Home

Symantec Enterprise Security Manager 6.1 (10287797) for PC, Unix, Sun, Linux

image

Contents

1. CATEGORY_NAME CODE STRING_CODE AND STRING_VALUE Account Integrity Category CATEGORY_ID System Information 7 ESM Administrative Information System Error Change Notification e UU UD Policy Compliance The following command set shows an example of how to enable trending for all categories that use the Account Integrity module To enable trending for the module Account Integrity Use the following example command set update esmdb10 category set trend 1 where category_id in select category_id from esmdb10 category esmdb10 content_string_map where category_type 2 and category_name_code string_code and string_value Account Integrity You can disable trending for all categories that use a specific module The following set of commands shows an example of how to do this To disable trending for the module Account Integrity Use the following example command set UPDATE ESMDB10 CATEGORY SET TREND 0 WHERE CATEGORY_ID IN SELECT CATEGORY_ID FROM ESMDB10 CATEGORY ESMDB10 CONTENT_STRING_MAP WHERE CATEGORY_TYPE 2 AND CATEGORY_NAME_CODE STRING_CODE AND STRING_VALUE Account Integrity Running Symantec ESM Reporting 151 Configuring and updating the database Updating description information in the database Future versions Symantec ESM will have a manager console enhancement that lets you add des
2. WHERE MANAGER_NAME IN Manager_0 To create an account with rights to specific policies and domains on specific managers Use the following sets of commands as templates to do specific actions m The following set of SQL commands gives a user named alan access to Manager_1 data but not blanket access to all domains or policies It gives him access ESM user account information from Manager_1 INSERT INTO ESMDB10 RPT_MANAGER_PERM USER_NAME MANAGER_ID IS_ESM_ACCOUNT VIEW_ALL_DOMAINS VIEW_ALL_POLICIES VIEW_ESM_ACCOUNTS SELECT alan MANAGER_ID 0 0 0 1 FROM ESMDB10 MANAGER WHERE MANAGER_NAME IN Manager_1 118 Securing Symantec ESM Reporting About user account permissions m The following set of SQL commands gives a user named alan access to Manager _2 data but not blanket access to all domains or policies It denies him access ESM user account information from Manager_2 INSERT INTO ESMDB10 RPT_MANAGER_PERM USER_NAME MANAGER_ID IS_ESM_ACCOUNT VIEW_ALL_DOMAINS VIEW_ALL_POLICIES VIEW_ESM_ACCOUNTS SELECT alan MANAGER_ID 0 0 0 0 FROM ESMDB10 MANAGER Lad m The following set of SQL commands gives a user named alan access to specific domains All Agents Domain_0 and Domain_1 on specific managers Manager_1 and Manager_2 INSERT INT
3. UPDATE ESMDB10 CATEGORY SET TREND 1 WHERE PARENT_CATEGORY_ID SELECT CATEGORY_ID FROM ESMDB10 CATEGORY ESMDB10 CONTENT_STRING_MAP WHERE CATEGORY_TYPE 1 AND CATEGORY_NAME_CODE STRING_CODE AND STRING_VALUE Change Notification The following is an example of how to disable trending all modules in a category To disable trending for modules for the category Change Notification Use the following example command UPDATE ESMDB10 CATEGORY SET TREND 0 WHERE PARENT_CATEGORY_ID SELECT CATEGORY_ID FROM ESMDB10 CATEGORY ESMDB10 CONTENT_STRING_MAP WHERE CATEGORY_TYPE 1 AND CATEGORY_NAME_CODE STRING_CODE AND STRING_VALUE Change Notification You can enable trending for all categories that incorporate a specific module The following set of commands gives an example of how to see all the top level categories for a specific module 150 Running Symantec ESM Reporting Configuring and updating the database To show top level categories for module Account Integrity Use the following example command set SELECT STRING_VALUE AS CATEGORY CATEGORY_ID FROM ESMDB10 CATEGORY ESMDB10 CONTENT_STRING_MAP WHERE CATEGORY_TYPE 1 AND CATEGORY_NAME_ CODE STRING_CODE AND CATEGORY_ID IN SELECT PARENT_CATEGORY_ID FROM ESMDB10 CATEGORY ESMDB10 CONTENT_STRING_MAP WHERE CATEGORY_TYPE 2 AND
4. 1 FROM ESMDB10 RPT_ALL_MGR_PERM INTO ESMDB10 RPT_ALL_MGR_PERM VALUES Administrator 1 Securing Symantec ESM Reporting 117 About user account permissions To create an account with rights to specific policies and domains on all managers The following set of SQL commands gives a user named eric rights to view specific domains Windows 2000 Agents and the ALL Agents domain and specific policies Phase 1 and Phase 2 on all managers SELECT FROM RPT_ALL_MGR_PERM INSERT INTO ESMDB10 RPT_ALL_MGR_PERM VALUES eric 0 0 0 INSERT INTO ESMDB10 RPT_DOMAIN_PERM USER_NAME IS_ESM_ACCOUNT DOMAIN_ID SELECT eric 0 DOMAIN_ID FROM ESMDB10 ESM_DOMAIN WHERE DOMAIN_NAME IN Windows 2000 Agents All Agents INSERT INTO ESMDB10 RPT_POLICY_PERM USER_NAME IS_ESM_ACCOUNT POLICY_ID SELECT eric 0 POLICY_ID FROM ESMDB10 POLICY WHERE POLICY_NAME IN Phase 1 Phase 2 To create an account with rights to all policies and domains on specific managers The following set of SQL commands gives a user named jeremy rights to view all domains and policies on a specific manager Manager_0 INSERT INTO ESMDB10 RPT_MANAGER_PERM USER_NAME MANAGER_ID IS_ESM_ACCOUNT VIEW_ALL_DOMAINS VIEW_ALL_POLICIES VIEW_ESM_ACCOUNTS SELECT jeremy MANAGER_ID 0 1 1 1 FROM ESMDB10 MANAGER ed
5. For operating system versions check vendor specifications Oracle 9i m Solaris Microsoft SQL Server Microsoft Windows 2000 IBM DB2 m IBM DB2 v7 2 or 8 1 on Microsoft Windows 32 Before you Install Symantec ESM Reporting System requirements Table 2 2 Symantec Enterprise Reporting system requirements Database driver Oracle m Oracle JDBC driver for Java 1 3 Classes 12 zip Download this driver from http www oracle com Symantec Enterprise Reporting does not function correctly with earlier versions of this driver Microsoft SQL Server Microsoft SQL Server requires a fully supported JDBC 2 x driver The computers on which you are installing the Symantec ESM Reporting Database Foundation must use the Microsoft JDBC driver for SQL Server 2000 Do not use third party JDBC Drivers for the Microsoft SQL Server database IBM DB2 8 1 m Use the default driver that installs with the DB2 database You can find this driver at the following default path C Program Files IBM SQLLIB java db2java zip For this driver you must include the following string in the library path during the installations of both the Symantec ESM Reporting Database Link and Symantec Enterprise Reporting C Program Files IBM SQLLIB BIN The path may vary if you did not use the default installation path for the DB2 installation IBM DB2 7 x m Configure DB2 7 x to use the correct JDBC driver This requires that you run the bat file loc
6. MESSAGE_STATE_ID A character string up to 32 letters that identifies the state of a Symantec ESM message POLICY_ID A character or numeric string that identifies the Symantec ESM policy MANAGER ID The unique character or numeric string that identifies a Symantec ESM Manager DOMAIN_ID A unique character or numeric string that identifies the Symantec ESM domain AGENT_ID A character or numeric string that identifies the name of the Symantec ESM Agent host computer MESSAGE _ID An integer that identifies a message SEVERITY_ID A small integer 0 4 that identifies the level of severity MODULE_ID A character or numeric string that identifies a specific Symantec ESM module CATEGORY_ID An integer that identifies the category of a specific Symantec ESM message 198 About the Symantec ESM Reporting metadata model Structure of data items Table B 23 Path Message Information Message Filters Data item Message Filters Messages occurred today Predefined filter that limits the displayed data to messages that were reported on the current day Messages occurred in last n days Filter that limits the displayed data to messages that were reported within the number of days that you specify Messages occurred between these dates Filter that limits the displayed data to messages that were reported between two dates that you specify Red msgs only Predef
7. Modify policy True false value that identifies whether the user can modify all Symantec ESM policies Run policy True false value that identifies whether the user can run a Symantec ESM policy on a specific domain Table B 6 Path Administration Account permissions Template Data item Template Template name A unique character string that identifies a template from a specific Symantec ESM Policy Modify template True false value that identifies whether the user can modify a specific Symantec ESM template Read template True false value that identifies whether the user can run a Symantec ESM policy on a specific domain 184 About the Symantec ESM Reporting metadata model Structure of data items Table B 7 Path Administration Account permissions Advanced Data item Advanced Perform remote True false value that identifies whether the user installs upgrades can perform a remote installation upgrade Register agents with True false value that identifies whether the user manager can register Agents Modify own password True false value that identifies whether the user can modify his own password Modify ESM options True false value that identifies whether the user can modify Manager options Manage user rights True false value that identifies whether the user can manage Symantec ESM user rights Table B 8 Path Administration Account permissions Codes Data item Codes LOCKED_O
8. Default path Public Folders gt Symantec ESM gt Technical gt Administration gt Suppression Configuration Suppression configuration query Use this query as a template to create your own custom queries in Query Studio using the Suppression Configuration query subject in the metadata model Default path Public Folders gt Symantec ESM gt Technical gt Custom Queries Symantec report template Use this template as a framework for creating your own reports in Report Studio Default path Public Folders gt Symantec ESM gt Technical gt Report Template Upcoming scheduled audits query This query lists the audits that are scheduled to run within a time period that you specify For each Audit the query shows the manager name the domain name the policy name the job ID the start time the run state for the policies and the user name of the Symantec ESM account that created the policies Default path Public Folders gt Symantec ESM gt Technical gt Administration gt Audits 172 About Symantec ESM Reports About the reports in Symantec ESM Reporting Violations by line of business This report displays security compliance data for modules on selected domains The information is grouped according to modules then by domain It also shows the number of messages at each security level red yellow and green The report displays data as both a chart and a table Default path Public Folders gt Symantec E
9. File Watch Network Integrity Object Integrity Oracle Accounts Oracle Auditing Oracle Configuration Oracle Profiles Oracle Roles Oracle Tablespace Registry Startup Files This category contains all messages that have to do with changes to snapshots on Symantec ESM Agent computers It reports messages that are related to snapshots that deal with new modified and deleted messages ESM Administrative Information Account Information Account Integrity Active Directory Backup Integrity This category contains messages that inform the user of actions that Symantec ESM took For example messages regarding the creation of a snapshot or checks that were not performed fall into this category Unexpected actions could indicate security risks About Symantec ESM Reporting categories 271 About the categories in Symantec ESM Reporting Table E 1 Symantec ESM Reporting Categories Device Integrity Discovery Disk Quota Encrypted File System File Access File Attributes File Find File Information 272 About Symantec ESM Reporting categories About the categories in Symantec ESM Reporting Table E 1 Symantec ESM Reporting Categories ESM File Watch This category contains messages Administrative that inform the user of actions that Information Integrated Command Engine Symantec ESM took For example me
10. 35 36 Before you Install Symantec ESM Reporting System requirements Additional requirements for all computers The following requirements apply to all computers If you perform a custom installation of the ESM and SER databases use the database names that you assign instead of the default database names when installing the Symantec ESM Reporting Database Link Symantec Enterprise Reporting and Symantec ESM Reporting Reports Package Also use the database names that you assign when configuring Symantec Enterprise Reporting If the host computer on which you are installing the Symantec ESM Reporting Database Link uses Oracle OCI drivers do the following tasks before running the Database Link installer m Set up the OCI client m Set up the ORACLE HOME environment variable with the location of the installed Oracle files m Set up the appropriate environment variable for the operating system with the location of the OCI s libraries and drivers LD_LIBRARY_PATH for Solaris computers SHLIB_ PATH for HPUX computers LIBPATH for AIX computers If you are installing the Symantec ESM Reporting Database Link to a destination other than the default directory you must ensure that the path does not contain multi byte characters To add or delete a Symantec ESM Manager or make another change to an installed Symantec ESM Reporting Database Link you must use the installation CD to run the Database Link installer on the host comput
11. About the Reports Package installer Before you can perform the Symantec ESM Reporting Reports Package installation you must complete the following tasks m Run the Database Foundation installer to create the Symantec ESM Reporting databases m Run the Symantec Enterprise Reporting installer and install its components on at least one host computer m Obtain the URL to the Symantec Enterprise Reporting Gateway m Obtain the namespace user name and password of an account with the required privileges m Obtain the location of the Content Manager s deployment directory m Obtain the type and version of the relational database m Obtain the name of the database computer the database alias for IBM DB2 m Obtain the name and password of an account on the database that the Content Manager can use to retrieve data for reports This account must have read access to all of the tables and views in the database that contain Symantec ESM Reporting data If you run the Database Foundation installer the ESM_CM_USER account is created for you Before you Install Symantec ESM Reporting 27 Before you install Symantec ESM Reporting Planning for the Symantec ESM Reporting Database Foundation Use the following task list to plan for the Symantec ESM Reporting Database Foundation installation Estimate the message volume from the Symantec ESM Reporting Database Link computers Determine the amount of data that you want to keep online
12. CD Replacement Form Glossary Contents 15 Index 16 Contents Introducing Symantec Enterprise Security Manager Reporting This chapter includes the following topics m About Symantec ESM Reporting m Components of Symantec ESM Reporting m What you can do with Symantec ESM Reporting m How Symantec ESM Reporting works m Where to get more information About Symantec ESM Reporting Symantec ESM Reporting is a tool that lets you dynamically create and present reports on the state of your Symantec ESM Agent computers and on the state of your Symantec ESM application configuration Symantec ESM Reporting uses tools that let you organize limit or expand data in your report to fit your needs Symantec ESM Reporting lets you do the following m Send security information from Symantec ESM Managers to the Symantec ESM Reporting database m Query the Symantec ESM Reporting database for security information m Format the query results in reports m Control access to the information in the Symantec ESM Reporting database m Manage reports report schedules and user accounts 18 Introducing Symantec Enterprise Security Manager Reporting About Symantec Enterprise Reporting m Create reports tailored to your specific needs The reports that you can create with Symantec ESM Reporting let you track the security state of your network over time This application lets you present data from your Symantec ESM database to manager
13. eeseseteeeeseeeeeeeseseneeeeeeeeeeeeeeeee 25 About the Symantec Enterprise Reporting installer 0 00 0 cesses 25 About the Reports Package installer 0 c ccccesseeesseceeseeeeeeeeeeseeeeseeees 26 Planning for the Symantec ESM Reporting Database Foundation 27 Planning for the Symantec ESM Reporting Database Link 27 Planning for Symantec Enterprise Reporting ccccssesessseseseseeesesees 27 Planning for the Symantec ESM Reporting Reports Package 28 Ensuring network connectivity 00 0 eeeeeecessesesesseceseseeceseeeeceseeetseseeeeseseees 28 Setting Microsoft SQL Server database authentication e 28 System PEGUITEMENtS rse e a e EEE ren EEEE GREE 29 Additional requirements for all computers 0 0 ceeccecseseseteeseseeeeeeteeees 36 Additional Windows requirements ccccccccscesessescescescsseseesesesseseeseeaes 37 Additional UNIX requirements 0 cccceceesessesesseseseseeeeseseeeeseneeseseeeeeesees 38 Installing Symantec ESM Reporting Installing Symantec ESM Reporting ceccsseeseseseeseseeeeseseseeseeeeceeeesseeeeeeaes 41 Install on Windows computers using IBM DB2 eeeeceeseeseeseseteeeees 42 Install on Windows computers using Microsoft SQL Server 62 Install on Windows computers using Oracle Installing on UNIX computers using Oracle Silently installing the Symantec ESM Reporting Database Link 90 10 Cont
14. opt Symantec Enterprise Reporting webcontent documentation 4 Atthe end of the httpd conf file type the following lines of text lt Directory opt Symantec Enterprise_Reporting webcontent gt Options Indexes MultiViews lt Directory gt To enable LDAP name space authentication for Symantec Enterprise Reporting Note If you are using LDAP to authenticate users for Symantec Enterprise Reporting you must manually configure the LDAP server for Symantec Enterprise Reporting See To enable LDAP name space authentication for Symantec Enterprise Reporting on page 59 Install the Symantec ESM Reporting Reports Package for Oracle The installation process includes the following task m Install and test the Symantec ESM Reporting Reports Package for Oracle 90 Installing Symantec ESM Reporting Installing Symantec ESM Reporting Install and test the Symantec ESM Reporting Reports Package for Oracle See About the Reports Package installer on page 26 To install the Symantec ESM Reporting Reports Package for Oracle On the computer on which you installed the Symantec Enterprise Reporting Content Manager install the Symantec ESM Reporting Reports Package The process is the same as installing the Symantec ESM Reporting Reports Package for IBM DB2 except for the following change On the Database Type panel click Oracle and then click Next See To install the Symantec ESM Reporting Reports Packa
15. Note Reports saved in this manner may not be secure See Securing saved reports on page 109 Running Symantec ESM Reporting 135 Emailing reports Emailing reports You can also email the report directly to any user that has an account in Symantec Enterprise Reporting or you can type in the address of the recipient Note Ensure that you have set up your reporting server to communicate with your SMTP server See the Installation and Configuration Guide for instructions on setting up this connection You can find this guide on the CD in the Docs Symantec Enterprise Reporting directory To email a report 1 Runareport 2 Click email 3 Dooneor more of the following m Select the Symantec ESM Reporting user to whom you want to email the report from the list of users m Type the email address of the recipient of the report in the address box Separate the addresses with semicolons Warning Email sent using this function is insecure and may be intercepted and read by an unintended recipient See Securing email on page 109 About Query Studio Symantec ESM Reporting uses both reports and queries Reports are set and cannot be modified outside of the Report Studio tool Queries are dynamic and let you insert and remove information The tables and graphs update automatically See Using Report Studio on page 144 These functions are available because queries automatically open in the Query Studio
16. On the Symantec ESM Reporting database accounts panel do one of the following tasks m To specify the default password for the Sys and System built in accounts and the default account name and password for the Symantec ESM Reporting Database Link account and the Symantec Enterprise Reporting account click Next m To specify another password for the Sys or System built in accounts or the account name and password for the Symantec ESM Reporting Database Link account or the Symantec Enterprise Reporting account type the information in the related text boxes and then click Next 78 Installing Symantec ESM Reporting Installing Symantec ESM Reporting 10 11 12 13 14 15 On the Symantec Enterprise Reporting database accounts panel do one of the following tasks m To specify the default password for the Sys and System built in accounts and the default account name and password for the Content Store account click Next m To specify another password for the Sys or System built in accounts or the account name and password for the Content Store account type the information in the related text boxes and then click Next On the Choose Database Type panel click Oracle and then click Next Note If you selected Default Oracle in step 6 the installer skips this step On the JDBC Driver panel do one of the following tasks m To specify the default JDBC Driver Class JDBC Classpath and JDBC Library Path re
17. Snp_up_all_ domains SMALLINT Boolean that identifies whether the user can perform snapshot updates within a domain Write_all_domains SMALLINT Boolean that identifies whether the user can write to all domains Crt_all_templates SMALLINT Boolean that identifies whether the user can create all templates Read_all_templates SMALLINT Boolean that identifies whether the user can read all templates Wrt_all_templates SMALLINT Boolean that identifies whether the user can write all templates Manage_accounts SMALLINT Boolean that identifies whether the user can manage all accounts Mod_mgr_options SMALLINT Boolean that identifies whether the user can modify Manager options Mod_own_password SMALLINT Boolean that identifies whether the user can modify his own password Register_agents SMALLINT Boolean that identifies whether the user can register Agents 233 234 About the Symantec ESM Reporting database schema Tables in the database schema Table C 3 Account_Permission table Remote_inst_upgrd SMALLINT Boolean that identifies whether the user can perform a remote installation upgrade Account_ID CHAR 32 Holds the unique character string Primary key that identifies the Symantec ESM account Foreign key Table C 4 Acct_Domain_Perm table Execute_domain SMALLINT Boolean that identifies whether the
18. Symantec Enterprise Security Manager Reporting Implementation Guide Version 6 1 9 symantec Symantec Enterprise Security Manager Reporting Implementation Guide The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement Documentation version 6 1 Copyright Notice Copyright 1998 2004 Symantec Corporation All Rights Reserved Any technical documentation that is made available by Symantec Corporation is the copyrighted work of Symantec Corporation and is owned by Symantec Corporation NO WARRANTY The technical documentation is being delivered to you AS IS and Symantec Corporation makes no warranty as to its accuracy or use Any use of the technical documentation or the information contained therein is at the risk of the user Documentation may include technical or other inaccuracies or typographical errors Symantec reserves the right to make changes without prior notice No part of this publication may be copied without the express written permission of Symantec Corporation 20330 Stevens Creek Blvd Cupertino CA 95014 Trademarks Symantec the Symantec logo and LiveUpdate are U S registered trademarks of Symantec Corporation Symantec Enterprise Security Architecture SESA Symantec Enterprise Security Manager Symantec Incident Manager Symantec Security Response Symantec NetRecon and Symantec Vulnerability Assessment are tradema
19. Uninstalling Symantec Enterprise Reporting Symantec Enterprise Reporting uninstaller removes Symantec Enterprise Reporting and the Symantec ESM Reporting Report Package from the host computer Uninstall Symantec Enterprise Reporting Uninstalling Symantec Enterprise Reporting consists of the following tasks m Starting the Symantec Enterprise Reporting uninstaller on Windows or UNIX computers m Uninstalling Symantec Enterprise Reporting To start the Symantec Enterprise Reporting uninstaller on a Windows computer 1 Click Start gt Settings gt Control Panel 2 Double click Add Remove Programs 3 Click Symantec Enterprise Reporting 4 Click Change Remove To start the Symantec Enterprise Reporting uninstaller on a UNIX computer 1 At the system command line change to the opt Symantec Enterprise_Reporting uninstall directory 2 Type Uninstall_Symantec_Enterprise_Reporting Installing Symantec ESM Reporting 105 Post installation tasks To uninstall Symantec Enterprise Reporting 1 On the Introduction panel click Next 2 Onthe Uninstall Wizard panel select the language that you want to use and then click Next 3 Inthe Uninstall Wizard dialog box click Yes 4 Onthe Uninstall Complete panel click Done Uninstalling the Symantec ESM Reporting Reports Package Uninstalling Symantec Enterprise Reporting also uninstalls the Symantec ESM Reporting Reports Package 106 Installing Symantec ESM Reporting Post
20. ccceesessseeseseeeeeees 173 Weekly compliance trend by manager 0 cccscccsessecesseeeceteeeeseeeeseeeees 173 Weekly violations trend by line of business 00 eeeeseteteteeeteeeeeeees 174 Yearly agent level trend by line of business eee eeteteteeeeseeeeeeeees 174 Yearly agent level trend by manager cccccesesesesseseseeeeseeeeeeseeeeeeeees 174 Yearly compliance trend by line of business ccccceeeseseseseseeeeeeees 175 Yearly compliance trend by Manager ccccecseesesceseeseeeeseeeeseeeseesees 175 Yearly violations trend by line of business 00 0 eee eeseteteteteeseeeeeeeees 175 Yearly violations trend by manager ccccesesceseseeeeseeseeeseeeeeeseeeeeeeees 175 13 14 Contents Appendix B Appendix C Appendix D Appendix E Appendix F About the Symantec ESM Reporting metadata model About the Query Studio metadata model Metadata model divisions ccceeeeseeeeees Query subject prompts Combinations of data Objects mererien es nEn Ea EEEN Descriptions of data items sessssesesssseesssssesesssssesessssesessrssseseessrsisreessrsrsesnes Structure of datarit ms nece eanne ages EAEE Administration folder structure 0 cccccesssecssesesesessesssesssscesesesesesseees Message Information folder structure ccccccssssssessceseseseseseseseteeseeees 196 Message Summaries folder Structure cccccccscsssssesseseseseceseseseseeeeeeees 203 About the
21. lt Directory opt Symantec Enterprise_Reporting cgi bin gt Options Indexes FollowSymlinks AllowOverride None Order allow deny Allow from all lt Directory gt Alias Enterprise_Reporting help opt Symantec Enterprise_Reporting webcontent documentation lt Directory opt Symantec Enterprise_Reporting webcontent documentation gt Options Indexes FollowSymlinks AllowOverride None Order allow deny Allow from all lt Directory gt Alias Enterprise_Reporting opt Symantec Enterprise_Reporting webcontent Alias Enterprise_ Reporting opt Symantec Enterprise_Reporting webcontent lt Directory opt Symantec Enterprise_Reporting webcontent gt Options Indexes FollowSymlinks AllowOverride None Order allow deny Allow from all lt Directory gt Save the updated httpd conf file Stop the Apache2 daemon Start the Apache2 daemon Install Symantec Enterprise Reporting for Oracle See About the Symantec Enterprise Reporting installer on page 25 To install Symantec Enterprise Reporting Note Symantec ESM Reporting file names use Rock Ridge Extensions See System requirements on page 29 On the computer on which you are installing Symantec Enterprise Reporting access the Symantec ESM Reporting Solaris CD At the system command prompt type setup sh 10 11 12 Installing Symantec ESM Reporting 87 Installing Symantec ESM Reporting On the Symante
22. m Inthe Browse for Folder dialog box select the desired location click OK and then click Next Note If you select the Symantec ESM directory uninstalling Symantec ESM will remove the Symantec ESM Reporting Database Link 8 On the Database Type Selection panel click Oracle and then click Next 81 82 Installing Symantec ESM Reporting Installing Symantec ESM Reporting 9 On the JDBC Driver Information panel do one of the following tasks m To specify the default JDBC Driver Class JDBC Classpath JDBC Library Path and SQL Dialect click Next m To specify another JDBC Driver Class JDBC Classpath JDBC Library Path and SQL Dialect type the information in the related text boxes and then click Next 10 On the Database Connection panel do one of the following tasks m To specify the default database URL type the user name and password of the Oracle account in the related text boxes and then click Next m To specify another database URL user name and password type the information in the related text boxes and then click Next 11 On the ESM Manager Connection panel do the following tasks m Type the name of the Symantec ESM Manager m Type the user name of an account on the manager with manage user rights and read only access rights to all domains policies and templates m Type the password of the manager account m Specify the port number of the manager m Click the right arrow to add the mana
23. m On Windows computers use Windows Services to stop and restart the Symantec ESM Reporting Database Link m On UNIX computers see Stopping and restarting the Symantec ESM Reporting Database Link on UNIX on page 98 102 Installing Symantec ESM Reporting Post installation tasks Restoring database performance Loading large volumes of data into a database can cause database performance problems Restore database performance on Windows using IBM DB2 Symantec provides two scripts that you can use to restore database performance The REORG cmd script reorders the data for more efficient access The RUNSTATS cmd script gathers statistics for the schema You must run the REORG cmd script before running the RUNSTATS cmd script You should run the RUNSTATS script at five to ten minute intervals and run the REORG script at least hourly while the Symantec ESM Reporting Database Links load the ESM database After this initial start up period you can run the scripts on a weekly basis or whenever database performance slows down You must copy the RUNSTATS and REORG scripts to a physical disk drive on your computer To copy the REORG cmd script and RUNSTATS cmd script 1 At the IBM DB2 command prompt access the Symantec ESM Reporting installation CD for Windows 2 Doone of the following m For IBM DB2 v8 1 change to the SQL DB2 createESMdb folder m For IBM DB2 v7 2 change to the SQL DB2 createESMdb db2_72 folder 3 Copy th
24. Complete the installation prerequisites m Click Execute the Database Foundation Installer 4 Onthe Introduction panel click Next 5 On the License Agreement panel click I accept the terms of the License Agreement and then click Next Installing Symantec ESM Reporting 63 Installing Symantec ESM Reporting 6 On the Choose Install Set panel do one of the following tasks To let the Database Foundation installer create the ESM and SER databases and import the necessary data click Default MS SQL Server and then click Next The Symantec ESM Reporting Database Foundation installer creates the ESM and SER databases with 2 GB each for the User and Index tablespaces If your installation requires larger tablespaces you must manually create the ESM and SER databases and then select the Import Data option To import the necessary data into the ESM and SER databases that you manually created click Import Data and then click Next If you select this option the installer skips steps 7 through 14 and prompts you to choose the type of database in which to store your Symantec ESM Reporting data Go to step 15 If you intend to manually create the ESM and SER databases but have not yet done so click Cancel Symantec provides scripts that let you manually create the ESM and SER databases You can find the scripts on the Symantec Enterprise Security Manager ESM 6 1 Reporting Windows CD in the SQL directory You can change the scripts to cu
25. Securing JDBC driver communications The Symantec ESM Reporting Database Link and the Java content store components of Symantec Enterprise Reporting use JDBC communications to communicate with the Symantec ESM database The net and app drivers in the run time clients for IBM DB2 MS SQL and Oracle databases can send user names passwords and other sensitive information in clear text form across your network via these JDBC connections See Planning for the Symantec ESM Reporting Database Link on page 27 Planning for Symantec Enterprise Reporting on page 27 To secure the JDBC Driver connections use encrypted third party JDBC drivers Securing communications between Symantec Enterprise Reporting components Symantec Enterprise Reporting uses several components that can be installed on separate computers If you do a distributed installation of these components the communications between them may not be secure The components of Symantec Enterprise Reporting are as follows m Report Server The report engine that renders reports m Gateway The component that installs on the Web server computer m Content Manager The component that communicates with the Symantec Enterprise Reporting database m Web Server The component that hosts Symantec Enterprise Reporting See About the Symantec Enterprise Reporting installer on page 25 for more information about these components To secure these communications place c
26. The Symantec ESM Reporting Database Link sends security information from the proprietary databases of one or more Symantec ESM Managers to the Symantec ESM Reporting database To ensure that the Symantec ESM Reporting database contains current information the Symantec ESM Reporting Database Link runs in background as follows m On computers with Windows operating systems the Symantec ESM Reporting Database Link runs as a service m On computers with UNIX operating systems the Symantec ESM Reporting Database Link runs as a daemon 20 Introducing Symantec Enterprise Security Manager Reporting What you can do with Symantec ESM Reporting The Symantec ESM Reporting Report Package includes the queries that produce new and existing reports and the functions that let users create ad hoc reports Third party components Symantec Enterprise Reporting includes the Web browser interface the report forms and the functions that generate reports in Symantec ESM Reporting These functions let users schedule existing reports and create new queries and reports Symantec Enterprise Reporting installs with anonymous access enabled You can use the Symantec Enterprise Reporting configuration tool to require an authentication protocol The authentication protocol lets you restrict access to Symantec ESM Reporting The Web server provides the Web browsers on your network with connections to Symantec Enterprise Reporting The JDBC Drivers provide th
27. True false value that identifies whether suppression is configured to suppress messages of a specific type from all agents regardless of the user account or computer name Information True false value that identifies whether wildcarded suppression is configured to suppress messages of a specific type from all agents regardless of the message text Agent wildcarded True false value that identifies whether suppression is configured to suppress messages of a specific type regardless of the agent from which the message came Enabled True false value that identifies whether the suppression is currently enabled Comment A string of variable length up to 512 characters that can include multi byte unicode characters for international use Creation date The system time for the creation date of the suppression configuration Last used date The system date and time for the last time that the suppression configuration was used 192 Structure of data items Table B 15 About the Symantec ESM Reporting metadata model Path Administration Suppression Configuration Data item Suppression Expiration date The system date and time of the expiration date Configuration of the suppression configuration Module A unique character string that identifies a specific Symantec ESM Module Platform A unique character string that identifies the platform that the Symantec ESM Agent is runnin
28. form Default path Public Folders gt Symantec ESM gt Executive gt Policy Compliance gt Violation Counts Yearly violations trend by manager This report shows yearly policy violation trends for a selected manager You select a policy with a related module and then select a date range The report displays a trend chart that shows policy violations for all agents that are examined by the selected manager and domain The report also displays data as a table Default path Public Folders gt Symantec ESM gt Technical gt Policy Compliance gt Violation Counts 176 About Symantec ESM Reports About the reports in Symantec ESM Reporting Appendix About the Symantec ESM Reporting metadata model This appendix includes the following topics m About the Query Studio metadata model m Combinations of data objects m Descriptions of data items Structure of data items About the Query Studio metadata model Large amounts of information in a database are categorized based on metadata which is the classification of units of content so they can be retrieved and combined in useful and meaningful ways The information in the Symantec ESM Reporting metadata model is organized to cover all enterprise domains in all lines of business Reports and queries created with the Symantec ESM Reporting metadata model give a consistent view of enterprise data This creates a common foundation for sharing information whether with anal
29. queries 130 Query Studio 135 reporting prompts 132 reports 128 Reports Package installer 26 state reports 129 Symantec Enterprise Reporting 18 Symantec Enterprise Reporting installer 25 Symantec ESM Reporting 17 trend reports 129 user interface 126 using queries 136 account permissions 110 additional requirements all computers 36 UNIX computers 38 Windows computers 37 administration tools 127 administrator account creating 116 administrator account permissions 114 all computers additional requirements 36 anonymous access disabling 114 audit log setting 122 audit logs 121 audit report 122 audit reports 122 123 audit tables creating 123 auditing 121 B backups 110 before installing Symantec ESM Reporting 23 c categories 269 change notification 269 determining modules and messages 280 ESM administrative information 269 ESM error 269 ICE 269 patch assessment 269 policy compliance 269 system error 269 system information 269 change silent install properties file Database Link 96 changing an installed Database Link 97 check Database Link installation log 101 installation logs 99 components of Symantec ESM Reporting 19 configure Enterprise Reporting database 57 70 88 configure environment variables for Enterprise Reporting 83 for Oracle 76 configure HTTP Web server for Enterprise Reporting 54 68 85 for LDAP authentication 58 71 89 configure post installation Enterprise Reporting 98 HTTP Web server
30. 57 Configure the Symantec Enterprise Reporting database Perform the configuration of the Symantec Enterprise Reporting database on Windows computers using DB2 except on the New resource Database dialog box in the Type list box click Oracle database and then click Next See To configure the Symantec Enterprise Reporting database on page 57 Configure the installed Apache HTTP Web server for LDAP authentication See To configure the installed Apache HTTP Web server for LDAP authentication on page 58 Enable LDAP name space authentication for Symantec Enterprise Reporting See To enable LDAP name space authentication for Symantec Enterprise Reporting on page 59 Installing Symantec ESM Reporting 75 Installing Symantec ESM Reporting Install the Symantec ESM Reporting Reports Package for Oracle See To install the Symantec ESM Reporting Reports Package for Oracle on page 90 Installing on UNIX computers using Oracle Symantec ESM Reporting can install on a mix of Windows and UNIX computers using IBM DB2 Microsoft SQL Server MS SQL or Oracle database server The following procedures describe the installation on Solaris using Oracle Installing the Symantec ESM Reporting Database Foundation for Oracle The installation process includes the following tasks m Configure the environment variables for the Oracle user m Install the Symantec ESM Reporting Database Foundation for Oracle m Using SQL sc
31. 99 configure run time client for Enterprise Reporting 84 connect 7 2 run time client for Database Link 48 for Enterprise Reporting 53 connect 8 1 run time client for Database Link 47 for Enterprise Reporting 52 create ESM and SER databases for IBM DB2 42 for MS SQL 62 for Oracle 75 creating an administrator account 116 298 Index creating reports 145 custom groups 144 D dataitems 137 database purging old data 152 database authentication setting Microsoft SQL Server 28 Database Foundation uninstalling 103 Database Foundation installer about 24 planning for 27 Database Link change silent install properties file 96 changing an installed 97 checking installation log 101 connecting 7 2 run time client 48 connecting 8 1 run time client 47 installing 7 2 run time client 48 installing 8 1 run time client 47 installing JDBC Drivers 80 perform silent install 96 silent install properties file 91 stopping and starting 98 system requirements 34 testing 7 2 run time client 48 testing 8 1 run time client 48 uninstalling 103 Database Link installer about 25 planning for 27 database performance restore 102 DBPurger utility 152 DBPurger utility properties file 152 defined queries 140 deleting reports 147 disabling anonymous access 114 E email securing 109 emailing reports 135 enable LDAP authentication for Enterprise Reporting 59 71 89 enable redo log for ESM and SER databases for Oracle 79 enabling 148 en
32. Actions column click the set properties button for the dispatcher or configuration folder you want 4 Click the Settings tab to view all the configuration settings Securing Symantec ESM Reporting 123 About auditing in Symantec ESM Reporting In the Value column type a new value for the following settings each of which represents a logging category m Audit logging level m Audit run time usage logging level m Audit administration logging level Audit other logging level Note If you want to reset a configuration setting to its default value check its check box and click Reset to default value Click OK About audit reports Symantec Enterprise Reporting audit reports are included in the Symantec ESM Reporting sample report package in a file called Cognos _Audit zip See the Installation and Configuration Guide for information on installing and using these reports You can find this guide on the CD in the Docs Symantec Enterprise Reporting directory About audit table creation To create these reports you must first create the audit tables To create the audit tables O ou A U N e N 10 11 Open Enterprise Reporting Configuration Click Local Configuration gt Environment gt Logging Right click Logging and then click New Resource gt Destination Type a name for the New Database Resource Change the Type to Database and then click OK Right click the newly created Auditing DB and then cl
33. ESM Reporting Database Link On HP UX computers the uninstaller does not uninstall the jre folder and its contents if you install the Symantec ESM Reporting Database Link to a location other than the default directory and then uninstall the Symantec ESM Reporting Database Link 96 Installing Symantec ESM Reporting Installing Symantec ESM Reporting For the ESM_HOST_1 value do not connect two Symantec ESM Reporting Database Links to the same Symantec ESM Manager and database The database link log will report primary key failures If you specify connections to several Symantec ESM Managers during the installation of a Symantec ESM Reporting Database Link a race condition may cause some ESM database errors during the initial transfer of data You can correct the errors by stopping and restarting the Symantec ESM Reporting Database Link See Checking the Symantec ESM Reporting Database Link log for errors on page 101 Performing a silent Symantec ESM Reporting Database Link installation After you change the values in SilentInstallExample properties file you can run the silent Database Link installer To change the sample properties file 1 Open a text editor 2 Access the Symantec Enterprise Security Manager ESM 6 1 Reporting CD 3 Change to the database_link directory 4 Copy the properties file in the database _link directory m For only Windows installations copy the properties file to a temporary folder m
34. ESM database are in the sql oracle createESMdb directory You can change the scripts to specify a different location for the files If you change file locations you must create the corresponding directories if they do not exist You must also comment out the related lines of code in the oracle create_esm_db sh shell script so that it cannot create an extra directory If you prefer you can change the code to create the required directories For example you can type the following if d SORACLE_BASE oradata SORACLE_SID then mkdir p SORACLE_BASE oradata ORACLE_SID else 288 Symantec ESM Reporting installation scripts About the installation scripts for Oracle rm f SORACLE_BASE oradata S ORACLE_SID fi To change the location of the control files for the ESM database 1 Usea text editor to open the sql oracle createESMdb init file 2 Change control01 ctl control02 ctl and control03 ctl to the specified location Make sure the new directories are created in the create_esm_db sh file first To change the ESM database system file temporary tablespace undo tablespace or any of its redo01 log files 1 Usea text editor to open the sql oracle createESMdb CreateDB sql script 2 Change the appropriate sections of the script file Make sure the new directories are created in the create_esm_db sh file first To change the location of the tablespace ESM_32K_IDX_TS ESM_32K_USR_TS or ESM_32K_TMP_
35. Find the line of text containing C ESMDATA 3 Change C ESMDATA to D MyDatabase 4 The modified line of text should read as follows if not exist D MyDatabase mkdir D MyDatabase 5 Use a text editor to open the sql db2 createESMdb create_tablespace sq file 6 Find the lines of text containing C ESMDATA 7 Change C ESMDATA to D MyDatabase 8 The modified lines of text should read as follows USING File D MyDatabase Example 2 To change the location of the tablespace 1 Usea text editor to open the sq db2 createESMdb create_tablespace sq file 2 Find the line of text containing using C ESMDATA to a new location You can use a similar process to manually create the SER database On the Symantec ESM Reporting Windows CD in the sql db2 folder Symantec provides the create_ser_db bat file You can use this bat file to execute a command file The command file executes the sql scripts that create the SER database The sql scripts are in the sql db2 createSERdb folder You can use a text editor to do the following tasks m Change the create_ser_db bat file and specify a different location for the data file in which the SER database will be created 284 Symantec ESM Reporting installation scripts About the connection scripts for IBM DB2 m Change the create_db sq file and specify a different name for the SER database The installer creates two tablespaces using the default location m Tablesp
36. Foreign key Table C 41 Policy table Policy_ID CHAR 32 Holds the unique character string Primary key that identifies the Symantec ESM policy Policy_name VARCHAR 32 Holds the unique character string that identifies each policy Manager_ID CHAR 32 Holds the unique character string Foreign key that identifies a Symantec ESM Manager Table C 42 Policy_Changelog table Hash CHAR 32 Holds the unique character string that identifies the hash of the corresponding Symantec ESM Policy About the Symantec ESM Reporting database schema Tables in the database schema Table C 42 Policy_Changelog table Change_datetime TIMESTAMP Contains the system time for the Primary key date and time of a specific changelog event Policy_ID CHAR 32 Holds the unique character string Primary key that identifies the Symantec ESM policy Foreign key Table C 43 Policy_OS_Version table OS_version_ID CHAR 32 Code that identifies the operating Primary key system version Platform VARCHAR 32 String that holds the name of the operating system Table C 44 Report_String_Map table String_key INTEGER Code for identifying a data Primary key information string within a grouping of data information strings String_group INTEGER Code for identifying a logical Primary key grouping of strings Locale_ID CHAR 32 Holds a string of fixed length 32 Primary key characters that identifies whic
37. Install the Symantec ESM Reporting Reports Package for IBM DB2 This process installs the Symantec ESM Reporting Reports Package for IBM DB2 See About the Reports Package installer on page 26 To install the Symantec ESM Reporting Reports Package for IBM DB2 1 On the computer on which you installed the Symantec Enterprise Reporting Content Manager access the Symantec ESM Reporting Windows CD If the autorun feature does not start double click setup bat On the Symantec Enterprise Security Manager ESM 6 1 Reporting CD panel in the left pane click Reports Package In the right pane do the following tasks m Review the information m Complete the installation prerequisites m Click the Execute the Reports Package Installer link On the Introduction panel click Next 9 Installing Symantec ESM Reporting 61 Installing Symantec ESM Reporting On the License Agreement panel click I accept the terms of the License Agreement and then click Next On the Gateway URL panel do the following tasks m Specify the URL of the Symantec Enterprise Reporting Gateway m To use anonymous login check the Anonymous Login check box To use LDAP or another form of user authentication uncheck the Anonymous Login check box On the Gateway Credentials panel do the following tasks m Inthe Security Namespace ID text box type the Gateway Security Namespace ID m Inthe User Name text box type the Symantec Enterprise Repor
38. MANAGER_ID IN SELECT MANAGER_ID ER_NAME IN Manager1 Viewing current user permissions You can use SQL commands to view the current permissions for Symantec Enterprise Reporting users To view user permissions Use the following sets of commands to view user permissions SELECT P USER_NAME D DOMAIN_NAM ESMDB10 RPT_DOMAIN_PERM P ESMDB10 MANAGER M WHERE M MANAGER_ID D MANAGER_ID Use the following command to view all domain specific permissions E M MANAGER_NAME FROM ESMDB10 ESM_DOMAIN D P DOMAIN_ID D DOMAIN_ID AND 120 Securing Symantec ESM Reporting About user account permissions Use the following command to view all policy specific permissions SELECT R USER_NAME P POLICY_NAME M MANAGER_NAME FROM ESMDB10 RPT_POLICY_PERM R ESMDB10 POLICY P ESMDB10 MANAGI M WHERE R POLICY_ID P POLICY_ID AND M MANAGER_ID P MANAGER_ID zal ps Use the following command to view all manager specific permissions select user_name manager_name is_esm account view_all_domains VIEW_ALL_POLICIES VIEW_ESM_ACCOUNTS FROM ESMDB10 RPT_MANAGER_PERM R ESMDB10 MANAGER M WHERE R MANAGER_ID M MANAGER_ID on se the following command to view all cross manager permissions select from esmdb10 rpt_all_mgr_perm Use the following command to view all cross manager permissions for a spe
39. Name_info_ID CHAR 32 Code that identifies the message Primary key status for localization and suppression Suppressed SMALLINT Boolean that identifies whether the message information was suppressed Message_state_ID CHAR 32 Holds the unique character string Foreign key that identifies the current state of the message Table C 37 Message_State table Message_state_ID CHAR 32 Holds the unique character string Primary key that identifies the current state of the message Policy_ID CHAR 32 Holds the unique character string Foreign key that identifies the Symantec ESM policy Audit_datetime TIMESTAMP Contains the system time for the date of a specific audit Message_ID INTEGER Holds an integer that identifies a Foreign key message About the Symantec ESM Reporting database schema 249 Tables in the database schema Table C 37 Message_State table Short_name VARCHAR 32 Holds a string of variable length Foreign key up to 32 characters that identifies the short name of the message Agent_ID CHAR 32 Holds a character string that Foreign key identifies the name of the Symantec ESM Agent host computer Total_messages INT Holds the total number of messages Suppr_messages INT holds the total number of suppressed messages Table C 38 Message_String_Map table Name_info_ID CHAR 32 Code that identifies the message for Primary key localization
40. Note These information objects are used only for creating report prompts in Report Studio CATEGORY_ID Path Message Summaries Prompts Category_Name_Prompt An integer that identifies the category Category Displays the category names that appear in the prompt Table B 38 Data item Policy_ Manager_ Prompt Note These information objects are used only for creating report prompts in Report Studio Path Message Summaries Prompts Policy_Manager_Prompt Policy A unique character string that identifies a specific Symantec ESM Policy for a manager Manager A unique character string that identifies a specific Symantec ESM Manager Domain A unique character string that identifies the Symantec ESM Domain for a manager POLICY_ID An integer that identifies the specific policy MANAGER _ID The unique character or numeric string that identifies a Symantec ESM Manager DOMAIN_ID A unique character or numeric string that identifies the Symantec ESM domain About the Symantec ESM Reporting metadata model 211 Structure of data items Table B 39 Path Message Summaries Prompts Severity Parameter Map Query Data item Severity Parameter Map Query SEVERITY_ID A small integer 0 4 that identifies the level of severity Note These information SEVERITY Displays the security level for severities objects are used only for either red yellow or green cr
41. OF THIS LICENSE AGREEMENT CAREFULLY BEFORE USING THE SOFTWARE THIS IS A LEGAL AND ENFORCEABLE CONTRACT BETWEEN YOU AND THE LICENSOR BY OPENING THIS PACKAGE BREAKING THE SEAL CLICKING THE AGREE OR YES BUTTON OR OTHERWISE INDICATING ASSENT ELECTRONICALLY OR LOADING THE SOFTWARE YOU AGREE TO THE TERMS AND CONDITIONS OF THIS AGREEMENT IF YOU DO NOT AGREE TO THESE TERMS AND CONDITIONS CLICK THE I DO NOT AGREE OR NO BUTTON OR OTHERWISE INDICATE REFUSAL AND MAKE NO FURTHER USE OF THE SOFTWARE 1 License The software and documentation that accompanies this license collectively the Software is the proprietary property of Symantec or its licensors and is protected by copyright law While Symantec continues to own the Software You will have certain rights to use the Software after Your acceptance of this license This license governs any releases revisions or enhancements to the Software that the Licensor may furnish to You Except as may be modified by an applicable Symantec license certificate license coupon or license key each a License Module that accompanies precedes or follows this license and as may be further defined in the user documentation accompanying the Software Your rights and obligations with respect to the use of this Software are as follows You may A use the number of copies of the Software as have been licensed to You by Symantec under a License Module If the Soft
42. Programs gt Microsoft SQL Server gt Enterprise Manager 2 On the SQL Server Enterprise Manager tree expand Microsoft SQL Server gt SQL Server Group 3 Right click lt database_name gt 4 Click Properties 5 On the Security tab click SQL Server and Windows Before you Install Symantec ESM Reporting 29 System requirements System requirements Before you install Symantec ESM ensure that the computers on which you plan to install Symantec ESM components meet the minimum requirements in Table 2 1 Table 2 1 Symantec ESM system requirements Symantec ESM Microsoft Windows Manager m Windows 2003 Server m Windows 2000 Professional Server or Advanced Server with Service Pack 1 0 or higher m Microsoft Windows NT 4 0 Server or Workstation with Service Pack 5 0 or higher UNIX m Sun Solaris v2 7 2 8 or 2 9 m HP UX v10 20 11 or 11i m IBM AIX v4 3 2 through 5 2 Symantec ESM Microsoft Windows Agent m Windows 2003 Server m Windows 2000 Professional Server or Advanced Server with Service Pack 1 0 or higher m Windows XP Professional Microsoft Windows NT 4 0 Server or Workstation with Service Pack 5 0 or higher UNIX Sun Solaris v2 7 2 8 or 2 9 HP UX v10 20 11 or 11i IBM AIX v4 3 2 through 5 2 Red Hat Linux v7 1 8 9 AS ES 2 1 or 3 0 x86 SuSE Linux Standard Server v8 0 x86 Compaq Tru64 v4 SGI Irix v6 3 Novell NetWare m NetWare v4 1 4 2 5 0 or 6 0 Digital VMS Midrange m Open VMS
43. Symantec ESM Reporting database schema About the database schema cccccccsessssesscssessescesesesscacescsecsecsecaeeeesecseeneees 231 Tables in the database schema ccccccssssessessescescescssesecsecssesesesecsesseseeseeaes 232 Database Views neonne a A svete antec van NEN GRS 256 Views with localizable text 0 cccccccccsccscescseesseseescescsecseesseseeecsecseeseesee 256 Views without text 2 ccc cian saci E nea ANRA 259 System assessment checklists About system assessment checklists 00 0 cecccesseseesseceseeseceseeseseseeeeseeesseseees 263 Symantec ESM Reporting Database Foundation checklist 0 263 Symantec ESM Reporting Database Link checklist 0 0 0 ceeceseeeeteeeeee 264 Symantec Enterprise Reporting checklist 00 0 cccceseesesseceseeeeeeseeeeseneeeees 266 Symantec ESM Reporting Report Package checklist ccceseseeseeeees 267 About Symantec ESM Reporting categories About the categories in Symantec ESM Reporting cccceeseeseeeeteeeeees 269 Determining messages and modules in a category ceceseseeeseeeeeeteteeeees 280 Symantec ESM Reporting installation scripts About Symantec ESM Reporting installation scripts About the installation scripts for IBM DB2 About the connection scripts for IBM DB2 About the installation scripts for Microsoft SQL Server ccccceeeeeees 285 About the installation scripts for Oracle o cecccecesseseeessseseeseeeteeseseeees 287
44. Technical gt Policy Compliance gt Violation Counts Suppressed message details This report shows the details of messages that are suppressed on the agents that you select The report lets you select the policy category module message severity manager domains and agents then it shows you the messages that the managers domains and agents that you select reported as suppressed during the last policy run Default path Public Folders gt Symantec ESM gt Technical gt Message Information About Symantec ESM Reports 171 About the reports in Symantec ESM Reporting Suppression configuration This report displays information about current suppression configurations for Symantec ESM Managers The report lets you select the policies modules platforms and managers for which you want to view suppression configuration information You can also limit suppression information according to creation date expiration date last used date and whether the suppression is currently enabled Default path Public Folders gt Symantec ESM gt Technical gt Administration gt Suppression Configuration Suppression configuration query This query shows suppression configuration information for the managers in your database The query displays information on suppressions for managers accounts policies platforms modules creation date expiration date date last used wildcard information and whether suppressions are currently enabled
45. You can also use one of the default report types that is found in Report Studio See the Report Studio online help for information about creating a new report 146 Running Symantec ESM Reporting Using Report Studio Modifying an existing report You can use one of the reports in Symantec ESM Reports as a template that you can modify If you have a report open in the Symantec ESM Reporting interface and you open the Report Studio tool from the interface the report is automatically imported into the Report Studio tool as a template You can then modify the report to create new reports Note Do not overwrite existing Symantec ESM Reports If you overwrite them you must reinstall the package to recover the original report Also if you overwrite the existing reports your changes can be lost when you update the reporting package Typically you would not use queries as templates for creating reports because such reports will not work when used with multiple packages However Symantec ESM Reports only has one package so unless you have other packages you can use queries as report templates About insertable objects The Report Studio tool uses drag and drop functionality to let you quickly build reports The tool lets you drag items into the report and place them exactly where you need them Note When you place items in a report if you do not place them directly next to an existing item the report tool may not be able t
46. account Foreign key Template_name VARCHAR 64 Holds the unique character Primary key string that identifies the template name Read_template SMALLINT Boolean that identifies whether the user can read the template Write_template SMALLINT Boolean that identifies whether the user can write to the template Table C 7 Agent table Agent_ID CHAR 32 Holds a character string that Primary key identifies the name of the Symantec ESM Agent Foreign key host computer Port INTEGER Holds the value that identifies the port number of the Agent Protocol VARCHAR 16 Holds a string of variable length up to 16 characters that identifies the communication protocol Proxy_agent VARCHAR 128 Holds a string that identifies the name of the proxy agent for audited computers that have operating systems that require proxy agents 236 About the Symantec ESM Reporting database schema Tables in the database schema Table C 7 Agent table LiveUpdate TINYINY Boolean that identifies whether LiveUpdate is enabled on the Agent Version VARCHAR 64 Holds the version number of Symantec ESM that is installed on the Agent OS_info VARCHAR 128 Holds a string that identifies the type of operating system that the Agent has installed SU_Version CHAR 16 Holds a character string that identifies the Security Update version number Agent_name VARCHAR 128 Holds a string of variable length up to 128 characters
47. and descriptions for change events for each agent you select Default path Public Folders gt Symantec ESM gt Technical gt Message Information gt Change Notification Change events query Use this query as a template to create your own custom queries in Query Studio using the Change Events query subject in the metadata model Default path Public Folders gt Symantec ESM gt Technical gt Custom Queries About Symantec ESM Reports 163 About the reports in Symantec ESM Reporting Compliance by line of business This report shows policy compliance percentages for selected domains It lets you select a policy with any or all related modules and then it displays policy compliance percentage data about that policy for all selected managers and domains A policy compliance percentage figure for a domain is a figure that represents the aggregate of policy compliance percentages of all agents in the domain Default path Public Folders gt Symantec ESM gt Executive gt Policy Compliance gt Compliance Percentage Compliance by line of business query This query retrieves policy compliance percentages for selected domains You select a policy with any or all related modules and then the query retrieves policy compliance percentage data about that policy for all selected managers and domains The query displays data in table form Default path Public Folders gt Symantec ESM gt Executive gt Policy Compliance gt Co
48. business Daily violations trend by manager Domain trends Query erea rr EEN EER License Query EE E E kes License counts by manager query ccccesseceseeseseteeeeseseeeeseeseeeseeeeseees Contents Manager domain agent query cecsseseseseeseseeeeseseeeeseseeceseeeteeseeeens 166 Message compliance by line of business 0 0 ceeeesesesesstseseseeeeteesesenees 166 Message details found issues ceeesessssesssesececesesesesesssessseeeeseeeseseeees 166 Messages Query vs os cis gece T RE ER Na 166 Monthly agent level trend by line of business 00 cceeseseseeeeeeeeees 167 Monthly agent level trend by manager ccceceesesseseseeseseeeeeseteeeees 167 Monthly compliance trend by line of business cccceseseseeeseseeees 167 Monthly compliance trend by manager cccceseesesseeeeseseeseseeeteeeees 167 Monthly violations trend by line of business cccsseseseseeeeeneeees 168 Monthly violations trend by Manager ccccccecesseseeeeeceteeeeseeeeeeseeeees 168 Policy audit schedule 00 0 ccccescecessssssesesseceseeseseeeeseeeeeeseeenseseeecseeeeeeseeees 168 Policy audit schedule query cccccscesesesseseseeceseseeceseeeeeeseeeeseeeeeseeeees 168 POLICY RUNS aia r E ERK 169 Quarterly agent level trend by line of business s n on0n00000000000000000 169 Quarterly agent level trend by manager s s sssssssssssessssssesessssrsesesnssesesee 169 Quarterly comp
49. computer that can access your reporting Web server Symantec ESM Reporting has three types of reports state reports trend reports and queries Trend and state reports let you view the security status of your network at a point in time or observe changes over a period of time Both of these report types let you include specific data in your report Warning If you delete any of the reports that come with Symantec ESM Reporting you must reinstall the reports package from your installation CD to restore them Running Symantec ESM Reporting 129 About reports In addition Symantec ESM Reporting uses Query Studio for creating queries This tool lets you add or remove columns from queries and interactively link information that may not be in a report When using queries you can add remove filter and organize report data that is in the columns as well as add or remove columns In the user interface queries are denoted with a pencil icon while reports use a triangle icon Both types of reports can be found in the Public Folders tab About state reports The most basic reports in Symantec ESM Reporting are state reports State reports display a snapshot of your network security status at a point in time State reports use the most recent information that is in your Symantec ESM Reporting database This information is derived from the most recent job run for each agent You can schedule state reports to run at regular intervals to e
50. computers additional requirements 37
51. create your own custom queries in Query Studio using the Domain Trends query subject in the metadata model Default path Public Folders gt Symantec ESM gt Technical gt Custom Queries License query Use this query as a template to create your own custom queries in Query Studio using the License query subject in the metadata model Default path Public Folders gt Symantec ESM gt Technical gt Custom Queries License counts by manager query This report shows the number of licenses that are registered to each manager You select one or more managers and the query displays the manager name the total number of agent licenses that are registered to that manager the number of licenses that are being used and the number of licenses that are available Default path Public Folders gt Symantec ESM gt Technical gt Console Views 166 About Symantec ESM Reports About the reports in Symantec ESM Reporting Manager domain agent query Use this query as a template to create your own custom queries in Query Studio using the Manager Domain Agent query subject in the metadata model Default path Public Folders gt Symantec ESM gt Technical gt Custom Queries Message compliance by line of business This report shows whether agents in a domain comply with the security conditions that are reported by specific messages in a policy When you select a policy and a message from that policy the report displays whether
52. database Do not use the Microsoft JDBC driver for SQL Server 2000 See the jTDS JDBC Drivers at http sourceforge net or the list of JDBC Drivers at http servlet java sun com products jdbc drivers IBM DB2 8 1 m Use the default driver that installs with the DB2 database You can find this driver at the following default path C Program Files IBM SQLLIB java db2java zip For this driver you must include the following string in the library path during the installations of both the Symantec ESM Reporting Database Link and Symantec Enterprise Reporting C Program Files IBM SQLLIB BIN The path may vary if you did not use the default installation path for the DB2 installation IBM DB2 7 x m Configure DB2 7 x to use the correct JDBC driver This requires that you run the bat file located at the following path before you install the Symantec ESM Reporting applications C Program Files SQLLIB javal2 usejdbc2 bat The path may vary if you did not use the default DB2 installation path If you installed DB2 7 x at the default location the correct driver is available at the following path C Program Files SQLLIB java db2java zip For this driver you must include the following string in the library path during the installations of both the Symantec ESM Reporting Database Link and Symantec Enterprise Reporting C Program Files SQLLIB BIN The path may vary if you did not use the default installation path for the DB2 installation
53. database installation ORACLE_SID The Oracle Server system identifier or instance name Note Ensure that the Oracle user has its shell set to bin sh This is the shell that applies to the profile file for the Oracle user Install the Symantec ESM Reporting Database Foundation for Oracle See About the Database Foundation installer on page 24 To install the Symantec ESM Reporting Database Foundation for Oracle Note If you perform a custom installed of the ESM and SER databases use the database names that you assign instead of the default database names when installing the Symantec ESM Reporting Database Link Symantec Enterprise Reporting and Symantec ESM Reporting Reports Package 1 On the computer on which you installed Oracle access the Symantec ESM Reporting Solaris CD At the system command prompt type setup sh 2 On the Symantec Enterprise Security Manager ESM 6 1 Reporting CD panel in the left pane click Database Foundation 3 Inthe right pane do the following tasks m Review the information m Complete the installation prerequisites m Click Execute the Database Foundation Installer 4 On the Introduction panel click Next 5 On the License Agreement panel click I accept the terms of the License Agreement and then click Next Installing Symantec ESM Reporting 77 Installing Symantec ESM Reporting On the Choose Install Set panel do one of the following tasks m To let the Database Fo
54. each agent in every user defined domain in your database complies or does not comply with the condition that is reported by the selected message Default path Public Folders gt Symantec ESM gt Executive gt Administration Note In order to minimize duplicate data entries from a single agent this report shows data for only user defined domains Message details found issues This report shows the details of messages that were reported by the agents that you select The report lets you select the policy category module message severity manager domain and agents then it shows you the messages that the managers domains and agents that you select reported during the last policy run Default path Public Folders gt Symantec ESM gt Technical gt Message Information Messages query Use this query as a template to create your own custom queries in Query Studio using the Messages query subject in the metadata model Default path Public Folders gt Symantec ESM gt Technical gt Custom Queries About Symantec ESM Reports 167 About the reports in Symantec ESM Reporting Monthly agent level trend by line of business This report shows monthly agent security level trends for a selected manager and domain You select a policy with a related module on any manager and domain in your enterprise After you select a date range the report displays a trend chart that shows the number of agents for that manager and domai
55. for that manager and domain that are at each security level either red yellow or green for the selected policy and its related module The report displays data as both a chart and a table Default path Public Folders gt Symantec ESM gt Executive gt Policy Compliance gt Agent Level Daily agent level trend by manager This report shows daily agent security level trends for a selected manager You select a policy with a related module on any manager and domain in your enterprise You then select a date range and the report displays a trend chart that shows the number of agents in the selected domain at each security level red yellow and green for the selected policy and its related module The report also displays the data as a table Default path Public Folders gt Symantec ESM gt Technical gt Policy Compliance gt Agent Level Daily compliance trend by line of business This report shows daily compliance percentage trends for a selected domain You select a policy with a related module on any manager and domain in your enterprise After you select a date range the report displays a trend chart that shows the aggregate level of compliance for all agents in the domain The report also displays data in table form Default path Public Folders gt Symantec ESM gt Executive gt Policy Compliance gt Compliance Percentage Daily compliance trend by manager This report shows daily compliance percentage trends for a
56. gt Alias Enterprise_ Reporting C Program Files Symantec Enterprise_Reporting webcontent Alias Enterprise_ Reporting C Program Files Symantec Enterprise_Reporting webcontent lt Directory C Program Files Symantec Enterprise_Reporting webcontent gt Options Indexes FollowSymlinks AllowOverride None Order allow deny Allow from all lt Directory gt Installing Symantec ESM Reporting 55 Installing Symantec ESM Reporting 5 Save the updated httpd conf file 6 Stop the Apache service 7 Start the Apache2 service Install Symantec Enterprise Reporting for IBM DB2 Note Symantec Enterprise Reporting must connect to an HTTP Web server If you want the computer on which you are installing Symantec Enterprise Reporting to install the Apache HTTP Web server you must confirm that the computer does not have any Apache directories or subdirectories To install Symantec Enterprise Reporting 1 On the computer on which you are installing Symantec Enterprise Reporting access the Symantec ESM Reporting Windows CD If the autorun feature does not start double click setup bat 2 On the Symantec Enterprise Security Manager ESM 6 1 Reporting CD panel in the left pane click Symantec Enterprise Reporting 3 Inthe right pane do the following tasks m Review the information m Complete the installation prerequisites m Click Execute the Symantec Enterprise Reporting Installer 4 On the Introduction pa
57. indicates the number of green messages To fix this simply rearrange the columns so that the correct color is assigned to the correct column Locating reports By default all Symantec ESM Reporting reports are placed in the Public Folders tab Reports in this area are accessible to all users that have the correct permissions The My Folders tab is only accessible to your specific user account All the reports that come with Symantec ESM Reporting are placed in the Symantec ESM folder in the Public Folders tab These reports are placed in either the Technical or the Executive subfolder and then in one of several additional subfolders that further categorize the reports See About Symantec ESM Reports on page 155 When you use the Report Studio to create new reports or modify existing reports do not overwrite the default Symantec reports Note that updates from Symantec may overwrite your changes Running Reports After you locate the Symantec ESM Reporting reports you can begin running them to get the information that you require To run reports Double click the title of the report Note When you run reports if you have a large amount of data Symantec Enterprise Reporting shows a circling arrow to indicate that the report is running This arrow has a cancel button that allows you to stop the report and return to the interface This button does not cancel the query to the database If you start and stop several report
58. install an IBM DB2 or MS SQL database server can install a Web server during the Symantec Enterprise Reporting installation 42 Installing Symantec ESM Reporting Installing Symantec ESM Reporting Install on Windows computers using IBM DB2 Symantec ESM Reporting can install on a mix of Windows and UNIX computers using an IBM DB2 MS SQL or Oracle database server The following procedures describe the installation of Symantec ESM Reporting on Windows computers using an IBM DB2 database server Installing the Symantec ESM Reporting Database Foundation for IBM DB2 The installation process consists of doing one of the following tasks m Install the Symantec ESM Reporting Database Foundation for IBM DB2 m Use SQL scripts to create the databases for IBM DB2 See About the Database Foundation installer on page 24 Create the ESM and SER databases When you run the Database Foundation installer and select the Default DB2 option the installer creates two databases By default ESM is the name of the Symantec ESM Reporting database and SER is the name of the Symantec Enterprise Reporting database Each database has 2 GB for User and Index tablespaces If your installation requires larger table spaces Symantec provides SQL scripts that let you manually create the ESM and SER databases You must still use the Database Foundation installer to import the necessary data into the databases After importing the data you must run an additi
59. integer that identifies the category Category Displays the category names that appear in the prompt About the Symantec ESM Reporting metadata model 213 Structure of data items Table B 43 Path Message Summaries Prompts Policy_Compliance Data item Policy_ CATEGORY_ID An integer that identifies the category Compliance Category Displays the category names that appear Note These information in the prompt objects are used only for creating report prompts in Report Studio Table B 44 Path Message Summaries Prompts Filters Data item Filters Select a policy Filter used in prompts that lets the user Note These tiitersare sed select from among the displayed policies only for creating report Select a Filter used in prompts that lets the user prompts in Report Studio category select from among the displayed categories Select a module Filter used in prompts that lets the user select from among the displayed modules Select a Filter used in prompts that lets the user manager select from among the displayed managers Select a domain Filter used in prompts that lets the user select from among the displayed domains Select a agent Filter used in prompts that lets the user select from among the displayed agents 214 About the Symantec ESM Reporting metadata model Structure of data items Table B 45 Path Message Summaries Trends Agent Trends Data ite
60. key identifies the Agent audit error Foreign key Locale_ID CHAR 32 Holds a string of fixed length 32 Primary key characters that identifies which language Foreign key Symantec ESM is using Table C 10 Agent_ESM_Domain table Domain_ID CHAR 32 Holds a unique character string that Primary key identifies the Symantec ESM domain Foreign key Agent_ID CHAR 32 Holds a character string that Primary key identifies the name of the Symantec ESM Agent Foreign key host computer Table C 11 Agent_Group table Group_ID CHAR 32 Holds a unique character string that Primary key identifies the agent domain or manager group 237 238 About the Symantec ESM Reporting database schema Tables in the database schema Table C 12 Agent_Stat_Str_Map table Audit_ID CHAR 32 Holds a unique character string that identifies a specific audit Primary key Locale_ID CHAR 32 Holds a string of fixed length 32 characters that identifies which language Symantec ESM is using String value NVARCHAR 2000 Holds a string that can include multi byte unicode characters for international use Table C 13 Account_mapping table User_Name NVARCHAR 18 Holds the Symantec Primary key Enterprise Reporting user name Account_ID CHAR 32 Holds the unique character string Primary key that identifies the Symantec ESM account Foreign key Table C 14 Audit_stat
61. of green agents for the focus object Audited agents Shows the total number of audited agents for the focus object Total agents Shows the total number of agents associated with the ficus object 216 About the Symantec ESM Reporting metadata model Structure of data items Table B 47 Path Message Summaries Trends Agent Trends Compliance Counts Data item Compliance Agent compliance Show a number that rates a compliance Counts percentage for agents This fact only works correctly when agents are specified individually in a previous column of the query Compliance Shows a number which rates the compliance percentage for the focus object 0 10 counts Shows the number of agents that have a compliance percentage level that falls between 0 10 percent gt 10 20 counts Shows the number of agents that have a compliance percentage level that falls between 10 20 percent gt 20 30 counts Shows the number of agents that have a compliance percentage level that falls between 20 30 percent gt 30 40 counts Shows the number of agents that have a compliance percentage level that falls between 30 40 percent gt 40 50 counts Shows the number of agents that have a compliance percentage level that falls between 40 50 percent gt 50 60 counts Shows the number of agents that have a compliance percentage level that falls between 50 60 percent gt 60 70 counts Shows the n
62. retain proper information in the database to do trend reports The available categories are listed in Table 5 4 Note Trending is not retroactive You can only create trended reports on data transferred after trending is enabled Table 5 4 Category identifiers ee Policy Compliance 1 Patch Assessment 2 Change Notification 3 ESM Error 4 System Error 5 Running Symantec ESM Reporting 149 Configuring and updating the database Table 5 4 Category identifiers ESM Administrative Information 6 System Information 7 ICE 8 In order to enable trending you will need to use Structured Query Language SQL commands in the Symantec ESM Reporting database The following SQL commands are examples of standard SQL commands that you can use The following command is an example of how to show all top level categories in the database Future updates may add categories that are not displayed in Table 5 4 To show all top level categories Use the following example command SELECT STRING_VALUE AS CATEGORY CATEGORY_ID AS CATEGORY FROM ESMDB10 CATEGORY ESMDB10 CONTENT_STRING_MAP WHERE CATEGORY_TYP AND CATEGORY_NAME_ CODE STRING_CODE 1 Gl The following command is an example of how to enable trending for all modules in a category To enable trending for modules for the category Change Notification Use the following example command
63. schema Database Views MESSAGE_STATE_INFO This view represents current message metrics for agents Table C 62 MESSAGE_STATE_INFO Se Ss a CATEGORY_ID INTEGER 4 Yes MODULE_ID INTEGER 4 No POLICY_ID CHARACTER 32 No AGENT_ID CHARACTER 32 No AUDIT_DATETIME TIMESTAMP 10 Yes SEVERITY_ID SMALLINT 2 No MESSAGE _ID INTEGER 4 No SHORT_NAME VARCHAR 32 No MESSAGE_STATE_ID CHARACTER 32 No MESSAGES INTEGER 4 Yes SUPPR_MESSAGES INTEGER 4 Yes UNIQUE_MESSAGES INTEGER 4 No UNIQUE_SUPPR_MSGS INTEGER 4 No UNIQUE_PSBL_MSGS INTEGER 4 No Appendix System assessment checklists This appendix includes the following topics m About system assessment checklists m Symantec ESM Reporting Database Foundation checklist m Symantec ESM Reporting Database Link checklist m Symantec Enterprise Reporting checklist m Symantec ESM Reporting Report Package checklist About system assessment checklists These system assessment checklists can help you evaluate the suitability of the computers on which you plan to install Symantec ESM Reporting components or Symantec Enterprise Reporting components Symantec ESM Reporting Database Foundation checklist See Symantec ESM system requirements on page 29 Table D 1 Symantec ESM Reporting Database Foundation checklist What is the computer s name 264 System assessment checklists Symantec ESM Reporting Database Link checklist Table D 1 Sy
64. section 252 227 7014 a 5 and 48 C F R section 252 227 7014 a 1 and used in 48 C F R section 12 212 and 48 C F R section 227 7202 as applicable Consistent with 48 C F R section 12 212 48 C F R section 252 227 7015 48 C F R section 227 7202 through 227 7202 4 48 C F R section 52 227 14 and other relevant sections of the Code of Federal Regulations as applicable Symantec s computer software and computer software documentation are licensed to United States Government end users with only those rights as granted to all other end users according to the terms and conditions contained in this license agreement Manufacturer is Symantec Corporation 20330 Stevens Creek Blvd Cupertino CA 95014 United States of America 6 Export Regulation Certain Symantec products are subject to export controls by the U S Department of Commerce DOC under the Export Administration Regulations EAR see www bxa doc gov Violation of U S law is strictly prohibited Licensee agrees to comply with the requirements of the EAR and all applicable international national state regional and local laws and regulations including any applicable import and use restrictions Symantec products are currently prohibited for export or re export to Cuba North Korea Iran Iraq Libya Syria and Sudan or to any country subject to applicable trade sanctions Licensee agrees not to export or re export directly or indirectly any product to any country
65. shortcuts visible to all users Click Next On the Choose Database Type panel click MS SQL Server 2000 and then click Next On the Installation Summary panel click Install Note After clicking Install you cannot cancel the installation 70 Installing Symantec ESM Reporting Installing Symantec ESM Reporting To install the Apache HTTP Web server for Symantec Enterprise Reporting Note If you do not uncheck the Web Server check box the Symantec Enterprise Reporting installer automatically starts up the Apache HTTP Web server installer The Apache HTTP Web server uses port 80 by default If the computer on which you are installing the Apache Web server is already using port 80 for another application you must manually change the Apache HTTP Web server to use a different port number For example port 8000 or port 8080 See To install the Apache HTTP Web server for Symantec Enterprise Reporting on page 56 To finish installing Symantec Enterprise Reporting Onthe Install Complete panel confirm that the Start Enterprise Reporting Configuration check box is checked and then click Done To configure the Symantec Enterprise Reporting database 1 Inthe left pane under Data Access right click Content Store and then click Delete 2 Inthe left pane under Data Access right click Content Manager and then click New resource gt Database 3 Inthe New resource Database dialog box do the following t
66. supports the ESM database and the SER database m Open a Terminal window to the ESM database and SER database computer as Oracle user and type sqlplus nolog m At the sqlplus prompt type connect as sysdba shutdown immediately startup mount 4 Change the Oracle database to enable redo log archival m Open a Terminal window to the ESM database and SER database computer as Oracle user and type sqlplus nolog m At the sqlplus prompt type alter database archivelog alter database open archive log list Installing the Symantec ESM Reporting Database Link for Oracle The installation process includes the following tasks m Install the Oracle JDBC Drivers for the Symantec ESM Reporting Database Link m Install the Symantec ESM Reporting Database Link for Oracle Install the Oracle JDBC Drivers for the Symantec ESM Reporting Database Link Symantec does not provide JDBC Drivers for the Oracle database server You can download Oracle JDBC Drivers from the Sun Microsystems Web site at http servlet java sun com products jdbc drivers To install the Oracle JDBC Drivers for the Symantec ESM Reporting Database Link On the computer on which you are installing the Symantec ESM Reporting Database Link download and install the Oracle 9i JDBC Drivers Installing Symantec ESM Reporting Installing Symantec ESM Reporting Warning The net and app JDBC Drivers for IBM DB2 MS SQL and Oracle can send user names passwords and ot
67. tab has several tools that let you customize your workspace to meet your needs and preferences to create reports to customize your workspace and to access other tools to administer your Symantec ESM Reporting application The Public Folders tab contains all of the Symantec ESM reports that you have permissions to view or run You can use the My Folders tab to save your customized reports Symantec ESM Reporting has a help link on each page in the interface When you click on the help link Symantec ESM Reporting opens the help page that relates to the task that you are performing The help pages provide systematic instructions on using Symantec ESM Reporting Opening the user interface To use Symantec ESM Reporting you must access the Web server then log on to the application To open the user interface 1 Inthe address box of a supported Web browser type http lt Symantec ESM Reporting Web server name gt Enterprise_Reporting Note You may need to use https if http has been disabled 2 If anonymous logon is disabled in the Symantec Enterprise Reporting Logon page do the following m Inthe User Name field type the name of a user account that has the required permissions to use the desired reports m Inthe Password field type the user account password Running Symantec ESM Reporting 127 Customizing the user interface Note The user name and password are the LDAP or NTLM authentication sever account
68. tablespace ESM_32K_USR_TS to ynewlocation myDB 1 Usea text editor to open sql oracle createESMdb CreateTableSpaces sql 2 Find the line containing CREATE TABLESPACE ESM_32K_IDX_TS 3 Change the next line from DATAFILE ORACLE_BASE oradata ORACLE_SID esmidx01 dbf to DATAFILE mynewlocation myDB esmidx01 dbf You can use a similar process to manually create the SER database On the Symantec ESM Reporting Solaris CD Symantec provides the create_ser_db sh shell script The shell script calls the sql scripts that create the SER database The sql scripts for the SER database are in the sql oracle createSERdb directory You can change the scripts to specify a different location for the files If you use the Database Foundation installer to create the SER database the installer creates the data files control files and tablespaces in O0RACLE_BASE oradata ORACLE SID The Database Foundation installer associates the following files with the SER database Control files control01 ctl control02 ctl and control03 ctl m Database system file system01 dbf m Database temporary tablespace temp01 dbf m Database undo tablespace undotbs01 dbf m Database Log files redo01 log group 1 redo02 log group 2 and redo03 log group 3 The installer associates the following tablespaces and files m Tablespace SER 32K USR_TS This tablespace is the user space The file name is ser01 dbf 290 Symantec ESM Reporting installation scri
69. that identifies the name of the Agent that is installed Description NVARCHAR 2000 Holds a string of variable length up to 2000 characters that describes the agent The string can include multi byte unicode characters for international use Unsupported in Symantec ESM 6 1 Asset_tag VARCHAR 64 Holds a string of variable length up to 64 characters that can contain information from a physical security sticker or barcode Unsupported in Symantec ESM 6 1 OS_version_ID CHAR 32 Holds a character string that Foreign key identifies the operating system version number Manager_ID CHAR 32 Holds the unique character string Foreign key that identifies a Symantec ESM Manager Table C 8 Agent_Audit_Error table Agent_audit_err_ID CHAR 32 Holds a unique character string that Primary key identifies an Agent audit error Agent_ID CHAR 32 Holds a character string that Foreign key identifies the name of the Symantec ESM Agent host computer About the Symantec ESM Reporting database schema Tables in the database schema Table C 8 Agent_Audit_Error table Audit_ID CHAR 32 Holds a unique character string that Foreign key identifies a specific audit Table C 9 Agent_Err_Str_Map table String_value NVARCHAR 2000 Holds a string that can include multi byte unicode characters for international use Agent_audit_err_ID CHAR 32 Holds a unique character string that Primary
70. the agent Table C 52 Name_wildcarded About the Symantec ESM Reporting database schema Tables in the database schema Suppression table SMALLINT Holds a boolean that shows whether a supression is using a wildcard in the name Info_wildcarded SMALLINT Holds a boolean that shows whether a supression is using a wildcard in the information Agent_wildcarded SMALLINT Holds a boolean that shows whether a supression is using a wildcard in the agent name Enabled SMALLINT Boolean that identifies whether message suppression was enabled Suppr_comment NVARCHAR 512 Holds a string that can include multi byte unicode characters for international use Creation_date TIMESTAMP Contains the system time of the creation of a specific suppression event Last_used_date TIMESTAMP Contains the system time for the date of the last time the suppression was used Expiration_date TIMESTAMP Contains the system time for the date and time of the suppression s expiration OS_module_ID CHAR 32 Holds the unique character string Foreign key that identifies the Symantec ESM operating system module Policy_ID CHAR 32 Holds the unique character string Foreign key that identifies the Symantec ESM policy Message_ID INTEGER Holds an integer that identifies a Foreign key message Account_ID CHAR 32 Holds the unique character string Foreign key that identifi
71. the database creation step On the computer on which you installed the relational database server run the Database Foundation installer This installer creates the ESM and SER databases for Symantec ESM Reporting The databases serve all of the Symantec ESM Managers and Symantec ESM Reporting Database Links on the network You can install both databases on the same drive or install each database on a separate drive Note Symantec does not provide a relational database server for Symantec ESM Reporting You must purchase the relational database server from a database vendor If you have not already installed a relational database server you must perform the database server installation before installing the Database Foundation Before you can perform the database server installation you must obtain the name and password of an account on the host computer with permissions to create databases Before you Install Symantec ESM Reporting 25 Before you install Symantec ESM Reporting About the Database Link installer You can install one Symantec ESM Reporting Database Link for several managers or a separate Symantec ESM Reporting Database Link for each manager The Symantec ESM Reporting Database Link can be installed on a manager computer or another host computer Because of the impact to performance do not install the Symantec ESM Reporting Database Link on the database server computer Before you install the Symantec ESM Reporting D
72. the same report you can create report views and then create a schedule for each report view Jobs have their own schedules and these schedules are independent from report schedules After you create a schedule the report or job runs at the time and date specified You can then manage the properties of your schedules The following procedures outline the methods necessary for creating a basic report schedule For detailed steps to create group schedules manage change suspend or delete schedules see the online Help or the Administration and Security Guide on the CD in the Docs Symantec Enterprise Reporting directory To schedule a report using a recurring interval 1 In Public Folders or My Folders click the schedule button for the report that you want to schedule 2 Under Frequency select how often you want the schedule to run The Frequency section is dynamic and changes with your selection Wait until the page is updated before selecting the frequency 3 Under Start select the date and time when you want the schedule to start 4 Under End select when you want the schedule to end If you want to create the schedule but not apply it right away check Disable the schedule To later enable the schedule uncheck the check box 5 Under Formats click the format you want for the report output 6 Under Languages click Select the languages to select a different or additional language for the report 7 Under Delivery choose to
73. to the right of all information select the data item and click the Insert button on the lower left of the screen m To add the data item to the left of any column in the report drag the data item heading of any column and drop it there The new column is added to the left of that column This works to place a column between two existing columns m Toadd information that spans columns drag the data item to a location directly above the columns and then drop it there Note When you drag data items to locations in the query a small black line shows the location where the data will be added when you drop it To remove columns from queries 1 Right click the heading of the column that you want to remove 2 Select Delete from the menu Filters let you remove unwanted data from a query For example if you were creating a query that showed audits that had completed in the last week and you wanted to filter for only those audits that finished with errors you could build the query and then place a filter called Errors Only in the query The query would then display only those audits that had errors You can filter your queries in two ways You can use a filter that is part of the metadata model to encompass an entire query An example of this type of filter is the Errors Only example described previously You can also filter by column When you filter on columns the interface provides you with each available value in the column You
74. tool This tool uses a metadata model that lets you dynamically add and remove information from your queries See Metadata model divisions on page 138 See About the Symantec ESM Reporting metadata model on page 177 136 Running Symantec ESM Reporting About using queries The metadata model is a product of a package that Symantec has created for Symantec ESM Reporting Queries and reports in Symantec ESM Reporting do not function unless the Symantec ESM Reporting package is the currently selected package Symantec Enterprise reporting is capable of using multiple packages however Symantec ESM Reporting has only one package available For more information on packages and the Query Studio see the Query Studio User Guide and the other Symantec Enterprise Reporting documentation About using queries Symantec ESM Reporting uses queries to let you search through your enterprise data You can create a query from scratch or you can use one of the many defined queries The defined queries can be used in their default forms or you can alter them to display exactly the information that you need This section of this document is intended to let you quickly review the features of the Query Studio This section does not fully cover every feature of the Query Studio For complete documentation of the Query Studio see the Query Studio User Guide on the CD in Docs Symantec Enterprise Reporting directory Planning your query Be
75. types of information modeling tools Table C 1 shows what types of information can reside in each data type Table C 1 Data types and their contents CHAR X Holds a unique character string in a fixed size field where X is the number of characters NVARCHAR X Holds a string of variable length up to X characters that can include multi byte unicode characters for international use TINYINT Boolean like number field that identifies whether a condition is true or false When used to hold a boolean a value of zero equates to false and a value greater than zero equates to true 232 About the Symantec ESM Reporting database schema Tables in the database schema Table C 1 Data types and their contents SMALLINT Boolean that identifies whether a condition is true or false VARCHAR X Holds a unique character string with a maximum size of X INTEGER Holds a number with the specific value of an object TIMESTAMP DATETIME DATE Contains the system time of a specific event Tables in the database schema Each table below Table C 2 through Table C 52 corresponds to a table in the database and each row corresponds to a field in that table The tables in this appendix include field names data types descriptions of fields and indicate whether the field is a primary key a foreign key or both Table C 2 Account table Account_ID CHAR 32 Holds the unique character string Primary
76. user has execute permissions for a domain Read_domain SMALLINT Boolean that identifies whether the user can read a specific domain Snpshot_upd_domain SMALLINT Boolean that identifies whether the user can perform snapshot updates for a domain in the Symantec ESM console Write_domain SMALLINT Boolean that identifies whether the user can write to a specific domain Account_ID CHAR 32 Holds the unique character string Primary key that identifies the Symantec ESM account Foreign key Domain_ID CHAR 32 Holds a unique character string that Primary key identifies the Symantec ESM domain Foreign key Table C 5 Acct_Policy_Perm table Execute_Policy SMALLINT Boolean that identifies whether the user can execute a policy Read_Policy SMALLINT Boolean that identifies whether the user can read a policy Write_Policy SMALLINT Boolean that identifies whether the user can write to a policy About the Symantec ESM Reporting database schema 235 Tables in the database schema Table C 5 Acct_Policy_Perm table Account_ID CHAR 32 Holds the unique character string Primary key that identifies the Symantec ESM account Foreign key Policy_ID CHAR 32 Holds the unique character string Primary key that identifies the Symantec ESM policy Foreign key Table C 6 Acct_Template_Perm table Account_ID CHAR 32 Holds the unique character string Primary key that identifies the Symantec ESM
77. v7 2 or 7 3 Alpha processor IBM OS 400 Midrange m IBM iSeries OS 400 V5R1M0 or V5R2M0 30 Before you Install Symantec ESM Reporting System requirements Table 2 1 Symantec ESM system requirements Symantec ESM Console m Windows 2003 Server m Windows 2000 Professional Server or Advanced Server with Service Pack 1 0 or higher m Windows XP Professional Microsoft Windows NT 4 0 Server or Workstation with Service Pack 5 0 or higher Before you install Symantec Enterprise Reporting ensure that the computers on which you plan to install Symantec Enterprise Reporting components meet the minimum requirements in Table 2 2 Table 2 2 Symantec Enterprise Reporting system requirements Database hardware Small 1 server up to 100 report users 100 s of Symantec ESM Agents m 2 GHz dual processors m 4GBRAM m 10 GB free disk space Medium 3 servers 500 report users 1 000 to 10 000 Symantec ESM Agents One ReportNet Web server m 2 GHz dual processors m 4GBRAM m 25 GB free disk space Two ReportNet application servers m 2 GHz dual processors m 4GBRAM m 25 GB free disk space Large more than 500 report users more than 10 000 Symantec ESM Agents m Sales engineers can help you with capacity planning Table 2 2 Before you Install Symantec ESM Reporting 31 System requirements Symantec Enterprise Reporting system requirements Database application
78. warnings or errors 4 Ifyou used the Database Foundation installer to create the ESM database open the Symantec_ESM_ Reporting DB Creation log file and check for any warnings or errors 5 Ifyou used the Database Foundation installer to create the SER database open the Symantec_Enterprise_Reporting DB Creation log file and check for any warnings or errors To check the Database Link installation log 1 On the computer on which you installed the Symantec ESM Reporting Database Link open a text editor 2 Doone of the following tasks m On Windows computers browse to the C Program Files Symantec ESM Reporting Database Link folder m On UNIX computers change to the opt Symantec ESM Reporting Database_Link directory 3 Open the Symantec_ESM Reporting Database Link InstallLog log file and check for any warnings or errors To check the Symantec Enterprise Reporting installation log 1 On the computer on which you installed Symantec Enterprise Reporting open a text editor 2 Doone of the following tasks m On Windows computers browse to the C Program Files Symantec Enterprise_Reporting instlog folder m On UNIX computers change to the opt Symantec Enterprise_Reporting instlog directory 3 Open the tl CRN lt build ID number gt txt file and check for any warnings or errors 4 Open the tl CRN lt build ID number gt summary error txt file and check for any warnings or errors Installing Symantec ESM Reporting 101 Po
79. with a severity level of four are red messages Yellow messages per severity Displays the number of yellow messages at each severity level Yellow messages can have a severity level of one two or three Green messages per severity Displays the number of green messages Messages with a severity level of zero are green messages Messages per severity Displays the number of messages at each severity or security level Suppressed messages per severity Displays the number of suppressed messages at each severity security level Unique messages per severity Displays the number of unique messages at each severity security level Unique suppressed messages per severity Displays the number of unique suppressed messages at each severity security level Unique possible messages per severity Displays the number of unique possible messages at each severity security level Possible messages may or may not have been reported in a policy run Table B 33 Codes About the Symantec ESM Reporting metadata model 207 Structure of data items Path Message Summaries Agent Summaries Codes Data item POLICY_ID The unique character or numeric string that identifies the Symantec ESM policy CATEGORY_ID An integer that identifies the category MODULE_ID A character or numeric string that identifies a specific Symantec ESM module MANAGER ID The unique charact
80. 27 ESM_Check table Letter CHAR 1 Uniquely identifies checks for each module Primary key Table C 27 About the Symantec ESM Reporting database schema Tables in the database schema ESM_Check table 245 OS_module_ID CHAR 32 Identifies the module Primary key Foreign key Description_code VARCHAR 20 Code that uniquely identifies a check description Title_code VARCHAR 20 Code that uniquely identifies a check description Table C 28 ESM_Check_Message table Letter CHAR 1 Uniquely identifies module checks for Primary key message display Foreign key OS_module_ID CHAR 32 Uniquely identifies modules for Primary key message display Foreign key Message_ID INTEGER Holds an integer that identifies a Primary key message Foreign key Table C 29 ESM_Domain table Domain_ID CHAR 32 Holds a unique character string that identifies the Symantec ESM domain Primary key Foreign key Domain_Name VARCHAR 64 Holds a string of variable length up to 64 characters that identifies the name of a domain User_defined TINYINT Boolean that identifies whether the Symantec ESM domain can be defined by the user Manager_ID CHAR 32 Holds the unique character string that identifies a Symantec ESM Manager Foreign key 246 About the Symantec ESM Reporting database schema Tables in the database schema Table C 30 ESM_Mo
81. 47 reports 128 about 128 creating 145 deleting 147 emailing 135 exporting 134 locating 131 modifying 146 running 131 scheduling 133 Reports Package planning for 28 uninstalling 105 Reports Package installer about 26 requirements all computers 36 Database Link 34 Symantec Enterprise Reporting 30 Symantec ESM 29 UNIX computers 38 Windows computers 37 restore database performance 102 running reports 131 S scheduling reports 133 securing email 109 JDBC driver communications 108 saved reports 109 Symantec Enterprise Reporting components 108 Web servers 110 security considerations 107 selecting report parameters 132 SER and ESM databases create manually for IBM DB2 46 create manually for MS SQL 65 create manually for Oracle 79 enable redo log 79 for IBM DB2 42 for MS SQL 62 for Oracle 75 service logs 121 setting database authentication Microsoft SQL Server 28 setting the audit log 122 seved reports securing 109 silent install properties file Database Link 91 sorting queries 142 SQL commands assigning user permissions 116 removing user permissions 118 viewing user permissions 119 start ReportNet Service Enterprise Reporting database 88 state reports 129 stopping and starting Database Link 98 Symantec Enterprise Reporting 122 about 18 planning for 27 system requirements 30 Symantec Enterprise Reporting components securing 108 Symantec Enterprise Reporting Database purging old data 152 Symantec Ente
82. 5 130 Running Symantec ESM Reporting About reports About queries Note For trend reports when you select a policy Symantec ESM Reporting only lets you select modules for that policy that have trend data available If you select a policy that has no modules with trend data available no modules appear in the selection menu and you cannot run the report Queries are a type of customizable report in Symantec ESM Reporting After you run a query you can filter the contents of columns add columns or remove columns You can add related information of you can completely change the query to select any available information and reporting on a completely different type of data If you do this you have the option to save the new query You should save the query in a new place with a unique name Warning If you overwrite the Symantec default queries you must reinstall the original package to restore the query Also your new query may be overwritten when you install package updates When you create reports using queries remember that you must use related data or the Query Studio may find a meaningless relationship among the information objects or it may give you an error indicating that it could not find a relationship See About the Symantec ESM Reporting metadata model on page 177 Query Studio implements prompts When you use information objects from certain query subjects the Query Studio brings up prompt pag
83. 86 install 7 2 run time client for Database Link 48 for Enterprise Reporting 53 install 8 1 run time client for Database Link 47 for Enterprise Reporting 52 install Database Foundation for IBM DB2 42 for MS SQL 62 for Oracle 76 install Database Link for IBM DB2 49 for MS SQL 66 for Oracle 81 install HTTP Web server for Enterprise Reporting 85 install JDBC Drivers for Database Link 80 install on Solaris computers using Oracle 75 install on UNIX computers using Oracle 75 install on Windows computers using IBM DB2 42 using Microsoft SQL Server 62 install Reports Package for IBM DB2 60 for MS SQL 72 for Oracle 90 install run time client for Enterprise Reporting 84 installation log checking Database Link 101 installation logs checking 99 installing HTTP Web server for Enterprise Reporting 56 70 interface 126 internal auditing 122 Index 299 J JDBC driver communications securing 108 L LDAP authentication configure HTTP Web server 58 71 89 enable for Enterprise Reporting 59 71 89 Locating logs 121 locating reports 131 logs 121 auditing 121 locating 121 manually create ESM and SER databases for IBM DB2 46 for MS SQL 65 for Oracle 79 mapping user names 115 messages in categories 280 metadata model 135 138 147 Microsoft SQL Server setting database authentication 28 modifying reports 146 modules in categories 280 more information Symantec ESM Reporting 22 MS SQL create ESM and SER database
84. A WI FORM OF PAYMENT Check One ___ Check Payable to Symantec Amount Enclosed Visa Mastercard AMEX Credit Card Number Expires Name on Card please print Signature U S Dollars Payment must be made in U S dollars drawn on a U S bank MAIL YOUR CD REPLACEMENT ORDER TO Symantec Corporation Attention Order Processing 555 International Way Springfield OR 97477 800 441 7234 Please allow 2 3 weeks for delivery within the U S Symantec Symantec Enterprise Security Manager and Symantec ESM are trademarks of Symantec Corporation Other brands and products are trademarks of their respective holder s 2004 Symantec Corporation All rights reserved Printed in the U S A symantec Glossary agent audit category checks compliant compliance percentage console domain ESM Agent ESM Enterprise Console ESM Manager line of business manager See Symantec ESM Agent In Symantec ESM an audit is a policy run In Symantec ESM Reporting a category is a group of related messages that separate modules can return The term is specific to Symantec ESM Reporting In Symantec ESM a check examines a specific setting or attribute of an agent You can enable or disable a check When a check is enabled in a policy run it returns a message with a security level In Symantec ESM Reporting this parameter indicates whether an agent or domain conforms to a policy module message or category A
85. AMP Contains the system time of the start of a specific audit Finish_time TIMESTAMP Contains the system time of the end of a specific audit Job_ID VARCHAR 20 Holds a string that identifies the job code Policy_ID CHAR 32 Holds the unique character string Foreign key that identifies the Symantec ESM policy 243 244 Table C 24 About the Symantec ESM Reporting database schema Tables in the database schema ESM_Audit table Account_ID CHAR 32 Holds the unique character string Foreign key that identifies the Symantec ESM account Domain_ID CHAR 32 Holds a unique character string that Foreign key identifies the Symantec ESM domain Run_state SMALLINT Integer that identifies whether the Foreign key the recorded state of a policy run at the last poll of the manager Table C 25 ESM_Audit_Agent table Audit_ID CHAR 32 Holds a unique character string that Primary key identifies a specific audit Foreign key Agent_ID CHAR 32 Holds a character string that Primary key identifies the name of the Symantec ESM Agent Foreign key host computer Table C 26 ESM_Audit_ESM_Module table Audit_ID CHAR 32 Holds a unique character string that Primary key identifies a specific audit Foreign key Short_name VARCHAR 32 Holds a string of variable length Primary key up to 32 characters that identifies the short Foreign key name of an ESM Module Table C
86. About Symantec ESM Reports About the reports in Symantec ESM Reporting Quarterly compliance trend by manager This report shows quarterly compliance percentage trends for a selected manager You can select a policy with a module on any manager and domain in your enterprise You then select a date range and the report displays a trend chart that shows the aggregate level of compliance for a selected domain The report also displays the data as a table Default path Public Folders gt Symantec ESM gt Technical gt Policy Compliance gt Compliance Percentage Quarterly violations trend by line of business This report shows the quarterly policy violation trends for any selected module You select a policy with a related module and then select managers domains and a date range The report displays a trend chart that shows policy violations for a selected manager and domain The report also displays the data in table form Default path Public Folders gt Symantec ESM gt Executive gt Policy Compliance gt Violation Counts Quarterly violations trend by manager This report shows quarterly policy violation trends for a selected manager You select a policy with a related module and then select a date range The report displays a trend chart that shows policy violations for all agents that are examined by the selected manager and domain The report also displays data as a table Default path Public Folders gt Symantec ESM gt
87. B 50 Path Message Summaries Trends Agent Trends Severity Counts Data item Severity Counts Severity level Displays the security level either red yellow or green Severity ID A small integer 0 4 that identifies the level of severity Red messages per severity Displays the number of red messages Messages with a severity level of four are red messages Yellow messages per severity Displays the number of yellow messages at each severity level Yellow messages can have a severity level of one two or three Green messages per severity Displays the number of green messages Messages with a severity level of zero are green messages Messages per severity Displays the number of messages at each severity or security level Suppressed messages per severity Displays the number of suppressed messages at each severity or security level Unique messages per severity Displays the number of unique messages at each severity or security level Unique suppressed messages per severity Displays the number of unique suppressed messages at each severity or security level Unique possible messages per severity Displays the number of unique possible messages at each severity or security level Possible messages may or may not have been reported in a policy run 220 About the Symantec ESM Reporting metadata model Structure of data items Tabl
88. DAP name space authentication for Symantec Enterprise Reporting on page 59 Enable LDAP Secure Socket Layer SSL on Windows for Oracle 1 On the LDAP computer on which you installed LDAP authentication log on using an account with rights to change SSL status In the left pane under Security click SSL and then click Settings In the right pane under SSL status click SSL on Click Update oO F amp F U N Restart the host computer system Note If you install SSL on the Solaris computer on which you installed Symantec Enterprise Reporting and you set up signed certificates on the SSL server for Symantec Enterprise Reporting to use then no changes are required for Symantec Enterprise Reporting on Solaris to use LDAP on Windows See the Installation and Configuration Guide in the Docs Symantec Enterprise Reporting directory on the CD installation set 72 Installing Symantec ESM Reporting Installing Symantec ESM Reporting Install the Symantec ESM Reporting Reports Package for MS SQL The installation process includes the following tasks m To install the Symantec ESM Reporting Reports Package for MS SQL m To test the Symantec ESM Reporting Reports Package To install the Symantec ESM Reporting Reports Package for MS SQL On the computer on which you installed the Symantec Enterprise Reporting Content Manager install the Symantec ESM Reporting Reports Package The process is the same as installing the Symantec ESM Re
89. Database Link On the computer on which you are installing the Symantec ESM Reporting Database Link access the IBM DB2 installation CD select the run time client installation and then select the default installation settings To connect and test the IBM DB2 7 2 run time client for the Symantec ESM Reporting Database Link 1 On the computer on which you are installing the Symantec ESM Reporting Database Link click Start gt Programs gt IBM DB2 gt Configuration Assistant 2 Inthe DB2 Message prompt to add a database click Yes If the DB2 Message prompt does not display on the Menu bar click Selected and then click Add Database Using Wizard 3 Onthe Select how you want to set up a connection panel click Manually configure a connection to a database and then click Next 4 On the Select a communications protocol click TCP IP and then click Next 5 Onthe Specify TCP IP communication parameters panel do the following tasks m Inthe Host name text box type the name of the computer on which you installed IBM DB2 m Inthe Port number text box type 50000 6 Click Next 10 11 12 13 14 Installing Symantec ESM Reporting 49 Installing Symantec ESM Reporting On the Specify the name of the database to which you want to connect panel in the Database name text box type ESM Click Next On the Register this database as a data source panel uncheck the Register this database for ODBC check box and then cli
90. ER databases for Oracle See About the installation scripts for Oracle on page 287 1 oO F amp F WwW N On the computer on which you installed Oracle at the system command prompt change to the Symantec ESM Reporting Solaris CD Change to the sql oracle directory Type create_esm_db sh Type create_ser_db sh Type populate_esm_db sh lt system_user gt lt password gt lt database_name gt Type post_install sh lt system_user gt lt password gt lt database_name gt Note ESM is the default lt database_name gt To enable redo log archival for the Symantec ESM Reporting database and Symantec Enterprise Reporting database 1 2 Modify the initESM ora file m Inatext editor open the initESM ora file and type log_archive_start true log_archive dest_1 location u01 oradata ESM arch m Save and close the initESM_ ora file Verify that the archive directory exists and if it does not change to Oracle user and then type mkdir u01 oradata ESM arch Modify the initSER ora file m Inatext editor open the initSER ora file and type log_archive_start true log_archive dest_1 location u01 oradata SER arch m Save and close the initSER ora file m Verify that the archive directory exists and if it does not change to Oracle user and then type mkdir u01 oradata SER arch 80 Installing Symantec ESM Reporting Installing Symantec ESM Reporting 3 Shut down and restart the Oracle database that
91. E_CODE VARCHAR 32 No SEVERITY_ID SMALLINT 2 No RATING MULTIPLIER INTEGER 4 Yes SEVERITY_NAME VARGRAPHIC 2000 No CHG_MSG_DETAILS This is a view of the internationalized strings for the CHG_MESSAGE_ EVENT table This table holds the change management details from the Symantec ESM change management modules Table C 58 CHG_MSG_DETAILS LOCALE_CODE VARCHAR 32 No CHG_MSG_EVENT_ID CHARACTER 32 No POLICY_ID CHARACTER 32 No AGENT_ID CHARACTER 32 No AUDIT_DATETIME TIMESTAMP 10 Yes MESSAGE_ID INTEGER 4 No About the Symantec ESM Reporting database schema 259 Database Views Table C 58 CHG_MSG_DETAILS NAME VARGRAPHIC 2000 Yes INFO VARGRAPHIC 2000 Yes MSG_STATE_DETAILS This is a view of the internationalized strings for the messages generated by the Symantec ESM Managers Table C 59 MSG_STATE_DETAILS o o e eee LOCALE_CODE VARCHAR 32 Yes MESSAGE_STATE_ID CHARACTER 32 No POLICY_ID CHARACTER 32 No AGENT_ID CHARACTER 32 No AUDIT_DATETIME TIMESTAMP 10 Yes MESSAGE _ID INTEGER 4 Yes SHORT_NAME VARCHAR 32 No CATEGORY_ID INTEGER 4 Yes MODULE_ID INTEGER 4 No SUPPRESSED SMALLINT 2 Yes NAME VARGRAPHIC 2000 Yes INFO VARGRAPHIC 2000 Yes Views without text The remaining views do not contain text details therefore no locale is selectable These views are primarily used for gathering message metrics and statistics 260 About the Sym
92. For only UNIX installations copy the properties file to a tmp directory 5 Open the properties file 6 Change the values in the properties file to correspond to the settings for your host computer and database server See Table 3 3 Properties file values on page 91 7 Save the modified properties file To perform a silent Symantec ESM Reporting Database Link installation on Windows 1 At the system command prompt change to the temporary folder containing the modified properties file 2 Type install f lt path to the modified properties file gt Installing Symantec ESM Reporting 97 Post installation tasks To perform a silent Symantec ESM Reporting Database Link installation on UNIX 1 At the system command prompt change to the tmp directory containing the modified properties file 2 Type install sh To check the status of the installation See To check the Database Link installation log on page 100 Post installation tasks Symantec ESM Reporting post installation tasks include m Changing the Symantec ESM Reporting Database Link m Stopping and restarting the Symantec ESM Reporting Database Link on UNIX m Configuring Symantec Enterprise Reporting m Configuring the Apache HTTP Web server m Checking the installation logs for errors or warnings m Restoring database performance m Uninstalling the Symantec ESM Reporting Database Foundation m Uninstalling the Symantec ESM Reporting Database Link m Un
93. Foreign key Locale_ID CHAR 32 Holds a string of fixed length 32 Primary key characters that identifies the language that Foreign key Symantec ESM is using String_type CHAR 4 String that identifies whether a Primary key message is a name or an info message String_value NVARCHAR 2000 Holds a string that can include multi byte unicode characters for international use Table C 39 Mod_Err_Str_Map table String_value NVARCHAR 2000 Holds a string that can include multi byte unicode characters for international use Short_name VARCHAR 32 Holds a string of variable length Primary key up to 32 characters that identifies the short Foreign key name of an ESM Module 250 About the Symantec ESM Reporting database schema Tables in the database schema Table C 39 Mod_Err_Str_Map table Agent_audit_err_ID CHAR 32 Holds the unique character string Primary key that identifies each agent audit error Foreign key Locale_ID CHAR 32 Holds a string of fixed length 32 Primary key characters that identifies which language Foreign key Symantec ESM is using Table C 40 Module_Audit_Error table Short_name VARCHAR 32 Holds a string of variable length Primary key up to 32 characters that identifies the short Foreign key name of an ESM Module Agent_audit_err_ID CHAR 32 Holds the unique character string Primary key that identifies each agent audit error
94. Installing Symantec ESM Reporting To install Symantec Enterprise Reporting 1 10 11 On the computer on which you are installing Symantec Enterprise Reporting access the Symantec ESM Reporting Windows CD If the autorun feature does not start double click setup bat On the Symantec Enterprise Security Manager ESM 6 1 Reporting CD panel in the left pane click Symantec Enterprise Reporting In the right pane do the following tasks m Review the information m Complete the installation prerequisites m Click Execute the Symantec Enterprise Reporting Installer On the Introduction panel click Next On the License Agreement panel click I accept the terms of the License Agreement and then click Next On the Installation Location panel do one of the following tasks m To select the default folder click Next m To select another folder click Choose In the Browse for Folder dialog box select the desired folder click OK and then click Next On the Choose Install Set panel do one of the following tasks m To select the default software installation set click Next m If the computer on which you are installing Symantec Enterprise Reporting has already installed a Web server uncheck the Web Server check box and then click Next On the Shortcut Folder panel do the following tasks m To specify a different folder for the shortcuts select a folder in the list m To let the users see the shortcuts check Make the
95. NTEGER Holds an integer that counts the agents that were run during an audit Table C 20 Chg_Message_Event table Chg_msg_event_ID CHAR 32 Holds a unique character string that identifies change message event Primary key Audit_datetime DATETIME Holds the date and time of the related audit Suppressed TINYINT Boolean that identifies whether the related message is suppressed 242 Table C 20 About the Symantec ESM Reporting database schema Tables in the database schema Chg_Message_Event table Message_ID INTEGER Holds an integer that identifies a Foreign key message Policy_ID CHAR 32 Holds the unique character string Foreign key that identifies the Symantec ESM policy Agent_ID CHAR 32 Holds a character string that Foreign key identifies the name of the Symantec ESM Agent host computer Table C 21 Chg_Msg_ String Map table Chg_msg_event_ID CHAR 32 Holds a unique character string that Primary key identifies the change message event Foreign key Locale_ID CHAR 32 Holds a string of fixed length 32 Primary key characters that identifies which language Foreign key Symantec ESM is using String_type CHAR 4 Indicates whether the string is aname Primary key of info string String_value NVARCHAR 2000 Holds a string that can include multi byte unicode characters for international use Table C 22 Content_String_Map table String_
96. O ESMDB10 RPT_DOMAIN_PERM USER_NAME IS_ESM_ACCOUNT DOMAIN_ID SELECT alan 0 DOMAIN_ID FROM ESMDB10 ESM_DOMAIN D ESMDB10 MANAGER M WHERE D MANAGER_ID M MANAGER_ID AND D DOMAIN_NAME IN All Agents Domain_0 Domain_1 AND M MANAGER_NAME IN Manager_1 Manager_2 m The following set of SQL commands gives a user named alan access to specific policies Policy_0 and Policy_1 on specific managers Manager_1 and Manager _2 INSERT INTO ESMDB10 RPT_POLICY_PERM USER_NAME IS_ESM_ACCOUNT POLICY_ID SELECT alan 0 POLICY_ID FROM ESMDB10 POLICY P ESMDB10 MANAGER M WHERE P MANAGER_ID M MANAGER_ID AND P POLICY_NAME IN Policy_0 Policy_1 AND M MANAGER_NAME E IN Manager_1 Manager_2 Removing user account permissions Personnel changes may require you to delete user accounts The method for deleting user accounts varies depending on whether the Symantec Reporting Database Link is automatically updating the Symantec Enterprise Reporting user accounts If the user account is being updated in this way you can remove the user accounts automatically when you delete the corresponding accounts in the Symantec ESM console If you created the account manually using SQL commands then the following set of SQL commands is required to delete user accounts To delete user accounts manually Securing Symantec ESM Reporti
97. R PURPOSE AND NONINFRINGEMENT OF INTELLECTUAL PROPERTY RIGHTS THIS WARRANTY GIVES YOU SPECIFIC LEGAL RIGHTS YOU MAY HAVE OTHER RIGHTS WHICH VARY FROM STATE TO STATE AND COUNTRY TO COUNTRY 4 Disclaimer of Damages SOME STATES AND COUNTRIES INCLUDING MEMBER COUNTRIES OF THE EUROPEAN ECONOMIC AREA DO NOT ALLOW THE LIMITATION OR EXCLUSION OF LIABILITY FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES SO THE BELOW LIMITATION OR EXCLUSION MAY NOT APPLY TO YOU TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW AND REGARDLESS OF WHETHER ANY REMEDY SET FORTH HEREIN FAILS OF ITS ESSENTIAL PURPOSE IN NO EVENT WILL SYMANTEC BE LIABLE TO YOU FOR ANY SPECIAL CONSEQUENTIAL INDIRECT OR SIMILAR DAMAGES INCLUDING ANY LOST PROFITS OR LOST DATA ARISING OUT OF THE USE OR INABILITY TO USE THE SOFTWARE EVEN IF SYMANTEC HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES IN NO CASE SHALL SYMANTEC S LIABILITY EXCEED THE PURCHASE PRICE FOR THE SOFTWARE The disclaimers and limitations set forth above will apply regardless of whether or not You accept the Software 5 U S Government Restricted Rights RESTRICTED RIGHTS LEGEND All Symantec products and documentation are commercial in nature The software and software documentation are Commercial Items as that term is defined in 48 C F R section 2 101 consisting of Commercial Computer Software and Commercial Computer Software Documentation as such terms are defined in 48 C F R
98. SM gt Executive gt Policy Compliance gt Violation Counts Violations by line of business query This query retrieves security compliance data for modules in selected domains By default the results are grouped by domains and they display the number of messages at each security level red yellow and green for each domain as well as the total number of messages The query displays data as both a chart anda table You can modify the query to meet your needs Default path Public Folders gt Symantec ESM gt Executive gt Policy Compliance gt Violation Counts Violations by manager This report shows policy violations on selected managers You select a policy with its related modules a domain and any or all managers A bar chart shows the distribution of the violations across each manager the number of violations for each manager and the severity level of each message This information is also shown as a table Default path Public Folders gt Symantec ESM gt Technical gt Policy Compliance gt Violation Counts Violations by manager query This query retrieves information about policy violations on selected managers You select a policy with its related modules and any or all managers and domains The number of violations and severity levels are shown as a table Default path Public Folders gt Symantec ESM gt Technical gt Policy Compliance gt Violation Counts About Symantec ESM Reports 173 About th
99. Select the database server Symantec ESM Reporting uses the Symantec ESM Reporting database to store information from the Symantec ESM Reporting Database Link computers Symantec Enterprise Reporting uses the Symantec Enterprise Reporting database to store report information Select the user accounts passwords and role groups for the Symantec ESM Reporting database and the Symantec Enterprise Reporting database Select the URL user account and password for the database connection Determine the type and number of required computers Planning for the Symantec ESM Reporting Database Link Use the following task list to plan for the Symantec ESM Reporting Database Link installation Select a compatible JDBC Driver for the database server For IBM DB2 7 2 you must specify the Java 1 2 Driver See the JDBC Driver documentation Select the Symantec ESM Managers for each Symantec ESM Reporting Database Link You can select one or more Symantec ESM Managers for each Symantec ESM Reporting Database Link Do not select the same Symantec ESM Manager for two or more Symantec ESM Reporting Database Links Determine the type and number of required computers Planning for Symantec Enterprise Reporting Use the following task list to plan for the Symantec Enterprise Reporting installation Select a compatible JDBC Driver for the database server For IBM DB2 7 2 you must specify the Java 1 2 Driver See the JDBC Driver documentation Se
100. TP Web server for Symantec Enterprise Reporting Symantec does not provide a Web server for Symantec Enterprise Reporting You can download the latest Web server binary from the Apache HTTP Server Web site at http httpd apache org download cgi Note The Apache HTTP Web server uses port 80 by default If the computer on which you are installing the Apache Web server is already using port 80 for another application you must manually change the Apache HTTP Web server to use a different port number For example port 8000 or port 8080 To install the Apache HTTP server for Symantec Enterprise Reporting See To install the Apache HTTP Web server for Symantec Enterprise Reporting on page 56 To configure the Apache HTTP server for Symantec Enterprise Reporting 1 On the computer on which you installed the Apache HTTP server use a text editor to open the apache group apache2 conf httpd conf file 2 Inthe ScriptAlias section find the following line of text ScriptAlias cgi bin usr local apache group apache2 cgi bin 3 Immediately below this line type the following two lines of text ScriptAlias Enterprise_Reporting cgi bin opt Symantec Enterprise Reporting cgi bin ScriptAlias Enterprise_Reporting cgi bin opt Symantec Enterprise _ Reporting cgi bin 86 Installing Symantec ESM Reporting Installing Symantec ESM Reporting At the end of the httpd conf file type the following lines of text
101. TS 1 Usea text editor to open the sql oracle createESMdb CreateTableSpaces sql script 2 Change the appropriate sections of the script file Make sure the new directories are created in the create_esm_db sh file first To change the name of the ESM database 1 Usea text editor to open the sql oracle create_esm_db sh file 2 Change create_esm_db sh to the specified name for example MyESMDatabase Example 1 To change the location of the control files to myNewControlFilesLocation 1 Usea text editor to open the sql oracle createESMdb init file 2 Find the line of text containing control01 ctl 3 Change the location from ORACLE_BASE oradata ORACLE_SID control01 ctl to myNewControlFilesLocation control01 ctl 4 Make the same change for control02 ctl and control03 ctl 5 The modified line of text should read as follows control_files myNewControlFilesLocation control01 ctl myNewControlFilesLocation control01 ct2 myNewControlFilesLocation control03 ctl1 Symantec ESM Reporting installation scripts 289 About the installation scripts for Oracle Example 2 To change the location of the database file system to oradata myTestDatabase 1 Usea text editor to open the sql oracle createESMdb CreateDB sq file 2 Change the line containing DATAFILE SORACLE_BASE oradata ORACLE_SID SYSTEM01 DBF to DATAFILE oradata myTestDatabase system01 dbf Example 3 To change the location of the
102. UNT table of the Symantec ESM Reporting database to the USER_NAME field in the ACCOUNT_MAPPING table The USER_NAME field in the ACCOUNT_MAPPING table is the same as the authentication user name of the user account for Symantec Enterprise Reporting The USER_NAME field of the ACCOUNT table is the user name for the Symantec ESM account To map user names 1 Create an account for Symantec Enterprise Reporting using LDAP or another authentication server See vendor documentation for instructions on creating user accounts with authentication servers 2 Use the following SQL command as a template to map the Symantec Enterprise Reporting name to the authentication server user name This SQL command would take the ESM user name of jon_smith and map it to an authentication server user name of JON SMITH INSERT INTO ESMDB10 ACCOUNT_MAPPING USER_NAME ACCOUNT_ID VALUES JON SMITH SELECT ACCOUNT ACCOUNT_ID FROM ESMDB10 ACCOUNT WHERE ACCOUNT USER_NAME jon_smith More than one authentication server user name may be mapped to a single Symantec ESM user name To map a Symantec ESM account regardless of manager to the same Symantec Enterprise Reporting user account Use the following SQL command as a template to map the accounts INSERT INTO ESMDB10 ACCOUNT_MAPPING USER_NAME ACCOUNT_ID SELECT lt Symantec Enterprise Reporting user name gt ACCOUNT_ID FROM ESMDB10 ACCOUNT A WHERE A USER_NAME lt Symant
103. UT_KEY A boolean integer that identifies whether the Symantec ESM account is locked out ACTIVE_KEY A boolean integer that identifies whether the Symantec ESM account is active POLICY_ID An hexadecimal string that uniquely identifies the specific policy DOMIAIN_ID An hexadecimal string that uniquely identifies the specific domain MANAGER ID An hexadecimal string that uniquely identifies the specific manager Table B 9 Audit About the Symantec ESM Reporting metadata model 185 Structure of data items Path Administration Audit Data item Finish time The system time of the end of a specific audit Start time The system time of the start of a specific audit Job ID A character string that identifies a specific audit Run state True false value that identifies the current state of the policy run including complete running stopped reporting errors and other policy run states Audit status True false value that identifies whether the policy run completed without errors Account username A unique character string that identifies the username of a specific Symantec ESM account Policy A unique character string that identifies a specific Symantec ESM Policy for a manager Module A unique character string that identifies a specific Symantec ESM Module Manager A unique character string that identifies a specific Symantec ESM Manager Domain A unique c
104. Where possible use IBM DB2 8 1 for Symantec ESM Reporting IBM DB2 8 1 requires less administrative overhead and has better performance than IBM DB2 7 2 34 Before you Install Symantec ESM Reporting System requirements Before you install Symantec ESM Reporting Database Link ensure that the computers on which you plan to install Symantec ESM Reporting Database Link components meet the minimum requirements in Table 2 3 Table 2 3 Symantec ESM Reporting Database Link system requirements Hardware m 1 GHz processor m 1GBRAM m 77 MB free disk space Server operating m Windows 2003 Server system m Windows 2000 Professional Server or Advanced Server with Service Pack 3 0 or higher m Sun Solaris v2 7 through 2 9 m HP UX v11 through 11i m IBM AIX v5 1 through 5 2 Databases m Oracle 9i m Microsoft SQL Server 2000 m IBM DB2 v7 2 or 8 1 Table 2 3 Database driver Before you Install Symantec ESM Reporting System requirements Symantec ESM Reporting Database Link system requirements Oracle m Oracle 1 4 JDBC driver Download this driver from http www oracle com Symantec Enterprise Reporting does not function correctly with earlier versions of this driver Microsoft SQL Server m Microsoft SQL Server requires a fully supported JDBC 2 x driver The computers on which you are installing the Symantec ESM Reporting Database Link must use third party JDBC Drivers for the Microsoft SQL Server
105. _PATH SQL_DIALECT The SQL_ DIALECT is used to customize the Reporting Database Link for the specific SQL syntax that is used by each database If this variable is left blank the Reporting Database Link will attempt to determine the correct dialect to use For the three supported databases the correct dialects are DB2 net sf hibernate dialect DB2Dialect ORACLE net sf hibernate dialect Oracle9Dialect SQL SERVER 2000 net sf hibernate dialect SQLServerDialect DB2 example SQL_DIALECT net sf hibernate dialect DB2Dialect 94 Installing Symantec ESM Reporting Installing Symantec ESM Reporting Table 3 3 Properties file values DB_URL Connection information for DB2 8 1 example the database URL formats DB_URL jdbc db2 ESM are normally m DB2 7 2 or 8 1 jdbc db2 lt db_name gt m ORACLE 9i jdbc oracle thin lt host gt lt port gt lt db_name gt m SQLSERVER 2000 Microsoft JDBC Driver jdbc microsoft sqlserver lt host gt lt port gt lt instance_name gt SelectMethod Cursor DatabaseName lt db_name gt where lt instance_name gt may be omitted for the default instance and lt port gt may be omitted for the default port DB_USER Provide the user name and DB_USER ESM_DB_LINK_ DB PASSWORD password of a database user USER account with insert update DB_PASSWORD lt password gt and delete rights to all of the ESM tables in the database The user
106. _str_map table Audit_ID CHAR 32 Holds a unique character string that Primary key identifies a specific audit Foreign key Locale_ID CHAR 32 Holds a string of fixed length 32 Primary key characters that identifies which language Foreign key Symantec ESM is using String value NVARCHAR 2000 Holds a string that can include multi byte unicode characters for international use About the Symantec ESM Reporting database schema 239 Tables in the database schema Table C 15 Audit_State table Policy_ID CHAR 32 Holds the unique character string Primary key that identifies the Symantec ESM Policy Foreign key Audit_date DATETIME Holds the date and time of the latest audit for a policy or agent Audit_successful SMALLINT Boolean that identifies whether the policy completed without errors Full_policy_run SMALLINT Boolean that identifies whether the policy run was a full policy run Audit_ID CHAR 32 Holds a unique character string that Foreign key identifies a specific audit Agent_ID CHAR 32 Holds a character string that Primary key identifies the name of the Symantec ESM Agent Foreign key host computer Table C 16 Category table Category_ID INTEGER Holds an integer that identifies the Primary key category Link this field to the String Code field in the Content_String_Map table to identify the categories Parent_Category_ID INTEGER Holds an int
107. a column about account privileges without first removing the columns about policies and messages Policies and messages are data items pertaining to security and account privileges is a data item that relates to administration Attempting to mix unrelated data types in a query results in meaningless reports and can generate errors Additionally some columns that you can use in a query are meaningless unless they are grouped according to data that is in another column For example if you put a column in a query that displays manager information and then put in a column that has data on user permissions the query has little value unless you put in a column that has information on user accounts Running Symantec ESM Reporting 139 About using queries Some examples of data items that have these types of dependencies include data items that display information about user permissions agent properties suppression information change events message information agent counts compliance percentages severity counts violation counts and parameters Note Symantec ESM Reports has two data items in the metadata model that may not contain any information The Asset Tag and Description data items under Agent in the Administration folder are not supported in Symantec ESM 6 1 but may be supported in future versions You can use an SQL tool to add information to these two fields in the Database In the Query Studio tool the query subjects conta
108. a option Toimport the necessary data into the ESM and SER databases that you manually created click Import Data and then click Next If you select this option the installer skips steps 7 through 13 and prompts you to choose the type of database in which to store your Symantec ESM Reporting data Go to step 14 m If you intend to manually create the ESM and SER databases but have not yet done so click Cancel Symantec provides scripts that let you manually create the ESM and SER databases You can find the scripts on the Symantec Enterprise Security Manager ESM 6 1 Reporting Windows CD in the SQL directory You can change the scripts to customize the databases for your organization Note After clicking Next if you want to select a different database option you must cancel the Symantec ESM Reporting Database Foundation installation and start over On the Choose panel do one of the following tasks m Select the db2cmd exe file to use in the list and then click Next m To select another file path click Choose Other and then click Choose In the Please Select db2cmd exe File dialog box select the desired db2cmd exe file click Open and then click Next 44 Installing Symantec ESM Reporting Installing Symantec ESM Reporting 8 10 11 12 On the Database s to Create panel do one of the following tasks m To create the Symantec ESM Reporting database and the Symantec Enterprise Reporting database click C
109. able before you start installing the Symantec ESM Reporting Database Link To set the LD_LIBRARY_PATH variable use the export sh bash ksh or setenv csh commands For example if the IBM DB2 runtime client is in the opt IBM db2 V8 1 directory and the user session uses a sh shell to set the LD_LIBRARY_PATH variable do the following at the system command prompt m type LD_LIBRARY_PATH LD_LIBRARY_PATH opt IBM db2 V8 1 lib m type export LD_LIBRARY_PATH Before you Install Symantec ESM Reporting 39 System requirements On HP UX computers on which you are installing the Symantec ESM Reporting Database Link you must mount the CD using pfs The Symantec ESM Reporting CD file names use Rock Ridge Extensions To mount the CD using pfs m Adda line of text to the etc pfs_fstab file in the following format device_file mount_point filesystem_type translation method For example type dev dsk cOt0d0 sd_cdrom pfs rrip xlat unix 0 m Open a UNIX shell m Start the pfs daemons nohup usr sbin pfs_ mountd amp nohup usr sbin pfsd amp Mount the Symantec ESM Reporting installation CD by typing pfs_mount cdrom m After you finish installing the Symantec ESM Reporting Database Link unmount the CD by typing pfs_umount cdrom On Solaris computers on which you are installing the Symantec ESM Reporting Database Foundation the account that you are using to run the installer must have permission to write to the var opt or
110. abling trending 148 ensuring network connectivity 28 Enterprise Reporting configure HTTP Web server 54 68 85 configure run time client 84 configuring environment variables 83 configuring post installation 98 connect 7 2 run time client 53 connecting 8 1 run time client 52 install HTTP Web server 56 70 installing 55 69 86 installing 7 2 run time client 53 installing 8 1 run time client 52 installing HTTP Web server 85 installing run time client 84 test 7 2 run time client 53 testing 8 1 run time client 52 testing run time client 84 uninstalling 104 Enterprise Reporting database configuring 57 70 88 start ReportNet Service 88 error logs 121 ESM and SER databases create manually for IBM DB2 46 create manually for MS SQL 65 create manually for Oracle 79 for IBM DB2 42 for MS SQL 62 for Oracle 75 exporting report information 134 F finding reports 131 formatting queries 142 G GUI 126 H how it works Symantec ESM Reporting 22 HTTP Web server configuring for Enterprise Reporting 54 68 85 configuring for LDAP authentication 58 71 89 configuring post installation 99 installing for Enterprise Reporting 56 70 85 IBM DB2 create ESM and SER databases 42 installing Database Foundation 42 installing Database Link 49 installing Reports Package 60 manually create ESM and SER databases 46 testing Reports Package 61 information where to get more 22 insertable objects 146 install Enterprise Reporting 55 69
111. account must also have select rights to all ESM views in the database Table 3 3 Properties file values Installing Symantec ESM Reporting 95 Installing Symantec ESM Reporting ESM_CONNECTION_ MANAGER _COUNT ESM_HOST_1 ESM_PORT_1 ESM_USER_1 ESM_PASSWORD_ 1 Specify multiple managers by having each manager use the next higher number than the previous manager in its variable names You must provide the manager system name resolvable by DNS and the port number The Reporting Database Link uses the same port number as the ESM console to connect to the manager The default port number is 5600 You must also provide the user name and password of a manager user account with Manage user rights and read access rights to all domains and policies If you wanted to specify a second manager you must provide the connection information for that manager You can continue to add managers by incrementing the number each time and setting the ESM_CONNECTION_MANAG ER_COUNT to the total number of managers For example connecting the Reporting Database Link to two managers ESM_CONNECTION_ MANAGER _COUNT 2 ESM_HOST_1 computer1 ESM_PORT_1 5600 ESM_USER_1 user1 ESM_PASSWORD_1 password1 ESM_HOST_2 computer2 ESM_PORT_2 5600 ESM_USER_2 user2 ESM_PASSWORD_2 password2 Warning For the USER_INSTALL _DIR value if you specify the ESM directory uninstalling Symantec ESM will remove the Symantec
112. ace TSN_SYS_SERCS The file name is C SERDATA CNT_SYS_SERCS m Tablespace TSN_USER_SERCS The file name is C SERDATA CNT_USER_SERCS About the connection scripts for IBM DB2 On the Symantec ESM Reporting Windows CD in the sql db2 folder Symantec provides the catalog_esm_db bat and catalog_ser_db bat files for only IBM DB2 v8 1 You can use the bat files to connect the run time client to the Symantec ESM Reporting Database Link and Symantec Enterprise Reporting The sql scripts are in the sql db2 runtime folder You can use a text editor to do the following tasks m Change the catalog_esm_db bat file and specify a different name for the ESM database m Change the catalog ser_db bat file and specify a different name for the SER database Symantec ESM Reporting installation scripts 285 About the installation scripts for Microsoft SQL Server About the installation scripts for Microsoft SQL Server On the Symantec ESM Reporting Windows CD in the sql sqlserver folder Symantec provides the create_esm_db bat file You can use this bat file to execute the sql scripts that create the ESM database The sql scripts are in the sql sqlserver createESMdb folder Note If you use the Database Foundation installer to create the ESM database the installer creates the data file for the database in the lt database_name gt Data folder By default the Database Foundation installer creates the ESM database in the C ESMDATA folder Dur
113. acle oratab file On Solaris computers on which you are installing the Symantec ESM Reporting Database Foundation the Oracle database server must have created at least one database before running the Database Foundation installer The installer will report an error if the listener ora or tnsnames ora files are missing On Solaris computers on which you are installing Symantec Enterprise Reporting you must define ORACLE_HOME before running the Symantec Enterprise Reporting installer On Solaris computers on which you are installing Symantec Enterprise Reporting ensure there is adequate disk space for the components 40 Before you Install Symantec ESM Reporting System requirements Installing Symantec ESM Reporting Installing Symantec ESM Reporting Post installation tasks Installing Symantec ESM Reporting Before you install Symantec ESM Reporting do the following tasks Install or upgrade to Symantec ESM 6 0 or 5 5 If this is a new installation run several Symantec ESM policies Install or select an IBM DB2 Oracle or Microsoft SQL Server MS SQL database server for the Symantec ESM Reporting database and the Symantec Enterprise Reporting database m Solaris computers on which you install an Oracle database server must install a Web server before installing Symantec Enterprise Reporting You can download the Apache HTTP Web server from the Apache Web site at http www apache org m Windows computers on which you
114. age 42 At the system command prompt change to the Symantec ESM Reporting Windows CD Change to the sql db2 createESMdb folder Type post_install Note If you changed the name of the ESM database in the installation scripts you must change the name of the ESM database in the post_install cmd script Restart the host computer system Installing Symantec ESM Reporting 47 Installing Symantec ESM Reporting Installing the Symantec ESM Reporting Database Link for IBM DB2 The installation process includes the following tasks m Install connect and test the IBM DB2 run time client for the Symantec ESM Reporting Database Link m Install the Symantec ESM Reporting Database Link for IBM DB2 Install connect and test the IBM DB2 run time client for the Symantec ESM Reporting Database Link Symantec does not provide a run time client for the IBM DB2 database server You can download the IBM DB2 Run Time Client from the IBM DB2 Web site at http www ibm com software data db2 udb support html To install the IBM DB2 8 1 run time client for the Symantec ESM Reporting Database Link 1 On the computer on which you are installing the Symantec ESM Reporting Database Link double click the IBM DB2 Run Time Client installation file 2 On the Welcome to the DB2 Setup wizard panel click Next 3 Onthe License Agreement panel click I accept the terms in the license agreement and then click Next 4 On the Select the installa
115. ame of the Symantec ESM Agent host computer MESSAGE _ID An integer that identifies a message CATEGORY_ID An integer that identifies the category MODULE_ID A character or numeric string that identifies a specific Symantec ESM module 202 About the Symantec ESM Reporting metadata model Structure of data items Table B 27 Path Message Information Change Event Filters Data item Change Events occurred today Predefined filter that limits the displayed data Event Filters to events that occurred on the current day Events occurred in last Filter that limits the displayed data to events n days that occurred within the number of days that you specify Events occurred Filter that limits the displayed data to events between these dates that occurred between two dates that you specify Suppressed events only Predefined filter that limits the displayed data to suppressed change event messages Events in user defined Predefined filter that limits the displayed data domains only to change event messages that were generated by agents that are in user defined domains About the Symantec ESM Reporting metadata model 203 Structure of data items Message Summaries folder structure The following data items are included in the Message Summaries folder Table B 28 Path Message Summaries Agent Summaries Data item Agent Policy A unique character string that identifies a Summaries spec
116. an Oracle database the Symantec ESM Reporting Database Link uninstaller cannot remove the default Symantec ESM Reporting Database Link installation directory or the JRE directory with its bin and lib directories You must manually remove these directories after the uninstaller finishes Uninstall the Symantec ESM Reporting Database Link Uninstalling the Symantec ESM Reporting Database Link consists of the following tasks m Starting the Symantec ESM Reporting Database Link uninstaller on Windows or UNIX computers m Uninstalling the Symantec ESM Reporting Database Link To start the Symantec ESM Reporting Database Link uninstaller ona Windows computer 1 Click Start gt Settings gt Control Panel 2 Double click Add Remove Programs 3 Click Symantec ESM Reporting Database Link 4 Click Change Remove 104 Installing Symantec ESM Reporting Post installation tasks To start the Symantec ESM Reporting Database Link uninstaller on a UNIX computer 1 At the system command line change to the opt Symantec ESM Reporting Database_Link Uninstall Symantec ESM Reporting Database Link directory 2 Type Uninstall_Symantec_ESM_Reporting_Database_Link To uninstall the Symantec ESM Reporting Database Link 1 On the Introduction panel click Uninstall 2 On the Uninstall Complete panel do one of the following tasks m For UNIX computers click Done m For Windows computers click Yes restart my system and then click Done
117. and printers from this tool Capabilities Lets you administer the features and permissions for the reporting tools such as Report Studio 128 Running Symantec ESM Reporting About reports Table 5 1 Symantec ESM Reporting administration tools Schedule Management Lets you schedule report runs and view the history of reports that have been previously scheduled See Scheduling reports on page 133 Server Administration Lets you optimize your reporting servers for best performance Use this tool to do load balancing view the status of services and a host of other functions Deployment Lets you import and export data between your reporting servers Note Table 5 1 is a quick reference to the administration tools For detailed descriptions and step procedures see the online Help or the Administration and Security Guide on the CD in the Docs Symantec Enterprise Reporting directory About reports Symantec Enterprise Reporting is an application that allows you to create reports and organize data dynamically Symantec Enterprise Reporting lets you select associate and filter columns for the data that you want contained in the report as well as arrange the graphic display of the reports Symantec ESM has several customizable reports and queries that let you view and present information about any aspect of your Symantec ESM application Because the reports are Web based you can create reports from any
118. ange events m Message information m Agent counts m Compliance percentages m Severity counts m Violation counts m Parameters For example if you create a query including columns of data about the Managers Policies and Messages you cannot add a column about Account Privileges without first removing the columns about Policies and Messages This is because Policies and Messages are data items that relate to security and Account Privileges is a data item that relates to Administration Mixing unrelated data items in a query can result in meaningless reports and can generate cross join errors Note The Symantec ESM Reports metadata model has two data items that may not contain any information The Asset Tag and Description data items under Agent in the Administration folder are not supported in Symantec ESM 6 1 but may be supported in future versions You can use an SQL tool to add information to these two fields in the database About the Symantec ESM Reporting metadata model 181 Descriptions of data items Descriptions of data items Data objects in the Symantec ESM Reporting metadata model are classified as query subjects information objects facts or filters Table B 2 lists the different types of data items and descriptions of each type Table B 2 Different types of data items Query subjects Query subjects represent tables in the database They generally hold information objects Information objects Inf
119. ange to the sql db2 runtime folder Type catalog_esm_db lt host_computer_name gt ESM 50000 Type catalog_ser_db lt host_computer_name gt ESM 50000 Note If you changed the name of the ESM or SER database in the installation scripts you must change the name of the ESM or SER database in the catalog_esm_db or catalog_ser_db scripts To test the IBM DB2 8 1 run time client connection for Symantec Enterprise Reporting On the computer on which you are installing Symantec Enterprise Reporting test the IBM DB2 8 1 run time client connection The process is the same as testing the IBM DB2 8 1 run time client connection for the Symantec ESM Reporting Database Link except for the following changes m At the DB2 command prompt type CONNECT TO lt database alias name gt AS USER lt database user name gt For example CONNECT TO ESM as USER ESM_REPORT_USER m At the DB2 command prompt type CONNECT TO lt database alias name gt AS USER lt database user name gt For example CONNECT TO SER as USER ESM_CM_USER See To test the IBM DB2 8 1 run time client connection for the Symantec ESM Reporting Database Link on page 48 Installing Symantec ESM Reporting Installing Symantec ESM Reporting To install the IBM DB2 7 2 run time client for Symantec Enterprise Reporting On the computer on which you are installing the Symantec ESM Reporting Database Link access the IBM DB2 7 2 installation CD select the run time client installatio
120. annot access Symantec Enterprise Reporting until you create an administrator account See Manually assigning user account permissions using SQL commands on page 116 To disable anonymous access 1 Open the ESM Reporting Configuration tool See the Configuration User Guide for more information on using this application 2 Inthe left pane click to Security gt Authentication gt Cognos 3 Inthe Allow Anonymous Access field click False In addition to disabling anonymous access to your Web server in order to enforce permissions for legitimate users you need to delete the anonymous access account entry in the RPT_ALL_MGR_PERM table of the database If you disabled anonymous access during installation you must delete the anonymous account rows from the database to enforce user permissions If you do not remove this from the database anonymous user accounts will have access to all data in the database To delete the anonymous access account information from the database Use the following SQL command DELETE FROM ESMDB10 RPT_ALL_MGR_PERM WHERE USER_NAME Anonymous Securing Symantec ESM Reporting 115 About user account permissions Assigning user account permissions using the Symantec ESM Reporting Database Link The synchronization feature of Symantec ESM Reporting imports permissions from Symantec ESM To use this feature you must map the account user names in the USER_NAME field of the ACCO
121. ant to summarize Click Summarize in the menu on the left of your screen From the Summary for Footers drop down menu click Count Click OK Adding charts to a query You can add charts and graphs any query that has is quantified using a fact as a data item in the query The Query Studio has more than 25 charts and graphs that you can use to display your data Note Charts are unavailable in queries that do not contain at least one fact as a data item Note Because charts use default colors using a chart to display information on red yellow and green agents may be misleading For example unless you place the columns in exact order the bar in a bar chart that displays the number of green agents may be colored red To solve this issue rearrange the order of the columns in the report until the chart colors correspond to data type 144 Running Symantec ESM Reporting About Report Studio To add a chart to a query Create a query that uses a fact or other measured data item In the menu on the upper left side of the screen click Change Layout Click Chart in the menu on the left of your screen In the Chart Type menu select the chart category that you want Click the radio button that corresponds to the chart style that you want Click OK O uo A W NY e About custom groups in queries You can create custom groups to produce a new report item containing values that are meaningful to you Use custom groups
122. antec ESM Reporting database schema Database Views CAT_AGENT_TREND This view represents historical message trend metrics for specific agents Table C 60 CAT_AGENT_TREND Se Se SS POLICY_ID CHARACTER 32 No AGENT_ID CHARACTER 32 No AUDIT_DATETIME TIMESTAMP 10 No AUDIT_DATE DATE 4 No SEVERITY_ID SMALLINT 2 No MODULE_ID INTEGER 4 No MESSAGES INTEGER 4 Yes SUPPR_MESSAGES INTEGER 4 Yes UNIQUE_MESSAGES INTEGER 4 Yes UNIQUE_SUPPR_MSGS INTEGER 4 Yes UNIQUE_PSBL_MSGS INTEGER 4 Yes GROUPED_AGENTS INTEGER 4 Yes RUN_AGENTS INTEGER 4 Yes CAT_DOMAIN_TREND This view represents message trend metrics for domains Each domain represents a single domain on a specific Symantec ESM Manager To get metrics for domains that span managers you must join this table on a query which selects all appropriate domains Table C 61 CAT_DOMAIN_TREND ee a ee ere POLICY_ID CHARACTER 32 No DOMAIN_ID CHARACTER 32 No AUDIT_DATETIME TIMESTAMP 10 No AUDIT_DATE DATE 4 No SEVERITY_ID SMALLINT 2 No Table C 61 CAT_DOMAIN_TREND About the Symantec ESM Reporting database schema Database Views MODULE_ID INTEGER No MESSAGES INTEGER Yes SUPPR_MESSAGES INTEGER Yes UNIQUE_MESSAGES INTEGER Yes UNIQUE_SUPPR_MSGS INTEGER Yes UNIQUE_PSBL_MSGS INTEGER Yes GROUPED_AGENTS INTEGER Yes RUN_AGENTS INTEGER Yes 261 262 About the Symantec ESM Reporting database
123. asks m Inthe Name text box type SER m Inthe Type list box click Microsoft SQL Server database 4 Click OK 5 Inthe right pane SER Database Resource Properties click the Value text box for the User ID and password and then click the pencil icon to the right of the Value text box 6 Inthe Enter the user ID and password dialog box do the following tasks m Inthe User ID text box type ESM_CM_USER m Inthe Password text box type the password of the ESM_CM_USER account m Inthe Confirm password text box type the password of the ESM_CM_USER account 7 Click OK 8 Inthe right pane SER Database Resource Properties in the Value text box for the Database name type SER Installing Symantec ESM Reporting 71 Installing Symantec ESM Reporting 9 Click the Save configuration icon on the toolbar 10 Click Close 11 Click the Start icon on the toolbar 12 Click Close 13 Close the Enterprise Reporting Configuration utility Configure the installed Apache HTTP Web server for LDAP authentication Ifyou are using LDAP to authenticate users for Symantec Enterprise Reporting you must manually configure the LDAP server for Symantec Enterprise Reporting To configure the installed Apache HTTP Web server for LDAP authentication See Configure the installed Apache HTTP Web server for LDAP authentication on page 58 To enable LDAP name space authentication for Symantec Enterprise Reporting See To enable L
124. at acts as a server for other central processing units 4 You May use the Software to assess no more than the number of Network machines set forth under a License Module Network means a system comprised of multiple machines each of which can be assessed over the same network B If the Software you have licensed includes Report Studio You may use the single 1 user license of Report Studio that is received with the Software only Additional Report Studio licenses must be purchased separately Contents Technical support Chapter 1 Chapter 2 Chapter 3 Introducing Symantec Enterprise Security Manager Reporting About Symantec ESM Reporting 0 0 cccccesssesseseseeseseeseseseeeeseeeeeeseeeeseseseeseeeees 17 About Symantec Enterprise Reporting cecccesesceceseseecesceeeeeeeeeseeeeeeseenees 18 Components of Symantec ESM Reporting cecesesesesesesesesesesetseseeeeeeesesenees 19 What you can do with Symantec ESM Reporting cccceceseeseeeseeseeeseeeees 20 How Symantec ESM Reporting works cccccssssesesceseseeeeseseseeseeeseeeseteeeeeeaes 22 Where to get more information ccccscssssssesssesesesesessesssesseesesesesesesesseeseeeeees 22 Before you Install Symantec ESM Reporting Before you install Symantec ESM Reporting ccceeseseeseseseseseeeeseseeseesesees 23 About the Database Foundation installer oe ee eeseeeseeteeeeeeeeeeeeees 24 About the Database Link installer 0
125. ata as both a chart and a table Note In this report when reporting on all modules agent counts for the All Modules row may not appear to correlate with the agent count in the individual modules The reason for this is that the All Modules row assesses the overall security level of the agents while the individual module rows assess the security level of each agent in regard to a single module only Default path Public Folders gt Symantec ESM gt Technical gt Policy Compliance gt Agent Level Agent level by manager query This query lists agent security levels for agents that are examined by specific managers It lets you select a policy with any or all related modules along with any or all managers and domains It then shows you the number of agents at every security level on the selected managers Default path Public Folders gt Symantec ESM gt Technical gt Policy Compliance gt Agent Level 160 About Symantec ESM Reports About the reports in Symantec ESM Reporting Agent properties query This query displays the properties of each agent on every manager in your database The properties columns that this query shows include Platform Symantec ESM Version SU Version OS Agent Name Port Protocol Description and Asset Tag Default path Public Folders gt Symantec ESM gt Technical gt Administration gt Agents Agent summaries query Use this query as a template to create your own custom querie
126. atabase Link you must complete the following tasks m Run the Database Foundation installer to create the Symantec ESM Reporting databases m Obtain the name and password of an account on the database server to which the Symantec ESM Reporting Database Link will send data The database account must have rights to read and write to all of the tables and views in the database If you run the Database Foundation installer or the manual installation scripts the ESM_DB_LINK_USER account will be created for you m Obtain the name and password of an account on each Symantec ESM Manager from which the Symantec ESM Reporting Database Link will send data The manager account must have manage user rights and read only access rights to all domains and policies About the Symantec Enterprise Reporting installer Symantec Enterprise Reporting includes the following components m Report Server the report engine that renders reports m Gateway the component that installs on the Web server computer m Content Manager the component that communicates with the Symantec Enterprise Reporting database m Web Server the component that hosts Symantec Enterprise Reporting You can install all of the Symantec Enterprise Reporting components on a single computer For more complex configurations install the components on separate computers To scale for larger deployments you may need to install the same components on more than one computer For more in
127. ated at the following path before you install the Symantec ESM Reporting applications C Program Files SQLLIB java12 usejdbc2 bat The path may vary if you did not use the default DB2 installation path If you installed DB2 7 x at the default location the correct driver is available at the following path C Program Files SQLLIB java db2java zip m For this driver you must include the following string in the library path during the installations of both the Symantec ESM Reporting Database Link and Symantec Enterprise Reporting C Program Files SQLLIB BIN The path may vary if you did not use the default installation path for the DB2 installation Table 2 2 Before you Install Symantec ESM Reporting 33 System requirements Symantec Enterprise Reporting system requirements Web server m Microsoft IIS on Windows m iPlanet on Solaris m Apache on Windows or Solaris Web browser Symantec Enterprise Reporting and Report Viewer m Internet Explorer 6 SP1 m Internet Explorer 5 5 SP2 m Netscape 7 1 Query Studio m Internet Explorer 6 SP1 m Internet Explorer 5 5 SP2 m Netscape 7 1 Report Studio m Internet Explorer 6 SP1 m Internet Explorer 5 5 SP2 Note When you use Type 2 JDBC drivers with dll files or shared libraries you must include the path to the shared files in the library path steps in the installations of the Symantec ESM Reporting Database Link and Symantec Enterprise Reporting
128. ategory drop down menu select Text 5 In the Number of Visible Characters field type the number of characters that you want to see 6 Click OK You can sort columns in queries in ascending or descending order The columns that are to the right of the sorted column change in accordance with the sort To sort columns in a query 1 Click Edit Data from the menu on the upper left of the screen 2 Click on the heading of the column that you want to sort 3 Click Sort from the menu on the left of your screen 4 5 Running Symantec ESM Reporting 143 Using defined queries Under Sort Order click the radio button that corresponds to the type of sort that you want Click OK Summarize queries When you summarize queries Symantec Enterprise Reporting displays counts of items in a column that has subordinate columns Summarizing a query is a good way to quickly quantify it For example if you had a report that displayed a column for managers then domains then agents and showed the number of red messages on each agent you could summarize the report It would then display the numbers of red messages on the domains and managers as well For a complete explanation of summarizing queries see the Query Studio User Guide on the CD in the Docs Symantec Enterprise Reporting directory To summarize a report 1 2 3 4 5 Click Edit Data from the menu on the upper left of the screen Click on the heading of the column that you w
129. ation scripts 287 About the installation scripts for Oracle About the installation scripts for Oracle When you run the Database Foundation installer and select the Default Oracle option the installer creates two databases By default ESM is the name of the Symantec ESM Reporting database and SER is the name of the Symantec Enterprise Reporting database If you use the Database Foundation installer to create the ESM database the installer creates the data files control files and tablespaces in ORACLE_BASE oradata ORACLE_SID The installer associates the following files with the ESM database Control files control01 ctl control02 ctl and control03 ctl m Database system file system01 dbf m Database temporary tablespace temp01 dbf m Database undo tablespace undotbs01 dbf m Database Log files redo01 log group 1 redo02 log group 2 and redo03 log group 3 The installer associates the following tablespaces and files m Tablespace ESM 32K IDX TS This tablespace is used for indexes The file name is esmidx01 dbf m Tablespace ESM 32K USR_TS This tablespace is the user space The file name is esm01 dbf m Tablespace ESM 32K TMP TS This tablespace is the user temporary tablespace The file name is esmtemp01 dbf On the Symantec ESM Reporting Solaris CD Symantec provides the create_esm_db sh shell script The shell script calls sql scripts that you can use to manually create the ESM database The sql scripts for the
130. ations component The agent performs security assessments on its host system and returns the results to the Symantec ESM Manager Agents also store snapshot files of system specific and user account information make user requested corrections to files and update snapshots to match the corrected files In Symantec ESM the manager coordinates the work of its registered agents provides communication between the agents and the user interfaces and stores security data In Symantec ESM the Symantec ESM Console is the graphical user interface GUI that lets users administer managers and agents The Symantec ESM Console receives user input sends audit requests to the managers and formats the resulting security assessment data for displays or reports Symantec ESM Reporting provides the database foundation database link and the reports package that integrates Symantec ESM with Symantec Enterprise Reporting Symantec ESM Reporting lets you dynamically create and present reports on the state of your Symantec ESM Agent computers and on the state of your Symantec ESM application configuration In Symantec ESM Reporting a violation is reported when a policy run returns a message with a red or yellow security level Each message is counted as one violation 296 Glossary A about administration tools 127 auditing 121 categories 269 Database Foundation installer 24 Database Link installer 25 insertable objects 146 printing reports 109
131. c Enterprise Security Manager ESM 6 1 Reporting CD panel in the left pane click Symantec Enterprise Reporting In the right pane do the following tasks m Review the information m Complete the installation prerequisites m Click Execute the Symantec Enterprise Reporting Installer On the Introduction panel click Next On the License Agreement panel click I accept the terms of the License Agreement and then click Next On the Installation Location panel do one of the following tasks m To select the default location click Next m To select another location click Choose In the Browse for Folder dialog box select the desired location click OK and then click Next On the Choose Install Set panel specify the default components and then click Next On the Shortcut Folder panel do the following tasks m Specify the default program folder m Check the Make the shortcuts visible check box if you want the users to see the shortcuts Click Next On the Choose Database Type panel click Oracle and then click Next On the Choose JDBC Driver panel do one of the following tasks m To select a JDBC Driver select the desired driver in the list and then click Next m To select another JDBC Driver click Choose other In the Please Select Your JDBC Driver dialog box select the JDBC Driver and then click Open On the Installation Summary panel click Install Note On Solaris computers the free disk space requirem
132. ce About the Message Summaries folder The Message Summaries folder contains data items that relate to fact items in the metadata model Combine these facts with data items that are in the Message Information section to quantify your queries Fact item columns should be placed in the report after the information objects These data objects are intended to create reports that display the current overall security state of your enterprise The facts let you quantify the security state of your computers to use in reports to executives and managers About the Symantec ESM Reporting metadata model 179 Combinations of data objects Query subject prompts The Query Studio uses prompts with certain query subjects to help you focus your queries to only the information that you need When you use information objects from certain query subjects the Query Studio brings up prompt pages that let you select from the policies modules managers and domains that you want The following table outlines the prompts that are associated with each query subject Table B 1 Query subject prompts ee ee Account permissions manager Agent summaries policy module manager domain Agent trends policy module manager domain Audits policy manager domain Change events policy manager domain Domain trends policy module manager domain Messages policy module manager domain Suppressions policy Note If you create queries from sc
133. cific user User1 select from esmdb10 rpt_all_mgr_perm where user_name User1 Use the following command to view all domain permissions for a specific user User1 select p user_name d domain_name m manager_name from esmdb10 rpt_domain_perm p esmdb10 esm domain d esmdb10 manager m where p domain_id d domain_id and m manager_id d manager_id and p user_name User1 Securing Symantec ESM Reporting 121 About auditing in Symantec ESM Reporting About auditing in Symantec ESM Reporting Symantec Enterprise Reporting uses several logs to let you keep track of events It also has a set of audit reports that display audit events You can look at the logs to see the events for components of Symantec Enterprise Reporting You can also use the logs with the reporting interface to create custom reports Locating logs The following tables show you the default installation location for auditing logs and describe the data in the logs If you install the application in a folder other than the default folder the location of the logs will vary Table 4 7 Reporting interface logs CRNServer log Windows Program Files Symantec Enterprise_Reporting logs UNIX opt Symantec Enterprise_Reporting logs Records events that occur in the Symantec Enterprise Reporting interface localhost_access_ log lt date gt txt Windows Program Files Symantec Enterprise_Reporting logs UNIX opt Symantec Enterprise_R
134. ck Next On the Specify the node options panel in the Operating system list box click Windows and then click Next On the Specify the system options panel click Finish In the Test Connection dialog box on the Connections tab do the following tasks m Inthe User ID text box type ESM_DB_LINK_USER m Inthe Password text box type the ESM_DB_LINK_USER password m Click Test Connection In the Test Connection dialog box on the Results tab verify that the CLI connection was successful Exit from the DB2 Configuration Assistant Install the Symantec ESM Reporting Database Link for IBM DB2 See About the Database Link installer on page 25 To install the Symantec ESM Reporting Database Link for IBM DB2 1 On the computer on which you are installing the Symantec ESM Reporting Database Link access the Symantec ESM Reporting Windows CD If the autorun feature does not start double click setup bat On the Symantec Enterprise Security Manager ESM 6 1 Reporting CD panel in the left pane click Database Link In the right pane do the following tasks m Review the information m Complete the installation prerequisites m Click Execute the Database Link Installer On the Introduction panel click Next On the License Agreement panel click I accept the terms of the License Agreement and then click Next On the Choose Installation Type panel click Initial Installation and then click Next 50 Installing Syman
135. computers using a Microsoft SQL Server database server Installing the Symantec ESM Reporting Database Foundation for MS SQL Server The installation process consists of doing one of the following tasks m Installing the Symantec ESM Reporting Database Foundation for MS SQL m Using SQL scripts to create the databases for MS SQL See About the Database Foundation installer on page 24 Create the ESM and SER databases When you run the Database Foundation installer and select the Default MS SQL Server option the installer creates two databases By default ESM is the name of the Symantec ESM Reporting database and SER is the name of the Symantec Enterprise Reporting database Each database has 2 GB of space If your installation requires larger table spaces Symantec provides SQL scripts that let you manually create the ESM and SER databases You must still use the Database Foundation installer to import the necessary data into the databases See About Symantec ESM Reporting installation scripts on page 281 To install the Symantec ESM Reporting Database Foundation for MS SQL 1 On the computer on which you installed MS SQL access the Symantec ESM Reporting Windows CD If the autorun feature does not start double click setup bat 2 On the Symantec Enterprise Security Manager ESM 6 1 Reporting CD panel in the left pane click Database Foundation 3 Inthe right pane do the following tasks m Review the information
136. cription and asset tag information for agents in the Agent Properties dialog box in the Symantec ESM Console Fields to hold this information are found in the Symantec Enterprise Reporting Database If you do not have this enhancement or you have not entered any agent information these fields are blank and the description and asset tag information objects in the metadata model are blank when you use them in queries or reports Paths to these blank information objects are m Symantec ESM gt Administration gt Manager Domain Agent gt Agent Properties gt Description m Symantec ESM gt Administration gt Manager Domain Agent gt Agent Properties gt Asset Tag If you don t have the Symantec ESM enhancement you can still enter description and asset tag information using SQL commands To add description and asset tag data to the database Doone or more of the following m To update the description field use the following SQL command UPDATE ESMDB10 AGENT SET DESCRIPTION lt My Description gt WHERE AGENT_NAME lt agent name gt m To update the asset tag field use the following SQL command UPDATE ESMDB10 AGENT SET ASSET_TAG lt My asset tag data gt WHERE AGENT_NAME lt agent name gt You can also use an SQL command to verify that the information is correct or you can run a query To verify your data using SQL commands Doone or more of the follo
137. csccssessesssscssescesessessessesesassaeseees About trend reports serno a a a RA ADOULIQUETIES 6 siciseitecateiiilen A I Gaeta ee aed ee Locating reports erario are E E EAE EN Running Reports eene E e E E RE ER Selecting report PLOMPts sasies tonia e E REE Scheduling reports iecenrenerr aeei E E E a A is Exporting report information c cccccceseseseseseesessssssseseseseseeeesssseesescsesesees Emailing reports g icccscaceedhen eein E a E E E E EE E About Query Studi ertene a a ei About using queries 2 2 2 5 3 deaa iiei er SEE NEE EE Planning VOuUr QUEL Y eenei aE EEEE ERE Dataitems einnar nj atten a E O nea ERGE Metadata model divisions 0 ccceeeseseeseseseeseseeceseeeceseeeeeeseeeeseeeeeseeeees Using defined queries snn rennon na ER RRE ERA Add or remove columns in queries Filter QUeries senna nN A RA ANTAR FOrmat Queries ancestor enia a raei N Sort QUETIES erni nre iE a cake wane end VE NEE EEE RA e SUMIMATIZE QUETICS 3 5 5 c cccsevevecscoscseevestoeseeetveceses duces ARE ALEVE Adding charts to a query c ccccccccsecessssesesseeesesseeeseeceeeseesesesenecseseeseseeeaees About custom groups in queries 00 0 eeeseeseseseeceseeeeseseeeeseeeeeeseeeeaeeees About Report Studio 2 sided Sistine EA cid E E Using Report Studi se i steeesteceretiastieewetirnctcacete asieecsesteecaesede Planning your report Opening Report Studio Creating a new report ee eeeeeeeeereeeee Modifying an existing repo
138. csscseesecscesesecsecsecsesscsecsecsecseeecsecsseseesees About HTTP Web server security cccessesessssesesesseceseeeeseeeeseseeetseseeees About user account permissions cccccccscssessescesessessescescescsecseesceeesecseeaeees About anonymous access and administrator accounts cce Assigning user account permissions using the Symantec ESM Reporting Database Link eccesesseseseeeeseeeeseseeeeseseeeeseeeeeeeees Manually assigning user account permissions using SQL commands osoei eine eee EE Ee NE Ea E EEE ai Removing user account permissions sssssssseseeeeesesesteserssssseserensrereset Viewing current user permissions ss ssesssssserereseseeeseesesssestsrsrsesesee About auditing in Symantec ESM Reporting s ssssesessssesesesreseseseesesesereesese Locating 108 oenen aE rE E TEE N N TERERAA Using audit reports s sesesesesessesessssestseststseseseseseeseseserstseseessssrsteseneseses Running Symantec ESM Reporting About the user interface 0 0 cesesesssssssssesesssesesesssssssssesesessesesesssssssesesenseees Opening the user interface ccceesesesssesesesesseseseseceeesesesesssesssseeseeseseseseseseees Customizing the user interface 0 cccssssssesssesssesesesesstsessseeeessesesesesseeeees About the administration tools ccccecsssseseeseseseeseceseeeeseeeesesenseseeesseseeees Contents Aout TE POPS TENE VEVET EE VAERE REEN About state reports oo cccccccsssssscsscesessss
139. d then select a date range The report displays a trend chart that shows policy violations for all agents that are examined by the selected manager and domain The report also displays data as a table Default path Public Folders gt Symantec ESM gt Technical gt Policy Compliance gt Violation Counts Yearly agent level trend by line of business This report shows yearly agent security level trends for a selected manager and domain You select a policy with a related module on any manager and domain in your enterprise After you select a date range the report displays a trend chart that shows the number of agents for that manager and domain that are at each security level either red yellow or green for the selected policy and its related module The report displays data as both a chart and a table Default path Public Folders gt Symantec ESM gt Executive gt Policy Compliance gt Agent Level Yearly agent level trend by manager This report shows yearly agent security level trends for a selected manager You select a policy with a related module on any manager and domain in your enterprise You then select a date range and the report displays a trend chart that shows the number of agents in the selected domain at each security level red yellow and green for the selected policy and its related module The report also displays the data as a table Default path Public Folders gt Symantec ESM gt Technical gt Policy Co
140. d using these protocols If your Web server does not come configured to use SSL instructions for obtaining SSL and configuring to work with your Web server are readily available on the Internet About user account permissions You can update Symantec ESM Reporting user permissions at any time These user permissions can be entered manually using SQL commands or can be synchronized to implement Symantec ESM user account permissions user rights match in Symantec ESM Reporting Additional SQL commands are necessary to implement this synchronization feature For users that do not have ESM accounts you can add user permissions for LDAP or NTLM accounts and assign appropriate permissions by mapping the LDAP or NTLM to a Symantec ESM account See Assigning user account permissions using the Symantec ESM Reporting Database Link on page 115 Securing Symantec ESM Reporting 111 About user account permissions Table 4 1 displays and explains the four database tables that hold permissions for Symantec ESM Reporting In addition to these permission settings you can use Symantec Enterprise Reporting to control user rights when generating adding editing or deleting reports See the Administration and Security Guide for information on access permissions You can find this guide on the CD in the Docs Symantec Enterprise Reporting directory Table 4 1 Symantec ESM Reporting permissions tables RPT_ALL_MGR_ PERM Has rights to view all da
141. del components Fact A fact is a quantifiable column in a report Examples of __ facts include numbers of messages and numbers of il types and severities of messages Facts should generally be inserted into reports after information objects Filter Filters are convenient and powerful ways of quickly getting to the information that you need When you add Y a filter to a report you get only that information in your report that is specified by the filter For example if you added a filter named Red Msgs Only any columns that you add to your report that have information about messages will only display information about red messages Metadata model divisions The metadata model is divided into three major sections Administration Message Information and Message Summaries Each section is delineated by its own folder Each folder has many query subjects with information objects in it that you can use to build effective queries For a detailed description of each data item see About the Query Studio metadata model on page 177 Data items from one section of the metadata model often do not pertain to other sections Because each section of the model has its own specific purpose combining data items from separate sections of the metadata model can result in errors or meaningless reports For example if you were to take a query that had columns with data about the managers policies and messages you could not add
142. dentifies the level of severity 228 About the Symantec ESM Reporting metadata model Structure of data items Table B 59 Path Message Summaries Trends Category Filters Data item Category All messages Filter that displays all messages Filters Change notification Predefined filter that limits the displayed data to messages in the Change Notification category ESM administrative Predefined filter that limits the displayed data information to messages in the ESM Administrative Information category ESM error Predefined filter that limits the displayed data to messages in the ESM error category ICE Predefined filter that limits the displayed data to messages in the ICE category Patch assessment Predefined filter that limits the displayed data to messages in the Patch assessment category Policy compliance Predefined filter that limits the displayed data to messages in the Change Notification category System error Predefined filter that limits the displayed data to messages in the System Error category System information Predefined filter that limits the displayed data to messages in the System Information category Table B 60 Trend Filters About the Symantec ESM Reporting metadata model Structure of data items Path Message Summaries Trends Trend Filters Data item Agent Latest Audit Predefined filter that limits the displayed data to data that was reported from the
143. dit Severity Displays the security level of the change event either green yellow or red Suppressed True false value that identifies whether information about Symantec ESM compliance has been suppressed Category Displays the category that the change event message falls under Module A unique character string that identifies a specific Symantec ESM Module Policy A unique character string that identifies a specific Symantec ESM Policy for a manager Manager A unique character string that identifies a specific Symantec ESM Manager Domain A unique character string that identifies the Symantec ESM Domain for a manager Agent A unique character string that identifies a specific Symantec ESM Agent on a manager Table B 26 Codes About the Symantec ESM Reporting metadata model 201 Structure of data items Path Message Information Change Events Codes Data item SUPPRESSED_KEY A integer that identifies if the Symantec ESM compliance message can be suppressed by users USER_DEFINED_ KEY Integer that identifies whether the Symantec ESM domain can be defined by the user POLICY_ID The unique character or numeric string that identifies a Symantec ESM policy MANAGER ID The unique character or numeric string that identifies a Symantec ESM Manager DOMAIN_ID A unique character or numeric string that identifies the Symantec ESM domain AGENT_ID A character or numeric string that identifies the n
144. dule table Short_name VARCHAR 32 Holds a string of variable length up to 32 characters that identifies the short name of an ESM Module Primary key Long_name_code NVARCHAR 18 Holds a string of variable length up to 18 characters that identifies the short name of an ESM Module Can include multi byte unicode characters for international use Joined the CONTENT_STRING_MAP table Table C 31 ESM_OS_ Module table OS_module_ID CHAR 32 String that identifies the operating Foreign key systems specific to the modules Platform VARCHAR 32 Holds a string of variable length up to 32 characters that identifies the platform for a specific OS Module Short_name VARCHAR 32 Holds a string of variable length Foreign key up to 32 characters that identifies the short name of an ESM Module Table C 32 Locale_Map table Locale_code VARCHAR 32 Holds a string of variable length up to 32 characters that identifies the language being used Locale_ID CHAR 32 Holds a string of fixed length 32 characters that identifies which language Symantec ESM is using Primary key About the Symantec ESM Reporting database schema 247 Tables in the database schema Table C 33 Manager table Manager_ID CHAR 32 Holds the unique character string Primary key that identifies a Symantec ESM Manager Foreign key Manager_name NVARCHAR 128 Holds the name of th
145. e Symantec ESM Manager Max_agents INTEGER Holds an integer that corresponds to the maximum number of agents per specific manager Last_poll_status VARCHAR 32 Holds data that specifies the state of a manager the last time that the Symantec Reporting Database Link attempted to contact the manager Last_poll_datetime TIMESTAMP Contains the system time for the date of the end of a specific manager poll Table C 34 Manager_Poll_Error table Mgr_poll_error_ID CHAR 32 Code that uniquely identifies Primary key manager poll error string Error_string VARCHAR 256 The message text for manager poll errors Error_datetime TIMESTAMP Contains the system time for a specific error event Manager_ID CHAR 32 Holds the unique character string Foreign key that identifies a Symantec ESM Manager Table C 35 Message table Message_ID INTEGER Holds an integer that identifies a Primary key message 248 About the Symantec ESM Reporting database schema Tables in the database schema Table C 35 Message table Title_code VARCHAR 20 Code that identifies the message title Description_code VARCHAR 20 Code that identifies the message description Format_code VARCHAR 20 Code that identifies the message format Severity_ID SMALLINT Holds a small integer that identifies the level of severity Foreign key Table C 36 Message _Name_Info table
146. e Access File Attributes File Find File Information Login Parameters Network Integrity OS Patches Object Integrity Oracle Accounts Oracle Auditing Oracle Configuration Oracle Networks Oracle Objects Oracle Passwords Oracle Patches Oracle Profiles Oracle Roles Oracle Tablespace Password Strength Program Find Queries Registry Response SQL Server Configuration Startup Files System Auditing System Mail Messages in this category report information that can be used to manually assess or audit a computer These messages do not have a direct implication regarding the security state of the computer 280 About Symantec ESM Reporting categories Determining messages and modules in a category Table E 1 Symantec ESM Reporting Categories System System Queues Messages in this category report Information information that can be used to User Files manually assess or audit a computer These messages do not have a direct implication regarding the security state of the computer Determining messages and modules in a category To find the messages that are associated with each category you can run a query in Query Studio This query can also show the modules To run a message query 1 Open Query Studio 2 Expand the Message Information folder 3 Expand the Messages query subject 4 Insert
147. e B 51 Path Message Summaries Trends Agent Trends Codes Data item Codes POLICY_ID The unique character or numeric string that identifies the Symantec ESM policy CATEGORY_ID An integer that identifies the category MODULE_ID A character or numeric string that identifies a specific Symantec ESM module MANAGER ID The unique character or numeric string that identifies a Symantec ESM Manager DOMAIN_ID A unique character or numeric string that identifies the Symantec ESM domain AGENT_ID A character or numeric string that identifies the name of the Symantec ESM Agent host computer SEVERITY_ID A small integer 0 4 that identifies the level of severity Table B 52 Agent Trends About the Symantec ESM Reporting metadata model 221 Structure of data items Path Message Summaries Trends Domain Trends Data item Policy A unique character string that identifies a specific Symantec ESM Policy for a manager Category A unique character string that identifies the category of a specific Symantec ESM message Module A unique character string that identifies a specific Symantec ESM Module Manager A unique character string that identifies a specific Symantec ESM Manager Domain A unique character string that identifies the Symantec ESM Domain for a manager Agent A unique character string that identifies a specific Symantec ESM Agent on a manager Level Displays the security level either red yellow
148. e Oracle run time client for Symantec Enterprise Reporting Symantec does not provide an Oracle run time client for the Symantec Enterprise Reporting database To install the Oracle run time client for the Symantec Enterprise Reporting database 1 On the computer on which you are installing Symantec Enterprise Reporting access the Oracle installation CD and then perform an Oracle 9i client installation 2 Click Runtime and then click Next 3 Click Install and then click Next To configure and test the Oracle run time client for the Symantec ESM Reporting data base 1 On the computer on which you are installing Symantec Enterprise Reporting run Net Manager Click Service Naming Click Create In the Service name text box type ESM and then click Next In the Select a communications protocol click TCP IP and then click Next Type the name of the database computer and then click Next In the service name text box type sid and then click Next o N OO UW FP W N In the Test Connection dialog box on the Connections tab do the following tasks m Inthe User ID text box type ESM_REPORT_USER m Inthe Password text box type the ESM_REPORT_USER password m Click Test Connection 9 Inthe Test Connection dialog box on the Results tab verify that the CLI connection was successful 10 Exit from the Net Configuration Manager Installing Symantec ESM Reporting 85 Installing Symantec ESM Reporting Install the Apache HT
149. e REORG cmd and RUNSTATS cmd scripts to a path on the database server computer To run the REORG cmd script At the IBM DB2 command prompt type reorg To run the RUNSTATS cmd script At the IBM DB2 command prompt type runstats Restore database performance on Solaris using Oracle You can use a SQL Plus command to restore database performance The command gathers statistics for the schema You should run the command at hourly intervals while the Symantec ESM Reporting Database Links load the ESM database After this initial start up period you can run the command ona nightly basis or whenever database performance slows down Installing Symantec ESM Reporting 103 Post installation tasks To run the SQL Plus command At the SQL Plus command prompt type execute dbms_stats gather_schema_stats lt ESMDB10 dbms _ stats auto_sample_size gt cascade gt true Uninstalling the Symantec ESM Reporting Database Foundation This is a database maintenance function You must drop the ESM and SER databases to uninstall the Symantec ESM Reporting Database Foundation Uninstalling the Symantec ESM Reporting Database Link The Symantec ESM Reporting Database Link uninstaller removes only the Symantec ESM Reporting Database Link from the host computer If you silently installed the Symantec ESM Reporting Database Link the uninstaller will silently remove the Symantec ESM Reporting Database Link Note On an HP UX computer using
150. e Symantec ESM Reporting Database Link and Symantec Enterprise Reporting with connections to their respective databases What you can do with Symantec ESM Reporting Symantec ESM reporting has many tools that let you create organize and present reports and queries using diverse data from the Symantec ESM Reporting database For example you can create a report about account privileges with a chart or graph that displays the number of accounts with the same level of privileges You can create a report containing the names and numbers of Symantec ESM Agent host computers that are compliant with a specific policy You can also create reports using disparate information that you can combine to provide new insights into your enterprise configurations Symantec ESM Reporting includes tools to help you organize your data and tailor it to your specific needs The Report Studio tool lets you create new reports using a template to help you get started The Query Studio tool lets you customize a pre formatted query and add remove filter and format the data to the arrangement that you need Both of these tools include a metadata model that lets you extract information from the Symantec ESM Reporting database In addition to these tools the Symantec ESM Reporting Report Package provides you with many reports that inspect every facet of your Symantec ESM application Through these reports Symantec ESM Reporting provides you with appropriate information abo
151. e compliance percentage for the focus object 0 10 counts Shows the number of agents that have a compliance percentage level that falls between 0 10 percent gt 10 20 counts Shows the number of agents that have a compliance percentage level that falls between 10 20 percent gt 20 30 counts Shows the number of agents that have a compliance percentage level that falls between 20 30 percent gt 30 40 counts Shows the number of agents that have a compliance percentage level that falls between 30 40 percent gt 40 50 counts Shows the number of agents that have a compliance percentage level that falls between 40 50 percent gt 50 60 counts Shows the number of agents that have a compliance percentage level that falls between 50 60 percent gt 60 70 counts Shows the number of agents that have a compliance percentage level that falls between 60 70 percent gt 70 80 counts Shows the number of agents that have a compliance percentage level that falls between 70 80 percent gt 80 90 counts Shows the number of agents that have a compliance percentage level that falls between 80 90 percent 224 Structure of data items Table B 54 About the Symantec ESM Reporting metadata model Path Message Summaries Trends Domain Trends Compliance Counts Data item Compliance gt 90 100 counts Shows the number of agents that have a Counts compliance percentage lev
152. e for a policy on managers in your database You select a policy and its associated managers and domains and the report displays the managers and domains that the policy ran on the policy start times the Job IDs and the modules that run in that policy Default path Public Folders gt Symantec ESM gt Technical gt Administration gt Audits Policy audit schedule query This query retrieves the audit schedules for policies on managers in your database You select the managers and policies and the query shows the managers the policies the domains that the policies run on the policy start times the Job IDs and the modules that run in each policy Default path Public Folders gt Symantec ESM gt Technical gt Administration gt Audits Policy Runs About Symantec ESM Reports 169 About the reports in Symantec ESM Reporting This report shows all policy run information and is sorted by job ID When you select a policy with associated managers domains and agents the report displays the run state the start time the finish time the policy the domain and the audit status for each job ID Default path Public Folders gt Symantec ESM gt Technical gt Console Views Quarterly agent level trend by line of business This report shows quarterly agent security level trends for a selected manager and domain You select a policy with a related module on any manager and domain in your enterprise After you select a date ra
153. e name of every Symantec ESM Agent that is registered to a manager but is not listed in a user defined domain These agents appear only in the All Agents domain Default path Public Folders gt Symantec ESM gt Technical gt Administration gt Agents Agents not running a policy before a specified date This report displays the agents that will not run a specific policy until after a specified date You select a policy manager domain and audit date and the report shows which of the selected agents will not run the policy until after the date you select Default path Public Folders gt Symantec ESM gt Technical gt Administration gt Audits Agents with errors by line of business Audit query This report shows the number of agents in a domain that are reporting errors The report displays a graph and a table When you select the policy the domain and the manager the report shows the number of agents with audit errors for each domain and manager Data is for the most recent policy run for each agent Default path Public Folders gt Symantec ESM gt Executive gt Administration Use this query as a template to create your own custom queries in Query Studio using the Audit query subject in the metadata model Default path Public Folders gt Symantec ESM gt Technical gt Custom Queries Audit errors by line of business query This report shows the number of agents in a domain that are reporting errors The re
154. e otherwise separately acquired the right to obtain Content Updates Symantec reserves the right to designate specified Content Updates as requiring purchase of a separate subscription at any time and without notice to You provided however that if You purchase maintenance hereunder that includes particular Content Updates on the date of purchase You will not have to pay an additional fee to continue receiving such Content Updates through the term of such maintenance even if Symantec designates such Content Updates as requiring separate purchase This License does not otherwise permit the licensee to obtain and use Content Updates 3 Limited Warranty Symantec warrants that the media on which the Software is distributed will be free from defects for a period of thirty 30 days from the date of delivery of the Software to You Your sole remedy in the event of a breach of this warranty will be that Symantec will at its option replace any defective media returned to Symantec within the warranty period or refund the money You paid for the Software Symantec does not warrant that the Software will meet Your requirements or that operation of the Software will be uninterrupted or that the Software will be error free TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW THE ABOVE WARRANTY IS EXCLUSIVE AND IN LIEU OF ALL OTHER WARRANTIES WHETHER EXPRESS OR IMPLIED INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY FITNESS FOR A PARTICULA
155. e reports in Symantec ESM Reporting Weekly agent level trend by line of business This report shows weekly agent security level trends for a selected manager and domain You select a policy with a related module on any manager and domain in your enterprise After you select a date range the report displays a trend chart that shows the number of agents for that manager and domain that are at each security level either red yellow or green for the selected policy and its related module The report displays data as both a chart and a table Default path Public Folders gt Symantec ESM gt Executive gt Policy Compliance gt Agent Level Weekly agent level trend by manager This report shows weekly agent security level trends for a selected manager You select a policy with a related module on any manager and domain in your enterprise You then select a date range and the report displays a trend chart that shows the number of agents in the selected domain at each security level red yellow and green for the selected policy and its related module The report also displays the data as a table Default path Public Folders gt Symantec ESM gt Technical gt Policy Compliance gt Agent Level Weekly compliance trend by line of business This report shows weekly compliance percentage trends for a selected domain You select a policy with a related module on any manager and domain in your enterprise After you select a date range the r
156. e you Install Symantec ESM Reporting System requirements On Windows computers using DB2 do one of the following when installing the Symantec ESM Reporting Database Link or Symantec Enterprise Reporting m Specify the JDBC app driver if the host computer has installed a run time client that can establish a local connection with the DB2 database server across the network m Specify the JDBC net driver if the host computer must establish a remote connection with the DB2 database server across the network On Windows computers using Microsoft SQL server ensure that the following user accounts do not exist in the Microsoft SQL Servers SQL Server Group lt host_computer gt Security Logins folder before installing the Symantec ESM Reporting Database Foundation m ESM CM USER ESM_DB LINK USER m ESM REPORT USER ESMDB10 Additional UNIX requirements The following requirements apply to UNIX computers On UNIX computers you must run the command xhost localhost as root before starting to install Symantec ESM Reporting This command lets other users run the installation programs On UNIX computers you must set the DISPLAY variable before starting to install Symantec ESM Reporting Set DISPLAY hostname 0 0 and then export DISPLAY On UNIX computers that use an IBM DB2 runtime client to connect to a remote database server using the app driver you must add the runtime library lib directory to the LD_LIBRARY_PATH environment vari
157. eating report prompts in Report Studio Table B 40 Path Message Summaries Prompts Boolean_Prompt Data item Boolean_ Prompt Note These information objects are used only for creating report prompts in Report Studio STRING_KEY An integer zero or one that refers to the string value for boolean prompts in reports STRING_VALUE The string value No or Yes for boolean prompts in reports 212 About the Symantec ESM Reporting metadata model Structure of data items Table B 41 Path Message Summaries Prompts Module Message Data item Boolean_ Module A unique character string that identifies a Prompt specific Symantec ESM Module Note These information Message title A unique character string that identifies objects are used only for the title of a specific Symantec ESM creating report prompts in message Report Studio MODULE_ID A character or numeric string that identifies a specific Symantec ESM module CATEGORY_ID An integer that identifies the category MESSAGE _ID An integer that identifies a message CATEGORY_TY An integer that identifies a category type PE The eight high level categories have a type of 1 and subcategories such as module categories have a type of 2 Table B 42 Path Message Summaries Prompts All_Messages Data item All Messages Note These information objects are used only for creating report prompts in Report Studio CATEGORY_ID An
158. ec ESM account user name gt 116 Securing Symantec ESM Reporting About user account permissions To map a specific Symantec ESM account on a specific manager to the same Symantec Enterprise Reporting user account Use the following SQL command as a template to map the accounts INS SI ERT INTO ESMDB10 ACCOUNT_MAPPING USER_NAME ACCOUNT_ID ELECT lt Symantec Enterprise Reporting user name gt ACCOUNT_ID FROM ESMDB10 ACCOUNT A ESMDB10 MANAGER M WHERE A MANAGER_ID M MANAGER_ID AND A USER_NAME lt Symantec ESM account user name gt AND M MANAGER_NAME lt Symantec ESM Manager nam e gt Manually assigning user account permissions using SQL commands To manually update the permissions you need to use SQL commands Use an SQL application to access the Symantec ESM Reporting Database and update your permissions The following examples show how to update permissions in several situations including m Give administrator privileges m Give rights to specific policies and domains on all managers m Give rights to all policies and domains on specific managers m Give rights to specific policies and domains on specific managers To create an account with administrator privileges The following set of SQL commands gives administrator privileges to an account including rights to all information in the Symantec ESM Reporting Database ECT ERT
159. ed managers and domains It also shows the date and time of the policy run from which the data was retrieved Data is taken from the most recent successful policy run for each agent Default path Public Folders gt Symantec ESM gt Technical gt Policy Compliance gt Compliance Percentage 158 About Symantec ESM Reports About the reports in Symantec ESM Reporting Agent counts by manager This report displays the number of agents in each domain on every manager in your database It also shows the total number of agents on every manager Default path Public Folders gt Symantec ESM gt Technical gt Administration gt Agents Agent counts by manager query This query retrieves the number of agents in each domain on every manager in your database Default path Public Folders gt Symantec ESM gt Technical gt Administration gt Agents Agent level query Use this query to retrieve security levels for agents on any or all managers and domains in your enterprise This query displays the agent level either red yellow or green for all agents on selected managers and domains You can select any or all managers and domains and the query reports data about the associated agents You can also select any or all polices and modules The query shows security levels for each agent that is included in your selections The query also shows the date of the policy runs from which the data was retrieved Default path Public Fold
160. eger that identifies a Foreign key parent category Category_Type INTEGER Holds an integer that identifies a category type The eight high level categories have a type of 1 and subcategories such as module categories have a type of 2 Category_Name_Code VARCHAR 20 Holds a string that identifies the category name code Trend TINYINT Boolean that identifies whether the policy completed without errors Short name VARCHAR 32 Holds the short name for Foreign key Symantec ESM modules 240 About the Symantec ESM Reporting database schema Tables in the database schema Table C 17 Category_Message table Category_ID INTEGER Holds an integer that identifies the Primary key category Link this field to the String Code field Foreign key in the Content_String_ Map table to identify the categories Message_ID INTEGER Holds an integer that identifies a Primary key message Foreign key Table C 18 Cat_trend_daily table Group_ID CHAR 32 Holds a unique character string that identifies the group Policy_ID CHAR 32 Holds the unique character string that identifies the Symantec ESM policy Category_ID INTEGER Holds an integer that identifies the category Link this field to the String Code field in the Content_String_ Map table to identify the categories Audit_datetime DATETIME Holds the date and time of the related audit Table C 19 Categ
161. el that falls between 90 100 percent Table B 55 Path Message Summaries Trends Domain Trends Date Trends Data item Date Trends Day of week A small integer that corresponds to the day of the week 1 Sunday 2 Monday etc Day of month A small integer that corresponds to the day of the month Week A small integer that corresponds to the week of the year from 1 to 52 Month A small integer that corresponds to the month of the year 1 January 2 February etc Quarter Asmall integer that identifies the quarter of the year 1 First Quarter 2 Second Quarter 3 Third Quarter 4 Fourth Quarter Year A small integer that corresponds to the current year First audit date per week Shows the date of the first audit that occurs each week Daily audit date The system time for the date of the next scheduled daily audit Weekly audit date The system time for the date of the next scheduled weekly audit Monthly audit date The system time for the date of the next scheduled monthly audit Quarterly audit date The system time for the date of the next scheduled quarterly audit Yearly audit date The system time for the date of the next scheduled yearly audit About the Symantec ESM Reporting metadata model 225 Structure of data items Table B 56 Path Message Summaries Trends Domain Trends Message Counts Data item Message Red messages The number o
162. ement timesharing service provider or service bureau arrangement D use a previous version or copy of the Software after You have received and installed a disk replacement set or an upgraded version Upon upgrading the Software all copies of the prior version must be destroyed E use a later version of the Software than is provided herewith unless You have purchased corresponding maintenance and or upgrade insurance or have otherwise separately acquired the right to use such later version F use if You received the software distributed on media containing multiple Symantec products any Symantec software on the media for which You have not received permission in a License Module nor G use the Software in any manner not authorized by this license 2 Content Updates Certain Software utilize content that is updated from time to time including but not limited to the following Software antivirus software utilize updated virus definitions content filtering software utilize updated URL lists some firewall software utilize updated firewall rules and vulnerability assessment products utilize updated vulnerability data these updates are collectively referred to as Content Updates You shall have the right to obtain Content Updates for any period for which You have purchased maintenance except for those Content Updates that Symantec elects to make available by separate paid subscription or for any period for which You hav
163. ents Chapter 4 Chapter 5 Post installation tasks cvcessecsssseseesensncussnsearivevenveneeebavieas catdreneconneaeesiieneeh Changing the Symantec ESM Reporting Database Link 0 Stopping and restarting the Symantec ESM Reporting Database Linkon UNDA a e hvcbesvcsdahcscttueieencteanele daa dalteretuetdamaaneaneceees Configuring Symantec Enterprise Reporting ccceeseseseseseseteeeees Configuring the Apache HTTP Web server ccceceeseseseseseseeeteteeees Checking the installation logs for errors or warnings ceeeeeeees Checking the Symantec ESM Reporting Database Link log FOTELT OES erei T ET ERE OER Restoring database performance cccccccesssssesesesesetseseseseesseseseseseeeees Uninstalling the Symantec ESM Reporting Database Foundation Uninstalling the Symantec ESM Reporting Database Link Uninstalling Symantec Enterprise Reporting ccecseeeeeeeeeeees Uninstalling the Symantec ESM Reporting Reports Package Securing Symantec ESM Reporting About security considerations c ccccecseesssseseseeseseseeceseeeeseseeeeseseneeseeeeseseees Securing JDBC driver communications 000 eceeeeseteeeeseteeeeeteeeeeeeees Securing communications between Symantec Enterprise Reporting components 2 00 eeeeeceseeeeceeeeseeseeseeeeeeeeeseeseeseeseeeaeeneees Securing email meeer ea escent ai ave seleeseste sees About backups occ ccccscscsscsseseescss
164. ents for Symantec Enterprise Reporting do not change when you select different components After clicking Install you cannot cancel the installation 88 Installing Symantec ESM Reporting Installing Symantec ESM Reporting To finish installing Symantec Enterprise Reporting On the Install Complete panel confirm that the Start Enterprise Reporting Configuration check box is checked and then click Done To configure the Symantec Enterprise Reporting database 1 9 10 11 12 13 In the left pane under Data Access right click Content Store and then click Delete In the left pane under Data Access right click Content Manager and then click New resource gt Database In the New resource Database dialog box do the following tasks m Inthe Name text box type SER m Inthe Type list box click Oracle database Click OK In the right pane SER Database Resource Properties click the Value text box for the User ID and password and then click the pencil icon to the right of the Value text box In the Enter the user ID and password dialog box do the following tasks m Inthe User ID text box type ESM_CM_USER m Inthe Password text box type the password of the ESM_CM_USER account m Inthe Confirm password text box type the password of the ESM_CM_USER account Click OK In the right pane SER Database Resource Properties in the Value text box for the Database name type SER Click the Save con
165. eport displays a trend chart that shows the aggregate level of compliance for all agents in the domain The report also displays data in table form Default path Public Folders gt Symantec ESM gt Executive gt Policy Compliance gt Compliance Percentage Weekly compliance trend by manager This report shows weekly compliance percentage trends for a selected manager You can select a policy with a module on any manager and domain in your enterprise You then select a date range and the report displays a trend chart that shows the aggregate level of compliance for a selected domain The report also displays the data as a table Default path Public Folders gt Symantec ESM gt Technical gt Policy Compliance gt Compliance Percentage 174 About Symantec ESM Reports About the reports in Symantec ESM Reporting Weekly violations trend by line of business This report shows the weekly policy violation trends for any selected module You select a policy with a related module and then select managers domains and a date range The report displays a trend chart that shows policy violations for a selected manager and domain The report also displays the data in table form Default path Public Folders gt Symantec ESM gt Executive gt Policy Compliance gt Violation Counts Weekly violations trend by manager This report shows weekly policy violation trends for a selected manager You select a policy with a related module an
166. eporting logs Records user activity in Symantec Enterprise Reporting tomcat log Windows Program Files Symantec Enterprise_Reporting logs UNIX opt Symantec Enterprise_Reporting logs The Tomcat servlet log 122 Securing Symantec ESM Reporting About auditing in Symantec ESM Reporting Table 4 8 Symantec Enterprise Reporting Database Link logs Database_link log Windows Program Files Records events for the Symantec Symantec Enterprise Enterprise_Reporting Reporting Database Link Database Link logs UNIX opt Symantec Enterprise_Reporting Database Link logs service log Windows Program Files The service control log for the Symantec Symantec Enterprise Enterprise_Reporting Reporting Database Link Database Link logs UNIX opt Symantec Enterprise_Reporting Database Link logs Using audit reports To use audit reports you must set the audit log level install the audit reports package and create the tables for the audit reports About setting the audit log The Symantec Enterprise Reporting log can be adjusted to record events in five levels of detail to meet your security needs See the Administration and Security Guide for information about the five levels of auditing You can find this guide on the CD in the Docs Symantec Enterprise Reporting directory To set the logging level 1 Onthe portal toolbar click Server Administration 2 Click the Configure tab 3 Inthe
167. er You can select a policy with a module on any manager and domain in your enterprise You then select a date range and the report displays a trend chart that shows the aggregate level of compliance for a selected domain The report also displays the data as a table Default path Public Folders gt Symantec ESM gt Technical gt Policy Compliance gt Compliance Percentage 168 About Symantec ESM Reports About the reports in Symantec ESM Reporting Monthly violations trend by line of business This report shows the monthly policy violation trends for any selected module You select a policy with a related module and then select managers domains and a date range The report displays a trend chart that shows policy violations for a selected manager and domain The report also displays the data in table form Default path Public Folders gt Symantec ESM gt Executive gt Policy Compliance gt Violation Counts Monthly violations trend by manager This report shows monthly policy violation trends for a selected manager You select a policy with a related module and then select a date range The report displays a trend chart that shows policy violations for all agents that are examined by the selected manager and domain The report also displays data as a table Default path Public Folders gt Symantec ESM gt Technical gt Policy Compliance gt Violation Counts Policy audit schedule This report shows the audit schedul
168. er A unique character string that identifies a permissions Symantec ESM Manager Account name A unique character string that identifies the Symantec ESM account Active True false value that identifies whether the Symantec ESM account is active Locked out True false value that identifies whether the Symantec ESM account is locked out Disabled True false value that identifies whether the Symantec ESM account is disabled Table B 4 Path Administration Account permissions Domains Data item Domains Domain A unique character string that identifies the Symantec ESM Domain for a manager View domain True false value that identifies whether the user can view all Symantec ESM domains Modify domain True false value that identifies whether the user can modify all Symantec ESM domains Run policy on domain True false value that identifies whether the user can run a Symantec ESM policy on a specific domain Snapshot updates True false value that identifies whether the user can create or update snapshots on a specific domain About the Symantec ESM Reporting metadata model 183 Structure of data items Table B 5 Path Administration Account permissions Policies Data item Policies Policy A unique character string that identifies a specific Symantec ESM Policy for a manager View policy True false value that identifies whether the user can view all Symantec ESM policies
169. er account is active or locked out and whether a user can view modify or run a policy on the manager Default path Public Folders gt Symantec ESM gt Technical gt Administration gt Accounts Account template permissions query This query displays the permissions that each Symantec ESM user account has for each template on every manager in the database Account permissions columns show whether a user account is active or locked out and whether a user can read or modify a template on the manager Default path Public Folders gt Symantec ESM gt Technical gt Administration gt Accounts Agent audit schedule This report displays the scheduled start time and date for audits of the agents on selected managers You select a policy with its related managers The report displays a schedule of the start times for the agents that are associated with the selected policies and managers Additional information in the report includes the job ID and module names for selected policies Default path Public Folders gt Symantec ESM gt Technical gt Administration gt Audits About Symantec ESM Reports 157 About the reports in Symantec ESM Reporting Agent audit schedule query This query retrieves the start time and date for audits of all agents that are on selected managers The query lets you select any or all managers and policies It then displays a schedule of the start times for audits of the agents on selected managers us
170. er and type the new configuration information If Cognos is already installed on the computers on which you are installing Symantec Enterprise Reporting use the Enterprise Reporting Configuration utility to change the name of the node under the ReportNet Service This changes the name of the service so that Symantec Enterprise Reporting can install If you decide to uninstall Cognos after changing the name of the service you must stop the service before proceeding After the uninstaller finishes delete the Cognos installation directory if necessary If you are installing Symantec Enterprise Reporting on two or more host computers you must install a separate content store for each of them See the Architecture and Planning Guide on the CD in the Docs Symantec Enterprise Reporting directory Before you Install Symantec ESM Reporting 37 System requirements If the host computer on which you are installing Symantec Enterprise Reporting has already installed a Web server you must manually configure the Web server to function with Symantec Enterprise Reporting See the Installation and Configuration Guide on the CD in the Docs Symantec Enterprise Reporting directory Before you can reinstall the Symantec ESM Reporting Database Foundation you must stop all of the Symantec ESM Reporting Database Links that are connected to the database m On Windows computers you must stop the Symantec ESM Reporting Database Link service On UNIX com
171. er or numeric string that identifies a Symantec ESM Manager DOMAIN_ID A unique character or numeric string that identifies the Symantec ESM domain AGENT_ID A character or numeric string that identifies the name of the Symantec ESM Agent host computer SEVERITY_ID A small integer 0 4 that identifies the level of severity 208 About the Symantec ESM Reporting metadata model Structure of data items Table B 34 Path Message Summaries Summary Filters Data item Summary Filters All messages category Predefined filter that shows all messages Change notification category Predefined filter that limits the displayed data to only those messages in the Change Notification category ESM administrative information category Predefined filter that limits the displayed data to only those messages in the ESM Administrative Information category ESM error category Predefined filter that limits the displayed data to only those messages in the ESM Error category ICE category Predefined filter that limits the displayed data to only those messages in the ICE category Patch assessment category Predefined filter that limits the displayed data to only those messages in the Patch Assessment category Policy compliance category Predefined filter that limits the displayed data to only those messages in the Policy Compliance category System error category Predefined filter that limits t
172. erence to reuse an object Conditional Block List Adds an empty block that you can use for conditional formatting Field Set Adds an empty block that has a caption This is similar to the Block object but with a caption Hyperlink Button Adds a hyperlink in the form of a button About the metadata model You can insert items from the metadata model in the Insertable Objects pane into your reports The metadata model is identical to the Query Studio metadata model Appendix B explains the metadata model and all of its data items 148 Running Symantec ESM Reporting Configuring and updating the database Deleting an existing report You can delete existing reports in the Symantec ESM Reports user interface To delete an existing report 1 Navigate to the report that you want to delete 2 Inthe column on the right click More 3 Click Delete 4 Click OK Configuring and updating the database You can configure and update the Symantec Enterprise Reporting Database using SQL commands This section describes how to do the following m Enable trending m Update agent description and asset tag information in the database m Purge old data from the database Enabling trending You can enable trending for Symantec ESM Reporting categories By default trending is available for the policy compliance category You can also enable trending in other categories so that the Symantec ESM Reporting Database Link will import and
173. erprise Reporting After you install Symantec Enterprise Reporting you must change some default configuration settings to run multiple reports concurrently on different Web browsers Use an account that has execute permissions for the Administration secured function To configure Symantec Enterprise Reporting 1 Open the Symantec Enterprise Reporting user interface See Opening the user interface on page 126 On the toolbar click Tools and then click Server Administration Click Configure Click lt http host_computer_name 9300 gt In the Actions list click Set properties BatchReportService Click Settings N HO wo A U N In the Number of low affinity connections for the batch report service value text box change the value from 4 to 2 Click OK o 9 Inthe Actions list click Set properties ReportService 10 Click Settings 11 Inthe Number of low affinity connections for the interactive report service value text box change the value from 4 to 2 Installing Symantec ESM Reporting 99 Post installation tasks 12 Inthe Queue time limit of report service in seconds value text box change the value from 30 to 300 13 Inthe Maximum number of interactive report service processes change the value from 2 to the result of multiplying the number of processors on the Symantec Enterprise Reporting host computer by 2 For example if the host computer has two processors change the value from 2 to 4 14 Clic
174. erprise Reporting user account Manager_ID CHAR 32 Holds the unique character string Primary key that identifies a Symantec ESM Manager Foreign key About the Symantec ESM Reporting database schema Tables in the database schema Table C 47 RPT_Manager_Perm table IS_ESM_account TINYINT Boolean integer that shows whether user permissions to view data in Symantec ESM Reporting are synchronized with user permissions in the Symantec ESM Console This data should not be altered View_all_domains TINYINT Boolean integer that shows whether a user has permissions to view all domains in Symantec ESM Reporting View_all_policies TINYINT Boolean integer that shows whether a user has permissions to view all policies in Symantec ESM Reporting View_ESM_accounts TINYINT Boolean integer that shows whether a user has permissions to view all accounts in Symantec ESM Reporting Table C 48 RPT_Policy_Perm table User_Name NVARCHAR 18 Holds the user name Primary key IS_ESM_account TINYINT Boolean integer that shows whether user permissions to view data in Symantec ESM Reporting are synchronized with user permissions in the Symantec ESM Console This data should not be altered Policy_ID CHAR 32 Holds the unique character string that identifies the Symantec ESM policy Primary key Foreign key Table C 49 Run_state_string table Run_state SMALLINT Bo
175. ers gt Symantec ESM gt Technical gt Policy Compliance gt Agent Level Agent level by line of business This report shows the number of agents at each security level for a selected module in a selected domain When you make the domain manager policy then module selections the report displays the number of agents at each level grouped by module and then by domain The report displays data as both a chart and a table Default path Public Folders gt Symantec ESM gt Executive gt Policy Compliance gt Agent Level About Symantec ESM Reports 159 About the reports in Symantec ESM Reporting Agent level by line of business query This query retrieves agent security levels for all agents in selected domains When you make the domain manager policy then module selections the query displays the agent levels of all agents for all selected managers and domains The query also shows the date and time of the policy run from which the data was retrieved The query displays data in table form You can modify the query to meet your needs Default path Public Folders gt Symantec ESM gt Executive gt Policy Compliance gt Agent Level Agent level by manager This report shows agent security levels for agents that are audited by specific managers It lets you select a policy with any or all related modules and then it shows you security levels for all agents on selected managers and the specified domain The report displays d
176. es file m For UNIX run the dbpurger sh file that is in the same folder as the properties file Using the purge rows_per_transaction parameter The purge rows_per_transaction parameter has some characteristics that you need to consider The number that you specify tells the DBPurge utility the number of rows in the database tables to delete per call to the database If you set this value to 0 the DBPurge utility deletes all applicable rows in one call to the database However when you set this value to 0 the database locks and cannot accept another call during the time that the DBPurge utility is deleting rows and data from the Symantec Reporting Database Link can be lost If you set this value to a number greater than 0 the database checks for other calls between purge commands However if you set the number to a low value the DBPurge utility must send a large number of separate commands to the database and purge utility may take a substantial amount of time to purge the database The default value is 5000 however you may need to change this value to optimize it for your database Appendix About Symantec ESM Reports This appendix includes the following topic m About the reports in Symantec ESM Reporting About the reports in Symantec ESM Reporting Symantec ESM Reports includes several default reports that you can use to determine the state of your Symantec ESM Agents Reports come in several categories including executi
177. es that let you select from the policies modules managers and domains that you want This allows you to focus your queries to only the information that you need Different query subjects prompt for different data See Query subject prompts on page 179 Query Studio is limited in that it does not offer all the aggregation features that are available in the report studio Therefore reports and queries with similar columns may differ slightly in numbers because of the way that the reports are aggregated Generally these issues can be overcome by adding columns to the queries that are automatically aggregated in the reports such as manager agent or domain columns Also if you use the Symantec standard queries to build new queries you may get results that differ from similar reports due to some cascading limitations To overcome this limitation you should build a new query Running Symantec ESM Reporting 131 Locating reports Query Studio has color limitations as well When creating charts with Query Studio the application uses a color scheme that assigns a color to the first data item and another color to the second data item These colors cannot be changed unless you rearrange the data items For example if you create a report that has a column that indicates the number of red yellow and green messages the Query Studio may assign the color blue to the bar indication the number of red messages and the color red to the bar that
178. es the Symantec ESM account 255 256 About the Symantec ESM Reporting database schema Database Views Database Views The following views represent objects that you can use to create reports Because the views behave exactly like database tables they can be queried and joined to other tables and views as if they were tables Use of all of the views listed here in place of using the underlying tables where appropriate Note There are some views in the database that are not documented here These views have been depreciated Avoid using these views Views with localizable text In the following views the LOCALE_CODE field is the language code An example of a locale code for english is as follows LOCALE_CODE en The following query returns all of the category strings and important category information for the english locale code SELECT FROM ESMDB10 CATEGORY_STRINGS WHERE LOCALE_CODE en CATEGORY_STRINGS This is a view of the internationalized strings for high level categories including Policy compliance Change notification and all other categories with a CATEGORY_TYPE of 1 Table C 53 CATEGORY_STRINGS Ts a Ee LOCALE_CODE VARCHAR 32 No CATEGORY_ID INTEGER 4 No CATEGORY_NAME VARGRAPHIC 2000 No TREND SMALLINT 2 Yes CATEGORY_TYPE INTEGER 4 Yes About the Symantec ESM Reporting database schema 257 Database Views ESM_MODULE_STRINGS This is a view o
179. eseseeeeseseeeeseseescseeeeseeseeseeeees 159 Agent level by manager query cccesesseseseseeseseseeseseeeeseseeeeseseeeeseeeees 159 Agent properties QUECTY serenan rr EEEE ERENS 160 Agent summaries query cceeseesseseseseeseseeseseseeeeseseeceseeeeseseeeeseeeeeeseseees 160 Agent Summary o E E divas E EE NORR 160 Agent trends query s ssesesssesseseseseresesestessstststssesestsnsnesesesseneseseseesesese 160 Agent violations query sessesesesesesesssseseessseseersrsrsesssnesesesseseseseseesesent 160 Agents not assigned to user defined domains query cccccseseeees 161 Agents not running a policy before a specified date 161 Agents with errors by line of business 00 0 eeetetesesetseseseeeeeseeesenees AUtdit query 2 2 asics E e A E Audit errors by line of business query ccccccceesesesseseseseseseeeseseseeees Atidit errors Query eenas ccna arene eas Audits scheduled for today Query ccccsecsecssesesesessessseseesscseseseseenees Changeeverntidetails iec 0 5 ces dacu ceieasiel ai ae A Change events query cccccesscessesescsseseseeeeseseeseseseeseseseeseseeecseeeesesenesseeees Compliance by line of business 0 ec ceseseseseseseseseesesseeeeeeseseseseeeseenes Compliance by manager Compliance by manager query Daily agent level trend by line of business Daily agent level trend by manager Daily compliance trend by manager Daily violations trend by line of
180. ext containing C ESMDATA Do one of the following tasks m Change C ESMDATA to D MyServer m Copy the if not exist line and change C ESMData to D MyDatabase The modified lines of text should read as follows FILENAME D MyServer ESMData mdf FILENAME D MyServer ESMLog 1df Use a text editor to open the sql sqlserver createESMdb create_database sq file Find the line of text containing C ESMDATA Change C ESMDATA to D MyServer The modified lines of text should read as follows FILENAME D MyServer ESMData mdf FILENAME D MyServer ESMLog 1df You can use a similar process to manually create the SER database On the Symantec ESM Reporting Windows CD in the sql sqlserver folder Symantec provides the create_ser_db bat file You can use this bat file to execute the sql scripts that create the SER database The sql scripts are in the sql sqlserver createSERdb folder You can use a text editor to do the following tasks Change the create_ser_db bat file and specify a different location for the data file in which the SER database will be created Change the create_database sql file and specify a different name for the SER database By default the database name is SERDATA The installer associates the following files with the SER database Database file C lt database_name gt SERdata mdf Log file C lt database_name gt SERlog ldf Symantec ESM Reporting install
181. f all of the internationalized strings from the ESM MODULES table as defined in Symantec ESM Table C 54 ESM_MODULE_STRINGS LOCALE_CODE VARCHAR 32 No LOCALE_ID CHARACTER 32 No SHORT_NAME VARCHAR 32 No LONG_NAME VARGRAPHIC 2000 No MESSAGE_STRINGS This is a view of all of the internationalized strings from the MESSAGES table as defined in Symantec ESM Table C 55 MESSAGE_STRINGS iS a ee LOCALE_CODE VARCHAR 32 No MESSAGE _ID INTEGER 4 No DESCRIPTION VARGRAPHIC 2000 No TITLE VARGRAPHIC 2000 No FORMAT VARGRAPHIC 2000 No SEVERITY_ID SMALLINT 2 No SEVERITY_NAME VARGRAPHIC 2000 No MODULE_STRINGS This is view of the internationalized strings from the CATEGORY table for the categories that correspond to the modules that are defined in Symantec ESM Table C 56 MODULE_STRINGS LOCALE_CODE VARCHAR No CATEGORY_ID INTEGER No 258 About the Symantec ESM Reporting database schema Database Views Table C 56 MODULE_STRINGS CATEGORY_NAME VARGRAPHIC 2000 No MODULE_NAME VARGRAPHIC 2000 No MOD_CATEGORY_ID INTEGER 4 No TREND SMALLINT 2 Yes SEVERITY_STRINGS This is a view of all of the internationalized strings from the SEVERITY table Although there are five severity levels defined 0 4 they usually map to only 3 security levels red yellow and green as defined in Symantec ESM Table C 57 SEVERITY_STRINGS LOCAL
182. f red messages for the focus Counts object Yellow messages The number of yellow messages for the focus object Green messages The number of green messages for the focus object Messages Shows the total number of reported messages Suppressed messages Shows the number of suppressed messages for the focus object Unique messages Shows the number of unique messages for the focus object Unique suppressed Shows the number of unique suppressed messages messages for the focus object Unique possible Shows the number of unique possible messages messages for the focus object Violations Shows the number of messages that indicate that the agent is out of compliance with the policy 226 About the Symantec ESM Reporting metadata model Structure of data items Table B 57 Path Message Summaries Trends Domain Trends Severity Counts Data item Severity Counts Severity level Displays the security level either red yellow or green Severity ID A small integer 0 4 that identifies the level of severity Red messages per severity Displays the number of red messages Messages with a severity level of four are red messages Yellow messages per severity Displays the number of yellow messages at each severity level Yellow messages can have a severity level of one two or three Green messages per severity Displays the number of green messages Messages with a severity leve
183. f the ESM database 1 Usea text editor to open the sql db2 createESMdb create_db sq file 2 Change the appropriate section of the script file If you change the name of the ESM database in the installation scripts you must change the name of the ESM database in the create_esm_db cmd script and the post_install cmd script The installer creates three tablespaces using the default location m Tablespace ESM 32K IDX TS The file name is C ESMDATA INDEX32K m Tablespace ESM 32K USR_TS The file name is C ESMDATA USER32K m Tablespace ESM 32K TMP TS The file name is C ESMDATA TEMP32K If you change the data file location in the create_esm_db bat file you must also change the create_tablespace sql script in the sql db2 createESMdb folder To change the ESM database tablespace location or any of its parameters 1 Usea text editor to open the sql db2 create_esm_db create _tablespace sql script 2 Change the appropriate sections of the script file Symantec ESM Reporting installation scripts 283 About the installation scripts for IBM DB2 To change the location of the tablespace ESM_32K_IDX_TS ESM_32K_USR_TS or ESM_32K_TMP_TS or any of its parameters 1 Usea text editor to open the sqI db2 create_esm_db create _tablespace sql script 2 Change the appropriate sections of the script file Example 1 To change the location of the ESM database to D MyDatabase 1 Usea text editor to open the sql db2 create_esm_db bat file 2
184. figuration icon on the toolbar Click Close Click the Start icon on the toolbar Click Close Exit the Enterprise Reporting Configuration utility To start the ReportNet Service for Symantec Enterprise Reporting 1 On the computer on which you installed Symantec Enterprise Reporting at the system command prompt change to the opt Symantec Enterprise_Reporting bin directory Type crnctl sh start Installing Symantec ESM Reporting 89 Installing Symantec ESM Reporting Configure the installed Apache HTTP Web server for LDAP authentication If you are using LDAP to authenticate users for Symantec Enterprise Reporting you must manually configure the LDAP server for Symantec Enterprise Reporting To configure the installed Apache HTTP Web server for LDAP authentication Note If you are using LDAP to authenticate users for Symantec Enterprise Reporting you must manually configure the LDAP server for Symantec Enterprise Reporting 1 Onthe computer on which you installed the Apache HTTP server use a text editor to open the apache group apache2 conf httpd conf file 2 Inthe ScriptAlias section find the following line of text ScriptAlias Enterprise_Reporting cgi bin opt Symantec Enterprise _Reporting cgi bin 3 Immediately below this line type the following two lines of text Alias Enterprise_ Reporting opt Symantec Enterprise _ Reporting webcontent Alias Enterprise Reporting help
185. following tasks m To specify the default account name and password for the Symantec ESM Reporting Database Link account and the Symantec Enterprise Reporting account click Next m To specify another account name or password for the Symantec ESM Reporting Database Link account or the Symantec Enterprise Reporting account type the information in the related text boxes and then click Next On the Symantec Enterprise Reporting database accounts panel do one of the following tasks m To specify the default account name and password for the Content Store account click Next m To specify another account name or password for the Content Store account type the information in the related text boxes and then click Next On the Choose Database Type panel click Microsoft SQL Server 2000 and then click Next Note If you selected Default MS SQL Server in step 6 the installer skips this step On the JDBC Driver panel do one of the following tasks m To specify the default JDBC Driver Class JDBC Classpath and JDBC Library Path click Next m To specify another JDBC Driver Class JDBC Classpath and JDBC Library Path type the information in the related text boxes and then click Next Installing Symantec ESM Reporting 65 Installing Symantec ESM Reporting Warning The computers on which you are installing the Symantec ESM Reporting Database Foundation must use the Microsoft JDBC driver for SQL Server 2000 Do not use
186. for Oracle The installation process includes the following tasks m Install connect and test the Oracle JDBC Drivers for the Symantec ESM Reporting Database Link m Install the Symantec ESM Reporting Database Link on Windows for Oracle Install connect and test the Oracle JDBC Drivers for the Symantec ESM Reporting Database Link Symantec does not provide JDBC Drivers for the Oracle database server You can download Oracle JDBC Drivers from the Sun Microsystems Web site at http servlet java sun com products jdbc drivers On the computer on which you are installing the Symantec ESM Reporting Database Link download install connect and test the Oracle JDBC Drivers Install the Symantec ESM Reporting Database Link on Windows for Oracle On the computer on which you are installing the Symantec ESM Reporting Database Link access the Symantec ESM Reporting Windows CD The process is the same as installing the Symantec ESM Reporting Database Link for IBM DB2 except on the Database Type Selection panel click Oracle Next See To install the Symantec ESM Reporting Database Link for IBM DB2 on page 49 Installing Symantec Enterprise Reporting on Windows for Oracle The installation process includes the following tasks m Configure the environment variables for Symantec Enterprise Reporting m Install connect and test the Oracle JDBC Drivers for Symantec Enterprise Reporting m Install Symantec Enterprise Reporting on W
187. fore using the Query Studio you must determine the question that you want to answer with your query The following list outlines some questions that you may want to answer before beginning your query m Is the query related to the security state of your enterprise or is it related to the administration of Symantec ESM m Whois the audience m What information should the query find Do I want to know about my agents policies security levels message counts message information or some other information m What is the scope of the query Do I want to know about my enterprise a section of my enterprise or a single computer How do I want to group my information By manager by policy or do I want organize my data in another way Data items Running Symantec ESM Reporting About using queries If you have not planned what you want the report to say and how you want to group it it is possible to create queries that have little meaning For example if you create a query that has a column for managers agents policies and modules the report has little meaning unless you add a metric that explains something about those data items You may want to display the number of red yellow and green messages on a specific agent However to do this you would have to reorder the columns and possibly add a Domains column If your report had columns ordered according to managers domains policies modules and agents and then had columns fo
188. formation see the installation options in the Architecture and Planning Guide You can find this guide on the CD in the Docs Symantec Enterprise Reporting directory 26 Before you Install Symantec ESM Reporting Before you install Symantec ESM Reporting Before you can perform the Symantec Enterprise Reporting installation you must complete the following tasks m Install JDBC drivers for your database on each computer on which you install the Content Manager If you are using IBM DB2 as your relational database server you must install the DB2 run time client The run time client includes the JDBC drivers and other required software JDBC drivers let applications that are written using the Java programming language interface with the database JDBC drivers are usually specific to a database and database vendors normally provide the JDBC drivers for their databases without cost Third party JDBC drivers for some databases may provide better performance than the drivers supplied by the database vendors m Run the Database Foundation installer to create and populate the required databases or manually create the databases and run the Database Foundation to populate them m Install a Web server to host Symantec Enterprise Reporting The installer can install and configure an open source version of the Apache HTTP server If you select another Web server you must manually configure the Web server after installing Symantec Enterprise Reporting
189. g on Manager A unique character string that identifies a specific Symantec ESM Manager Policy A unique character string that identifies a specific Symantec ESM Policy for a manager Table B 16 Path Administration Suppression Configuration Codes Data item Codes POLICY_ID A character or numeric string that identifies the Symantec ESM policy MANAGER ID The unique character or numeric string that identifies a Symantec ESM Manager OS_MODULE_ID A unique character or numeric string that identifies the operating system module INFO_WILDCARDED_ KEY A boolean integer that specified whether an information wildcard is active in the suppression AGENT_ WILDCARDED_ KEY A boolean integer that specified whether an agent wildcard is active in the suppression NAME_WILDCARDED_ KEY A boolean integer that specified whether a name wildcard is active in the suppression ENABLED_KEY A boolean integer that specifies whether the suppression is enabled About the Symantec ESM Reporting metadata model 193 Structure of data items Table B 17 Path Administration License Data item License Manager Specifies the name of the manager Number of licenses Shows the total number of agent licenses This represents the total number of agents that can be registered to a manager Used licenses Show the number of agent licenses used to register agents to a manager This represents the number of a
190. g on the computer Does the computer have sufficient memory and free disk space to install and run the Symantec ESM Reporting Database Link software For UNIX systems does the computer have sufficient swap space to run the software What is the installation file system path name What Web server is running on the computer What JDBC drivers are running on the computer Do you have access to accounts with the required privileges on the computer What CD ROM drive can you use to load the software What version of Symantec ESM is running on the Symantec ESM Manager computers Can you run a network connectivity test to verify that the computer can connect to the computers in the Database Foundation checklist and the Symantec ESM Reporting Database Link checklist 266 System assessment checklists Symantec Enterprise Reporting checklist Symantec Enterprise Reporting checklist See Symantec Enterprise Reporting system requirements on page 30 Table D 3 Symantec Enterprise Reporting checklist What is the computer s name If you are installing on a distributed configuration what are the names and intended uses of the other computers What is the computer s communication protocol address What operating system is running on the computer What version of the operating system is running on the computer Does the computer have sufficient memory and free d
191. g that identifies the name of the Symantec ESM Agent host computer OS_VERSION_ID The unique character or numeric string that identifies the operating system of the agent DOMAIN_ID A unique character or numeric string that identifies the Symantec ESM domain MANAGER ID The unique character or numeric string that identifies a Symantec ESM Manager POLICY_ID A character or numeric string that identifies the Symantec ESM policy USER_DEFINED_KEY Integer that identifies whether the Symantec ESM domain can be defined by the user LIVE_UPDATE_KEY A boolean integer that specifies whether LiveUpdate is enabled on the agent Table B 15 Suppression Configuration About the Symantec ESM Reporting metadata model 191 Structure of data items Path Administration Suppression Configuration Data item Suppression title A unique character string that identifies the title of a specific Symantec ESM suppression configuration Suppressed name A unique character string that identifies the name of the suppression configuration Suppressed A unique character string that identifies what information information is being suppressed on a specific agent Suppressed agent A unique character string that identifies the name of the suppressed agent based on the configuration Account name A unique character string that identifies the Symantec ESM account that created the suppression Name wildcarded
192. ge for IBM DB2 on page 60 To test the Symantec ESM Reporting Reports Package See To test the Symantec ESM Reporting Reports Package on page 61 Silently installing the Symantec ESM Reporting Database Link You can silently install the Symantec ESM Reporting Database Link on a computer that has a Windows or UNIX operating system You must run the silent installation program from the command prompt on the host computer Note If you perform a custom installation of the ESM database use the database name that you assign instead of the default database name in the response file when silently installing the Symantec ESM Reporting Database Link The installation program uses a response file to provide necessary information On the Symantec Enterprise Security Manager ESM 6 1 Reporting CD for each operating system see the sample SilentInstallExample properties file in the database_link directory You can use any text editor to set the values of the variables in the properties file The values must correspond to the settings for your host computers and database server m Set the values of the variables using the syntax lt variable name gt lt value gt Do not put a space before or after the equal sign m Precede the backslash characters that are commonly found in the file paths on Microsoft Windows with another backslash m Do not change the names of any variables except when you are connecting the Reporting Database Lin
193. gents or domains with a red or yellow security level are out of compliance In Symantec ESM Reporting compliance percentage is a numerical value that shows how close an agent manager or domain is to being fully compliant The value is calculated by taking the total number of reported compliant messages and dividing it by the total number of possible reported messages Messages that are not reported by disabled checks and suppressed messages are not counted in compliance percentage See Symantec ESM Console In Symantec ESM a domain is a set of computers You can specify a domain based on organizational structure such as computers in the accounting department computer configuration or function such as computers that function as Web servers or other criteria See Symantec ESM Agent See Symantec ESM Console See Symantec ESM Manager In Symantec ESM Reporting a line of business is an organizational structure For example the accounting department legal department or sales department is a line of business See Symantec ESM Manager Glossary message message level policy policy compliance policy configuration management security domain security level SESA Symantec Enterprise Security Architecture severity severity ID Symantec Enterprise Reporting In Symantec ESM Reporting a message contains text and a security level that describe a specific non compliant condition in an agent Checks return
194. gents that are currently registered to a manager Remaining licenses Shows the number of agent licenses remaining This represents the number of agents that can still be registered to the manager Table B 18 Path Administration Agent Filters Data item Agent Filters Not assigned to user Predefined filter that limits the displayed data defined domain to agents that are not assigned to a user defined domain Agents in user defined Predefined filter that limits the displayed data domains only to agents that are assigned to a user defined domain In policy run Predefined filter that limits the displayed data to agents that are assessed in a policy run 194 About the Symantec ESM Reporting metadata model Structure of data items Table B 19 Path Administration Audit Filters Data item Audit Filters Audits not yet finished Predefined filter that limits the displayed data to audits that have not yet finished according to the audit state data Audits not yet started Predefined filter that limits the displayed data to audits that have not yet started according to the audit state data Audits finished Predefined filter that limits the displayed data to audits that have completed according to the audit state data Audits finished in last n Filter that limits the displayed data when you days specify audits that were finished in a number of days that you specify Audits finished t
195. ger to the list Optionally repeat these steps to let the Symantec ESM Reporting Database Link connect to another Symantec ESM Manager Warning Do not connect two Symantec ESM Reporting Database Links to the same Symantec ESM Manager and database The database link log will report primary key failures If you specify connections to several Symantec ESM Managers during the installation of a Symantec ESM Reporting Database Link a race condition may cause some ESM database errors during the initial transfer of data You can correct the errors by stopping and restarting the Symantec ESM Reporting Database Link See Checking the Symantec ESM Reporting Database Link log for errors on page 101 12 On the Pre Install Summary panel click Install 13 On the Install Complete panel click Done Installing Symantec ESM Reporting 83 Installing Symantec ESM Reporting Note In the opt Symantec Reporting_Database_Link server default conf log4j xml file the default settings limit the Symantec ESM Reporting Database Link log file to a maximum file size of 50 MB and three backups You can change the MaxFileSize value to increase the file size and the MaxBackupIndex value to increase the number of backup files Installing Symantec Enterprise Reporting for Oracle The installation process includes the following tasks m Configure the environment variables for Symantec Enterprise Reporting m Install the Oracle run time client fo
196. ger_poll_error true poll_error whether to purge the MANAGER_POLL_ERROR table in the database Valid values are true and false purge This specifies the number of purge days_to_keep 90 days_to_keep days of data that remain in the database A day is defined as the time between midnight and midnight The current day is disregarded purge rows_per_ transaction This specifies the number of rows to purge with each call to the database Setting this parameter requires special consideration See Using the purge rows_per_transaction parameter on page 154 for more information purge rows_per_transaction 5000 154 Running Symantec ESM Reporting Configuring and updating the database Locating and using the DBPurger utility files The DBPurger utility uses a bat file to run Running this bat file accesses the DBPurger utility s Java executable This bat file also adds the appropriate files to the computer s path so that the DBPurger utility can function correctly To run the DBPurger 1 Modify the dbpurger properties file to contain data that is specific to your database The properties file can be found at the following path m Windows Program Files Symantec ESM Reporting Database Link bin dbpurger properties m UNIX opt Symantec ESM Reporting Database Link bin dbpurger properties 2 Doone of the following m For Windows run the DBPurger bat file that is in the same folder as the properti
197. h language Foreign key Symantec ESM is using String_value NVARCHAR 2000 Holds a string that can include multi byte unicode characters for international use Table C 45 RPT_all_mgr_Perm table User_Name NVARCHAR 18 Holds the user name Primary key 251 252 Tables in the database schema Table C 45 About the Symantec ESM Reporting database schema RPT_all_mgr_Perm table View_all_domains TINYINT Boolean integer that shows whether a user has permissions to view all domains in Symantec ESM Reporting View_all_policies TINYINT Boolean integer that shows whether a user has permissions to view all policies in Symantec ESM Reporting View_ESM_accounts TINYINT Boolean integer that shows whether a user has permissions to view all accounts in Symantec ESM Reporting Table C 46 RPT_Domain_Perm table User_Name NVARCHAR 18 Holds the user name for the Symantec Enterprise Reporting user account Primary key IS_ESM_account TINYINT Boolean integer that shows whether user permissions to view data in Symantec ESM Reporting are synchronized with user permissions in the Symantec ESM Console This data should not be altered Policy_ID CHAR 32 Holds the unique character string that identifies the Symantec ESM policy Primary key Foreign key Table C 47 RPT_Manager_Perm table User_Name NVARCHAR 18 Holds the user name for the Primary key Symantec Ent
198. haracter string that identifies the Symantec ESM Domain for a manager 186 About the Symantec ESM Reporting metadata model Structure of data items Table B 10 Path Administration Audit Agent State Data item Agent State Agent A unique character string that identifies a specific Symantec ESM Agent on a manager Audit date The system date for a specific audit Full policy run Yes no value that identifies whether the policy run was a full policy run Successful audit Yes no value that identifies whether the policy run completed successfully Erred module A unique character string that identifies the name of the module with errors Agent error Displays the messages associated with agent errors that are returned during policy runs Module error Displays the messages associated with module errors that are returned during policy runs Table B 11 Codes About the Symantec ESM Reporting metadata model 187 Structure of data items Path Administration Audit Codes Data item AUDIT_ID A unique character or numeric string that identifies a specific audit AGENT_ID A character or numeric string that identifies the name of the Symantec ESM Agent host computer MANAGER ID The unique character or numeric string that identifies a Symantec ESM Manager POLICY_ID A character or numeric string that identifies the Symantec ESM policy SHORT_NAME A string of variable length up t
199. he Symantec Enterprise Reporting account type the information in the related text boxes and then click Next 13 14 15 16 17 Installing Symantec ESM Reporting 45 Installing Symantec ESM Reporting On the Symantec Enterprise Reporting database accounts panel do one of the following tasks m To specify the default account name and password for the Content Store account click Next m To specify another account name or password for the Content Store account type the information in the related text boxes and then click Next On the Choose Database Type panel select DB2 and then click Next Note If you selected Default DB2 in step 6 the installer skips this step On the JDBC Driver panel do one of the following tasks m To specify the default JDBC Driver Class and JDBC Classpath and JDBC Library Path click Next m To specify another JDBC Driver Class JDBC Classpath or JDBC Library Path type the information in the related text boxes and then click Next Note For IBM DB2 7 2 you must specify the Java 1 2 Driver See the JDBC Driver documentation On the Database Connection panel do one of the following tasks m To specify the default database URL and user account name type the password of the user account in the text box and then click Next m To specify another database URL user name and password type the information in the related text boxes and then click Next On the Pre Insta
200. he displayed data to only those messages in the System Error category System information category Predefined filter that limits the displayed data to only those messages in the System Information category Table B 35 item About the Symantec ESM Reporting metadata model 209 Structure of data items Path Message Summaries Prompts Trend_Interval_Prompt Data Trend_ Interval_ Prompt Note These information objects are used only for creating report prompts in Report Studio Prompt key Displays an integer that represent a time interval prompt Time interval Displays the prompt values for time intervals in trend reports Intervals include daily weekly monthly quarterly and annually Table B 36 Data item Category_ Module_ Prompt Note These information objects are used only for creating report prompts in Report Studio CATEGORY_ID Path Message Summaries Prompts Category_Module_Prompt An integer that identifies the category MODULE_ID A numeric string that identifies a specific Symantec ESM module Category Displays the category names that appear in the prompt Module Displays the module names that appear in the prompt TREND A boolean prompt that determines whether the report displays trended data 210 About the Symantec ESM Reporting metadata model Structure of data items Table B 37 Data item Category_ Name_ Prompt
201. he following tasks m Inthe Namespace ID text box type a unique identifier for the name space For example type ESM m Inthe Host and port text box type the lt LDAP server computer hostname gt lt port number gt For example type LDAPserver 389 m Inthe Base Distinguish Name text box type the domain controller names For example type dc esm dc ses o symc_ses 60 Installing Symantec ESM Reporting Installing Symantec ESM Reporting 9 10 11 12 13 m Inthe User lookup text box type userid userID ou People m Inthe Bind user DN and password text boxes type the values if the LDAP authentication provider must bind to the directory server using a specific Bind user DN and password to perform searches If no values are specified the LDAP authentication provider binds as anonymous m Inthe Accounting mappings Advanced text box change the default user name from uid to userid m Inthe remaining text boxes select the default values In the left pane under Security click Authentication and then click Cognos In the right pane under Cognos Namespace Resource Properties in the Allow anonymous access list box select False Click the Save configuration icon on the tool bar In the Enterprise Reporting Configuration dialog box click Close Click the Restart icon on the tool bar In the Enterprise Reporting Configuration dialog box click Close Exit from the Enterprise Reporting Configuration utility
202. her sensitive information in clear text form across your network To secure the JDBC Driver connections use encrypted third party JDBC Drivers If your database computers are in a physically secure location you can isolate the JDBC Driver connections by setting up a dual home host through a physically secure segment of the network The connection can pass sensitive information in clear text but unauthorized personnel cannot access it Install the Symantec ESM Reporting Database Link for Oracle See About the Database Link installer on page 25 To install the Symantec ESM Reporting Database Link 1 On the computer on which you are installing the Symantec ESM Reporting Database Link access the Symantec ESM Reporting Solaris CD At the system command prompt type setup sh 2 On the Symantec Enterprise Security Manager ESM 6 1 Reporting CD panel in the left pane click Database Link 3 Inthe right pane do the following tasks m Review the information m Complete the installation prerequisites m Click Execute the Database Link Installer 4 On the Introduction panel click Next 5 On the License Agreement panel click I accept the terms of the License Agreement and then click Next 6 Onthe Choose Installation Type panel click Initial Installation and then click Next 7 Onthe Choose Install Folder panel do one of the following tasks m To select the default location click Next m To select another location click Choose
203. ick New Resource gt Database Type a name for the new database Select the database type Click OK In the right panel type the appropriate database name user ID password server and port number From the File menu click Save 124 Securing Symantec ESM Reporting About auditing in Symantec ESM Reporting 12 Restart the Cognos ReportNet service to create the new tables in the Content Manager database The tables are m COGIPF_ACTION m COGIPF_USERLOGON m COGIPF_NATIVEQUERY m COGIPF_PARAMETER m COGIPF_RUNJOB m COGIPF_RUNJOBSTEP m COGIPF_RUNREPORT m COGIPF_VIEWREPORT m COGIPF_SYSPROPS Running Symantec ESM Reporting This chapter includes the following topics About the user interface Opening the user interface Customizing the user interface About reports Locating reports Running Reports Selecting report prompts Scheduling reports Exporting report information Emailing reports About Query Studio About using queries Using defined queries Using Report Studio Enabling trending 126 Running Symantec ESM Reporting About the user interface About the user interface Symantec ESM Reporting uses a Web based user interface for creating reports This lets you use the application from any computer that can connect to your Web server The first time that you log into Symantec ESM Reporting your interface opens to the Welcome tab a Public Folders tab and a My Folders tab The Welcome
204. ied domains on a specific week or weeks Agent monthly audit Predefined filter that limits the displayed data to data that was reported from audits for agents in specified domains on a specific month or months 229 230 About the Symantec ESM Reporting metadata model Structure of data items Table B 60 Path Message Summaries Trends Trend Filters Data item Trend Filters Agent quarterly audit Predefined filter that limits the displayed data to data that was reported from audits for agents in specified domains on a specific quarter or quarters Agent yearly audit Predefined filter that limits the displayed data to data that was reported from audits for agents in specified domains on a specific year or years Select a domain audit Predefined filter that lets the user choose a date date range range for domain trend queries or reports Trended modules Predefined filter that limits the displayed data to data on modules that have trending enabled Appendix About the Symantec ESM Reporting database schema This appendix includes the following topics m About the database schema m Tables in the database schema About the database schema This schema is the underlying structure of fields for the Symantec Reporting Database To ensure compatibility among the different databases that you can use with the database link the Symantec ESM Reporting Database uses data types that are common to many
205. ific Symantec ESM Policy for a manager Category A unique character string that identifies the category of a specific Symantec ESM message Module A unique character string that identifies a specific Symantec ESM Module Manager A unique character string that identifies a specific Symantec ESM Manager Domain A unique character string that identifies the Symantec ESM Domain for a manager Agent A unique character string that identifies a specific Symantec ESM Agent on a manager Level Specifies the security level either red yellow or green Audit Date The system date and time for a specific audit Table B 29 Path Message Summaries Agent Summaries Agent Counts Data item Agent Rating Displays the rating of the focus object A rating Counts is an integer Red agent messages contribute 10 points to a rating yellow messages contribute 1 point to a rating and green messages do not contribute to a rating Red agents Shows the number of red agents for the focus object Yellow agents Shows the number of yellow agents for the focus object Green agents Shows the number of green agents for the focus object 204 About the Symantec ESM Reporting metadata model Structure of data items Table B 30 Path Message Summaries Agent Summaries Compliance Counts Data item Compliance Agent compliance Show a number that rates a compliance Counts percentage for agents This fact only w
206. in Symantec ESM Reporting 275 Symantec ESM Reporting Categories ICE Integrated Command Engine Messages in this category are all derived from the Integrated Command Engine module The messages in this category are difficult to classify because the meaning of the messages can vary depending on the Integrated Command Engine scripts Patch Assessment OS Patches Messages in this category report information on the state of operating system patches These messages detail whether a computer has all of the necessary patches Policy Compliance Account Information Account Integrity Active Directory Backup Integrity Device Integrity Disk Quota Encrypted File System File Access File Attributes File Find File Watch Login Parameters Network Integrity OS Patches Object Integrity Oracle Accounts Oracle Auditing Oracle Configuration This category contains messages that report whether a Symantec ESM Agent host computer complies with a Symantec ESM Policy Security levels associated with these messages rate the severity of the security risk to these computers 276 About Symantec ESM Reporting categories About the categories in Symantec ESM Reporting Table E 1 Symantec ESM Reporting Categories Policy Compliance Oracle Networks This category contains messages that report whether a Symantec ESM Agent host computer c
207. in related information objects facts and filters When you create queries use the data items from within a single query subject Administration The administration folder contains all the data items that relate to the administration of your Symantec ESM application Data items in this section relate to Symantec ESM user accounts message suppressions audit schedules manager agent communications configurations and similar types of data Message Information The Message Information section of the metadata model contains the security related information objects that you need to find the security state of computers in your enterprise Information objects in this section include policies message titles message descriptions and change events These information objects are intended to be used to locate individual issues and display the details about specific problems at the agent level Reports that you generate with these data items are intended for the people responsible for operations and day to day computer security maintenance Message Summaries The Message Summaries section contains all of the fact items that are in the metadata model Use these fact items with the information objects that are in the Message Information section to quantify your queries Fact item columns should be placed in the report after the information objects These data objects are intended to create reports that display the current overall security state of yo
208. indows for Oracle m Install the Apache HTTP server for Symantec Enterprise Reporting m Finish installing Symantec Enterprise Reporting on Windows for Oracle m Configure the Symantec Enterprise Reporting database 74 Installing Symantec ESM Reporting Installing Symantec ESM Reporting Configure the environment variables for Symantec Enterprise Reporting See To configure the environment variables for Symantec Enterprise Reporting on page 83 Install connect and test the Oracle JDBC Drivers for Symantec Enterprise Reporting Symantec does not provide JDBC Drivers for the Oracle database server You can download Oracle JDBC Drivers from the Sun Microsystems Web site at http servlet java sun com products jdbc drivers On the computer on which you are installing Symantec Enterprise Reporting download install connect and test the Oracle JDBC Drivers Install Symantec Enterprise Reporting on Windows for Oracle Perform the installation of Symantec Enterprise Reporting on Windows computers using DB2 except on the Choose Database Type panel click Oracle Next See To install Symantec Enterprise Reporting on page 55 Install the Apache HTTP server for Symantec Enterprise Reporting See To install the Apache HTTP Web server for Symantec Enterprise Reporting on page 56 Finish installing Symantec Enterprise Reporting on Windows for Oracle See To finish installing Symantec Enterprise Reporting on page
209. ined filter that limits the displayed data to messages that indicate a red security level Yellow msgs only Predefined filter that limits the displayed data to messages that indicate a yellow security level Green msgs only Predefined filter that limits the displayed data to messages that indicate a green security level Suppressed msgs only Predefined filter that limits the displayed data to messages that are suppressed Not suppressed msgs only Predefined filter that limits the displayed data to messages that are not suppressed Compliant msgs only Predefined filter that limits the displayed data to only messages that indicate that the agent host computer is in compliance with the policy Not compliant msgs only Predefined filter that limits the displayed data to only messages that indicate that the agent host computer is not in compliance with the policy Msgs in user defined domains only Predefined filter that limits the displayed data to messages reported by computers that are in user defined domains Table B 24 About the Symantec ESM Reporting metadata model 199 Structure of data items Path Message Information Message Filters Category Filters Data item Category Filters All messages Filter that displays all messages Change notification Predefined filter that limits the displayed data to messages in the Change Notification category ESM adm
210. ing 59 Installing Symantec ESM Reporting 3 Immediately below that line type the following two lines of text Alias Enterprise_Reporting C Program Files Symantec Enterprise_Reporting webcontent Alias Enterprise_Reporting help C Program Files Symantec Enterprise Reporting webcontent documentation 4 Atthe end of the httpd conf file type the following lines of text lt Directory C Program Files Symantec Enterprise_Reporting webcontent gt Options Indexes MultiViews lt Directory gt To enable LDAP name space authentication for Symantec Enterprise Reporting Note The following example describes the process of creating a name space using the LDAP that installs with Symantec Enterprise Security Architecture SESA 1 On the LDAP computer on which you installed LDAP authentication verify that the server is configured for Port 389 This port creates an insecure connection by default 2 On the computer on which you are installing Symantec Enterprise Reporting click Start gt Programs gt Symantec Enterprise Reporting gt Enterprise Reporting Configuration 3 Inthe left pane under Security right click Authentication and then click New resource gt Namespace 4 Inthe right pane in the New resource Namespace dialog box do the following tasks m Inthe Name text box type ESM m Inthe Type list box click LDAP 5 Click OK 6 Inthe right pane under Namespace Resource Properties do t
211. ing selected policies You can also specify certain domains ona manager and get audit information for those domains Additional information in the report includes the job ID and module names for selected policies that were audited Default path Public Folders gt Symantec ESM gt Technical gt Administration gt Audits Agent compliance distribution by line of business This report shows the distribution of agents in a domain as a function of compliance percentages A bar chart shows the number of agents in each compliance percentage category You select the domain manager policy and module for which you want to view data about the distribution of reporting agents Default path Public Folders gt Symantec ESM gt Executive gt Policy Compliance gt Compliance Percentage Agent compliance Distribution by manager This report shows the distribution of agents on a manager as a function of compliance percentages A bar chart shows the number of agents in each compliance percentage category You select the manager domain policy and module for which you want to retrieve data about the distribution of the reporting agents Default path Public Folders gt Symantec ESM gt Technical gt Policy Compliance gt Compliance Percentage Agent compliance query This query lists policy compliance percentages for agents in your enterprise This query displays policy compliance data for selected policies and related modules for select
212. ing the installation you can specify another volume for the lt database_name gt Data folder You can use a text editor to change the create_esm_db bat file and specify a different location for the data file in which the ESM database will be created If you change the location of the ESM database in the installation scripts you must change the location of the ESM database in the other sq files that depend on the location For example the post_install bat script To change the location of the file for the ESM database 1 Usea text editor to open the sql sqlserver create_esm_db bat file 2 Change C ESMDATA to the specified location To change the name of the ESM database 1 Usea text editor to open the sql sqlserver createESMdb create_database sq file 2 Change the appropriate section of the script file The installer associates the following files with the ESM database m Database file C lt database_name gt ESMDATA mdf m Log file C lt database_name gt ESMlog ldf If you change the name of the ESM database in the installation scripts you must change the name of the ESM database in the create_esm_db bat script and the post_install bat script 286 Symantec ESM Reporting installation scripts About the installation scripts for Microsoft SQL Server Example 1 To change the location of the database file to D MyServer 1 2 3 Use a text editor to open the sql sqlserver create_esm_db bat file Find the line of t
213. inistrative Predefined filter that limits the displayed data information to messages in the ESM Administrative Information category ESM error Predefined filter that limits the displayed data to messages in the ESM error category ICE Predefined filter that limits the displayed data to messages in the ICE category Patch assessment Predefined filter that limits the displayed data to messages in the Patch assessment category Policy compliance Predefined filter that limits the displayed data to messages in the Change Notification category System error Predefined filter that limits the displayed data to messages in the System Error category System information Predefined filter that limits the displayed data to messages in the System Information category 200 About the Symantec ESM Reporting metadata model Structure of data items Table B 25 Change Events Path Message Information Change Events Data item Event title Displays a title that specifies the type of change event Event description Displays an in depth description of the event Event format Displays replaceable parameter formatting data that the Symantec ESM console uses when formatting events Event name Displays the change event name Event information Displays additional information about the change event Audit date The system date for a specific au
214. installation tasks Securing Symantec ESM Reporting This chapter includes the following topics About security considerations About user account permissions About auditing in Symantec ESM Reporting About security considerations The reports that Symantec ESM Reporting generates contain sensitive information regarding computers in your network This information could be used by an attacker to compromise your network The Symantec ESM Reporting database holds the data for your network including computer names account names for your Symantec ESM user accounts and your Symantec Enterprise Reporting user accounts specific security violations for computers in your network and other data You can improve the security of your sensitive data by considering the following points m Authentication to Symantec Enterprise Reporting JDBC communications between components of Symantec ESM Reporting Communications between computers where you installed components of Symantec ESM reporting if you did a distributed installation Communications between the Web server and Web browsers m Email security m Backups and backup security 108 Securing Symantec ESM Reporting About security considerations Log files m Network security m Web browser security m Enabling Symantec Enterprise Reporting auditing Note Communications between Symantec ESM and the Symantec Enterprise Reporting Database Link are inherently secure
215. installing Symantec Enterprise Reporting m Uninstalling the Symantec ESM Reporting Reports Package Changing the Symantec ESM Reporting Database Link If you add or delete a Symantec ESM Manager or make another change to an installed Symantec ESM Reporting Database Link you must use the installation CD to run the Database Link installer on the host computer and type the new configuration information On Windows computers after the Database Link installer finishes confirm that the Symantec ESM Reporting Database Link service has started To start the Symantec ESM Reporting Database Link service 1 Onthe host computer access the services list 2 Ifthe Symantec ESM Reporting Database Link service does not have a status of Started start the service 98 Installing Symantec ESM Reporting Post installation tasks Stopping and restarting the Symantec ESM Reporting Database Link on UNIX On UNIX computers you must use the ReportingDatabaseLink script to stop and restart the Symantec ESM Reporting Database Link process To stop the Symantec ESM Reporting Database Link process 1 Change to the opt Symantec ESM_ Reporting Database_Link bin directory 2 At the system command prompt type ReportingDatabaseLink stop To restart the Symantec ESM Reporting Database Link process 1 Change to the opt Symantec ESM_ Reporting Database_Link bin directory 2 Atthe system command prompt type ReportingDatabaseLink start Configuring Symantec Ent
216. isk space to install and run the Symantec Enterprise Reporting software What is the installation file system path name What Web server is running on the computer What JDBC drivers are running on the computer Does your security policy require login authentication Do you have access to accounts with the required privileges on the computer What CD ROM drive can you use to load the software Can you run a network connectivity test to verify that the computer can connect to the computers in the Database Foundation checklist and the Symantec ESM Reporting Database Link checklist System assessment checklists 267 Symantec ESM Reporting Report Package checklist Symantec ESM Reporting Report Package checklist See Symantec ESM system requirements on page 29 Table D 4 Symantec ESM Reporting Report Package checklist What is the computer s name If you are installing on a distributed configuration what are the names and intended uses of the other computers What is the computer s communication protocol address What operating system is running on the computer What version of the operating system is running on the computer What relational database management system is running on the computer What is the installation file system path name Do you have access to accounts with the required privileges on the computer What CD ROM drive can
217. k Next On the Setup Type panel click Typical and then click Next On the Destination Folder panel do one of the following tasks m To select the default folder click Next m To select another folder click Change In the Change Current Destination Folder panel type the destination folder path click OK and then click Next On the Ready to Install the Program panel click Install On the Installation Wizard Completed panel click Finish To finish installing Symantec Enterprise Reporting Onthe Install Complete panel confirm that the Start Enterprise Reporting Configuration check box is checked and then click Done To configure the Symantec Enterprise Reporting database 1 In the left pane under Data Access right click Content Store and then click Delete In the left pane under Data Access right click Content Manager and then click New resource gt Database In the New resource Database dialog box do the following tasks m Inthe Name text box type SER m Inthe Type list box click DB2 database Click OK In the right pane SER Database Resource Properties click the Value text box for the User ID and password and then click the pencil icon to the right of the Value text box 58 Installing Symantec ESM Reporting Installing Symantec ESM Reporting 9 10 11 12 13 14 In the Enter the user ID and password dialog box do the following tasks m Inthe User ID text box type ESM_CM_USER
218. k OK Configuring the Apache HTTP Web server After you install the Apache HTTP Web server you must change some default configuration settings to run multiple reports concurrently on different Web browsers To configure the Apache HTTP Web server 1 On the computer on which you are installing Symantec Enterprise Reporting use a text editor to open the C Program Files Apache Group Apache2 conf httpd conf file 2 Under MaxKeepAliveRequests type 1000 3 Under the KeepAliveTimeout type 300 4 Stop and then restart the Apache2 service Checking the installation logs for errors or warnings Each installer creates a separate installation log Some installers create more than one installation log Check the installation logs for errors or warnings The installation logs contain lists of messages from the installers Some logs contain summary tables listing the number of successes warnings non fatal errors or fatal errors To check the Database Foundation installation log 1 On the computer on which you installed the Symantec ESM Reporting Database Foundation open a text editor 100 Installing Symantec ESM Reporting Post installation tasks 2 Doone of the following tasks m On Windows computers browse to the C Documents and Settings Administrator Local Settings temp folder m On UNIX computers change to the tmp directory 3 Open the Symantec_ESM_Reporting Database_Foundation_InstallLog log file and check for any
219. k to multiple managers You can specify multiple managers by having each manager use the next higher number than the previous manager in its variable names Installing Symantec ESM Reporting 91 Installing Symantec ESM Reporting Do not delete any variables in the file Leave the value blank if you do not want it set Table 3 3 lists the valid values that you can set for the variables in the properties file Table 3 3 Properties file values INSTALLER_UI Silent Do not change this value INSTALLER_Ul silent CHOSEN_INSTALL_ SET Initial Installs the Reporting Database Link on a host computer for the first time Update Changes the manager credentials database or database credentials for the installed Reporting Database Link CHOSEN_INSTALL_SET Initial USER_INSTALL_DIR Set to the directory where you want the Reporting Database Link to install Windows example USER_INSTALL_DIR c Program Files Symantec ESM Reporting Database Link UNIX example USER_INSTALL_DIR opt Symantec Reporting Database_Link DB2 ORACLE SQL_SERVER CUSTOM_DB Set the variable to 1 for the type of database where you want the Reporting Database Link to send data Set the other variables to 0 DB2 example DB2 1 ORACLE 0 SQL_SERVER 0 CUSTOM_DB 0 92 Installing Symantec ESM Reporting Installing Symantec ESM Reporting Table 3 3 Properties file values JDBC_DRIVER Information abo
220. key that identifies the Symantec ESM account User_Name NVARCHAR 18 Holds the user name Active TINYINT Boolean that identifies whether the Symantec ESM account is active Locked_out TINYINT Boolean that identifies whether the Symantec ESM account is locked out Deleted TINYINT Boolean that identifies whether the Symantec ESM account is deleted Register_only TINYINT Boolean that indicates whether the Symantec ESM account is a register only account Manager_ID CHAR 32 Holds the unique character string Foreign key that identifies a Symantec ESM Manager About the Symantec ESM Reporting database schema Tables in the database schema Table C 3 Account_Permission table Crt_all_policies SMALLINT Boolean that identifies whether the user can create all policies Exec_all_policies SMALLINT Boolean that identifies whether the user can execute all policies Read_all_policies SMALLINT Boolean that identifies whether the user can read all policies Write_all_policies SMALLINT Boolean that identifies whether the user can write all policies Crt_all_domains SMALLINT Boolean that identifies whether the user can create all domains Exec_all_domains SMALLINT Boolean that identifies whether the user can execute all domains Read_all_domains SMALLINT Boolean that identifies whether the user can read from all domains
221. kup files Installing Symantec Enterprise Reporting for IBM DB2 The installation process includes the following tasks Install connect and test the IBM DB2 run time client for Symantec Enterprise Reporting Configure an installed Apache HTTP Web server for Symantec Enterprise Reporting Install Symantec Enterprise Reporting for IBM DB2 Configure the installed Apache HTTP Web server for LDAP authentication Install connect and test the IBM DB2 run time client for Symantec Enterprise Reporting Symantec does not provide a run time client for the IBM DB2 database server You can download the IBM DB2 Run Time Client from the IBM DB2 Web site at http www ibm com software data db2 udb support html 52 Installing Symantec ESM Reporting Installing Symantec ESM Reporting To install the IBM DB2 8 1 run time client for Symantec Enterprise Reporting On the computer on which you are installing Symantec Enterprise Reporting install the IBM DB2 8 1 run time client The process is the same as installing the IBM DB2 8 1 run time client for the Symantec ESM Reporting Database Link See To install the IBM DB2 8 1 run time client for the Symantec ESM Reporting Database Link on page 47 To connect the IBM DB2 8 1 run time client for Symantec Enterprise Reporting 1 On the computer on which you are installing Symantec Enterprise Reporting at the system command prompt change to the Symantec ESM Reporting Windows CD Ch
222. l of zero are green messages Messages per severity Displays the number of messages at each severity or security level Suppressed messages per severity Displays the number of suppressed messages at each severity or security level Unique messages per severity Displays the number of unique messages at each severity or security level Unique suppressed messages per severity Displays the number of unique suppressed messages at each severity or security level Unique possible messages per severity Displays the number of unique possible messages at each severity or security level Possible messages may or may not have been reported in a policy run Table B 58 About the Symantec ESM Reporting metadata model 227 Structure of data items Path Message Summaries Trends Domain Trends Codes Data item Codes POLICY_ID The unique character or numeric string that identifies the Symantec ESM policy CATEGORY_ID An integer that identifies the category MODULE_ID A character or numeric string that identifies a specific Symantec ESM module MANAGER ID The unique character or numeric string that identifies a Symantec ESM Manager DOMAIN_ID A unique character or numeric string that identifies the Symantec ESM domain AGENT_ID A character or numeric string that identifies the name of the Symantec ESM Agent host computer SEVERITY_ID A small integer 0 4 that i
223. lated to the administration of Symantec ESM m Whois the audience m What information should the report find Do I want to know about my agents policies security levels message counts message information or some other information m What is the scope of the report Do I want to know about my enterprise a section of my enterprise or a single computer How do I want to group my information By manager by policy or do I want to organize my data in another way When you have answered these questions you will be able to formulate a report to meet your needs The remainder of this section explains how to use the Report Studio tool to create a report that is specific to your needs Opening Report Studio Report Studio is a separate application from Symantec ESM Reports however you can access it from the Symantec ESM Reporting interface To open Report Studio Inthe Symantec ESM Reporting interface click Report Studio This link is always available in the Symantec ESM Reporting interface m Ifyou click this link when a report or query is open that report or query opens in Report Studio as a template m If noreport is open when you open Report Studio the tool prompts you to choose the type of report that you want to create and then open a blank report Creating a new report You can build a new report using the Report studio tool Symantec ESM Reporting includes a template that you can use to create your own reports
224. latest audit for selected agents Agent daily audit Predefined filter that limits the displayed data to data that was reported from audits for selected agents on a specific date or dates Agent weekly audit Predefined filter that limits the displayed data to data that was reported from audits for selected agents on a specific week or weeks Agent monthly audit Predefined filter that limits the displayed data to data that was reported from audits for selected agents on a specific month or months Agent quarterly audit Predefined filter that limits the displayed data to data that was reported from the audit for selected agents on a specific quarter or quarters Agent yearly audit Predefined filter that limits the displayed data to data that was reported from the audit for selected agents on a specific year or years Select an agent audit date range Predefined filter that lets the user choose a date range for agent trend queries or reports Domain Latest Audit Predefined filter that limits the displayed data to data that was reported from the latest audit for agents in specified domains Domain daily audit Predefined filter that limits the displayed data to data that was reported from audits for agents in specified domains on a specific date or dates Agent weekly audit Predefined filter that limits the displayed data to data that was reported from audits for agents in specif
225. lation Summary panel click Install Note After clicking Install you cannot cancel the installation If you did not uncheck the Web Server check box on the Choose Install Set panel during the installation the Symantec Enterprise Reporting installer will warn you that it is about to install and configure the Apache HTTP Web server installer To install the Apache HTTP Web server for Symantec Enterprise Reporting Note The Apache HTTP Web server uses port 80 by default If the computer on which you are installing the Apache Web server is already using port 80 for another application you must manually change the Apache HTTP Web server to use a different port number For example port 8000 or port 8080 1 On the Welcome to the Installation Wizard for Apache HTTP Server 2 0 49 panel click Next 2 On the License Agreement panel click I accept the terms in the license agreement and then click Next 3 On the Read this First panel click Next 7 8 Installing Symantec ESM Reporting 57 Installing Symantec ESM Reporting On the Server Information panel do one of the following tasks m To select the default network domain server name administrator s email address and port number click Next You must specify the required information that does not display by default m To specify a different network domain server name administrator s email address or port number specify the required information and then clic
226. le fields VIEW _ESM_ACCOUNTS Holds a boolean value A 1 in this field indicates that the associated user can view data for all Symantec ESM user accounts on all managers A 0 in this field indicates that the user cannot view all Symantec ESM user accounts however you can put data into the other tables to give users rights to specific Symantec ESM user accounts Table 4 3 RPT_MANAGER_PERM database table fields USER_NAME Holds the user name MANAGER ID Holds the manager name for which the user has permissions This data comes from the MANAGER table IS_ESM ACCOUNT Holds a boolean value that indicates whether this user information is updated by the Symantec ESM Reporting Data Link Do not modify this field if it contains a boolean one VIEW_ALL_DOMAINS Holds a boolean value that indicates whether this user has permissions to view all domains for the manager VIEW_ALL_POLICIES Holds a boolean value that indicates whether this user has permissions to view all policies for the manager VIEW_ESM_ACCOUNTS Holds a boolean value that indicates whether this user has permissions to view all Symantec ESM user accounts for the manager Table 4 4 RPT_DOMAIN_PERM database table fields USER_NAME Holds the user name IS_ESM ACCOUNT Holds a boolean value that indicates whether this user information is updated by the Symantec ESM Reporting Data Link Do not modify this field if it contai
227. lect a compatible Web server By default Symantec Enterprise Reporting installs the Apache HTTP Web server 28 Before you Install Symantec ESM Reporting Before you install Symantec ESM Reporting m Select an optional authentication service m Determine the type and number of required computers Planning for the Symantec ESM Reporting Reports Package Use the following task list to plan for the Symantec ESM Reporting Reports Package installation m Select the user accounts passwords and role groups for the Symantec ESM Reporting Gateway Ensuring network connectivity Appropriate routing must exist between the computers on which you will install the Symantec ESM Reporting Database Foundation Symantec ESM Reporting Database Link Symantec Enterprise Reporting and Symantec ESM Reporting Reports Package and the computers on which you installed the database server and the Symantec ESM Managers In addition ensure that there is no firewall or device policy blocking the connections between these computers Setting Microsoft SQL Server database authentication On Windows computers using Microsoft SQL server you must select Microsoft SQL Server and Windows authentication mode so that the Symantec ESM Reporting Database Foundation can create the ESM and SER databases To select Microsoft SQL Server and Windows authentication 1 On the computer on which you are installing the Symantec ESM Reporting Database Foundation click Start gt
228. liance trend by line of business cccseeseseseeeeees 169 Quarterly compliance trend by manager cccesesesesseseseeeeseteeeeseees 170 Quarterly violations trend by line of business 0 ccesesesseseseeeeeeees 170 Quarterly violations trend by manager cceccesseseceseeeeseeeeseeeeeseees 170 Suppressed message details ccccccessesssessesesseseeeseseseeeeseseeeeseeeeeeseseeees 170 Suppression configuration oo ceseeseseseseseseeesesesesctsessseceseesscseseseseeeeeees 171 Suppression configuration query cccceseessseesesssseseseseseessesesesesseeeeees 171 Suppression configuration query ccccesesesesesesstseseceseseesseseseseeteeeees 171 Symantec report template 00 0 cc ceeseseseeseseseeseseseeseseeceseeeesesenetseeeeeees 171 Upcoming scheduled audits Query cceseesesesseceeeeeeeseeeeseeeeeeseeeees 171 Violations by line Of business 0 eeseseseseseseseseseeseseseeeeesesesesseeseeeseeeeees 172 Violations by line of business query cccsesesseseseseseseseseseetetseeseeeeees 172 Violations by Manager cccceessesessscecesseseseeeeseeeeseseeeeseseseeseeeseeeneeaeeees 172 Violations by manager query ccecesessesesssseseseeceseeeeseeseeeseeseeseeeeaeeees 172 Weekly agent level trend by line of business esesseseeeeeeeeeeeees 173 Weekly agent level trend by manager ccccceceesseceseeseseteeeeseteeeeseeees 173 Weekly compliance trend by line of business 00 0 0
229. ll Folder panel do one of the following tasks m To select the default location click Next m To select another location click Choose In the Browse for Folder dialog box select the desired location click OK and then click Next Note If you select the Symantec ESM folder uninstalling Symantec ESM will remove the Symantec ESM Reporting Database Link On the Database Type Selection panel click MS SQL Server 2000 and then click Next 10 11 Installing Symantec ESM Reporting 67 Installing Symantec ESM Reporting On the JDBC Driver Information panel do one of the following tasks m To specify the default JDBC Driver Class JDBC Classpath JDBC Library Path and SQL Dialect click Next m To specify another JDBC Driver Class JDBC Classpath JDBC Library Path and SQL Dialect type the information in the related text boxes and then click Next See the JDBC Driver documentation Warning The computers on which you are installing the Symantec ESM Reporting Database Link must use third party JDBC Drivers for the Microsoft SQL Server database Do not use the Microsoft JDBC driver for SQL Server 2000 See System requirements on page 29 On the Database Connection panel do one of the following tasks m To specify the default database URL type the user name and password of the ESM_DB LINK _USER account in the related text boxes and then click Next m To specify another database URL user name and pa
230. ll Summary panel click Install Note If the Symantec ESM Reporting Database Foundation installer reports that it cannot find the local settings directory set the TEMP and TMP environment variables to a path that does not contain international characters Then rerun the Symantec ESM Reporting Database Foundation installer 46 Installing Symantec ESM Reporting Installing Symantec ESM Reporting 18 On the Install Complete panel click Yes restart my system and then click Done Note In a DB2 cluster the Symantec ESM Reporting Database Foundation installer creates the following database user accounts on the primary node ESM _DB LINK USER m ESM REPORT USER ESM CM USER You must manually create these accounts on the secondary node To manually create the ESM and SER databases for IBM DB2 See About the installation scripts for IBM DB2 on page 282 1 uo Ff U N On the computer on which you installed IBM DB2 at the system command prompt change to the Symantec ESM Reporting Windows CD Change to the sql db2 folder Type create_esm_db Type create_ser_db Start the Symantec ESM Reporting Database Foundation installer The process is the same as installing the Symantec ESM Reporting Database Foundation for IBM DB2 except for the following change On the Choose Install Set panel click Import Data and then click Next See To install the Symantec ESM Reporting Database Foundation for IBM DB2 on p
231. m Agent Policy A unique character string that identifies a Trends specific Symantec ESM Policy for a manager Category A unique character string that identifies the category of a specific Symantec ESM message Module A unique character string that identifies a specific Symantec ESM Module Manager A unique character string that identifies a specific Symantec ESM Manager Domain A unique character string that identifies the Symantec ESM Domain for a manager Agent A unique character string that identifies a specific Symantec ESM Agent on a manager Level Displays the security level either red yellow or green of the focus object Audit Date The system date for a specific audit Audit date time The system date and time for a specific audit About the Symantec ESM Reporting metadata model 215 Structure of data items Table B 46 Path Message Summaries Trends Agent Trends Agent Counts Data item Agent Level Displays the security level either red yellow or Counts green of the focus object Rating Displays the rating of the focus object A rating is anumber between zero and four Red objects have a rating of four yellow objects have a rating of between one and three and green objects have a rating of zero Red agents Shows the number of red agents for the focus object Yellow agents Shows the number of yellow agents for the focus object Green agents Shows the number
232. m Inthe Password text box type the password of the ESM_CM_USER account m Inthe Confirm password text box type the password of the ESM_CM_USER account Click OK In the right pane SER Database Resource Properties in the Value text box for the Database name type SER Click the Save configuration icon on the toolbar Click Close Click the Start icon on the toolbar Click Close Exit from the Enterprise Reporting Configuration utility In the Configuration Complete Reboot Needed dialog box click Yes Warning For only IBM DB2 7 2 you must wait a minimum of five minutes after the computer restarts before beginning to install the Symantec ESM Reporting Reports Package The computer must have time to create the table spaces in the SER database Configure the installed Apache HTTP Web server for LDAP authentication If you are using LDAP to authenticate users for Symantec Enterprise Reporting you must manually configure the LDAP server for Symantec Enterprise Reporting To configure the installed Apache HTTP Web server for LDAP authentication 1 On the computer on which you are installing Symantec Enterprise Reporting use a text editor to open the C Program Files Apache Group Apache2 conf httpd conf file In the ScriptAlias section find the following line of text ScriptAlias Enterprise_Reporting cgi bin C Program Files Symantec Enterprise Reporting cgi bin Installing Symantec ESM Report
233. mail could be retrieved from a store and forward email server where email can be stored even after it is sent to the intended recipient To email a report securely 1 Save the report to your computer See Exporting report information on page 134 This procedure also involves some safety considerations See Securing saved reports on page 109 110 Securing Symantec ESM Reporting About user account permissions 2 Doone of the following m Add the report as an attachment then use your email tool to encrypt the entire email before you send it to the recipient m Encrypt the file then add the file to your email as an attachment About backups The information in the Symantec Enterprise Reporting database can be critical to an organization Consider backing up this database However if you backup the database keep in mind the following points Communications between your database and your network backup solution may not be secure Use Symantec Client VPN to secure this connection m Keep backup storage media secure by protecting it from physical compromise About HTTP Web server security The default settings of Symantec Enterprise Reporting use http as the Web protocol To secure your Web server you should configure it to use https or another secure protocol Many commercial Web servers are preconfigured to use https or another secure protocol Consult your vendor documentation for information on configuring an
234. mantec ESM Reporting Database Foundation checklist If you are installing on a distributed configuration what are the names and intended uses of the other computers What is the computer s communication protocol address What operating system is running on the computer What version of the operating system is running on the computer What relational database management system is running on the computer What version of the relational database management system is running on the computer What is the installation file system path name Do you have access to accounts with the required privileges on the computer What CD ROM drive can you use to load the software Can you run a network connectivity test to verify that the computer can connect to the computers in the Symantec ESM Reporting Database Link checklist and the Symantec Enterprise Reporting checklist Symantec ESM Reporting Database Link checklist See Symantec ESM Reporting Database Link system requirements on page 34 Table D 2 Symantec ESM Reporting Database Link checklist What is the computer s name System assessment checklists 265 Symantec ESM Reporting Database Link checklist Table D 2 Symantec ESM Reporting Database Link checklist What is the computer s communication protocol address What operating system is running on the computer What version of the operating system is runnin
235. mation about your Symantec ESM application The reports can be modified for audience purpose and scope and can be automated so that the most current information can be appropriately disseminated About Symantec Enterprise Reporting Symantec Enterprise Reporting is the reporting engine that provides comprehensive reporting for Symantec enterprise security products Symantec ESM Reporting integrates Symantec ESM with Symantec Enterprise Reporting through a database foundation database link and a reports package Symantec Enterprise Reporting provides a Web based user interface that you can use to generate view email and print a wide range of reports for Symantec ESM Introducing Symantec Enterprise Security Manager Reporting 19 Components of Symantec ESM Reporting Components of Symantec ESM Reporting Symantec ESM Reporting includes the components that are depicted in Figure 1 1 These components install separately Figure 1 1 Symantec ESM Reporting components Database server Symantec Symantec ESM ESM Reporting Manager Symantec Report ESM Package Reporting database Symantec Symantec Enterprise ESM Symantec Reporting Reporting Enterprise Database Reporting Link database Web server JDBC Driver JDBC Driver Symantec ESM Reporting components The Symantec ESM Reporting Database Foundation creates the Symantec ESM Reporting database and the Symantec Enterprise Reporting database with their schemas and tables
236. messages in policy runs Disabled checks do not return messages In Symantec ESM Reporting message level is the security level of a reported message In Symantec ESM Reporting a policy consists of a document hardcopy or electronic that outlines specific requirements or rules that must be met This includes the activities or states that are allowed required or forbidden within a specific environment In Symantec ESM a policy is a set of security checks that can audit the security of agents You can change the security checks in a policy to conform with your organizational security policy Policy compliance software audits and scores adherence to your company s security policy by analyzing the settings of controls on information systems in the enterprise Policy configuration management includes the control and configuration of security gateways for example firewalls Through policy configuration management administrators can distribute security policy changes to one or more organizational units without having to direct the changes to individual security gateways Security domains group computers for security purposes Security domains can be based on attributes such as operating system location function and role Security domains often correspond to Symantec ESM Domains Security levels are red yellow and green A red security level represents a serious threat to security A yellow security level is of moderate concern A gree
237. mpliance gt Agent Level About Symantec ESM Reports 175 About the reports in Symantec ESM Reporting Yearly compliance trend by line of business This report shows yearly compliance percentage trends for a selected domain You select a policy with a related module on any manager and domain in your enterprise After you select a date range the report displays a trend chart that shows the aggregate level of compliance for all agents in the domain The report also displays data in table form Default path Public Folders gt Symantec ESM gt Executive gt Policy Compliance gt Compliance Percentage Yearly compliance trend by manager This report shows yearly compliance percentage trends for a selected manager You can select a policy with a module on any manager and domain in your enterprise You then select a date range and the report displays a trend chart that shows the aggregate level of compliance for a selected domain The report also displays the data as a table Default path Public Folders gt Symantec ESM gt Technical gt Policy Compliance gt Compliance Percentage Yearly violations trend by line of business This report shows the yearly policy violation trends for any selected module You select a policy with a related module and then select managers domains and a date range The report displays a trend chart that shows policy violations for a selected manager and domain The report also displays the data in table
238. mpliance Percentage Compliance by manager This report shows policy compliance percentages for managers It lets you select a policy with any or all related modules and a selected domain and then it shows you policy compliance percentage data about that policy for selected managers Information includes module manager and compliance percentage information The report displays data as both a bar chart and a table Default path Public Folders gt Symantec ESM gt Technical gt Policy Compliance gt Compliance Percentage Compliance by manager query This query retrieves policy compliance percentages for managers It lets you select a policy with any or all related modules as well as the domains and managers for which you want data and then it shows you policy compliance percentage data about each module for the selected policy on selected managers Information includes module manager domain and compliance percentage information Default path Public Folders gt Symantec ESM gt Technical gt Policy Compliance gt Compliance Percentage 164 About Symantec ESM Reports About the reports in Symantec ESM Reporting Daily agent level trend by line of business This report shows daily agent security level trends for a selected manager and domain You select a policy with a related module on any manager and domain in your enterprise After you select a date range the report displays a trend chart that shows the number of agents
239. n m Global support from Symantec Security Response experts which is available 24 hours a day 7 days a week worldwide in a variety of languages for those customers enrolled in the Platinum Support Program m Advanced features such as the Symantec Alerting Service and Technical Account Manager role offer enhanced response and proactive security support Please visit our Web site for current information on Support Programs The specific features available may vary based on the level of support purchased and the specific product that you are using Licensing and registration If the product that you are implementing requires registration and or a license key the fastest and easiest way to register your service is to access the Symantec licensing and registration site at www symantec com certificate Alternatively you may go to www symantec com techsupp ent enterprise html select the product that you wish to register and from the Product Home Page select the Licensing and Registration link Contacting Technical Support Customers with a current support agreement may contact the Technical Support group via phone or online at www symantec com techsupp Customers with Platinum support agreements may contact Platinum Technical Support via the Platinum Web site at www secure symantec com platinum When contacting the Technical Support group please have the following Customer Service Product release level Hardware information A
240. n and then select the default installation settings To connect and test the IBM DB2 7 2 run time client for Symantec Enterprise Reporting database On the computer on which you are installing Symantec Enterprise Reporting connect the IBM DB2 7 2 run time client The process is the same as connecting the IBM DB2 7 2 run time client for the Symantec ESM Reporting Database Link except you must make the following changes for the ESM database connection m On the Specify the name of the database to which you want to connect panel in the Database name text box type ESM m Inthe Test Connection dialog box on the Connections tab do the following tasks In the User ID text box type ESM_REPORT_USER In the Password text box type the ESM_REPORT_USER password Click Test Connection You must make the following changes for the SER database connection m On the Specify the name of the database to which you want to connect panel in the Database name text box type SER m Inthe Test Connection dialog box on the Connections tab do the following tasks In the User ID text box type ESM_CM_USER In the Password text box type the ESM_CM_USER password Click Test Connection See To connect and test the IBM DB2 7 2 run time client for the Symantec ESM Reporting Database Link on page 48 Configure an installed Apache HTTP Web server for Symantec Enterprise Reporting If the computer on which you are installing Symantec Enterprise Reporting ha
241. n security level represents no risk to security In Symantec ESM security levels depict the security of agents managers and domains at their highest levels For example if one agent is red then the entire domain is red Similarly if the highest module in a policy is yellow then the entire policy is yellow The centralized scalable management architecture that is used by Symantec security products SESA has managers and agents that are separate from Symantec ESM Managers and Agents Symantec ESM can communicate with and report data to SESA Managers via the ESM SESA Bridge In Symantec ESM Reporting severity is the measure of Symantec ESM security level The colors red yellow or green represent the different levels In Symantec ESM Reporting severity ID is a number from 4 to 0 Severity ID rates the overall impact and risk to Symantec ESM Agents Red severities have a severity ID of 4 Yellow severities have a severity ID of 3 2 or 1 Green severities have a severity ID of 0 Symantec Enterprise Reporting is a reporting engine that provides reporting for Symantec Enterprise security products Symantec ESM Reporting integrates Symantec ESM with Symantec Enterprise Reporting through a database foundation database link and a reports package Symantec ESM Agent Symantec ESM Manager Symantec ESM Console Symantec ESM Reporting violation Glossary 295 In Symantec ESM the agent consists of a module server and its communic
242. n that are at each security level either red yellow or green for the selected policy and its related module The report displays data as both a chart and a table Default path Public Folders gt Symantec ESM gt Executive gt Policy Compliance gt Agent Level Monthly agent level trend by manager This report shows monthly agent security level trends for a selected manager You select a policy with a related module on any manager and domain in your enterprise You then select a date range and the report displays a trend chart that shows the number of agents in the selected domain at each security level red yellow and green for the selected policy and its related module The report also displays the data as a table Default path Public Folders gt Symantec ESM gt Technical gt Policy Compliance gt Agent Level Monthly compliance trend by line of business This report shows monthly compliance percentage trends for a selected domain You select a policy with a related module on any manager and domain in your enterprise After you select a date range the report displays a trend chart that shows the aggregate level of compliance for all agents in the domain The report also displays data in table form Default path Public Folders gt Symantec ESM gt Executive gt Policy Compliance gt Compliance Percentage Monthly compliance trend by manager This report shows monthly compliance percentage trends for a selected manag
243. nel click Next 5 Onthe License Agreement panel click I accept the terms of the License Agreement and then click Next 6 Onthe Installation Location panel do one of the following tasks m To select the default folder click Next m To select another folder click Choose In the Browse for Folder dialog box select the desired folder click OK and then click Next 7 Onthe Choose Install Set panel do one of the following tasks m To select the default software installation set click Next m If the computer on which you are installing Symantec Enterprise Reporting has already installed a Web server uncheck the Web Server check box and then click Next 56 Installing Symantec ESM Reporting Installing Symantec ESM Reporting 8 On the Shortcut Folder panel to let all of the users see the shortcuts check the Make the shortcuts visible to all users check box Then do one of the following tasks m To select the default folder for the shortcuts click Next m To specify a different folder for the shortcuts select a folder in the list and then click Next 9 On the Choose Database Type panel click IBM DB2 and then click Next 10 On the Choose panel do one of the following tasks m To select a JDBC Driver select the desired driver in the list and then click Next m To select another JDBC Driver click Choose other In the Please Select Your JDBC Driver dialog box select the JDBC Driver and then click Open 11 On the Instal
244. ng 119 About user account permissions Use the following sets of commands as templates to do specific actions The following command removes acce ss to specific policies Phase 1 and Phase 2 on a specific manager Manager_1 from a specific user ERM WHERE USER_NAME User1 DELETE FROM ESMDB10 RPT_POLICY_P Userl AND POLICY_ID IN SELECT ESMDB10 POLICY P M MANAGER_ID AND P POLICY_NAME IN M MANAGER_NAME Manager_1 The following set of commands remov specific users Userl and User2 POLICY_ID FROM ESMDB10 MANAGER M WHERE P MANAGER_ID Phase 1 Phase 2 AND es all access to ESM data from ESMDB10 RPT_MANAGER_PERM WHERE IS_ESM_ ACCOUNT User2 FROM ESMDB10 RPT_DOMAIN_PERM WHERE IS_ESM_ ACCOUNT 0 DELETE FROM 0 AND USER_NAME IN Userl1 DELETE AND USER_NAME IN Userl User2 DELETE AND USER_NAME IN Userl User2 DELETE FROM FROM ESMDB10 RPT_POLICY_PERM WHERE IS_ESM_ACCOUNT 0 User1l User2 ESMDB10 RPT_ALL_MGR_PERM WHERE USER_NAME IN The following command revokes a specific permission view all policies on a specific manger Manager1 from a user named Joe UPDATE ESMDB10 RPT_MANAGER_PERM SET VIEW_ALL_POLICIES 0 WHERE FROM ESMDB10 MANAGER WHERE MANAG USER_NAME Joe AND
245. nge the report displays a trend chart that shows the number of agents for that manager and domain that are at each security level either red yellow or green for the selected policy and its related module The report displays data as both a chart and a table Default path Public Folders gt Symantec ESM gt Executive gt Policy Compliance gt Agent Level Quarterly agent level trend by manager This report shows quarterly agent security level trends for a selected manager You select a policy with a related module on any manager and domain in your enterprise You then select a date range and the report displays a trend chart that shows the number of agents in the selected domain at each security level red yellow and green for the selected policy and its related module The report also displays the data as a table Default path Public Folders gt Symantec ESM gt Technical gt Policy Compliance gt Agent Level Quarterly compliance trend by line of business This report shows quarterly compliance percentage trends for a selected domain You select a policy with a related module on any manager and domain in your enterprise After you select a date range the report displays a trend chart that shows the aggregate level of compliance for all agents in the domain The report also displays data in table form Default path Public Folders gt Symantec ESM gt Executive gt Policy Compliance gt Compliance Percentage 170
246. ns a boolean one Securing Symantec ESM Reporting 113 About user account permissions Table 4 4 RPT_DOMAIN_PERM database table fields DOMAIN_ID Holds the domain ID for which the user has permissions This value comes from the ESM_DOMAIN table Table 4 5 RPT_POLICY_PERM database table fields USER_NAME Holds the user name IS_ESM ACCOUNT Holds a boolean value that indicates whether this user information is updated by the Symantec ESM Reporting Data Link Do not modify this field if it contains a boolean one POLICY_ID Holds the policy name for which the user has permissions This value comes from the POLICY table Table 4 6 ACCOUNT_MAPPING database table fields USER_NAME Holds the user name of the NTLM LDAP or other authentication account that is used to log into Symantec Enterprise Reporting ACCOUNT_ID Holds the Symantec ESM account ID taken from the ACCOUNT table See Assigning user account permissions using the Symantec ESM Reporting Database Link on page 115 114 Securing Symantec ESM Reporting About user account permissions About anonymous access and administrator accounts If you enabled anonymous access during installation you should disable it to prevent unauthorized users from gaining network access However you need to create an administrator account with all privileges to pre vent loss of administration rights to your application If you disable anonymous access you c
247. ns and agents in those domains Table B 20 Path Administratio n Suppression Filters Data item Suppression Filters Expired within last n days Filter that limits the displayed data to suppressions that have expired within the number of days that you specify Will expire within n days Filter that limits the displayed data to suppressions that will expire within the number of days that you specify Created within last n days Filter that limits the displayed data to suppressions that were created within the number of days that you specify 196 About the Symantec ESM Reporting metadata model Structure of data items Message Information folder structure The following data items are included in the Message Information folder Table B 21 Path Message Information Messages Data item Messages Message title A unique character string that identifies the title of a specific Symantec ESM message Message description A unique character string that describes the message The string can include multi byte unicode characters for international use Message format A unique character string that describes the replaceable parameter structure of a specific Symantec ESM message Message name A unique character string that displays the message name Message info A unique character string that displays the message information Audit date Specifies the date of the policy run Se
248. nsure that your reports contain the latest data State reports have prompts that let you select all available data or a subset of that data For example if a report displays information about your Symantec ESM Managers you can select just those managers that you want If a report has information about domains for a manager you can select the managers then select from among the domains on those managers and the report shows only information about those domains See About Symantec ESM Reports on page 155 About trend reports Trend reports show information over a period of time You can select the beginning and end dates to show data for any period of time for which you have data A graph shows how the state of your network has changed over time and a table shows data for each point in time Data for these reports is derived from policy runs on a per domain basis Note Because state and trend reports derive data in different ways state and trend reports for the same day may differ slightly Because state reports use the last policy run for each agent regardless of domain or date state reports may access a set of policy runs over wider range of dates and may report slightly different information Like state reports trend reports have prompts that let you show trends for only the data that you want You can use prompts to select or filter managers domains agents or other data See About Symantec ESM Reports on page 15
249. o 32 characters that identifies the short name of an ESM Module RUN_STATE_ID An integer that identifies the run state of a policy run USER_DEFINED_ KEY Integer that identifies whether the Symantec ESM domain can be defined by the user DOMAIN _ID A unique character or numeric string that identifies the Symantec ESM domain FULL_POLICY_RUN_ KEY A boolean integer that specifies whether the policy run was a full policy run AUDIT_SUCCESSFUL_ KEY A boolean integer that specifies whether the policy run was successful AGENT_AUDIT _ ERR_ID An character or numeric that specifies the agent error 188 About the Symantec ESM Reporting metadata model Structure of data items Table B 12 Path Administration Manager Domain Agent Data item Manager Manager A unique character string that identifies a Domain specific Symantec ESM Manager Agent Domain A unique character string that identifies the Symantec ESM Domain for a manager Agent A unique character string that identifies a specific Symantec ESM Agent on a manager Policy A unique character string that identifies a specific Symantec ESM Policy for a manager Domain count Fact that counts the number of Domains per Manager Agent count Fact that counts the number of Agents per Manager About the Symantec ESM Reporting metadata model 189 Structure of data items Table B 13 Path Adminis
250. o place the item in the report You can place item in reports from the metadata model from the toolbox or from other areas in the explorer bar You can add charts tables graphics text HTML links and other types of data to your reports See the online Help or the Report Studio User Guide for complete information on adding data to your reports You can find this guide on the CD in the Docs Symantec Enterprise Reporting directory Running Symantec ESM Reporting 147 Using Report Studio Toolbox items In addition to text and images the Toolbox tab in the Insertable Objects pane contains other objects that you can add to a report To add an object drag or double click it from the Toolbox tab Table 5 3 Toolbox items Calculation Adds a calculated column Block Adds an empty block a container in which you can insert other objects This is useful for controlling where objects appear Table Adds a table a container in which you can insert other objects This is useful for controlling where objects appear Hyperlink Adds a hyperlink so that users can jump to another place such as a Web site Row Number Numbers each row of data returned when the report is run HTML Adds a container in which you can insert HTML code such as a link to a multimedia file Note HTML items appear only when you run the report in HTML format Layout Component Adds a reference to another object Useful when you want Ref
251. oday Predefined filter that limits the displayed data to audits that have not yet finished within the last day Audits scheduled in Filter that limits the displayed data when you next n days specify audits that scheduled to start ina number of days that you specify Audits scheduled today Predefined filter that limits the displayed data to audits that start on the current day Audit state only Predefined filter that limits the displayed data to only data about audit states Table B 19 Audit Filters About the Symantec ESM Reporting metadata model 195 Structure of data items Path Administration Audit Filters Data item Last finished audit errors Predefined filter that limits the displayed data to audit error information for only the most recently completed audit Next audit for policy Filter that limits the displayed data to information about the next scheduled audit for a specific policy Scheduled audits only Predefined filter that limits the displayed data to information about upcoming scheduled audits Audit errors only Predefined filter that limits the displayed data to information pertaining to policy run errors Agent errors only Predefined filter that limits the displayed data to information pertaining to errors that are reported by agents User defined domains only Predefined filter that limits the displayed data to data about user defined domai
252. olean that identifies whether the policy run was a full policy run Primary key String_code VARCHAR 20 Code that identifies a specific string 253 254 About the Symantec ESM Reporting database schema Tables in the database schema Table C 50 Severity table Severity_ID SMALLINT Holds a small integer that identifies the level of severity Primary key Severity_name_code VARCHAR 20 Code that identifies a severity name string Rating multiplier INTEGER Integer that holds values for the amount of points that a message adds to a rating Ten points for a red message 1 point for a yellow message and zero points for a green message Table C 51 SU_Version table Platform CHAR 16 Holds the operating system type and Primary key version SU_version CHAR 16 Holds the Security Update version for thae computer Locale_ID CHAR 32 Holds a string of fixed length 32 Primary key characters that identifies which language Foreign key Symantec ESM is using Table C 52 Suppression table Suppression_ID CHAR 32 Holds the unique character string that identifies the supression Primary key Suppression_name NVARCHAR 256 Holds the data that identifies the suppression by name Info_string NVARCHAR 2000 Holds a string that can include multi byte unicode characters for international use Agent NVARCHAR 256 Holds the name of
253. omplies with a Symantec ESM Policy Security levels associated with these Oracle Patches messages rate the severity of the security risk to these computers Oracle Objects Oracle Passwords Oracle Profiles Oracle Roles Oracle Tablespace Password Strength Program Find Queries Registry Response SQL Server Auditing SQL Server Configuration SQL Server Objects SQL Server Password Strength SQL Server Roles Startup Files Symantec Product Info SysVal Control SysVal Security SysVal Storage System Auditing System Mail System Queues User Files Table E 1 About Symantec ESM Reporting categories About the categories in Symantec ESM Reporting 277 Symantec ESM Reporting Categories System Error lt All Modules gt Account Information Account Integrity Active Directory Backup Integrity Device Integrity Discovery Disk Quota Encrypted File System File Access File Attributes File Find File Information File Watch Integrated Command Engine Login Parameters Network Integrity OS Patches Object Integrity Oracle Accounts Oracle Auditing Oracle Configuration Oracle Networks Oracle Objects Oracle Passwords Oracle Patches Oracle Profiles Messages in this category
254. omputers behind a firewall Securing Symantec ESM Reporting 109 About security considerations If your computers are in a physically secure location you can isolate these connections by setting up a dual homed host through a physically secure segment of the network The connection can pass sensitive information in clear text but unauthorized personnel cannot access it Securing saved reports When you save reports to your computer the file permissions may allow others to access and view the report You may need to take additional steps to ensure that your reports are secure To secure saved reports Doone or more of the following m Using your operating system modify the file permissions to allow access to the report to only authorized individuals m Encrypt the report files About printing reports Connections to network printers may not be secure Use Parallel port or USB printers where possible Securing email Symantec Enterprise Reporting incorporates an option to email reports directly from the Symantec Enterprise Reporting interface This function sends email insecurely and can be intercepted and read by an unintended recipient You may be able to use this function if you are sending email to a recipient within your network and you know that the email will not be sent to a server outside of your protected network However if the email travels outside of your network the communications could be intercepted or the e
255. on the manager with manage user rights and read only access rights to all domains and policies m Type the password of the manager account m Specify the port number of the manager Click the right arrow to add the manager to the list Optionally repeat these steps to let the Symantec ESM Reporting Database Link connect to another Symantec ESM Manager 12 13 Installing Symantec ESM Reporting 51 Installing Symantec ESM Reporting Warning Do not connect two Symantec ESM Reporting Database Links to the same Symantec ESM Manager and database The database link log will report primary key failures If you specify connections to several Symantec ESM Managers during the installation of a Symantec ESM Reporting Database Link a race condition may cause some ESM database errors during the initial transfer of data You can correct the errors by stopping and restarting the Symantec ESM Reporting Database Link See Checking the Symantec ESM Reporting Database Link log for errors on page 101 On the Pre Install Summary panel click Install On the Install Complete panel click Done Note In the C Program Files Symantec Reporting Database_Link server default conf log4j xml file the default settings limit the Symantec ESM Reporting Database Link log file to a maximum file size of 50 MB and three backups You can change the MaxFileSize value to increase the file size and the MaxBackupIndex value to increase the number of bac
256. onal SQL script to tune the database See About Symantec ESM Reporting installation scripts on page 281 Note For only IBM DB2 7 2 you must log on to the computer on which you installed IBM DB2 using the DB2ADMIN account To install the Symantec ESM Reporting Database Foundation for IBM DB2 1 On the computer on which you installed IBM DB2 access the Symantec ESM Reporting Windows CD If the autorun feature does not start double click setup bat 2 Onthe Symantec Enterprise Security Manager ESM 6 1 Reporting CD panel in the left pane click Database Foundation Installing Symantec ESM Reporting 43 Installing Symantec ESM Reporting In the right pane do the following tasks m Review the information m Complete the installation prerequisites m Click Execute the Database Foundation Installer On the Introduction panel click Next On the License Agreement panel click I accept the terms of the License Agreement and then click Next On the Choose Install Set panel do one of the following tasks m To let the Database Foundation installer create the ESM and SER databases and import the necessary data click Default DB2 and then click Next The Symantec ESM Reporting Database Foundation installer creates the ESM and SER databases with 2 GB each for the User and Index tablespaces If your installation requires larger tablespaces you must manually create the ESM and SER databases and then select the Import Dat
257. or green of the focus object Audit Date The system date for a specific audit Audit date time The system date and time for a specific audit 222 About the Symantec ESM Reporting metadata model Structure of data items Table B 53 Path Message Summaries Trends Domain Trends Agent Counts Data item Agent Level Displays the security level either red yellow or Counts green of the focus object Rating Displays the rating of the focus object A rating is anumber between zero and four Red objects have a rating of four yellow objects have a rating of between one and three and green objects have a rating of zero Red agents Shows the number of red agents for the focus object Yellow agents Shows the number of yellow agents for the focus object Green agents Shows the number of green agents for the focus object Audited agents Shows the total number of audited agents for the focus object Total agents Shows the total number of agents associated with the focus object About the Symantec ESM Reporting metadata model 223 Structure of data items Table B 54 Path Message Summaries Trends Domain Trends Compliance Counts Data item Compliance Agent compliance Show a number that rates a compliance Counts percentage for agents This fact only works correctly when agents are specified individually in a previous column of the query Compliance Shows a number which rates th
258. orks correctly when agents are specified individually in a previous column of the query Compliance Shows a number which rates the compliance percentage for the focus object 0 10 counts Shows the number of agents that have a compliance percentage level that falls between 0 10 percent gt 10 20 counts Shows the number of agents that have a compliance percentage level that falls between 10 20 percent gt 20 30 counts Shows the number of agents that have a compliance percentage level that falls between 20 30 percent gt 30 40 counts Shows the number of agents that have a compliance percentage level that falls between 30 40 percent gt 40 50 counts Shows the number of agents that have a compliance percentage level that falls between 40 50 percent gt 50 60 counts Shows the number of agents that have a compliance percentage level that falls between 50 60 percent gt 60 70 counts Shows the number of agents that have a compliance percentage level that falls between 60 70 percent gt 70 80 counts Shows the number of agents that have a compliance percentage level that falls between 70 80 percent gt 80 90 counts Shows the number of agents that have a compliance percentage level that falls between 80 90 percent About the Symantec ESM Reporting metadata model 205 Structure of data items Table B 30 Path Message Summaries Agent Summaries Compliance C
259. ormation objects are the main report items They represent columns in a report Managers Agents Domains and Policies are examples of information objects Information objects often relate to fields in a table in the database Facts A fact is a quantifiable column in a report Examples of facts include numbers of messages and numbers of types and severities of messages Facts should generally be inserted into reports after information objects Filters Filters control and limit the data so you can display the specific information you need When you add a filter to a report it refines the displayed information to be more specific Structure of data items The following set of tables describes the data items in the Symantec ESM Reports metadata model Data items described in these tables include information objects filters and facts See Data items on page 137 The tables include the name of the data item a description of the data item and a container Containers can be either folders or query subjects At the top of each table is a path to locate the data items that shows the folders of query subjects that you must expand in the tree to access the data item 182 About the Symantec ESM Reporting metadata model Structure of data items Administration folder structure The following data items are included in the Administration folder Table B 3 Path Administration Account permissions Data item Account Manag
260. orting Database Foundation for MS SQL on page 62 6 Atthe system command prompt change to the Symantec ESM Reporting Windows CD 7 Change to the sql sqlserver createESMdb folder 8 Type post_install 66 Installing Symantec ESM Reporting Installing Symantec ESM Reporting Note If you changed the name of the ESM database in the installation scripts you must change the name of the ESM database in the post_install bat script Installing the Symantec ESM Reporting Database Link for MS SQL The installation process consists of installing the Symantec ESM Reporting Database Link for MS SQL See About the Database Link installer on page 25 To install the Symantec ESM Reporting Database Link for MS SQL 1 On the computer on which you are installing the Symantec ESM Reporting Database Link access the Symantec ESM Reporting Windows CD If the autorun feature does not start double click setup bat On the Symantec Enterprise Security Manager ESM 6 1 Reporting CD panel in the left pane click Database Link In the right pane do the following tasks m Review the information m Complete the installation prerequisites m Click Execute the Database Link Installer On the Introduction panel click Next On the License Agreement panel click I accept the terms of the License Agreement and then click Next On the Choose Installation Type panel click Initial Installation and then click Next On the Choose Insta
261. ory_Trend table Policy_ID CHAR 32 Holds the unique character string Primary key that identifies the Symantec ESM policy Foreign key Audit_date DATE Holds the audit date Audit_datetime DATETIME Holds the date and time of the Primary key related audit Table C 19 About the Symantec ESM Reporting database schema Tables in the database schema Category_Trend table 241 Category_ID INTEGER Holds an integer that identifies the Primary key category Link this field to the String Code field Foreign key in the Content_String Map table to identify the categories Group_ID CHAR 32 Holds a unique character string that Primary key identifies the group Foreign key Severity_ID SMALLINT Holds a small integer that identifies Primary key the level of severity Foreign key Messages INTEGER Holds an integer that counts the number of messages Suppr_messages INTEGER Holds an integer that counts the number of suppressed messages Unique_messages INTEGER Holds an integer that counts the number of unique messages Unique_suppr_msgs INTEGER Holds an integer that counts the number of unique suppressed messages Unique_PSBL_msgs INTEGER Holds an integer that counts the number of unique possible messages for a specific agent or policy Grouped_agents INTEGER Holds an integer that counts the possible agents in a domain Run_agents I
262. ounts Data item Compliance gt 90 100 counts Shows the number of agents that have a Counts compliance percentage level that falls between 90 100 percent Table B 31 Path Message Summaries Agent Summaries Message Counts Data item Message Red messages Shows the number of red messages for the focus Counts object Yellow messages Shows the number of yellow messages for the focus object Green messages Shows the number of green messages for the focus object Messages Shows the total number of reported messages Suppressed messages Shows the number of suppressed messages for the focus object Unique messages Shows the number of unique messages for the focus object Unique suppressed Shows the number of unique suppressed messages messages for the focus object Unique possible Shows the number of unique possible messages messages for the focus object Violations Shows the number of messages that indicate that the agent is out of compliance with the policy 206 About the Symantec ESM Reporting metadata model Structure of data items Table B 32 Path Message Summaries Agent Summaries Severity Counts Data item Severity Counts Severity level Displays the security level either red yellow or green Severity ID A small integer 0 4 that identifies the level of severity Red messages per severity Displays the number of red messages Messages
263. outlined in the EAR nor to any person or entity on the DOC Denied Persons Entities and Unverified Lists the U S Department of State s Debarred List or on the U S Department of Treasury s lists of Specially Designated Nationals Specially Designated Narcotics Traffickers or Specially Designated Terrorists Furthermore Licensee agrees not to export or re export Symantec products to any military entity not approved under the EAR or to any other entity for any military purpose nor will it sell any Symantec product for use in connection with chemical biological or nuclear weapons or missiles capable of delivering such weapons 7 General If You are located in North America or Latin America this Agreement will be governed by the laws of the State of California United States of America Otherwise this Agreement will be governed by the laws of England and Wales This Agreement and any related License Module is the entire agreement between You and Symantec relating to the Software and i supersedes all prior or contemporaneous oral or written communications proposals and representations with respect to its subject matter and ii prevails over any conflicting or additional terms of any quote order acknowledgment or similar communications between the parties This Agreement shall terminate upon Your breach of any term contained herein and You shall cease use of and destroy all copies of the Software The disclaimers of warran
264. place lt ORACLE_HOME gt with the ORACLE HOME directory and then click Next m To specify another JDBC Driver Class JDBC Classpath and JDBC Library Path type the information in the related text boxes and then click Next On the Database Connection panel do one of the following tasks m To specify the default database URL and user name type the password of the user account in the text box and then click Next m To specify another database URL user name and password type the information in the related text boxes and then click Next On the Pre Install Summary panel click Install Note If the Symantec ESM Reporting Database Foundation installer reports that it cannot find the local settings directory set the TEMP and TMP environment variables to a path that does not contain international characters Then rerun the Symantec ESM Reporting Database Foundation installer On the Install Complete panel click Done Note During the installation of the Symantec ESM Reporting Database Foundation the installer creates an Oracle user account This account is not intended for users The purpose of the account is to provide a schema name The account has full access to all of the database tables but does not have connect privileges or a password The installer deactivates the account to prevent unauthorized access Installing Symantec ESM Reporting 79 Installing Symantec ESM Reporting To manually create the ESM and S
265. port groups the error messages by domain manager and agent When you select domains managers and policies the report shows audit error messages for each agent for the most recent policy run Default path Public Folders gt Symantec ESM gt Technical gt Administration gt Errors 162 About Symantec ESM Reports About the reports in Symantec ESM Reporting Audit errors query Use this query to retrieve all audit errors on managers and domains in your enterprise The tabular information is grouped according to manager domain and policy It also shows the job ID the agent error the module name and the module error You can filter the query based on any of these categories Default path Public Folders gt Symantec ESM gt Technical gt Administration gt Errors Note Error descriptions are truncated to 510 characters This is also true in Symantec ESM Audits scheduled for today query This query lists the audits that are scheduled to run on the current day This report shows the manager name the policy name the job ID the start time and the run state for the policies Default path Public Folders gt Symantec ESM gt Technical gt Administration gt Audits Change event details This tabular report shows how agents have been changed since the last snapshot You can specify policy module and severity on any or all managers domains and agents The report generates event titles names information
266. porting Reports Package for IBM DB2 except for the following change On the Database Type panel click Microsoft SQL Server 2000 and then click Next See To install the Symantec ESM Reporting Reports Package for IBM DB2 on page 60 See About the Reports Package installer on page 26 To test the Symantec ESM Reporting Reports Package See To test the Symantec ESM Reporting Reports Package on page 61 Install on Windows computers using Oracle Symantec ESM Reporting can be installed on a mix of Windows and UNIX computers using an IBM DB2 Microsoft SQL Server MS SQL or Oracle database server The following procedures describe the installation of Symantec ESM Reporting on Windows computers using an Oracle database server on a Solaris computer Installing the Symantec ESM Reporting Database Foundation for Oracle The installation process includes the following tasks m Configure the environment variables for the Oracle user m Install the Symantec ESM Reporting Database Foundation for Oracle Configure the environment variables for the Oracle user See To configure the environment variables for the Oracle user on page 76 Installing Symantec ESM Reporting 73 Installing Symantec ESM Reporting Install the Symantec ESM Reporting Database Foundation for Oracle See Install the Symantec ESM Reporting Database Foundation for Oracle on page 76 Installing the Symantec ESM Reporting Database Link on Windows
267. pts About the installation scripts for Oracle m Tablespace SER 32K TMP TS This tablespace is the user temporary tablespace The file name is sertemp01 dbf Symantec ESM 6 1 Reporting CD Replacement Form CD REPLACEMENT After your 60 Day Limited Warranty if your CD becomes unusable fill out and return 1 this form 2 your damaged CD and 3 your payment see pricing below add sales tax if applicable to the address below to receive replacement CD DURING THE 60 DAY LIMITED WARRANTY PERIOD THIS SERVICE IS FREE You must be a registered customer in order to receive CD replacements FOR CD REPLACEMENT Please send me CD Replacement s Name Company Name Street Address No P O Boxes Please City State Zip Postal Code ee Country Daytime Phone Software Purchase Date This offer limited to U S Canada and Mexico Outside North America contact your local Symantec office or distributor Briefly describe the problem CD Replacement Price 10 00 SALES TAX TABLE AZ 5 CA 7 25 CO 3 CT 6 DC 5 75 FL 6 GA 4 Sales Tax See Table IA 5 IL 6 25 IN 5 KS 4 9 LA 4 MA 5 MD 5 ME 6 MI 6 Shipping amp Handling 9 95 MN 6 5 MO 4 225 NC 6 NJ 6 NY 4 OH 5 OK 4 5 PA 6 SC TOTAL DUE 5 TN 6 TX 6 25 VA 4 5 WA 6 5 WI 5 Please add local sales tax as well as state sales tax in AZ CA FL GA MO NY OH OK SC TN TX W
268. puters you must stop the Symantec ESM Reporting Database Link daemon See Stopping and restarting the Symantec ESM Reporting Database Link on UNIX on page 98 Additional Windows requirements The following requirements apply to Windows computers The Windows computers on which you are installing the Symantec ESM Reporting Database Foundation the Symantec ESM Reporting Database Link Symantec Enterprise Reporting or the Symantec ESM Reporting Reports Package must not be running the Symantec pcAnywhere service The Windows computers on which you are installing the Symantec ESM Reporting Database Foundation the Symantec ESM Reporting Database Link Symantec Enterprise Reporting or the Symantec ESM Reporting Reports Package must display at least 256 colors and 800 by 600 pixels The Windows computers on which you installed IBM DB2 must maintain a 2 1 ratio of tablespace to index space because the Symantec ESM Reporting Database Foundation installer creates databases that use database managed tablespaces The Windows computers on which you are installing the Symantec ESM Reporting Database Link must install third party JDBC Drivers for the Microsoft SQL Server database The Symantec ESM Reporting Database Link is not fully compatible with the Microsoft JDBC Driver for Microsoft SQL Server See the jTDS JDBC Drivers at http sourceforge net or the list of JDBC Drivers at http servlet java sun com products jdbc drivers 38 Befor
269. quence to fully install Symantec ESM Reporting m Database Foundation m Database Link m Symantec Enterprise Reporting m Reports Package 24 Before you Install Symantec ESM Reporting Before you install Symantec ESM Reporting Before you install Symantec ESM Reporting ensure that the Symantec ESM Managers have been upgraded to Symantec ESM 6 0 or 5 5 and Security Update 1901 Also ensure that the computers on which Symantec ESM Reporting components and Symantec Enterprise Reporting components will be installed are properly prepared and that you have the logon and other installation information See About system assessment checklists on page 263 About the Database Foundation installer The Database Foundation installer creates two databases with their necessary tables and initial data m The Symantec ESM Reporting database stores the data from the Symantec ESM Managers m The Symantec Enterprise Reporting database stores the queries and reports that Symantec provides as well as the queries and reports that you create Symantec provides the database scripts for the Database Foundation installer on the CD in the database_loader sql lt database_name gt folder You can change the scripts to customize the databases for your organization For only IBM DB2 and MS SQL if you change the scripts you must still run the database installer to load the initial data Select the Import Data option on the Choose Install Set panel to skip
270. r Symantec Enterprise Reporting m Install the Apache HTTP Web server for Symantec Enterprise Reporting m Install Symantec Enterprise Reporting for Oracle m Configure the installed Apache HTTP Web server for LDAP authentication Configure the environment variables for Symantec Enterprise Reporting Environment variables provide critical information during the installation of Symantec Enterprise Reporting To configure the environment variables for Symantec Enterprise Reporting On the computer on which you are installing Symantec Enterprise Reporting ensure that the owner has set up the following environment variables Table 3 2 New environment variables ORACLE_HOME The full path name to the directory that contains the database client software or the entire database installation TNS_ADMIN The path name to the tns files including tnsnames ora This file calls the Oracle database to determine the required server connections LD_LIBRARY_PATH The path name to the directory that contains the Oracle library files NLS_LANG The setting that provides support for multilingual databases Its three components are language territory and character set Ensure that the character set is UTF8 UTF16 AL32UTF8 or 16UTF16 84 Installing Symantec ESM Reporting Installing Symantec ESM Reporting Table 3 2 New environment variables JAVA_HOME The path name to the directory that contains Java 1 3 1_07 Install th
271. r query You can place columns in any location in the report including to the left of to the right of or between existing columns You can also add information that spans existing columns by adding information above the columns For complete information on how to add information to a query and on the effects of adding information to a specific location in a query see the Query Studio User Guide on the CD in the Docs Symantec Enterprise Reporting directory To add data to a defined query 1 Select Insert Data from the menu on the upper left side of the screen to see the metadata model 2 Determine the type of report that you are trying to create Depending of the type report that you want to create do one of the following m If the query is for a Symantec ESM Administration report use data items in the Administration folder of the metadata model m If the query is intended to provide specific information to operations personnel to improve the security of agent computers use data items in the Message Information folder in the metadata model Filter queries Running Symantec ESM Reporting 141 Using defined queries m If the query is intended for management to provide information on current security status use the data items in the Message Summaries folder of the metadata model 3 Expand the metadata model to locate the data items that you want to include in the query 4 Doone of the following m To add the data item column
272. r the numbers of green yellow and red messages you could easily see for any agent the number of messages for each policy and module at each level You could also easily locate the agent according manager and domain You could order this query in several ways depending on what items are most important to you When you have answered appropriate planning questions you will be able to formulate an exact query to meet your needs The remainder of this section explains how to use the Query Studio tool to create a query that is specific to your needs Queries use a metadata model that lets you find and insert information into your view The metadata model is made up of folders query subjects information objects facts and filters Table 5 2 displays the icons in the metadata model that represent each object and describe their functions Table 5 2 Metadata model components Folder Folders hold all other objects that are in the metadata E model The metadata model uses folders Query subject Query subjects represent tables in the database They generally hold information objects Information object Information objects are the main report items They _ represent columns in a report Managers agents F domains and policies are examples of information objects Information objects often relate to fields in a table in the database 137 138 Running Symantec ESM Reporting About using queries Table 5 2 Metadata mo
273. ratch the Query Studio cannot remember what prompt values that you selected Each change requires you reenter the prompt values Also the Query Studio cannot determine which prompts are necessary based on the columns that you add to the query and requests all associated prompts regardless of whether you use a related column To work around this issue when you use the query studio use the queries in the Custom Queries folder in the user interface Combinations of data objects When you create queries you must use information objects filters and facts from within the same query subject Using data objects from different query subjects may result in errors 180 About the Symantec ESM Reporting metadata model Combinations of data objects Objects that require another object Some data objects must combine with other objects to return useful information for example a query that uses only Asset tag or Description An effective query will combine one of these objects with an object such as Agent name or Domain Data items from one section of the metadata model often do not pertain to other sections Because each section of the model has its own specific purpose combining data items from separate sections of the metadata model can result in errors or meaningless reports Some examples of data items that have these types of dependencies include the following m User permissions m Agent properties m Suppression information m Ch
274. re used to update values in certain prompt selection fields For example if you run a report that groups data by managers and domains you may see a list of managers a button labeled Refresh Domains and a list of domains If you select all the managers and then click the Refresh Domains button the list of domains remains the same If you select fewer than all of the managers and you click the Refresh Domains button the list changes to reflect only those domains that are on the managers that you selected If you select a manager and do not click the Refresh Domains button and then select a domain that is not on the manager that you selected the report fails and the interface reports an error To select prompts for your reports Do each of the following as necessary m Select one or more values from a list box Select only one value from a drop down menu Select one or more values from a check box Select only one value from a radio button Refresh to update prompt values Running Symantec ESM Reporting 133 Scheduling reports Scheduling reports You can schedule reports to run at a time that is convenient for you such as during off hours when demands on the network are low You can schedule reports individually or in a group by using a job You can schedule reports to run by minute hourly daily weekly monthly or yearly Only one schedule can be associated with each report or job If you require multiple schedules for
275. reate both the ESM and SER Databases and then click Next m Tocreate only the Symantec ESM Reporting database click Create the ESM Database only and then click Next m To create only the Symantec Enterprise Reporting database click Create the SER Database only and then click Next Note Symantec ESM Reporting requires both the ESM and SER databases to function On the Get Database Names panel do one of the following tasks m To specify the default Symantec ESM Reporting Database Name and Symantec Enterprise Reporting Database Name click Next m To specify different database names type the names in the related text boxes and then click Next On the Database Drive panel do one of the following tasks m To specify the default drive click Next m To specify another drive for the databases to store data type the name of the drive in the text box and then click Next On the Default Password panel do the following tasks m Inthe Default Password text box type a secure password for the database accounts m Inthe Confirm Default Password text box retype the password On the Symantec ESM Reporting database accounts panel do one of the following tasks m To specify the default account name and password for the Symantec ESM Reporting Database Link account and the Symantec Enterprise Reporting account click Next m To specify another account name or password for the Symantec ESM Reporting Database Link account or t
276. report errors on Symantec ESM Agent host computers that prevent or invalidate a policy run These can be regarded as audit errors 278 About Symantec ESM Reporting categories About the categories in Symantec ESM Reporting Table E 1 Symantec ESM Reporting Categories System Error Oracle Roles Messages in this category report errors on Symantec ESM Agent host computers that prevent or invalidate a policy run These can be regarded as audit errors Oracle Tablespace Password Strength Program Find Queries Registry Response SQL Server Auditing SQL Server Configuration SQL Server Objects SQL Server Password Strength SQL Server Roles Startup Files Symantec Product Info SysVal Control SysVal Security SysVal Storage System Auditing System Mail System Queues User Files System lt All Modules gt Messages in this category report Information information that can be used to Account Information manually assess or audit a computer These messages do not have a direct implication regarding Active Directory the security state of the computer Account Integrity Backup Integrity Discovery Disk Quota Table E 1 About Symantec ESM Reporting categories About the categories in Symantec ESM Reporting 279 Symantec ESM Reporting Categories System Information Encrypted File System Fil
277. ripts to create the databases for Oracle See About the Database Foundation installer on page 24 Create the ESM and SER databases When you run the Database Foundation installer and select the Default Oracle option the installer creates two databases By default ESM is the name of the Symantec ESM Reporting database and SER is the name of the Symantec Enterprise Reporting database Each database has 2 GB for User and Index tablespaces If your installation requires larger table spaces Symantec provides SQL scripts that let you manually create the ESM and SER databases These scripts also import the necessary data into the databases After the scripts finish importing data you must run an additional SQL script to tune the database See About Symantec ESM Reporting installation scripts on page 281 Configure the environment variables for the Oracle user Environment variables provide critical information for the Oracle user 76 Installing Symantec ESM Reporting Installing Symantec ESM Reporting To configure the environment variables for the Oracle user On the computer on which you installed Oracle in the profile file for the Oracle user ensure that the following environment variables are set Table 3 1 New environment variables ORACLE_BASE The full path name to the base directory for all Oracle versions ORACLE_HOME The full path name to the directory that contains the database client software or the entire
278. rks of Symantec Corporation This product includes software developed by the Apache Software Foundation http www apache org Other brands and product names that are mentioned in this manual may be trademarks or registered trademarks of their respective companies and are hereby acknowledged Technical support As part of Symantec Security Response the Symantec global Technical Support group maintains support centers throughout the world The Technical Support group s primary role is to respond to specific questions on product feature function installation and configuration as well as to author content for our Web accessible Knowledge Base The Technical Support group works collaboratively with the other functional areas within Symantec to answer your questions in a timely fashion For example the Technical Support group works with Product Engineering as well as Symantec Security Response to provide Alerting Services and Virus Definition Updates for virus outbreaks and security alerts Symantec technical support offerings include m A range of support options that give you the flexibility to select the right amount of service for any size organization m Telephone and Web support components that provide rapid response and up to the minute information m Upgrade insurance that delivers automatic software upgrade protection m Content Updates for virus definitions and security signatures that ensure the highest level of protectio
279. rprise Reporting Database Link mapping user accounts 115 Symantec Enterprise Reporting installer about 25 Symantec ESM system requirements 29 Symantec ESM Reporting about 17 before installing 23 components of 19 how it works 22 interface 126 more information 22 reports 128 what you can do with 20 synchronizing user accounts 115 system requirements Database Link 34 Symantec Enterprise Reporting 30 Symantec ESM 29 T test 7 2 run time client for Database Link 48 for Enterprise Reporting 53 test 8 1 run time client for Database Link 48 for Enterprise Reporting 52 Index 301 test Reports Package for IBM DB2 61 for MS SQL 72 for Oracle 90 test run time client for Enterprise Reporting 84 toolbox 147 tools 127 trend reports 129 trending 148 U uninstall Database Foundation 103 Database Link 103 Enterprise Reporting 104 Reports Package 105 UNIXcomputers additional requirements 38 user account permissions 110 user interface 126 customizing 127 opening 110 126 tools 127 user names mapping 115 User permissions viewing 119 user permissions assigning 116 removing 118 using audit reports 122 using IBM DBz2 installing on Windows computers 42 using Microsoft SQL Server installing on Windows computers 62 using Oracle installing on Solaris computers 75 V viewing user permissions 119 W Web server security 110 what you can do with Symantec ESM Reporting 20 where to get more information 22 Windows
280. rt About insertable objects Deleting an existing report 0 0 0 cece Configuring and updating the database Enabling trending sorer nn E EERE Updating description information in the database cceeeeees 151 Removing old data from your database cceceeseeesesssssseseesseeesesesees 152 11 12 Contents Appendix A About Symantec ESM Reports About the reports in Symantec ESM Reporting ccccesceseseteeseteeeeseeeees 155 Account domain permissions query 0 06 Account permissions query ccceseeeeeeeseeeeeeee Account policy permissions query cceee Account template permissions query Agent audit schedule Agent audit schedule query Agent compliance distribution by line of business cceeeeees 157 Agent compliance Distribution by manager ccccccesceseeseeseteteeeees 157 Agent compliance QUeCLY cecececsesesesseseseeseseeeseseeeeseeseeseeeeseseeeeseeeeaees 157 Agent counts by Manager ccecesesesseseseeseseseeeeseeecesseeeseeeseseeeeseeeesees 158 Agent counts by manager query ccccssesesesseseseseeseeseeseeesseseeeeseseesees 158 Agent level Query neccs naon ia ia 158 Agent level by line of business oo ccceseseseseceseseseseseseseesseeeeseeesesenees 158 Agent level by line of business query ccccccsesesesesesesetsessseeeeesesesenees 159 Agent level by manager cccecccscssesessesesees
281. s already installed an Apache HTTP Web server you must manually configure the Web server for Symantec Enterprise Reporting 53 54 Installing Symantec ESM Reporting Installing Symantec ESM Reporting To configure the installed Apache HTTP Web server for Symantec Enterprise Reporting 1 On the computer on which you are installing Symantec Enterprise Reporting use a text editor to open the C Program Files Apache Group Apache2 conf httpd conf file In the ScriptAlias section find the following line of text ScriptAlias cgi bin C Program Files Apache Group Apache2 cgi bin Immediately below that line type the following two lines of text ScriptAlias Enterprise_Reporting cgi bin C Program Files Symantec Enterprise_Reporting egi bin ScriptAlias Enterprise_Reporting cgi bin C Program Files Symantec Enterprise_Reporting cgi bin At the end of the httpd conf file type the following lines of text lt Directory C Program Files Symantec Enterprise_Reporting cgi bin gt Options Indexes FollowSymlinks AllowOverride None Order allow deny Allow from all lt Directory gt Alias Enterprise_Reporting help C Program Files Symantec Enterprise_Reporting webcontent documentation lt Directory C Program Files Symantec Enterprise _ Reporting webcontent documentation gt Options Indexes FollowSymlinks AllowOverride None Order allow deny Allow from all lt Directory
282. s executives auditors or operations personnel For managers and executives you can use the reports to show changes to your network security over any given length of time for any area of your network You can create many types of charts graphs and tables to tailor the reports to the preferences of your managers or to a standard organizational format For employees who are responsible for continued improvement of network security you can provide reports that show areas that need improvement These reports can show the entire network or focus on part of a policy on a single computer You can also create reports that help you manage your Symantec ESM application more effectively These reports can help you find unused or locked accounts and accounts with inappropriate permissions Other reports can show you schedules for your policy runs helping you identify areas of your network that need to be audited more or less frequently or that could be audited at a more opportune time You can look at the policies that are being run on your computers and decide whether to implement additional or more appropriate policies You can find reporting errors such as Symantec ESM Agents that are failing to report or errors in policy runs You can also look at the versions of your Symantec ESM components to determine what areas of your network need upgrades or whether they have the most current security updates Symantec ESM Reporting lets you view infor
283. s 62 installing Database Foundation 62 installing Database Link 66 installing Reports Package 72 manually create ESM and SER databases 65 testing Reports Package 72 MS SQL Server installing on Windows computers 62 network connectivity ensuring 28 O Oracle configuring environment variables 76 create ESM and SER databases 75 enable redo log for ESM and SER databases 79 installing Database Foundation 76 installing Database Link 81 300 Index Oracle continued installing Reports Package 90 manually create ESM and SER databases 79 testing Reports Package 90 P packages 122 135 perform silent install Database Link 96 permissions assigning 115 assigning administrator 114 assigning in the database 116 removing 118 user account 110 viewing 119 planning for Database Foundation installer 27 Database Link installer 27 Reports Package 28 Symantec Enterprise Reporting 27 planning queries 136 printing 109 prompts 132 properties file DBPurger utility 152 purging old database data 152 Q queries 130 136 adding charts 143 adding columns 140 custom groups 144 defined 140 filtering 141 formatting 142 planning 136 removing columns 140 sorting 142 summarizing 143 Query Studio 135 R removing database data 152 removing user permissions 118 report parameters selecting 132 report prompts 132 Report Studio 144 creating reports 145 Report Studio 144 continued modifying reports 146 opening 145 toolbox 1
284. s in Query Studio using the Agent Summaries query subject in the metadata model Default path Public Folders gt Symantec ESM gt Technical gt Custom Queries Agent Summary This report shows the number of red yellow and green messages for agents that you select You select the policy modules managers domains and agents and the report displays the agent data from the most recent policy run sorted by category module manager and domain The report also displays the total number of messages and the date of the policy run Default path Public Folders gt Symantec ESM gt Technical gt Console Views Agent trends query Use this query as a template to create your own custom queries in Query Studio using the Agent Trends query subject in the metadata model Default path Public Folders gt Symantec ESM gt Technical gt Custom Queries Agent violations query This query retrieves information about policy violations on your agents The query displays policy compliance data for selected policies and related modules on each selected manager and domain Results are grouped by policies and modules The query also shows the number of violations by severity levels Default path Public Folders gt Symantec ESM gt Technical gt Policy Compliance gt Violation Counts About Symantec ESM Reports 161 About the reports in Symantec ESM Reporting Agents not assigned to user defined domains query This query retrieves th
285. s in succession using the cancel button you will have multiple simultaneous queries to the database that can significantly reduce database performance 132 Running Symantec ESM Reporting Selecting report prompts Selecting report prompts Most reports in Symantec ESM Reporting have prompts that let you filter data when you run the reports These prompts are classified as optional or required Asterisks indicate required prompts If a prompt is required you must select at least one of the given values for the report to function If you do not select a value for the prompt the Next and Finish buttons remain dimmed and you cannot run your report If a prompt is optional and you do not select any values for it all values for the prompt are automatically selected and data for each value displays in the report When you run a report the prompt values that you select are automatically saved with the report The next time that you run the same report you can click the Finish button before proceeding through all of the prompt selection screens When you do this the report runs using saved prompt values for any prompts that you did not change Prompts use text selection boxes drop down menus check boxes and radio buttons to help you select the values Single value prompts are denoted with radio buttons and drop down menus while multiple value prompts use check boxes and list boxes Your report may also have action buttons that a
286. s limit the Symantec ESM Reporting Database Link log file to a maximum file size of 50 MB and three backups You can change the MaxFileSize value to increase the file size and the MaxBackupIndex value to increase the number of backup files Installing Symantec Enterprise Reporting for MS SQL The installation process includes the following tasks m Configure an installed Apache HTTP Web server for Symantec Enterprise Reporting m Install Symantec Enterprise Reporting for MS_SQL m Configure the installed Apache HTTP Web server for LDAP authentication Configure an installed Apache HTTP Web server for Symantec Enterprise Reporting If the computer on which you are installing Symantec Enterprise Reporting has already installed an Apache HTTP Web server you must manually configure the Web server for Symantec Enterprise Reporting To configure the installed Apache HTTP Web server for Symantec Enterprise Reporting On the computer on which you are installing Symantec Enterprise Reporting configure the installed Apache HTTP Web server See Configure an installed Apache HTTP Web server for Symantec Enterprise Reporting on page 53 Install Symantec Enterprise Reporting for MS_SQL Note If you want the computer on which you are installing Symantec Enterprise Reporting to install an Apache HTTP Web server confirm that the computer does not have any Apache directories or subdirectories Installing Symantec ESM Reporting 69
287. s specifies the password for dbpurger password lt Pa wOrd gt the user account dbpurger jdbc This specifies the java zip file dbpurger jdbc driver jar driver jar than contains the driver for the lib db2java zip database dbpurger jdbc This specifies the JDBC driver dbpurger jdbc driver driver that is used to connect the COM ibm db2 jdbc net DB2Driver Symantec Reporting Database Link to the database hibernate This specifies the hibernate hibernate properties filename properties properties file for your database db2 hibernate properties filename driver db schema This specifies the name of the db schema ESMDB10 database schema The default name is ESMDB10 purge This is a boolean that specifies purge category_trend true category_trend whether to purge the CATEGORY_TREND table in the database Valid values are true and false Table 5 5 Configuring and updating the database DBPurge utility properties file Running Symantec ESM Reporting 153 purge policy_changelog This is a boolean that specifies whether to purge the POLICY_CHANGELOG table in the database Valid values are true and false purge policy_changelog true purge chg_ message_event This is a boolean that specifies whether to purge the CHG_MESSAGE_EVENT table in the database Valid values are true and false purge chg_message_event true purge manager_ This is a boolean that specifies purge mana
288. save the report print the report or send the report by email You must select at least one delivery method Note You are prompted for values only if the report specification or model includes prompts or if you have access to more than one sign on even if you selected the Prompt for values check box 8 Click OK 134 Running Symantec ESM Reporting Exporting report information Note To schedule a report to run once set the end date and time to limit the report runs to one To run a scheduled entry once 1 2 3 4 From the Tools menu on the Welcome tab click Schedule Management Click the Schedule tab and show the filter options In the Scope list click the filter to use when showing the schedules In the Status list click the status to use for filtering and then click Apply to see a list of scheduled entries Note To sort the entries by the modified time click the Modified column header Click Run a scheduled entry once Exporting report information When you run a report Symantec ESM Reporting lets you save the report in one of several formats These formats include report views HTML PDF Microsoft Excel XML and comma separated values These report formats can be saved and exported as necessary To save a report in a different format 1 2 Run a report Click the button in the upper right that converts the report to the desired format Save the report in the selected format
289. se Foundation installer on page 24 IBM DB2 8 1 Symantec provides additional scripts that let you connect the run time client to the Symantec ESM Reporting Database Link and Symantec Enterprise Reporting See Checking the installation logs for errors or warnings on page 99 282 Symantec ESM Reporting installation scripts About the installation scripts for IBM DB2 About the installation scripts for IBM DB2 On the Symantec ESM Reporting Windows CD in the sql db2 folder Symantec provides the create_esm_db bat file You can use this bat file to execute a command file The command file executes the sql scripts that create the ESM database The sql scripts are in the sql db2 createESMdb folder The sql scripts create the data file for the database in the lt database_name gt Data folder By default the sql scripts create the ESM database in the C ESMDATA folder To improve database performance you can use a text editor to change the default disk drive in the sql scripts specifying one physical disk drive for the Index tablespaces and another physical disk drive for the Data tablespaces You can use a text editor to change the create_esm_db bat file and specify a different location for the data file in which the ESM database will be created To change the location of the file for the ESM database 1 Usea text editor to open the sql db2 create_esm_db bat file 2 Change C ESMDATA to the specified location To change the name o
290. selected manager You can select a policy with a module on any manager and domain in your enterprise You then select a date range and the report displays a trend chart that shows the aggregate level of compliance for a selected domain The report also displays the data as a table Default path Public Folders gt Symantec ESM gt Technical gt Policy Compliance gt Compliance Percentage About Symantec ESM Reports 165 About the reports in Symantec ESM Reporting Daily violations trend by line of business This report shows the daily policy violation trends for any selected module You select a policy with a related module and then select managers domains anda date range The report displays a trend chart that shows policy violations for a selected manager and domain The report also displays the data in table form Default path Public Folders gt Symantec ESM gt Executive gt Policy Compliance gt Violation Counts Daily violations trend by manager This report shows daily policy violation trends for a selected manager You make policy module manager domain and date range selections and the report displays a trend chart that shows policy violations for all agents that are examined by the selected manager and domain The report also displays data as a table Default path Public Folders gt Symantec ESM gt Technical gt Policy Compliance gt Violation Counts Domain trends query Use this query as a template to
291. ser s Guide the Administration and Security Guide and the other Symantec Enterprise Reporting documents in the Docs Symantec Enterprise Reporting directory on the CD installation set For more information about Symantec ESM see the Symantec Enterprise Security Manager knowledge base on the Symantec Technical Support Web site at www symantec com techsupp enterprise The knowledge base link is the first one under Technical Support You can find the Symantec Enterprise Security Manager knowledge base listed under Policy Compliance To obtain an updated version of the Symantec ESM User s Guide or other Symantec ESM documents see the Symantec Public FTP site at ftp ftp symantec com public english_us_canada products symantec_enterprise_security_manager Before you Install Symantec ESM Reporting m Before you install Symantec ESM Reporting m System requirements Before you install Symantec ESM Reporting Symantec ESM Reporting has three main parts m A relational database that stores Symantec ESM Reporting data m A reporting database link that transfers data from the Symantec ESM Managers to the Symantec ESM Reporting database m A reporting application that lets you create view customize and schedule reports You can use a Web browser to access the application The browser does not require additional software to access the reports Symantec provides four installation programs that you must run in the following se
292. ssages regarding the creation of a snapshot or checks that were not Network Integrity performed fall into this category Unexpected actions could indicate security risks Login Parameters OS Patches Object Integrity Oracle Accounts Oracle Auditing Oracle Configuration Oracle Networks Oracle Objects Oracle Passwords Oracle Patches Oracle Profiles Oracle Roles Oracle Tablespace Password Strength Program Find Queries Registry Response SQL Server Auditing SQL Server Configuration SQL Server Objects SQL Server Password Strength SQL Server Roles Startup Files Symantec Product Info Table E 1 About Symantec ESM Reporting categories About the categories in Symantec ESM Reporting 273 Symantec ESM Reporting Categories ESM SysVal Control This category contains messages Administrative A that inform the user of actions that Information SysVal Security Symantec ESM took For example SysVal Storage messages regarding the creation of a snapshot or checks that were not System Auditing performed fall into this category R Unexpected actions could indicate System Mail Bh od security risks System Queues User Files ESM Error Account Information Messages in this category inform Account Integrity Active Directory Backup Integrity Device Integrity Discover
293. ssword type the information in the related text boxes and then click Next On the ESM Manager Connection panel do the following tasks m Type the name of the Symantec ESM Manager m Type the user name of an account on the manager with manage user rights and read only access rights to all domains policies and templates m Type the password of the manager account m Specify the port number of the manager m Click the right arrow to add the manager to the list Optionally repeat these steps to let the Symantec ESM Reporting Database Link connect to another Symantec ESM Manager Warning Do not connect two Symantec ESM Reporting Database Links to the same Symantec ESM Manager and database The database link log will report primary key failures If you specify connections to several Symantec ESM Managers during the installation of a Symantec ESM Reporting Database Link a race condition may cause some ESM database errors during the initial transfer of data You can correct the errors by stopping and restarting the Symantec ESM Reporting Database Link See Checking the Symantec ESM Reporting Database Link log for errors on page 101 68 Installing Symantec ESM Reporting Installing Symantec ESM Reporting 12 On the Pre Install Summary panel click Install 13 On the Install Complete panel click Done Note In the C Program Files Symantec Reporting Database_Link server default conf log4j xml file the default setting
294. st installation tasks To check the Reports Package installation log 1 On the computer on which you installed the Symantec ESM Reporting Reports Package open a text editor Do one of the following tasks m On Windows computers browse to the C Documents and Settings Administrator Local Settings temp folder m On UNIX computers change to the tmp directory Open the Symantec_ESM_ Reports Package _InstallLog log file and check for any warnings or errors Checking the Symantec ESM Reporting Database Link log for errors If you specify connections to several Symantec ESM Managers during the installation of a Symantec ESM Reporting Database Link a race condition may cause some ESM database errors during the initial transfer of data You can correct the errors by stopping and restarting the Symantec ESM Reporting Database Link To check the Database Link log for errors 1 On the computer on which you installed the Symantec ESM Reporting Database Link open a text editor Do one of the following tasks m On Windows computers browse to the C Program Files Symantec ESM Reporting Database Link logs folder m On UNIX computers change to the opt Symantec ESM Reporting Database Link logs directory Check the file for messages containing the text duplicate rows for columns If you find these error messages in the log you must do one of the following tasks to stop and restart the Symantec ESM Reporting Database Link
295. stem time for the date of the next scheduled daily audit Weekly audit date The system time for the date of the next scheduled weekly audit Monthly audit date The system time for the date of the next scheduled monthly audit Quarterly audit date The system time for the date of the next scheduled quarterly audit Yearly audit date The system time for the date of the next scheduled yearly audit 218 About the Symantec ESM Reporting metadata model Structure of data items Table B 49 Path Message Summaries Trends Agent Trends Message Counts Data item Message Red messages Shows the number of red messages for the focus Counts object Yellow messages Shows the number of yellow messages for the focus object Green messages Shows the number of green messages for the focus object Messages Shows the total number of reported messages Suppressed messages Shows the number of suppressed messages for the focus object Unique messages Shows the number of unique messages for the focus object Unique suppressed Shows the number of unique suppressed messages messages for the focus object Unique possible Shows the number of unique possible messages messages for the focus object Violations Shows the number of messages that indicate that the agent is out of compliance with the policy About the Symantec ESM Reporting metadata model 219 Structure of data items Table
296. stomize the databases for your organization Note After clicking Next if you want to select a different database option you must cancel the Symantec ESM Reporting Database Foundation installation and start over 7 Onthe Searching panel select the desired path to the isql exe file and then click Next 8 Onthe Choose panel do one of the following tasks To select the default location click Next To select another location click Choose other In the Please Select isql exe file dialog box select the location and then click Open 9 Click Next 10 On the Get Database Names panel do one of the following tasks To specify the default Symantec ESM Reporting Database Name and Symantec Enterprise Reporting Database Name click Next To specify other database names type the names in the related text boxes and then click Next 64 Installing Symantec ESM Reporting Installing Symantec ESM Reporting 11 12 13 14 15 16 On the Database Drive panel do one of the following tasks m To specify the default drive click Next m To specify another drive for the databases to store data type the name of the drive in the text box and then click Next On the Default Password panel do the following tasks m Inthe Default Password text box type a secure password m Inthe Confirm Default Password text box retype the default password On the Symantec ESM Reporting database accounts panel do one of the
297. ta and overrides permissions in all other tables This table is never updated with the Symantec ESM Reporting Database Link See Manually assigning user account permissions using SQL commands on page 116 RPT_MANAGER PERM Provides view of individual managers and the policies and domains that are associated with the managers RPT_POLICY_PERM Contains data for specific policies RPT_DOMAIN_PERM Contains data for specific domains ACCOUNT_MAPPING Holds the accounts that are synchronized via the Symantec Enterprise Reporting Database Link Table 4 2 RPT_ALL_MGR_PERM database table fields USER_NAME Holds the user name User names appearing in this field have access to the specified data on all managers VIEW_ALL_ DOMAINS Holds a boolean value A 1 in this field indicates that the associated user can view data for all domains on all managers A 0 in this field indicates that the user cannot view all domains however you can put data into the other tables to give users rights to specific domains VIEW_ALL_POLICIES Holds a boolean value A 1 in this field indicates that the associated user can view data for all policies on all managers A 0 in this field indicates that the user cannot view all policies however you can put data into the other tables to give users rights to specific policies 112 Securing Symantec ESM Reporting About user account permissions Table 4 2 RPT_ALL_MGR_PERM database tab
298. tec ESM Reporting Installing Symantec ESM Reporting 10 11 On the Choose Install Folder panel do one of the following tasks m To select the default folder click Next m To select another folder click Choose In the Browse for Folder dialog box select the desired location click OK and then click Next Note If you select the Symantec ESM folder uninstalling Symantec ESM will remove the Symantec ESM Reporting Database Link On the Database Type Selection panel click DB2 and then click Next On the JDBC Driver Information panel do one of the following tasks m To specify the default JDBC Driver Class JDBC Classpath JDBC Library Path and SQL Dialect click Next m To specify another JDBC Driver Class JDBC Classpath JDBC Library Path and SQL Dialect type the information in the related text boxes and then click Next Note For only IBM DB2 7 2 you must specify the Java 1 2 Driver See the JDBC Driver documentation On the Database Connection panel do one of the following tasks m To specify the default database URL and account name type the password of the ESM_DB_LINK_USER account in the related text box and then click Next m To specify another database URL user name and password type the information in the related text boxes and then click Next On the ESM Manager Connection panel do the following tasks m Type the name of the Symantec ESM Manager m Type the user name of an account
299. the following information objects in order m Category m Module m Message Title 5 Group the Category column For detailed steps to group columns see the online Help or the Administration and Security Guide You can find this guide on the CD in the Docs Symantec Enterprise Reporting directory Appendix Symantec ESM Reporting installation scripts This appendix includes the following topics m About Symantec ESM Reporting installation scripts m About the installation scripts for IBM DB2 m About the connection scripts for IBM DB2 m About the installation scripts for Microsoft SQL Server m About the installation scripts for Oracle About Symantec ESM Reporting installation scripts The Database Foundation installer creates the ESM database for Symantec ESM Reporting the SER database for Symantec Enterprise Reporting and installs all of the necessary components to a single disk drive If you are creating the ESM and SER databases on separate physical disk drives installing to a cluster or installing on an IBM DB2 database server and want more than 2 GB for Index tablespaces and 2 GB for User tablespaces Symantec provides SQL scripts that let you manually create the ESM and SER databases For only DB2 and Microsoft SQL Server you must use the Database Foundation installer to import the necessary data into the databases After importing the data you must run an additional SQL script to tune the database See About the Databa
300. third party JDBC Drivers for the Microsoft SQL Server database 17 On the Database Connection panel do one of the following tasks m To specify the default database URL and user account name type the password of the user account in the text box and then click Next m To specify another database URL user name and password type the information in the text boxes and then click Next 18 On the Pre Install Summary panel click Install Note If the Symantec ESM Reporting Database Foundation installer reports that it cannot find the local settings directory set the TEMP and TMP environment variables to a path that does not contain international characters Then rerun the Symantec ESM Reporting Database Foundation installer 19 On the Install Complete panel click Done To manually create the ESM and SER databases for MS SQL See About the installation scripts for Microsoft SQL Server on page 285 1 On the computer on which you installed MS SQL at the system command prompt change to the Symantec ESM Reporting Windows CD Change to the sql sqlserver folder Type create_esm_db Type create_ser_db oO F amp F WwW N Start the Symantec ESM Reporting Database Foundation installer The process is the same as installing the Symantec ESM Reporting Database Foundation for MS SQL except for the following change On the Choose Install Set panel click Import Data and then click Next See To install the Symantec ESM Rep
301. ties and damages and limitations on liability shall survive termination Software and documentation is delivered Ex Works California U S A or Dublin Ireland respectively ICC INCOTERMS 2000 This Agreement may only be modified by a License Module that accompanies this license or by a written document that has been signed by both You and Symantec Should You have any questions concerning this Agreement or if You desire to contact Symantec for any reason please write to i Symantec Customer Service 555 International Way Springfield OR 97477 U S A ii Symantec Customer Service Center PO BOX 5689 Dublin 15 Ireland or iii Symantec Customer Service 1 Julius Ave North Ryde NSW 2113 Australia 8 Additional Uses and Restrictions A If the Software You have licensed is Symantec Enterprise Security Manager notwithstanding any of the terms and conditions contained herein the following additional terms apply to the Software 1 Permission to use the software to assess Desktop Server or Network machines does not constitute permission to make additional copies of the Software 2 You may use the Software to assess no more than the number of Desktop machines set forth under a License Module Desktop means a desktop central processing unit for a single end user 3 You may use the Software to assess no more than the number of Server machines set forth under a License Module Server means a central processing unit th
302. ting Gateway user name m Inthe Password text box type the Symantec Enterprise Reporting Gateway password On the Deployment Directory panel do one of the following tasks m To select the default directory click Next m To select another directory click Choose m Inthe Browse for Folder dialog box select the desired directory click OK and then click Next On the Database Type panel click DB2 and then click Next 10 On the Database Source panel do the following tasks m Inthe DB User Name text box type ESM_REPORT_USER m Inthe DB Password text box type the password of the ESM_REPORT_USER account m Inthe Database Name text box type ESM 11 On the Pre Installation Summary panel click Install 12 On the Install Complete panel click Done To test the Symantec ESM Reporting Reports Package 1 On the computer on which you installed Symantec Enterprise Reporting open a Web browser and then type http localhost Enterprise_Reporting Select the Public Folders tab Select the Symantec ESM link Select and expand the desired query or report 62 Installing Symantec ESM Reporting Installing Symantec ESM Reporting Install on Windows computers using Microsoft SQL Server Symantec ESM Reporting can be installed on a mix of Windows and UNIX computers using an IBM DB2 Microsoft SQL Server MS SQL or Oracle database server The following procedures describe the installation of Symantec ESM Reporting on Windows
303. tion type panel to select the typical installation click Next 5 Onthe Select the installation folder panel to select the default drive and directory click Next 6 On the Configure NetBIOS panel click Next 7 On the Start copying files panel click Install 8 On the Setup is complete panel click Finish To connect the IBM DB2 8 1 run time client for the Symantec ESM Reporting Database Link 1 On the computer on which you are installing the Symantec ESM Reporting Database Link at the system command prompt change to the Symantec ESM Reporting Windows CD 2 Change to the sql db2 runtime folder 3 Type catalog _esm_db lt host_computer_name gt ESM 50000 48 Installing Symantec ESM Reporting Installing Symantec ESM Reporting Note If you changed the name of the ESM database in the installation scripts you must change the name of the ESM database in the catalog _esm_db script To test the IBM DB2 8 1 run time client connection for the Symantec ESM Reporting Database Link 1 Atthe db2 command prompt type CONNECT TO lt database alias name gt AS USER lt database user name gt For example CONNECT TO ESM as USER ESM_DB_LINK_USER 2 Atthe prompt to Enter current password for lt database user name gt type the ESM_DB_LINK_USER account password 3 Verify that the database connection was successful 4 Exit from the Command Line Processor To install the IBM DB2 7 2 run time client for the Symantec ESM Reporting
304. to m Convert a list of numeric results into broader categories m Reduce the number of values into a smaller more meaningful set Custom groups are available in Symantec Enterprise Reporting See the Query Studio User Guide You can find this guide on the CD in the Docs Symantec Enterprise Reporting directory About Report Studio The Query Studio is a unique and effective tool for creating queries on the fly that answer specific security questions It is intended to be quick and effective However you may want to create reports that have a more customized look and style Report studio lets you do this You can use Report Studio to create a report from scratch or you can open an existing report in Report Studio and modify it Using Report Studio This section of this document lets you quickly review the basic features of the Report Studio so that you can become familiar with the tool To fully understand all the features of the report studio tool see the Report Studio User Guide You can find this guide on the CD in the Docs Symantec Enterprise Reporting directory Running Symantec ESM Reporting 145 Using Report Studio Planning your report Before using the Report Studio you must determine the question that you want to answer with your report The following list outlines some questions that you may want to answer before beginning to build your report m Is the report related to the security state of your enterprise or is it re
305. tration Manager Domain Agent Agent Properties Data item Agent Port A unique character string that identifies the Properties port number of a specific Symantec ESM Agent Protocol A unique character string that identifies that identifies the communication protocol Proxy agent A unique character string that identifies the name of the proxy agent installed on the Agent ESM version A unique character string that identifies the version number of Symantec ESM that is installed on the Agent OSs A unique character string that identifies the type of operating system that the Agent has installed Description A unique character string that describes the Agent The string can include multi byte unicode characters for international use Unsupported in Symantec ESM 6 1 Asset tag A unique character string that can contain information from a physical security sticker or barcode Unsupported in Symantec ESM 6 1 SU version A unique character string that identifies the Security Update version number Live update True false value that identifies whether LiveUpdate is active on the Agent Platform A unique character string that identifies the platform that the Symantec ESM Agent is running on 190 About the Symantec ESM Reporting metadata model Structure of data items Table B 14 Path Administration Manager Domain Agent Codes Data item Codes AGENT_ID A character or numeric strin
306. umber of agents that have a compliance percentage level that falls between 60 70 percent gt 70 80 counts Shows the number of agents that have a compliance percentage level that falls between 70 80 percent gt 80 90 counts Shows the number of agents that have a compliance percentage level that falls between 80 90 percent Table B 47 About the Symantec ESM Reporting metadata model 217 Structure of data items Path Message Summaries Trends Agent Trends Compliance Counts Data item Compliance gt 90 100 counts Shows the number of agents that have a Counts compliance percentage level that falls between 90 100 percent Table B 48 Path Message Summaries Trends Agent Trends Date Trends Data item Date Trends Day of week A small integer that corresponds to the day of the week 1 Sunday 2 Monday etc Day of month A small integer that corresponds to the day of the month Week A small integer that corresponds to the week of the year from 1 to 52 Month A small integer that corresponds to the month of the year 1 January 2 February etc Quarter A small integer that identifies the quarter of the year 1 First Quarter 2 Second Quarter 3 Third Quarter 4 Fourth Quarter Year A small integer that corresponds to the current year First audit date per week Shows the date of the first audit that occurs each week Daily audit date The sy
307. undation installer create the ESM and SER databases and import the necessary data click Default Oracle and then click Next Toimport data into the ESM and SER databases click Import Data and then click Next For Oracle only do not select this option The SQL scripts import the necessary data automatically after creating the ESM and SER databases If you select this option the installer skips steps 7 through 10 and prompts you to choose the type of database in which to store your Symantec ESM Reporting data Go to step 11 m If you intend to manually create the ESM and SER databases but have not yet done so click Cancel Symantec provides scripts that let you manually create the ESM and SER databases You can find the scripts on the Symantec Enterprise Security Manager ESM 6 1 Reporting Windows CD in the SQL directory You can change the scripts to customize the databases for your organization Note After clicking Next if you want to select a different database option you must cancel the Symantec ESM Reporting Database Foundation installation and start over On the Get Database Names panel do the following tasks m Inthe Symantec ESM Reporting database text box type ESM m Inthe Symantec Enterprise Reporting database text box type SER On the Default Password panel do the following tasks m Inthe Default Password text box type a secure password m Inthe Confirm Default Password text box retype the default password
308. ur enterprise The facts let you quantify the security state of your computers to use in reports to executives and managers 140 Running Symantec ESM Reporting Using defined queries Using defined queries Symantec ESM Reporting uses several defined queries that you can use as a starting point when working in Query Studio You can use these queries in their original format but they are intended to be modified in order to find data that is specific to your needs The defined queries are in the same folders with the standard reports but queries have the word query in the title If you have changed the name of the queries or have created your own queries you can differentiate between reports and queries because queries are marked with pencil icons while reports are marked with triangles Using queries requires you to select data items from the metadata model and add them to your query By default newly added columns attach to the right of the last column in the report but you can place them anywhere in the report You can also add graphs charts and other data to the report Add or remove columns in queries When using queries one of the most basic tasks is to add columns to the query The columns in the query are created from a data item in the metadata model You can add columns that show data about any information in your ESM database so adding and removing columns is the simplest way to show the exact data that you need in you
309. use check boxes to select those values that you want to display in the report For example if you had a query that uses a Managers column and you had data for 15 managers you could filter that column to show data for only the first three managers in the database 142 Running Symantec ESM Reporting Using defined queries To use filters that are in the metadata model Select the filter from the metadata model and click Insert To filter by column 1 Click on the heading of the column that you want to filter 2 Click the Filter icon See Table 5 2 for a graphic that shows what the Filter icon looks like 3 At the bottom of the query check the boxes that correspond to the values that you want to display in the report 4 Click OK Format queries Sort queries You can format the columns in a query to display only a specific number of characters in a column For example if you had a manager called First_Enterprise_Manager you could format the column that displays the manager name to display only a certain number of characters If you set the character limit to nine the column would display First_Ent This setting is useful when you have many columns in your query and need to save space To format your queries 1 Click Edit Data from the menu on the upper left of the screen Click on the heading of the column that you want to format Click Format from the menu on the left side of the screen 2 3 4 From the C
310. user name and password See Installing Symantec ESM Reporting on page 41 Customizing the user interface You can add tabs folders reports and other information to your workspace when you use the customization tool to customize your interface This lets you combine reports with other information sources such as bookmarks and Web pages to personalize your workspace To customize the user interface 1 On the Welcome page click New Page 2 Use the tools in the upper right corner to add content and edit the layout of the content Place your mouse over each icon for each tool to see pop up text that describes the tool 3 Click the Help link in each tool to see the function of each tool or refer to the Administration and Security Guide for detailed information You can find this guide on the CD in the Docs Symantec Enterprise Reporting directory About the administration tools The Welcome page has links to several tools that let you administer Symantec ESM Reporting some of the listed tools may be available only to users with the proper permissions Table 5 1 describes the administration tools Table 5 1 Symantec ESM Reporting administration tools Preferences Lets you organize the format and layout of your workspace You set default display settings and pages using this tool Directory Lists and lets you administer Users Groups and Roles in Symantec ESM Reporting You can also manage data sources distribution lists
311. ut the JDBC DB2 8 1 example JDBC_CLASSPATH driver to use The defaults JDBC_DRIVER COM ibm db2 JDBC_LIBRARY_PATH include jdbc app DB2Driver m Dpat DBC_CLASSPATH JDBC_DRIVER h AA retd COM ibm db2 jdbc app eas sata eae IBM SQLLIB java DB2Driver db2 ip C JDBC_CLASSPATH ee Program Files IBM C Program Files eae IBM SOLLIB java SQLLIB java db2jcc jar db2java zip C JDBC_LIBRARY_PATH C Program Files IBM Program Files IBM SQLLIB SQLLIB java BIN db2jcc jar JDBC_LIBRARY_PATH C Program Files IBM SQLLIB BIN m DB27 2 JDBC_DRIVER COM ibm db2 jdbc app DB2Driver JDBC_CLASSPATH C Program Files SQLLIB java12 db2java zip JDBC_LIBRARY_PATH C Program Files SQLLIB BIN m ORACLE 9i JDBC_DRIVER oracle jdbc driver OracleDriver JDBC_CLASSPATH lt ORA_HOME gt jdbc lib ojdbc14 jar JDBC_LIBRARY_PATH SQL SERVER 2000 Microsoft JDBC Driver Table 3 3 Properties file values Installing Symantec ESM Reporting Installing Symantec ESM Reporting be JDBC_DRIVER JDBC_CLASSPATH JDBC_LIBRARY_PATH m SQLSERVER 2000 JDBC_DRIVER com microsoft jdbc sqlserver SQLServerDriver JDBC_CLASSPATH C Program Files Microsoft SQL Server 2000 Driver for JDBC lib msbase jar C Program Files Microsoft SQL Server 2000 Driver for JDBC lib mssqlserver jar C Program Files Microsoft SQL Server 2000 Driver for JDBC lib msutil jar JDBC_LIBRARY
312. ut your Symantec ESM Managers Domains Agents Policies suppression configurations account configurations Agent levels message information policy runs audit schedules licenses and other topics Introducing Symantec Enterprise Security Manager Reporting 21 What you can do with Symantec ESM Reporting In addition to the reports that provide information about the current state of your network Symantec ESM Reporting provides reports that show trend information Date ranges let you show how the security of your enterprise has changed over time to conform to your organizational security policies Symantec ESM Reporting lets you control access to your sensitive enterprise data Read write and execute permissions let you limit access according to each user s needs Symantec ESM Reporting supports a separation of duties You can set up user accounts that limit user access to only the data for which they are responsible Symantec ESM Reporting lets you to schedule reports to run automatically This ensures that your reports will always be current Key features in Symantec ESM Reporting let users m Create and view reports and edit database queries that display information from several areas of your Symantec ESM application such as account administration agent configurations change notifications policy compliance and security information m Access current or trended information about the compliance of network resources to your organi
313. vailable memory disk space NIC information Operating system Version and patch level Network topology Router gateway and IP address information Problem description m Error messages log files m Troubleshooting performed prior to contacting Symantec m Recent software configuration changes and or network changes To contact Enterprise Customer Service online go to www symantec com select the appropriate Global Site for your country then choose Service and Support Customer Service is available to assist with the following types of issues Questions regarding product licensing or serialization Product registration updates such as address or name changes General product information features language availability local dealers Latest information on product updates and upgrades Information on upgrade insurance and maintenance contracts Information on Symantec Value License Program Advice on Symantec s technical support options Nontechnical presales questions Missing or defective CD ROMs or manuals SYMANTEC SOFTWARE LICENSE AGREEMENT Symantec Enterprise Security Manager Reporting SYMANTEC CORPORATION AND OR ITS SUBSIDIARIES SYMANTEC IS WILLING TO LICENSE THE SOFTWARE TO YOU AS AN INDIVIDUAL THE COMPANY OR THE LEGAL ENTITY THAT WILL BE UTILIZING THE SOFTWARE REFERENCED BELOW AS YOU OR YOUR ONLY ON THE CONDITION THAT YOU ACCEPT ALL OF THE TERMS OF THIS LICENSE AGREEMENT READ THE TERMS AND CONDITIONS
314. value NVARCHAR 2000 Holds a string that can include multi byte unicode characters for international use String_code CHAR 32 Uniquely identifies a specific string Primary key Locale_ID CHAR 32 Holds a string of fixed length 32 Primary key characters that identifies which language Foreign key Symantec ESM is using Table C 23 About the Symantec ESM Reporting database schema Tables in the database schema Date_Dimension table Date_Key Contains the system time for the date of a Primary key specific event Quarter SMALLINT Holds an integer that identifies the quarter of the year 1 First Quarter 2 Second Quarter 3 Third Quarter 4 Fourth Quarter Day_of_month SMALLINT Holds an integer that corresponds to the day of the month Week_of_year SMALLINT Holds an integer that corresponds to the week of the year 1 The first week of the year 22 The 22nd week of the year and so fourth Month_of_year SMALLINT Holds an integer that corresponds to the month of the year 1 January 2 February and so forth Year_value SMALLINT Holds an integer that corresponds to the current year Weekday SMALLINT Holds an integer that corresponds to the day of the week 1 Sunday 2 Monday etc Table C 24 ESM_Audit table Audit_ID CHAR 32 Holds a unique character string that Primary key identifies a specific audit Start_time TIMEST
315. ve and technical level reports Reports include topics on agent states audit errors and Symantec ESM management The following is a description of each report and query in Symantec ESM Reports Note If you generate a report that contains no data Symantec Enterprise Reporting may return an error entitled General Error If you are using a reporting Web server on the local host this error gives stack trace details for the error in addition to reporting the error Account domain permissions query This query retrieves the permissions that each Symantec ESM user account has for each domain on every manager in the database Account permissions columns show whether a user account is active or locked out whether a user can view or modify domains and whether a user can run policies and update snapshots Default path Public Folders gt Symantec ESM gt Technical gt Administration gt Accounts 156 About Symantec ESM Reports About the reports in Symantec ESM Reporting Account permissions query Use this query as a template to create your own custom queries in Query Studio using the Account Permissions query subject in the metadata model Default path Public Folders gt Symantec ESM gt Technical gt Custom Queries Account policy permissions query This query retrieves the permissions that each Symantec ESM user account has for each policy on every manager in the database Account permissions columns show whether a us
316. verity A character string that identifies the level of severity Red Yellow or Green Suppressed True false value that indicates whether a message is suppressed Category A unique character string that identifies the category of a specific Symantec ESM message Module A unique character string that identifies a specific Symantec ESM Module Compliant True false value that indicates whether a message represents an agent security state that is compliant with the policy Policy A unique character string that identifies a specific Symantec ESM Policy for a manager Manager A unique character string that identifies a specific Symantec ESM Manager Domain A unique character string that identifies the Symantec ESM Domain for a manager About the Symantec ESM Reporting metadata model 197 Structure of data items Table B 21 Path Message Information Messages Data item Messages Agent A unique character string that identifies a specific Symantec ESM Agent on a manager Table B 22 Codes Path Message Information Messages Codes Data item SUPPRESSED_KEY A boolean integer that identifies if the Symantec ESM compliance message can be suppressed by users COMPLIANCE_KEY A boolean integer that identifies whether a message is from a compliant Symantec ESM Agent USER_DEFINED_KEY A boolean integer that identifies whether the Symantec ESM Domain can be defined by the user
317. ware is part of a suite containing multiple Software titles the number of copies You may use may not exceed the aggregate number of copies indicated in the License Module as calculated by any combination of licensed Software titles Your License Module shall constitute proof of Your right to make such copies If no License Module accompanies precedes or follows this license You may make one copy of the Software You are authorized to use ona single computer B make one copy of the Software for archival purposes or copy the Software onto the hard disk of Your computer and retain the original for archival purposes C use the Software on a network provided that You have a licensed copy of the Software for each computer that can access the Software over that network D use the Software in accordance with any written agreement between You and Symantec and E after written consent from Symantec transfer the Software on a permanent basis to another person or entity provided that You retain no copies of the Software and the transferee agrees in writing to the terms of this license You may not A copy the printed documentation that accompanies the Software B sublicense rent or lease any portion of the Software reverse engineer decompile disassemble modify translate make any attempt to discover the source code of the Software or create derivative works from the Software C use the Software as part of a facility manag
318. wing m To verify your description information use the following command SELECT AGENT_NAME DESCRIPTION FROM ESMDB10 AGENT m To verify your asset tag information use the following command SELECT AGENT_NAME ASSET_TAG FROM ESMDB10 AGENT Note The console enhancement is not available in current versions of Symantec ESM Future versions will have this enhancement If you update a description or asset tag in the console it will overwrite any changes that you made using these SQL commands 152 Running Symantec ESM Reporting Configuring and updating the database Removing old data from your database Symantec Enterprise Reporting has a utility that purges your Symantec Enterprise Reporting database This utility has several parameters that let you specify exactly what data to purge This purge utility installs with the Symantec Reporting Database Link The utility is a Java executable and requires a properties file to run About the properties file Table 5 5 outlines and describes each statement that is required in the properties file for the DBPurge utility to run correctly Table 5 5 DBPurge utility properties file dbpurgerjdbc url This specifies your datasource dbpurger jdbc url jdbc db2 localhost 6789 ESM dbpurger user This specifies the user name of a dbpurger user lt DBUserName gt user authorized to access the Symantec Enterprise Reporting database dbpurger password Thi
319. y Disk Quota Encrypted File System File Access File Attributes File Find File Information File Watch Integrated Command Engine Login Parameters Network Integrity OS Patches Object Integrity Oracle Accounts Oracle Auditing users of Symantec ESM Policy configuration errors The errors that these messages report can be corrected by adjusting Symantec ESM Policy configurations 274 About Symantec ESM Reporting categories About the categories in Symantec ESM Reporting Table E 1 Symantec ESM Reporting Categories ESM Error Oracle Configuration Messages in this category inform users of Symantec ESM Policy Oracle Networks configuration errors The errors that Oracle Objects these messages report can be corrected by adjusting Symantec Oracle Passwords ESM Policy configurations Oracle Patches Oracle Profiles Oracle Roles Oracle Tablespace Password Strength Program Find Queries Registry Response SQL Server Auditing SQL Server Configuration SQL Server Objects SQL Server Password Strength SQL Server Roles Startup Files Symantec Product Info SysVal Control SysVal Security SysVal Storage System Auditing System Mail System Queues User Files Table E 1 About Symantec ESM Reporting categories About the categories
320. you use to load the software Can you run a network connectivity test to verify that the computer can connect to the computers in the Symantec ESM Reporting Database Link checklist and the Symantec Enterprise Reporting checklist 268 System assessment checklists Symantec ESM Reporting Report Package checklist Appendix About Symantec ESM Reporting categories This appendix includes the following topic m About the categories in Symantec ESM Reporting About the categories in Symantec ESM Reporting Symantec ESM Reporting uses categories as a way to classify messages The following list displays each category m Change notification m ESM administrative information m ESM error m ICE m Patch assessment m Policy compliance m System error m System information 270 About Symantec ESM Reporting categories About the categories in Symantec ESM Reporting Categories are created from the messages that Symantec ESM generates These messages are also associated with Symantec ESM Modules Any module that contains one or more messages that fall in a certain category is also associated with that category The following table displays the modules that are in each category and describes each category The modules associated with each category may vary depending on your security update level Table E 1 Symantec ESM Reporting Categories Change Notification Account Integrity File Attributes File Find
321. ysts developers or managers Analysts and programmers use the data model to create reports in an easy to understand format These reports illustrate security issues and trends that decision makers can use to increase the security of the enterprise network and maintain compliance with security policies 178 About the Symantec ESM Reporting metadata model About the Query Studio metadata model Metadata model divisions The Symantec ESM Reporting metadata model arranges ESM data into three main areas m Administration m Message Information m Message Summary Each area is contained within its own folder You can use the data items in the folder to build effective queries About the Administration folder The Administration folder contains data items that relate to the administration of your Symantec ESM application such as Symantec ESM user accounts message suppressions audit schedules Manager Agent communications configurations and similar types of data About the Message Information folder The Message Information folder contains data items that relate to the security state of computers in your enterprise such as policies message titles message descriptions and change events These data items are intended to display the details about specific problems at the Agent level Reports that you generate with these data items are intended for operations personnel and those responsible for day to day computer security maintenan
322. zational security policies m Configure report information as Web reports Excel spreadsheets printed reports and report views m Restrict access to the information in reports and the Symantec ESM Reporting database m Reduce hardware and maintenance costs related to the information needs of large numbers of users m Reduce support and training costs m Reduce IT workload tighten security and raise user productivity by empowering users in a controlled fashion with access to information from Symantec ESM policy runs m Reduce hardware administration costs through broad platform support 22 Introducing Symantec Enterprise Security Manager Reporting How Symantec ESM Reporting works How Symantec ESM Reporting works The Symantec ESM Reporting Database Link sends security data from the Symantec ESM Manager databases to the Symantec ESM Reporting database Symantec Enterprise Reporting uses a metadata model that lets you use queries to find any information in the Symantec ESM Reporting database You can also use the metadata model to create reports that are tailored to your specific information needs Symantec Enterprise Reporting delivers the information as interactive Web pages Excel spreadsheets report views or via email Where to get more information This document describes the implementation of Symantec ESM Reporting with Symantec Enterprise Reporting For more information about using Symantec Enterprise Reporting see the U

Download Pdf Manuals

image

Related Search

Related Contents

  IP-310 MANUAL DE CONFIGURACIÓN (ESPAÑOL)  Baureihe 111-01 - Sander Fördertechnik  Circulaire 2010  資料 4 測定器のテクニカルデータ  User manual and installation guide ICY18xx  Istruzioni per l`uso  Monarch 9800™ Series Printers  716 09 05 Rev0 UM Secador SP 3100N  C-300  

Copyright © All rights reserved.
Failed to retrieve file