.8.4964) to containers with
newer connector builds (such as 4.0.8.4976 or later).
Cloning a connector using the Backup repository only works if the connector version numbers are the
same.
When the upload is complete, the parser override file is listed in the table on the Parser Overrides
tab.
To verify that the parser override has been applied successfully, issue a Get Status command to the
connector. See "Sending a Command to a Connector" on page 137. In the report that appears, check for the
line starting with ContentInputStreamOverrides.
• System 248
• Logs 267
• Storage 269
• Security 274
• Users/Groups on ArcMC 280
System
From the System tab, you can configure system specific settings such as network settings (if applicable)
and SMTP.
System Reboot
To reboot or shutdown your system:
1. Click Administration > Setup > System Admin from the top-level menu bar.
2. Click System Reboot in the System section.
3. Select from the following options:
Button Description
Note: Each of the above actions can be cancelled. “Reboot” and “Shutdown” allow for cancellation
within 60 seconds. “Reboot in 5 Minutes” can be cancelled within 300 seconds.
Network
System DNS
The System DNS tab allows you to edit the DNS settings and to add DNS search domains.
Hosts
The Hosts tab allows direct editing of your system’s /etc/hosts file. You can enter data in the System
Hosts text box or import it from a local file.
NICs
The NICs tab enables you to set the IP addresses for the network interface cards (NICs) on your system.
Additionally, you can configure the hostname and default gateway for your system.
Hostname The network host name for this system. Make sure that your DNS can resolve the host name you specify to
your system’s IP address . Performance is significantly affected if DNS cannot resolve the host name.
This name must be identical to the domain specified in the Certificate Signing Request, described in
"Generating a Certificate Signing Request (CSR)" on page 276.
Note: If you previously used a self-signed or CA-signed certificate on this system and are now changing its
host name, you must regenerate a new self-signed certificate or CSR. Once obtained, the new certificate
should be uploaded to ensure that the connectors which communicate with your system are able to
validate the host name. For more information about generating a CSR, see "Generating a Certificate Signing
Request (CSR)" on page 276.
Automatically When this option is enabled (checked box), the response packets are sent back on the same system
route interface on which the request packets had arrived. Enabling this option can improve performance as the
outbound routing decisions do not need to be made (using the default gateway information and static routes) to send
packets packets out from your system. If you have static routes configured, they are ignored when this feature is
(interface enabled.
homing) When this feature is disabled (unchecked box), the static routes (if configured) are used to determine the
interface through which the response packets should leave your system.
If you configure only one network interface, this setting does not provide any additional benefit.
Setting Description
IP Address The IP address for each network interface card (NICs) in your system.
Add NIC Alias
You can create an alias for any listed NIC. To do so:
a. Highlight the NIC for which you want to create an alias.
b. Click Add.
c. Create an alternative IP address for the alias.
d. Click Save.
You can identify the alias from its original by an appended colon alongside a digit indicating the number of
aliases you have created on a particular NIC.
Notes:
l You cannot alter the speed of an IP alias.
l You can create as many aliases as you choose.
Subnet Mask The subnet mask associated with the IP address you entered for an NIC.
Speed/Duplex Choose a speed and duplex mode, or let your system determine the network speed automatically:
Auto (recommended)
10 Mbps - Half Duplex
10 Mbps - Full Duplex
100 Mbps - Half Duplex
100 Mbps - Full Duplex
1 Gbps - Full Duplex
4. Click Save.
5. Click Restart Network Service to put the changes into effect.
Static Routes
You can specify static routes for the NICs on your system.
When adding or editing a static route, you need to configure these settings.
Setting Description
Subnet Mask The subnet mask if you specify a network as the destination
4. Click Save.
Time/NTP
The Time/NTP tab enables you to configure system time, date, local timezone, and NTP servers. Micro
Focus strongly recommends using an NTP server instead of manually configuring the time and date on
your system.
Caution: If you manually set the date and time settings and are also using an NTP service, the date
and time entered manually cannot be more than 16 minutes ahead of or behind the time that the NTP
server is providing. If the manually entered time is more than 16 minutes different from the NTP
server time, then the NTP service will fail to start.
1. Click Setup > System Admin from the top-level menu bar.
2. Click Network in the System section.
3. In the Time/NTP tab, configure these settings.
Setting Description
Current Time The time zones appropriate to your system’s location. To change this setting, click Change Time Zone...
Zone Local times zones follow the Daylight Saving Time (DST) rules for that area. Greenwich Mean Time (GMT) +
and - time zones are DST agnostic.
For example, the America/Los Angeles time zone varies by an hour compared with GMT when DST goes
into and out of effect.
l Pacific Standard Time (PST) = GMT-8
l Pacific Daylight Time (PDT) = GMT-7
Current Time The current date and time at the system’s location. To change this setting, click Change Date/Time... and
then enter the current date and time.
4. The Time Zone change requires that you reboot the appliance. However, the Current Time change
takes effect immediately.
To configure your system as an NTP server or for using an NTP server for your
system:
1. Click Setup > System Admin from the top-level menu bar.
2. Click Network in the System section.
3. Click the Time/NTP tab.
4. Under NTP Servers, configure these settings.
To add a new NTP server, click the icon. To remove a server, click the icon. To change the order
in which the NTP servers should be used, select a server and click the up or down arrow until the NTP
server is in the desired position.
Setting Description
Enable as an Check this setting if this system should be used as an NTP server.
NTP server
NTP Servers Enter the host name of an NTP server. For example, time.nist.gov.
Micro Focus recommends using at least two NTP servers to ensure precise time on your system. To enter
multiple NTP servers, type one server name per line.
Notes:
l An ArcSight system can serve as an NTP server for any other ArcSight system.
l If System A serves as an NTP server for System B, System B needs to list System A in its NTP
Servers list.
l Use the Test Servers button to verify the status of the servers entered into the NTP Servers box.
5. Click Save.
Tip: You may need to scroll down to view the Save button and Restart NTP Service.
SMTP
Your system uses the Simple Mail Transfer Protocol (SMTP) setting to send email notifications such as
alerts and password reset emails.
Setting Description
Primary SMTP Server The IP address or hostname of the SMTP server that will process outgoing email.
Backup SMTP Server The IP address or hostname of the SMTP server that will process outgoing email in case the
primary SMTP server is unavailable.
Outgoing Email The email address that will appear in the From: field of outbound email.
Address
Enable SMTP Auth Enable/Disable secure authenticated mode of communication with SMTP server.
Mode
Primary SMTP Server Primary SMTP Server Port. Required if SMTP Auth Mode is enabled.
Port
Username Primary SMTP Server Username. Required if SMTP Auth Mode is enabled.
Password Primary SMTP Server Password. Required if SMTP Auth Mode is enabled.
Upload Cert File SMTP Upload Primary SMTP Server Certificate. Required if SMTP Auth Mode is enabled.
Primary
Primary SMTP Server Secondary SMTP Server Port. Required if SMTP Auth Mode is enabled.
Port
Username Secondary SMTP Server Username. Required if SMTP Auth Mode is enabled.
Password Secondary SMTP Server Password. Required if SMTP Auth Mode is enabled.
Upload Cert File SMTP Upload secondary SMTP Server Certificate. Required if SMTP Auth Mode is enabled.
Backup
3. Click Save.
Note: After updating the license file, refresh the browser to see the current list of enabled features.
Process Status
The Process Status page lists all processes related to your system and enables you to view the details of
those processes and start, stop, or restart them.
System Settings
If you did not select ArcSight Management Center to start as a service during the installation process, you
can do so using the System Settings page.
SNMP
SNMP (Simple Network Management Protocol) can be used to monitor the health of your appliance. ArcMC
supports versions 2c and 3 of SNMP.
SNMP Configuration
You can configure SNMP polling and notifications. If SNMP polling is configured, a manager station can
query the SNMP agent residing on the ArcMC. The information retrieved provides detailed information at
the hardware and operating system level.
o Memory Usage
o Disk Almost Full
o Fan Failure
o Power Supply Failure
o Temperature Out of Range
o Ethernet Link Down
MIB Contents
Notifications are written to the following modules of the MIB file:
Caution: By default, you are not prompted for a challenge/response when logging in using SSH. (This
represents a change from the configuration of Connector Appliance.)
As a result, it is imperative that you change the default password for the “root” account on the ArcSight
Management Center Appliance to a new, strong password as soon as possible. To obtain the default
root password, contact ArcSight Customer Support.
Once you have enabled SSH access, follow these steps to connect to it using SSH:
1. Connect to the appliance as “root” using an SSH client.
2. When prompted to enter a password, enter a password and press Enter.
Note: On an upgraded G9 C6600 appliance, SSH connectivity will be blocked after upgrade. To
unblock SSH, disable SSH and then re-enable it.
Diagnostic Tools
ArcSight Management Center provides several diagnostic tools that help you set up, manage, and
troubleshoot your appliance. You can run these diagnostics on the local appliance only. To run a diagnostic
tool on a remote container, refer to "Running Diagnostics on a Container" on page 124.
Parameter Description
Match Type an expression to display only lines in the file that match that expression. Linux regular expressions are
Expression supported.
Note: The expression is case sensitive.
Exclude Type an expression to exclude lines that match that expression from the display. Linux regular expressions
Expression are supported.
Note: The expression is case sensitive.
Display file
Use Display file to display the contents of a file. This tool is equivalent to the Linux command cat.
This tool uses the parameters described below:
Parameter/Button Description
File Displays a list of files for the type selected in the Category field (described above). Select the file you want
to display from the list.
Note: Appliance models Cx400 do not have any boot log files; selecting Boot Log from the File list
displays an empty pop-up window.
Match Expression Type an expression to display only lines in the file that match that expression. Linux regular expressions
are supported.
Note: The expression is case sensitive.
Exclude Expression Type an expression to exclude lines that match that expression from the display. Linux regular
expressions are supported.
Note: The expression is case sensitive.
Display You can limit the number of lines you want to display.
l Select Beginning of file to limit the display to the number of lines specified in the Number of Lines
field (described below) starting from the top of the file.
l Select End of file to limit the display to the number of lines specified in the Number of Lines field
(described below) starting from the bottom of the file.
Note: If you select Beginning of file or End of file, you also need to specify a value in the Number of
Lines field, described below.
To display all the lines in the file, leave both the Display and the Number of Lines field empty.
Number of Lines Specify the number of lines you want to display from the beginning or end of the file.
If you enter an expression to match or exclude, the display contains or omits the first (if you select
Beginning of file) or last (if you select End of file) number of occurrences of that expression. For example, if
you enter TCP in the Exclude Expression field, then select Beginning of file from the Display drop-
down, and enter 10 in the Number of Lines field, the display contains the first 10 occurrences of the
expression TCP found starting from the beginning of the file.
Note: To display all the lines in the file, leave this field and the Display field (described above) empty.
Run Click this button to display the contents of the selected file. The file contents display in a pop-up window.
Parameter/Button Description
Protocol Leave this field empty to display statistics for all transport protocols or select from these options:
l RAW only displays raw IP protocol statistics. This option is equivalent to the netstat Linux
command option -w .
l TCP only displays TCP protocol statistics. This option is equivalent to the netstat Linux command
option -t .
l UDP only displays UDP protocol statistics. This option is equivalent to the netstat Linux command
option -u .
Connection Leave this field empty to display information for all non-listening connections or select from these options:
l All connections displays information for all current connections. This option is equivalent to the
netstat Linux command option -a .
l Listening connections displays information for listening connections only. This option is equivalent to
the netstat Linux command option -l .
Mode Select Run Continuously to poll the network status continuously every five minutes. This option is
equivalent to the netstat Linux command option -c .
When Run Continuously is not selected, the network status is polled once.
Match Expression Enter an expression to display only lines that match that expression in the output. Linux regular
expressions are supported.
Exclude Expression Enter an expression to exclude lines that match that expression from the output. Linux regular
expressions are supported.
Run Click this button to display the network connection information. The information displays in a pop-up
window.
Parameter/Button Description
Interface Select the network interface on the appliance whose status you want to display.
Note: If you leave this field empty, the status of all active network interfaces display.
Run Click this button to display the status of the selected network interface. The status displays in a pop-up
window.
Parameter/Button Description
Host Specify the IP address or hostname of the host you want to monitor.
Match Expression Enter an expression to show only network traffic that matches that expression in the display; For example,
if you specify the expression echo , only network traffic from the specified host that includes the
expression echo is displayed.
Linux regular expressions are supported.
Exclude Expression Enter an expression to exclude network traffic that matches that expression from the display; For
example, if you specify the expression echo , all traffic except traffic that contains echo will be displayed.
Linux regular expressions are supported.
Run Click this button to display network traffic between the appliance and the specified host. The information
displays in a pop-up window.
Parameter/Button Description
Match Expression Enter an expression to display only processes that match that expression. Linux regular expressions are
supported.
Exclude Expression Enter an expression to exclude processes that match that expression from the display. Linux regular
expressions are supported.
Run Click this button to display the list of currently running processes. The list displays in a pop-up window.
Parameter/Button Description
Destination Host l Leave this field empty to see the entire IP routing table.
l Specify the IP address or hostname of a host to see IP routing information from the appliance to that
host.
Run Click this button to obtain the routing table. The routing table displays in a pop-up window.
Parameter/Button Description
File Displays a list of files for the type selected in the Category field (described above). Select the file you want
to edit.
Edit Click this button to display the file for editing. After editing the file, click Save or Revert.
Save Click this button to save the edits you make to the file.
Revert Click this button to cancel the edits you make to the file. After clicking Revert, click Save to save the
reverted text.
List directory
Use List directory to display the contents of a directory on the appliance. This tool is equivalent to the Linux
command ls -alh.
This tool uses the parameters described below:
Parameter/Button Description
Directory Specify the directory whose contents you want to display. For example: /opt/arcsight/appliance
Run Click this button to display the directory list. The list displays in a pop-up window.
Parameter/Button Description
Match Expression Enter an expression to display only the top processes that match that expression. Linux regular
expressions are supported.
Exclude Expression Enter an expression to exclude processes that match that expression from the display. Linux regular
expressions are supported.
Run Click this button to display the list of the top processes. The list displays in a pop-up window.
List processes
Use List processes to display the top CPU processes that are currently running together with memory and
resource information. This tool is equivalent to the Linux command
ps -ef.
Parameter/Button Description
Match Expression Enter an expression to display only the top processes that match that expression. Linux regular
expressions are supported.
Exclude Expression Enter an expression to exclude processes that match that expression from the display. Linux regular
expressions are supported.
Run Click this button to display the list of the top processes. The list displays in a pop-up window.
Ping host
Use Ping host to test if a particular host is reachable across an IP network and to measure the round-trip
time for packets sent from the appliance to the host. This tool is equivalent to the Linux command ping.
This tool uses the parameters described below:
Parameter/Button Description
Host Specify the IP address or hostname of the host you want to ping.
Run Click this button to ping the specified host. The ping results display in a pop-up window.
Parameter/Button Description
Run Click this button to look up the hostname in the Domain Name Server. The result displays in a pop-up
window.
Parameter/Button Description
Host Specify the IP address or hostname of the host whose ports you want to scan.
Port Range Optional. Specify a range of ports you want to scan. Separate port numbers in a range by a dash (-) and
individual port numbers by a comma. For example, 80-90, 8080.
If you do not provide a port range, all ports on the specified host are scanned.
This option is equivalent to the netstat Linux command option -p .
Run Click this button to start scanning ports on the specified host. The result displays in a pop-up window.
Parameter/Button Description
Severity Select the severity of the terminate command you want to send to the container. You can select KILL
(Linux kill command option -9 ) or TERM (Linux kill command option -15 ).
Container Select the container to which you want to send the signal.
Run Click this button to send the signal. The result displays in a pop-up window.
Tail file
Use Tail file to display the last ten lines of a system, application, or log file. This tool is equivalent to the
Linux command tail -f.
This tool uses the parameters described below:
Parameter/Button Description
File Displays a list of files for the category selected in the Category field (described above). Select the file from
which you want to display the last ten lines.
Parameter/Button Description
Match Expression Enter an expression to display only lines that match that expression. Linux regular expressions are
supported.
Exclude Expression Enter an expression to exclude lines from the display that match that expression. Linux regular
expressions are supported.
Run Click this button to display the last ten lines of the file you selected. The lines display in a pop-up window.
Parameter/Button Description
Host Specify the IP address or hostname of the host whose route you want to trace.
Run Click this button to display the network route. The information displays in a pop-up window.
Logs
Your system can generate audit logs at the application and platform levels. Use the Logs sub-menu to
search audit logs and to configure audit forwarding so that the system can send audit events to a
destination, such as ESM.
Audit Logs
Your system’s audit logs are available for viewing. Audit logs, as Common Event Format (CEF) audit events,
can be sent to ArcSight ESM directly for analysis and correlation. For information about forwarding audit
events, see "Configuring Audit Forwarding to a Specific Destination" on page 269.
displayed. Similarly, when a user is specified, only logs whose User field contains the username are
displayed.
5. Click Search.
Note: If ArcSight Management Center has been installed by a root user, the syslog connector should
also be configured under the root user.
If the installation was by a non-root user, the syslog connector should be configured under the non-
root user.
Storage
Use the Storage sub-menu to add an NFS mount or a CIFS mount, or SAN (if applicable) and to view the
status of the hard disk array (RAID) controller and specific system processes.
3. The information displayed depends on the hardware model of your system. Click the arrows to open
and close the sections.
FTP
ArcSight Management Center allows for the use of FTP and FTPS (FTP over SSL) as a method of delivering
log files to the appliance. The default state for FTP and FTPS is disabled.
Blue Coat ProxySG appliances, in particular, support FTP and FTPS as a means of transferring files to
ArcSight Management Center (For details on this and other methods, refer to the SmartConnector
Configuration Guide for Blue Coat ProxySG).
FTPS
FTP can also be used over a secure channel, namely SSL. The use of FTPS requires that a certificate be
generated on ArcSight Management Center. This certificate can be self-signed or signed by a certificate
authority (CA). For detailed instructions on this option, see "Using FTPS (FTP over SSL)" on page 273.
Note: If the maximum directory size is exceeded, FTP is disabled and audit event platform:453,
FTP service stopped is sent. Until the directory size is lowered, all FTP connections are denied.
C1400 275
C3400 275
C3500 475
C5400 235
C5500 475
C6500 500
C6600 500
Enabling FTP
In order to use the FTP protocol, you need to enable it on the appliance and set a maximum directory size
for the accumulated files.
1. Click Administration > Setup > System Admin from the top-level menu bar.
2. Click FTP under the Storage section.
3. From within FTP Settings, check the Enable FTP check box.
4. If your FTP client is behind a firewall and you need to limit the ports used for passive mode data
transfer, check the Restrict port range... check box.
l Port Range allows you to set either an individual port (e.g., 12345) or a single port range (e.g.,
20001-20010). Ensure any ports specified open on your firewall.
Note: When choosing a port or port range, choose a port that is unlikely to already be in use. If a
chosen port is already in use, . For this FTP data transfers will fail. For this reason, Micro
Focus recommends using ports in the range of 10000 and above.
l The number of concurrent passive mode FTP clients is restricted to the number of ports specified.
For example, if the specified range is 10 ports, then only 10 concurrent passive FTP clients can be
7. Click Save.
l Only file put operations are supported by the FTP server. There is no capability to retrieve
data from the appliance.
l Data is processed faster and more efficiently when transferred in many small files instead of a
few large files.
Adding a Subdirectory
Based on naming convention, incoming log files from different devices can potentially conflict within the
same directory. To prevent this, you can create subdirectories to separate them. This window also shows
the current size of the subdirectory.
Tip: Creating subdirectories is a good practice, as it allows you to verify how much space is being used
and to easily delete subsets of file data.
Tip: When configuring the Blue Coat SmartConnector for use with FTP, point the connector to
/opt/arcsight/incoming/<or subdirectory>.
3. Configure the device. For instructions on how to do this, see the documentation for your device.
Security
Security settings enable you to configure SSL server certificates, enable and disable FIPS (Federal
Information Processing Standards) mode on your system, and configure SSL client authentication for client
certificate and Common Access Card (CAC) support.
Tip: For steps on how to create a user DN, see "Users" on page 290, and refer to the section “Use Client
DN” in the parameters table.
Your system generates an audit event when the installed SSL certificate is going to expire in less than 30
days or has already expired. The event with Device Event Class ID “platform:407” is generated
periodically until you replace the certificate with one that is not due to expire within 30 days.
HTTPS Choose this option to generate a CSR for use with the HTTPS protocol. This is the most commonly used
option.
FTPS Choose this option only when generating a CSR for use with FTPS.
5. From the Enter Certificate Settings field, enter new values for the following fields:
Parameter Description
Country ISO 3166-1 two-letter country code, such as ‘US’ for the United States.
Parameter Description
Email Address The email address of the administrator or contact person for this CSR.
6. Use the first two buttons to generate a CSR or a self-signed certificate. The View Certificate button is
only used to view the resulting certificate.
Button Description
Parameter Description
HTTPS Choose this option to generate a CSR for use with the HTTPS protocol. This is the most commonly used
option.
FTPS Choose this option only when generating a CSR for use with FTPS.
5. From the Enter Certificate Settings field, enter new values for the following fields:
Parameter Description
Country A two-letter country code, such as ‘US’ for the United States.
Email Address The email address of the administrator or contact person for this CSR.
Private Key Select the length (in bits) of the private key: 1024, 2048, 4096, or 8192.
Length
6. Use the first two buttons to generate a CSR or a self-signed certificate. The View Certificate button is
only used to view the resulting certificate.
Button Description
10. After the CA-signed certificate file is obtained, continue on to "Importing a Certificate" below.
Importing a Certificate
If you have obtained a certificate from your certificate authority (CA), follow the steps below to import it onto
your system.
1. Click Administration > System Admin.
2. Click SSL Server Certificate under the Security section in the left panel.
3. Select the Import Certificate tab.
4. From the Import Certificate For Protocol field, use the Network Protocol drop-down menu to
select the appropriate protocol type.
Parameter Description
HTTPS Choose to import an HTTPS certificate. (This option may require a reboot).
5. Click the Browse button to locate the signed certificate file on your local file system.
Note: The imported certificate must be in Privacy Enhanced Mail (PEM) format.
Note: CAC is a form of client certificate authentication. Information on client certificate authentication
applies to CAC.
To configure ArcMC to support CAC, you need to upload a trusted certificate, and enable client certificate
authentication.
FIPS 140-2
Your system supports the Federal Information Processing Standard 140-2 (FIPS 140-2). FIPS 140-2 is a
standard published by the National Institute of Standards and Technology (NIST) and is used to accredit
cryptographic modules in software components. The US Federal government requires that all IT products
dealing with Sensitive, but Unclassified (SBU) information meet these standards.
If your system needs to be FIPS 140-2 compliant, you can enable FIPS. Once you do so, the system uses the
cryptographic algorithms defined by the NIST for FIPS 140-2 for all encrypted communication between its
internal and external components.
Note: Do not perform any FIPS-related activity on the appliance while a FIPS mode change is in
progress.
To be fully FIPS 140-2 compliant, all components that work together need to be in FIPS mode. For example,
when you enable FIPS on ArcSight Management Center, the appliance becomes FIPS enabled and meets
the standards for cryptographic algorithms defined by the NIST. However, containers must also have FIPS
enabled.
Note: In ArcSight Management Center, enabling FIPS mode will disable the ability to regenerate a self-
signed certificate.
Users/Groups on ArcMC
Use the Users/Groups sub-menu to configure users and user groups on ArcMC, and to set authentication
options.
For managing users of managed products, see "Managing Users on Managed Products" on page 215.
Authentication
Authentication Settings enable you to specify the settings and policies for user login sessions, password
rules and lockouts, and external authentication options.
Sessions
The Session tab enables you to specify the maximum number of simultaneous sessions for a single user
account, and the length of time after which a user session is automatically logged out or a user account
disabled. By default, a single user account can have up to 15 simultaneous active sessions, and a user
account is logged out after 15 minutes of inactivity.
Max The maximum number of simultaneous sessions allowed for a single user account. The default is 15
Simultaneous sessions.
Logins/User
Logout The length of time, in minutes, after which an inactive session is automatically ended. The default is 15
Inactive minutes.
Session After This value does not apply to the user interface pages accessed through the Monitor menu. If a user is on
any of the Monitor menu pages and the session has been inactive for the specified number of minutes, the
user’s session remains active.
Disable The number of days after which an inactive user account is disabled. The default is 0, meaning the account is
Inactive never disabled.
Account
After
Local Password
The Local Password tab enables you to set password policies, such as the minimum and maximum
number of characters and other password requirements.
Enable Account Lockout Select the checkbox to enable user accounts to be locked out as defined by the following
settings. By default, the policy is disabled.
Lockout Account After Number of failed login attempts after which a user account is locked out. The default is 3.
Remember Failed Attempts The length of time, in minutes, for which a failed login attempt is remembered. The default is 1.
For
Lockout Account For The length of time, in minutes, for which a locked out account cannot be unlocked. The default
is 15.
Enable Password Expiration Select the checkbox to enable user passwords to expire as defined by the following settings.
By default, the policy is disabled.
Password Expires in Number of days after which the password expires. The default is 90.
Notify User Number of days before expiration to notify the user. Select this option to allow users to
update their password before expiration. The default is 5.
Users Exempted From Click the link to set the number of users whose password should never expire.
Password Expiration Policy For information on how to use this feature, see "Users Exempted From Password Expiration"
on the next page.
Enforce Password Strength Select the checkbox to enforce password policy as defined by the following settings. By
default, the policy is disabled.
Minimum Length Minimum number of characters that a password must contain. The default is 10.
Maximum Length Maximum number of characters that a password can contain. The default is 20.
Password character rules define additional character requirements to ensure password strength.
Special Minimum number of non-digit and non-letter characters that are required in a password. The
default is 2.
Password Must be At Least Minimum number of characters by which the new password must differ by from the previous
N Characters Different From one. The default is 2.
Old Password
Include “Forgot Password” Select the checkbox to enable users to reset their local password using a “Forgot Password”
link on Login Screen link on the login page. By default, the option is disabled.
An SMTP server must be configured on the system, and the username must have a correct
email address for this feature to work successfully.
If an SMTP server is not set, you cannot reset the password because the email containing the
temporary password cannot be sent.
You must specify an email address in the user settings for the user name. The temporary
password is sent to that email address. If no email address is specified or if the email address is
incorrect, the user will not receive the email.
For information on how to use this feature, see "Forgot Password" below.
Forgot Password
This feature is available only if the Include “Forgot Password” link on Login Screen setting on the
Authentication Settings page (Setup > System Admin > Authentication > Local Password) is set to
Yes. By default, this setting is set to No. An SMTP server must be configured in order to use this feature.
For more details on how to enable it, see "Local Password" on page 281.
If you forget your system password, use this feature to receive an email that provides a temporary
password.
The temporary password is valid until the time specified in the email. If you do not log in within the specified
time, only an administrator can reset the password to generate another temporary password.
External Authentication
Besides providing a local password authentication method, your system supports Client Certificate/CAC,
LDAP, and RADIUS authentication. It is not possible to enable all authentication methods simultaneously.
Note: CAC is a form of client certificate authentication. Information on client certificate authentication
applies to CAC.
From the External Authentication tab, use the drop-down menu to choose one of the following
authentication methods:
l "Local Password" below
l "Client Certificate Authentication " below
l "Client Certificate and Local Password Authentication" on the next page
l "LDAP/AD and LDAPS Authentication" on page 286
l "RADIUS Authentication" on page 287
Local Password
This option is the default method and implements the local password policies set in the Local Password
tab. Leave this as the default, or click Save if changing from another option.
Caution: All SSL client certificates used for authentication must be FIPS compliant (hashed with FIPS-
compliant algorithms) even if FIPS is not enabled on your system.
Caution: All SSL client certificates used for authentication must be FIPS compliant (hashed with FIPS-
compliant algorithms) even if FIPS is not enabled on your system.
4. From the drop-down menu, choose Client Certificate AND Local Password.
5. Allow Local Password Fallback provides two options:
l Allow Local Password Fallback for Default Admin Only
This option, always enabled, allows the default admin user to log in using only a username and
password.
l Allow Local Password Fallback for All Users
This option is always disabled. You cannot enable it when using the Client Certificate AND Local
Password authentication method.
For more information, see "Local Password Fallback" on page 288.
6. Click Save.
Tip: For steps on how to create a user DN, see "Users" on page 290, and the parameter "Use Client DN"
on page 291.
Server (Optional) Enter the host name or IP address and port of the LDAP server in the following format:
Hostname ldap://<hostname or IP address >:<port>
[:port]
ldaps://<hostname or IP address >:<port>
(optional)
Additional steps are required for the use of LDAPS. See "Using the LDAP over SSL (LDAPS) Protocol"
below.
Backup (Optional) Enter the backup LDAP server to use if the primary server does not respond. If the server
Server returns an authentication failure (bad password, unknown username, etc), then the backup server is not
Hostname tried. The backup server is tried only when the primary server has a communication failure.
[:Port] Use the same format as the primary server to specify the host name and port.
(optional)
Request The length of time, in seconds, to wait for a response from the LDAP server. The default is 10.
Timeout
Caution: If the aps process is not restarted, attempts to authenticate using LDAPS will fail.
RADIUS Authentication
This authentication method allows users to authenticate against a RADIUS server. Even when RADIUS
authentication is enabled, each user account must exist locally on your system. The username must match
the one in the RADIUS server, although the password can be different. A user must present a valid
username and (RADIUS) password to be successfully authenticated.
Server Enter the host name and port of the RADIUS server.
Hostname
[:port]
Backup Server (Optional) Enter the backup RADIUS server to use if the primary server does not respond. If the server
hostname returns an authentication failure (bad password, unknown username, etc), then the backup server is not
[:port] tried. The backup server is tried only when the primary server has a communication failure.
(optional) Use the same format as the primary server to specify the host name and port.
Request The length of time, in seconds, to wait for a response from the RADIUS server (in seconds). The default
Timeout is 10.
RADIUS Use the drop-down menu to choose a protocol option. The default is None.
Protocol:
7. Click Save.
log in using local authentication instead of RADIUS should they fail to authenticate to the configured
external RADIUS server(s).
For information on how to allow local password fallback for all users for all users, see "Client Certificate
Authentication " on page 284, "LDAP/AD and LDAPS Authentication" on page 286, or "RADIUS
Authentication" on page 287.
Login Banner
You can customize the message on the login screen to suit your needs. The text you enter in the Content
field is displayed before the login screen. In addition, you can enter a confirmation message that the user
must click to enable the Username and Password fields.
You must have the “Configure Login Settings” permission enabled for your user account to edit the login
banner.
5. Click Save.
User Management
The Users and Groups tabs enable you to manage users and user groups on your system. User groups
are a way to enforce access control to various sections of your system.
Users
Open the Users tab to manage the users that can log in to your system. You can add a new user, edit user
information, or delete a user at any time. You must have the appropriate System Admin group rights to
perform these functions.
Credentials
Contact Information
Use Client If you enabled SSL client certificate or LDAP authentication, click this link to enter the user’s Distinguished
DN Name (Certificate Subject) information. The Distinguished Name should be similar to this format:
CN=UserA,OU=Engg Team,O=ArcSight\, Inc.,L=Cupertino,C=US,ST=California
To determine the DN, use this URL to display the certificate:
https://<hostname or IP address >/platform-service/
DisplayCertificate
OR
Obtain the DN information from the browser that the user will open to connect to the system. For example, on
Mozilla Firefox, click Tools > Options > Advanced > Encryption > View Certificates > Your
Certificates > Select the certificate > View.
Assign to Select the groups to which this user belongs. This setting controls the privileges a user has on this ArcSight
Groups Management Center.
Parameter Description
To edit a user:
1. Click Administration > System Admin.
2. Click User Management in the Users/Groups section in the left panel.
3. In the Users tab, select the user (or users) you want to edit.
4. Click Edit from the top left side of the page.
5. Update the user information as necessary.
6. Click Save User.
To delete a user:
1. Click Administration > System Admin.
2. Click User Management in the Users/Groups section in the left panel.
3. In the Users tab, select the user (or users) you want to delete.
4. Click Delete from the top left side of the page.
Reset Password
The Reset Password feature enables you to reset a user's password without knowing their password. If you
are using an SMTP-configured server and have permissions to create and update users, you can reset a
user’s password by clicking the Reset Password button. An automated email including the new password
string is sent to the user.
An SMTP server must be configured for the automated email containing the temporary password to be
sent. If an SMTP server is not configured, the password will not be reset because an email cannot be sent.
To activate a user:
1. Click Administration > System Admin.
2. Click User Management in the Users/Groups section in the left panel.
3. In the Users tab, select the user (or users) that you want to activate.
4. Choose Edit.
5. Check the Active box.
6. Save the changes.
Groups
User groups define privileges to specific functions on your system and serve to enforce access control to
these functions. For example, if you want User A to perform system admin related activities that are not
Connector Appliance management specific, assign that user to the System Admin group, but not to the
Connector Appliance group.
User groups are divided into the following types: System Admin and Connector Appliance Rights Groups.
Each type has a pre-defined, default user group in which all privileges for the type are enabled. To
authorize a subset of the privileges for a specific group type, create a new user group and enable only the
privileges you want to provide for that group. Then, assign restricted users to the newly created group.
In addition to the default System Admin Group that enables all rights (privileges), a Read Only System
Admin Group is available on your system. Users assigned to this group can view System Admin settings,
but cannot change them.
Caution: It is strongly recommended not to modify any rights for the default admin user, as this can
cause access issues.
Change Password
You can use the Change Password menu to change your application password. This feature is available
to all users for changing their passwords, unlike the Reset Password feature that enables a system
administrator to reset the password of users without knowing the password. Passwords are subject to the
secure password policy specified by the Admin user, as well as the following restrictions.
l Password reset attempts for the admin user will fail, to prevent an unauthenticated user from resetting
the admin account.
l If the password reset attempt fails due to resetting an unknown or admin user, ArcMC will not report the
failure.
Note: If no Syslog Daemon connector is installed or configured on your local machine, then no audit
events will be visible.
Application Events
Application Events
Severit
Signature y Description deviceEventCategory
Connector
Destination
Container
Transformation Hub
Location
Host
Marketplace
Deployment Templates
Generator ID
Platform Events
Platform Events
Signature Severity Definition Category
l event.deviceReceiptTime l event.endTime
l event.deviceVendor l event.deviceProduct
l event.deviceVersion l event.deviceEventClassId
l event.name l event.deviceSeverity
l event.deviceEventCategory l event.deviceCustomNumber1
l event.deviceCustomNumber1Label l event.deviceCustomString1
l event.deviceCustomString1Label l event.deviceCustomString2
l event.deviceCustomString2Label l event.deviceCustomString3
l event.deviceCustomString3Label l event.deviceCustomString4
l event.deviceCustomString4Label l event.deviceCustomString5
l event.deviceCustomString5Label l event.deviceCustomString6
l event.deviceCustomString6Label l event.destinationAddress
l event.deviceAddress
CPU
Disk
Hardware
Memory
Network
NTP
RAID
Parameter Description
Batching Connectors can batch events to increase performance and optimize network bandwidth. When activated,
connectors create blocks of events and send them when they either (1) reach a certain size or (2) the time
window expires, whichever occurs first. You can also prioritize batches by severity, forcing the connector to
send the highest-severity event batches first and the lowest-severity event batches later.
Enable Batching Create batches of events of this specified size (5, 10, 20, 50, 100, 200, 300 events).
(per event)
Enable Batching (in The connector sends the events if this time window expires (1, 5, 10, 15, 30, 60).
seconds)
Batch By This is Time Based if the connector should send batches as they arrive (the default) or Severity Based if
the connector should send batches based on severity (batches of Highest Severity events sent first).
Time Correction The values you set for these fields establish forward and backward time limits, that if exceeded, cause the
connector to automatically correct the time reported by the device.
Use Connector Time Override the time the device reports and instead use the time at which the connector received the event.
as Device Time This option assumes that the connector will be more likely to report the correct time. (No | Yes)
Enable Device Time The connector can adjust the time reported by the device Detect Time , using this setting. This is useful
Correction (in when a remote device's clock isn't synchronized with the ArcSight Manager. This should be a temporary
seconds) setting. The recommended way to synchronize clocks between Manager and devices is the NTP protocol.
The default is 0.
Enable Connector The connector can also adjust the time reported by the connector itself, using this setting. This is for
Time Correction (in informational purposes only and allows you to modify the local time on the connector. This should be a
seconds) temporary setting. The recommended way to synchronize clocks between Manager and connectors is the
NTP protocol. The default is 0.
Set Device Time Ordinarily, it is presumed that the original device is reporting its time zone along with its time. And if not, it is
Zone To then presumed that the connector is doing so. If this is not true, or the device isn't reporting correctly, you
can switch this option from Disabled to GMT or to a particular world time zone. That zone is then applied to
the time reported. Default: Disabled.
Device Time
Auto-correction
Future Threshold The connector sends the internal alert if the detect time is greater than the connector time by Past
Threshold seconds.
Parameter Description
Past Threshold The connector sends the internal alert if the detect time is earlier than the connector time by Past
Threshold seconds.
Device List A comma-separated list of the devices to which the thresholds apply. The default, (ALL) , means all
devices.
Time Checking These are the time span and frequency factors for doing device-time auto-correction.
Future Threshold The number of seconds by which to extend the connector's forward threshold for time checking. The default
is 5 minutes (300 seconds).
Past Threshold The number of seconds by which to extend the connector's rear threshold for time checking. Default is 1
hour (3,600 seconds).
Frequency The connector checks its future and past thresholds at intervals specified by this number of seconds.
Default is 1 minute (60 seconds).
Cache Changing these settings will not affect the events cached, it will only affect new events sent to the cache.
Cache Size Connectors use a compressed disk cache to hold large volumes of events when the ArcSight Manager is
down or when the connector receives bursts of events. This parameter specifies the disk space to use. The
default is 1 GB which, depending on the connector, can hold about 15 million events, but it also can go down
to 5 MB. When this disk space is full, the connector drops the oldest events to free up disk cache space. (5
MB, 50 MB, 100 MB, 150 MB, 200 MB, 250 MB, 500 MB, 1 GB, 2.5 GB, 5 GB, 10 GB, 50 GB.)
Notification The size of the cache's contents at which to trigger a notification. Default is 10,000.
Threshold
Notification How often to send notifications after the Notification Threshold is reached. (1 minute, 5 minutes, 10
Frequency minutes, 30 minutes, 60 minutes.)
Network
Heartbeat This setting controls how often the connector sends a heartbeat message to the destination. The default is
Frequency 10 seconds, but it can go from 5 seconds to 10 minutes. Note that the heartbeat is also used to
communicate with the connector; therefore, if its frequency is set to 10 minutes, then it could take as much
as 10 minutes to send any configuration information or commands back to the connector.
Enable Name The connector tries to resolve IP addresses to hostnames, and hostnames to IP addresses , if required and
Resolution if the event rate allows. This setting controls this functionality. The Source, Target and Device IP addresses ,
and Hostnames might also be affected by this setting. By default, name resolution is enabled (Yes).
Limit Bandwidth To A list of bandwidth options you can use to constrain the connector's output over the network. (Disabled, 1
kbit/sec to 100 Mbits/sec.)
Parameter Description
Transport Mode You can configure the connector to cache to disk all the processed events it receives. This is equivalent to
pausing the connector. However, you can use this setting to delay event-sending during particular time
periods. For example, you could use this setting to cache events during the day and send them at night. You
can also set the connector to cache all events, except for those marked with a very-high severity, during
business hours, and send the rest at night. (Normal | Cache | Cache (but send Very High severity events).
Address-based This field applies to v3.0 ArcSight Managers. This field is not relevant in ESM v3.5 because the system has
Zone Population integral zone mapping. Default: Yes.
Defaults Enabled
Address-based This field applies to v3.0 ArcSight Managers. This field is not relevant in ESM v3.5 because the system has
Zone Population integral zone mapping.
Customer URI Applies the given customer URI to events emanating from the connector. Provided the customer resource
exists, all customer fields are populated on the ArcSight Manager. If this particular connector is reporting
data that might apply to more than one customer, you can use Velocity templates in this field to
conditionally identify those customers.
Source Zone URI Shows the URI of the zone associated with the connector's source address. (Required for ESM v3.0
compatibility.)
Source Translated Shows the URI of the zone associated with the connector's translated source address. The translation is
Zone URI presumed to be NAT. (Required for ESM v3.0 compatibility.)
Destination Zone Shows the URI of the zone associated with the connector's destination address. (Required for ESM v3.0
URI compatibility.).
Destination Shows the URI of the zone associated with the connector's translated destination address. The translation
Translated Zone is presumed to be NAT. (Required for ESM v3.0 compatibility.)
URI
Connector Zone URI Shows the URI of the zone associated with the connector's address. (Required for ESM v3.0 compatibility.)
Connector Shows the URI of the zone associated with the connector's translated address. The translation is presumed
Translated Zone to be NAT. (Required for ESM v3.0 compatibility.)
URI
Device Zone URI Shows the URI of the zone associated with the device's address. (Required for ESM v3.0 compatibility.)
Device Translated Shows the URI of the zone associated with the device's translated address. The translation is presumed to
Zone URI be NAT. (Required for ESM v3.0 compatibility.)
Field Based This feature is an extension of basic connector aggregation. Basic aggregation aggregates two events if,
Aggregation and only if, all the fields of the two events are the same (the only difference being the detect time).
However, field-based aggregation implements a less strict aggregation mechanism; two events are
aggregated if only the selected fields are the same for both alerts. It is important to note that field-based
aggregation creates a new alert that contains only the fields that were specified, so the rest of the fields are
ignored.
Connector aggregation significantly reduces the amount of data received, and should be applied only when
you use less than the total amount of information the event offers. For example, you could enable field-
based aggregation to aggregate “accepts” and “rejects” in a firewall, but you should use it only if you are
interested in the count of these events, instead of all the information provided by the firewall.
Parameter Description
Time Interval Choose a time interval, if applicable, to use as a basis for aggregating the events the connector collects. It is
exclusive of Event Threshold. (Disabled, 1 sec, 5 sec, and so on, up to 1 hour.)
Event Threshold Choose a number of events, if applicable, to use as a basis for aggregating the events the connector
collects. This is the maximum count of events that can be aggregated; for example, if 150 events were
found to be the same within the time interval selected (that is, contained the same selected fields) and you
select an event threshold of 100, you will then receive two events, one of count 100 and another of count
50. This option is exclusive of Time Interval. (Disabled, 10 events, 50 events, and so on, up to 10,000
events.)
Field Names Enter one or more fields, if applicable, to use as the basis for aggregating the events the connector collects.
The result is a comma-separated list of fields to monitor. For example, "eventName,deviceHostName"
would aggregate events if they have the same event- and device-hostnames. Names can contain no
spaces and the first letter must not be capitalized.
Fields to Sum Enter one or more fields, if applicable, to use as the basis for aggregating the events the connector collects.
Preserve Common Choosing Yes adds fields to the aggregated event if they have the same values for each event. Choosing
Fields No, the default, ignores non-aggregated fields in aggregated events.
Filter Aggregation Filter Aggregation is a way of capturing aggregated event data from events that would otherwise be
discarded due to an agent filter. Only events that would be filtered out are considered for filter aggregation
(unlike Field-based aggregation, which looks at all events).
Connector aggregation significantly reduces the amount of data received, and should be applied only when
you use less than the total amount of information the event offers.
Time Interval Choose a time interval, if applicable, to use as a basis for aggregating the events the connector collects. It is
exclusive of Event Threshold. (Disabled, 1 sec, 5 sec, and so on, up to 1 hour.)
Event Threshold Choose a number of events, if applicable, to use as a basis for aggregating the events the connector
collects. This is the maximum count of events that can be aggregated; for example, if 150 events were
found to be the same within the time interval selected (that is, contained the same selected fields) and you
select an event threshold of 100, you will then receive two events, one of count 100 and another of count
50. This option is exclusive of Time Interval. (Disabled, 10 events, 50 events, and so on, up to 10,000
events.)
Fields to Sum (Optional) Choose one or more fields, if applicable, to use as the basis for aggregating the events the
connector collects.
Processing
Preserve Raw For some devices, a raw event can be captured as part of the generated alert. If that is not the case, most
Event connectors can also produce a serialized version of the data stream that was parsed/processed to
generate the ArcSight event. This feature allows the connector to preserve this serialized "raw event" as a
field. This feature is disabled by default since using raw data increases the event size and therefore requires
more database storage space. You can enable this by changing the Preserve Raw Event setting. The
default is No. If you choose Yes, the serialized representation of the "Raw Event" is sent to the destination
and preserved in the Raw Event field.
Parameter Description
Turbo Mode You can accelerate the transfer of a sensor's event information through connectors by choosing one of two
“turbo” (narrower data bandwidth) modes. The default transfer mode is called Complete, which passes all
the data arriving from the device, including any additional data (custom, or vendor-specific).
Complete mode does indeed use all the database performance advances of ArcSight ESM v3.x.
The first level of Turbo acceleration is called Faster and drops just additional data, while retaining all other
information. The Fastest mode eliminates all but a core set of event attributes, in order to achieve the best
throughput.
The specific event attributes that apply to these modes in your enterprise are defined in the self-
documented $ARCSIGHT_HOME/config/connector/agent.properties file for the ArcSight
Manager. Because these properties might have been adjusted for your needs, you should refer to this file
for definitive lists. Only scanner connectors need to run in Complete mode, to capture the additional data.
Note: Connector Turbo Modes are superseded by the Turbo Mode in use by the ArcSight Managers
processing their events. For example, a Manager set to Faster will not pass all the data possible for a
connector that is set for the default of Complete.
Enable Aggregation When enabled, aggregates two or more events on the basis of the selected time value. (Disabled, 1, 2, 3, 4,
(in seconds) 5, 10, 30, 60)
The aggregation is performed on one or more matches for a fixed subset of fields:
l Agent ID
l Name
l Device event category
l Agent severity
l Destination address
l Destination user ID
l Destination port
l Request URL
l Source address
l Source user ID
l Source port
l Destination process name
l Transport protocol
l Application protocol
l Device inbound interface
l Device outbound interface
l Additional data (if any)
l Base event IDs (if any)
The aggregated event shows the event count (how many events were aggregated into the displayed
event) and event type. The rest of the fields in the aggregated event take the values of the first event in
the set of aggregated events.
Parameter Description
Limit Event You can moderate the connector's burden on the CPU by reducing its processing rate. This can also be a
Processing Rate means of dealing with the effects of event bursts.
The choices range from Disabled (no limitation on CPU demand) to 1 eps (pass just one event per second,
making the smallest demand on the CPU).
Note: The effect of this option varies with the category of connector in use, as described in the connector
Processing Categories table below.
Fields to
Obfuscate
Filters
Filter Out NA
“High Severity” NA
Event Definition
“Medium Severity” NA
Event Definition
“Low Severity” NA
Event Definition
“Unknown Severity” NA
Event Definition
Parameter Description
Max. Length Discard, 128 bytes, 256 bytes, 512 bytes, 1 kbyte
the SmartConnector Configuration Guide for Microsoft Windows Event Log - Unified, or SmartConnector
Configuration Guide for Microsoft Windows Security Events - Mappings.
Note: The pre-bundled SmartConnector for Microsoft Windows Event Log - Unified installed using
the First Boot Wizard is installed with Parser Version 1. Any Windows Event Log - Unified connectors
you add using the connector configuration wizard are installed with Parser Version 0 (the base
parser).
The fcp.version parameter value 0 designates the base parser. To use parser 1, change the
fcp.version parameter value to 1. For example:
agents[0].fcp.version=1
SSL Authentication
If you choose to use SSL as the connection protocol, you must add security certificates for both the Windows
Domain Controller Service and for the Active Directory Server. Installing a valid certificate on a domain
controller permits the LDAP service to listen for, and automatically accept, SSL connections for both LDAP
and global catalog traffic. With the First Boot Wizard installation of the connector, the certificates are already
imported for you. If you add Windows Event Log - Unified connectors, see the SmartConnector
Configuration Guide for Microsoft Windows Event Log - Unified for instructions.
Database Connectors
The following database connectors are available for installation with ArcSight Express:
l IBM SiteProtector DB*
l McAfee ePolicy Orchestrator DB*
l McAfee Vulnerability Manager DB*
l McAfee Network Security Manager DB*
l Microsoft SQL Server Audit Multiple Instance DB*
l Oracle Audit DB
l Symantec Endpoint Protection DB*
l Trend Micro Control Manager NG DB*
l Snort DB*
*These connectors extract events from an SQL Server or MySQL databases, which requires a JDBC driver.
See "Add a JDBC Driver" on the next page for instructions.
All of these database connectors require the following information when being added to ArcSight Express;
some connectors require additional parameters, such as event types or polling frequency.
Parameter Description
Database If you are using an ODBC DRIVER, select 'sun.jdbc.odbc.JdbcOdbcDriver' driver. For JDBC drivers, select the
JDBC 'com.microsoft.sqlserver.jdbc.SQLServerDriver' driver.
Driver
Database If you are using an ODBC DRIVER, enter: 'jdbc:odbc:<ODBC Data Source Name>, where the <ODBC Data Source
URL Name> is the name of the ODBC data source you just created. If you are using a JDBC DRIVER, enter:
'jdbc:sqlserver://<MS SQL Server Host Name or IP Address>:1433;DatabaseName=<MS SQL Server Database
Name>,' substituting actual values for <MS SQL Server Host Name or IP Address> and <MS SQL Server Database
Name>.
Database Enter the login name of the database user with appropriate privilege.
User
Note: Different versions of the JDBC driver are required for different SQL Server database versions;
be sure to use the correct driver for your database version. The name of the jar file may be different for
some JDBC driver versions.
10. Click Done to complete the process; the newly added file is displayed in the Name field under Add
Connector JDBC Driver File.
11. To apply the driver file, select the driver .zip file and click the up arrow to invoke the Upload
Container Files wizard. Click Next.
12. Select the container or containers into which the driver is to be uploaded; click Next.
13. Click Done to complete the process.
Configuration guides for the database connectors supported with ArcSight Express can be found on the
Micro Focus Community. The individual configuration guides that provide setup information and
mappings for the applications listed below can be found on Micro Focus Community:
l IBM SiteProtector DB
l McAfee ePolicy Orchestrator DB
l McAfee Vulnerability Manager DB (formerly FoundScan)
l McAfee Network Security Manager DB
l Microsoft SQL Server Multiple Instance Audit DB
l Oracle Audit DB
l Symantec Endpoint Protection DB
l Trend Micro Control Manager DB
l Snort DB
API Connectors
The following API connectors are available for installation with ArcSight Express. They require a client and
authentication credentials, as well as configuring the events types to be sent to the connector by the device.
l Cisco Secure IPS SDEE
l Sourcefire Defense Center eStreamer
For Cisco Secure IPS SDEE, if you want the SmartConnector to validate the Cisco IPS sensor's authentication
certificate, obtain the authentication certificate from the IPS sensor and import it to the appliance.
For Sourcefire Defense Center eStreamer, add an eStreamer client, create an authentication certificate, and
select event types to be sent to the connector.
See the individual configuration guides for these connectors for instructions.
Follow the instructions in "Uploading Certificates to the Repository" in the Connector Management for
ArcSight Express 4.0 User's Guide to import the trusted certificates to ArcSight Express.
Configuration guides for the API connectors supported with ArcSight Express can be found on the Micro
Focus Community, as well as the individual configuration guides that provide setup information and
mappings for the applications listed below.
File Connectors
File-based connectors use the Network File System (NFS) or the Common Internet File System (CIFS).
The following File connector is available for installation with ArcSight Express:
l Blue Coat Proxy SG Multiple Server File
See the configuration guide for device setup, parameter configuration, and mappings information for the
SmartConnector for Blue Coat Proxy SG Multiple Server File.
File-based connectors use the Network File System (NFS) or the Common Internet File System (CIFS). For
the file-based connectors on a Windows system, configure a CIFS share before you add the connectors.
For information on creating a CIFS Mount or an NFS Mount, see "Managing a Remote File System" in the
Connector Management for ArcSight Express 4.0 User's Guide.
Syslog Connectors
If you selected Syslog Daemon during initial installation with the First Boot Wizard, the Syslog Daemon
connector has already been installed.
You can add a Syslog File, Pipe, or Daemon connector in a new container. Syslog connectors for the
following devices are available with ArcSight Express:
l Cisco PIX/ASA Syslog
l Cisco IOS Router Syslog
l Juniper Network and Security Manager Syslog
l Juniper JUNOS Syslog
l UNIX OS Syslog
Be sure your device is set up to send syslog events. See your device documentation or the SmartConnector
Configuration Guide for device configuration information; the guide also includes specific device mappings
to ArcSight event fields as well as further information needed for configuration if you are installing the Pipe
or File connectors. Mappings in the SmartConnector for UNIX OS Syslog configuration guide apply to all
syslog connectors. Specific mappings per device are documented in the configuration guide for the device.
Configuration guides for these syslog connectors supported with ArcSight Express can be found on the
Micro Focus Community:
l Cisco PIX/ASA Syslog
l Cisco IOS Syslog
Preparation
Prior to first use of your ArcSight Management Center appliance, do each of the following:
1. Unpack the appliance and its accompanying accessories.
2. Read carefully through the instructions, cautions, and warnings packaged with the appliance. Failure
to do so can result in bodily injury or appliance malfunction.
3. Note and save the rack-mounting instructions included in the package.
4. Redeem your Management Appliance license key. You will need this key to access Management
Appliance functionality.
5. Apply for an account on the Micro Focus Community. You will need this account to access product
documentation and other community-based resources for your ArcSight products.
6. Follow the rack installation instructions (included in your Appliance package) to securely mount the
appliance in its rack and make the back panel connections.
7. Do one of the following to enable local access to the Appliance:
l Connect a keyboard, monitor, and mouse to the ports on the Appliance.
l Connect a terminal to the serial port on the Appliance using a null modem cable with DB-9
connector. The serial port requires a standard VT100-compatible terminal: 9600 bps, 8-bits,
no parity, 1 stop bit (8N1), no flow control.
8. Power on the appliance.
9. Optionally, enable your appliance for out-of-band remote access. Download, review, and follow the
instructions in the ProLiant Integrated Lights-Out User Guide, available on the product's website.
You are now ready to begin appliance set up.
Setup
During appliance setup, you will do the following:
1. Configure a new IP address for the appliance at the CLI.
2. Accept the End User License Agreement, and then log in to the appliance.
Overview
You can restore an ArcSight Management Center to its factory settings using a built-in utility on the
appliance. Restoration applies to new model ArcSight Management Centers as well as former Connector
Appliances that have been migrated to ArcSight Management Center.
Restoring an ArcSight Management Center Appliance to factory settings irretrievably deletes all
configuration settings. You should back up your configuration settings before performing a factory restore.
The utility used for the factory restore (and resulting appliance image) depends on the type of appliance
being restored. Consult the table below to determine the utility to employ.
CX400 (running RHEL 5.x pre-Migration) System Restore ArcSight Management Center
CX400 (running RHEL 6.x pre-Migration) Acronis True Image Connector Appliance
5. A screen similar to the one shown below appears on the attached monitor. Use the mouse or arrow
keys to select System Restore and press Enter. The System Restore utility launches.
For use, the appliance must now be configured with an IP address , default gateway, and netmask you
noted previously. For configuration instructions, see the document Getting Started with ArcSight
Management Center Appliance, available from the Micro Focus Community.
5. A screen similar to the one shown below appears on the attached monitor. Use the mouse or arrow
keys to select System Restore and press Enter.
10. On the Restoration Type Selection page, select Restore disks or partitions and click Next.
11. On the Partition or Disk to Restore page, select the entire drive, labeled cciss/c0d0 or sda
(depending on the appliance model) and click Next.
12. On the NT Signature selection for image restoration page, select how you want the NT signature
for the restored disk to be processed and click Next.
13. On the Restored Hard disk Location page, select the drive to restore (cciss/c0d0 or sda) and click
Next.
14. On the Non-empty Destination Hard Disk Drive page, select Yes, I want to delete all
partitions on the destination hard disk drive before restoring and click Next.
15. On the Next Selection page, select No, I do not and click Next (there are no other partitions or
disks to restore).
16. On the Restoration Options page, select Validate backup archive for the data restoration
process if you want to validate the archive before resetting the appliance. Select Reboot the
computer automatically after the restoration is finished if you want to reboot the appliance
automatically. Click Next.
17. Review the checklist of operations to be performed and click Proceed to begin factory reset. Click Back
to revisit previous pages.
Caution: Do not interrupt or power down the ArcSight Management Center during the reset
process. Interrupting the reset process can force the system into a state from which it cannot
recover.
Progress bars show the status of the current operation and the total progress.
18. When you see a message indicating that the data was restored successfully, click OK.
19. If you specified automatic reboot previously, the appliance reboots when the reset is complete.
Otherwise, reboot manually.
The result of the restore process is a factory restored Connector Appliance.
For use, the appliance must now be configured with an IP address , default gateway, and netmask you
noted previously. For configuration instructions, see the document Getting Started with Connector
Appliance, available from the Micro Focus Community.
agentAddress VARCHAR 16
agentId VARCHAR 40
agentReceiptTime DATE
agentType VARCHAR 63
agentVersion VARCHAR 31
applicationProtocol VARCHAR 40
baseEventCount INT
bytesIn Long
bytesOut Long
destinationAddress VARCHAR 16
destinationPort INT
destinationProcessId INT
destinationTranslatedAddress VARCHAR 16
destinationTranslatedPort INT
deviceAction VARCHAR 63
deviceAddress VARCHAR 16
deviceCustomDate1 DATE
deviceCustomDate2 DATE
deviceCustomFloatingPoint1 FLOAT
deviceCustomFloatingPoint2 FLOAT
deviceCustomFloatingPoint3 FLOAT
deviceCustomFloatingPoint4 FLOAT
deviceProcessId INT
deviceReceiptTime DATE
deviceSeverity VARCHAR 63
deviceVersion VARCHAR 16
eventOutcome VARCHAR 63
externalId VARCHAR 40
fileCreateTime DATE
fileModificationTime DATE
version
fileSize LONG
flexDate1 DATE
flexNumber1 LONG
flexNumber2 LONG
oldFileCreateTime DATE
oldFileModificationTime DATE
oldFileSize LONG
severity INT
sourcePort INT
sourceProcessId INT
sourceTranslatedPort INT
startTime DATE
transportProtocol VARCHAR 31
To get the most complete and accurate topological view, you are strongly encouraged to use ArcMC to
manage all supported connectors (or Collectors) included in your logical topology.