MER Analyzer 2 1 Walkthrough Guide
MER Analyzer 2 1 Walkthrough Guide
Walkthrough Guide
COPYRIGHT
Copyright 2012 McAfee, Inc. All Rights Reserved.
No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language in any form
or by any means without the written permission of McAfee, Inc., or its suppliers or affiliate companies.
TRADEMARK ATTRIBUTIONS
AVERT, EPO, EPOLICY ORCHESTRATOR, FOUNDSTONE, GROUPSHIELD, INTRUSHIELD, LINUXSHIELD, MAX (MCAFEE SECURITYALLIANCE
EXCHANGE), MCAFEE, NETSHIELD, PORTALSHIELD, PREVENTSYS, SECURITYALLIANCE, SITEADVISOR, TOTAL PROTECTION, VIRUSSCAN,
WEBSHIELD are registered trademarks or trademarks of McAfee, Inc. and/or its affiliates in the US and/or other countries. McAfee Red in
connection with security is distinctive of McAfee brand products. All other registered and unregistered trademarks herein are the sole property
of their respective owners.
LICENSE INFORMATION
License Agreement
NOTICE TO ALL USERS: CAREFULLY READ THE APPROPRIATE LEGAL AGREEMENT CORRESPONDING TO THE LICENSE YOU PURCHASED,
WHICH SETS FORTH THE GENERAL TERMS AND CONDITIONS FOR THE USE OF THE LICENSED SOFTWARE. IF YOU DO NOT KNOW WHICH
TYPE OF LICENSE YOU HAVE ACQUIRED, PLEASE CONSULT THE SALES AND OTHER RELATED LICENSE GRANT OR PURCHASE ORDER DOCUMENTS
THAT ACCOMPANY YOUR SOFTWARE PACKAGING OR THAT YOU HAVE RECEIVED SEPARATELY AS PART OF THE PURCHASE (AS A BOOKLET,
A FILE ON THE PRODUCT CD, OR A FILE AVAILABLE ON THE WEBSITE FROM WHICH YOU DOWNLOADED THE SOFTWARE PACKAGE). IF YOU
DO NOT AGREE TO ALL OF THE TERMS SET FORTH IN THE AGREEMENT, DO NOT INSTALL THE SOFTWARE. IF APPLICABLE, YOU MAY RETURN
THE PRODUCT TO MCAFEE OR THE PLACE OF PURCHASE FOR A FULL REFUND.
Contents
Introducing MER Analyzer. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
MER Analyzer 2.1 features. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
System requirements. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Supported products and components. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Contents
System requirements
MER Analyzer COE system prerequisites:
Item
Requirements
Operating system
2.2 (Will be installed automatically as part of the COE installation package during MER
Analyzer installation)
Requirements
Operating system
Microsoft Windows 7
2.2
Click Next to install MERAnalyzer in the default location or click Browse to change the
installation path.
When the installation completes, the Installation Complete page appears. Click Close.
Select MERAnalyzer from the programs list, then click Remove. Add or Remove Programs
dialog box appears.
From the left pane of the user interface, you can navigate to different data views of the archive
files. The right pane of the user interface displays the parsed data from the archive files.
Loading a file
To open an archive file using MER Analyzer, in the user interface click File | Open. Browse for
the required file, then click Open.
10
General view
General view of the archive MER file provides an overview of system details and McAfee product
details installed on the system on which the MER tool was run.
NOTE: Use Add to Bookmarks to bookmark log files. Wild characters can be used to bookmark
log files.
MER Analyzer displays the last MVT Execution ID in the MER Result section. Click on this link
to open eReports website, where details of last MVT Execution ID will be displayed.
General details
Item
Description
System Information
11
Item
Description
Services
Displays all the McAfee, Microsoft, and other services running on the system.
Registry
Event Logs
Displays application, security, and system log details such as type, source,
user, and description generated on the system.
NOTE: Use Add to Bookmarks to bookmark log files. Wild characters can
be used to bookmark log files.
Displays the errors extracted from the archive file in the result. Click the error
to display errors within the context of the log.
You can customize the Global Error Search by configuring the search
settings.
DrWatson Logs
Displays a list of Dr.Watson log files. Double-click the log file to view details.
Dr. Watson logs collected on non-English system can be viewed in the
following localized languages:
Drivers
German
French
Italian
Spanish
Japanese
Korean
Dutch
Swedish
Portuguese - Brazilian
File List
Lists all the activities logged during creation of the MER file.
MER Statistics
MER Results
Displays the general customer case information, MER settings, and the products
selected during the creation of MER file.
Product details
To search for specific defined terms in the product logs, click Products on the MER Explorer
and define the error and warning search terms then click Search.
NOTE: Use Add to Bookmarks to bookmark log files. Wild characters can be used to bookmark
log files.
12
Item
Description
Processes
Registry
Logs
Displays all logs associated with the product. Double-click the log file to view
details.
DrWatson Crashes
Errors
Displays all errors extracted from the product log files. Click the error to display
errors within the context of the log.
Warnings
Displays all warnings extracted from the product log files. Click the warning
to display errors within the context of the log.
Double-click to open the log file which contains the warning.
Open a .tgz file, then click Global Error Search on the left pane. The Global Error
Search page appears on the right pane.
Click Search Options tab. On the Search Options dialog box configure the search options
as required.
Tab
Description
File Types
Specify the file types that will be searched for the terms specified in
Error and Warning Search tabs.
Use Perform Global/Product search when loading a file to
search after a MER files is extracted and being parsed.
Use Perform second column E check option to search McAfee
Agent log files.
Specify the terms that will be identified as errors when searching log
files.
Specify the terms that will be identified as warning when searching log
files.
Click Search after configuring all the tabs. The search result is displayed in Results tab.
13
General view
14
Item
Description
System Reports
Real-Time Logs
Displays the real-time log properties extracted from the archive file in the
result.
Error Detection
Displays the errors extracted from the specified log file in the result. These
logs can be added to Reports.
Item
Description
Displays the errors extracted from the archive file in the result. Click the error
to display errors within the context of the log.
You can customize the Global Error Search by configuring the search
settings.
Escalation Checklist
Database view
Item
Description
System
Web Reports
Protocol
Updates
Network
HTTP/ICAP/FTP
Web Detection
SMTP
Transport.log
Email Detection
Conversation
Protocol Events
DLP
Web Detection
Email Detection
Viruses/PuPs-Web
Filtered URL-Web
Content-Web
Viruses/PuPs-Web
Content
Spam
Sender Authentication
Record
Priority Domain
Domain Status
Domain
15
Item
Description
Delivery Strategy
Filtering data
Use the filter options to filter unwanted data in the log files. You can select the filter type from
the
drop-down menu.
16
Click Find Filter Text on the right pane of the user interface. The Find Filter Text dialog
box appears.
To save filter, configure the filter options as required then click Save Filter.
To delete filter, click Delete Filter.
17
http://www.goggle.com
https://bugzilla.corp.nai.org
To search terms in online database, right-click a value, then select Select Cell. Right-click the
selected value, then select the required database.
18
19
20
Task
1
The ProductName is Network Security Platform by default. Type the new category
name, then click Add.
Editing errors
You can also edit the details of specific errors from LogWizard in WebMER.
Task
1
Click Log Wizard, then click the required code to edit. The LogWizard Item page appears
with the code details.
Deleting errors
Use this task to delete errors from LogWizard in WebMer.
Task
1
Click Log Wizard, then click Delete on the required code row and confirm deletion.
21
Task
1
Start MER Analyzer, then open the EWS archive file (.zip).
On the General tab, click Real-Time Logs. The Real-Time Properties Chart window appears
in the right pane.
Select the required real-time property(s), then click Add Selected Item(s) | Done.
Select the Date Range for which you require to generate real-time properties chart, then
click Start to view the real-time properties chart.
Start MER Analyzer, then open the EWS archive file (.zip).
On the General tab, click Error Detection. The Error Detection Settings window appears
in the right pane.
Select the date range for which you require to generate error detection result.
6
Select the log file category and click
7
Click OK.
To delete an error log from the dictionary, select the error message then click Delete Item
and confirm deletion.
22
Click Tools | Rule building and Catalog. The Rule Builder and Catalog wizard appears.
Type a valid KB Link, add any Suggestions, then select a Security Level for the Rule.
NOTE: Rules marked Internal can only be viewed by McAfee users and External rules
can be viewed by all users.
On the Components tab, right click on a component then add or import component entries.
NOTE: Refer to Creating a new component entry and Importing existing component entry
for more details.
23
On the Rule tab the rules are grouped in categories. Right click on the product name, then
select Create Category. The New Category window appears.
Type a category name then click Add Category. The category appears in Rule tab.
To add rules to the category, right click on the category then select Create Rule. The
Rule Builder window appears.
10 Type a name to rule and other rule information, then click Add Rule. The Rule Builder
Add Criteria dialog box appears.
11 To add criteria to the rule, select a criteria from the list then click the logical operation from
the Expression Builder. The list logical criteria for the rule appears in the Expression
Builder.
12 Click Add Criteria to add the new rule. The new rule now appears on the Rule tab of
Rule view.
In the Components tab of the Rule view, right click on a component type then select
Create Entry. The new entry window appears.
Type the Operation details and other required component details, then click Create.
To import component entries from the local machine, right click on a component type then
select Machine.
When importing component entries for a file from the local machine, on the Select the
File Options window browse for the file then add the text you want search the file for.
NOTE: You can also select text and right click to add it as search criteria.
When importing component entries for an event from the local machine, select the
Windows Event to add as criteria then select the description text to search.
To import component entries from an existing rule file, right click on a component type
then select Rule File. The Rule Builder appears.
a Select the Product name and Product version then click Next. The list of component
entries appears.
b Select the components from the list, then click Add. The component entries appear on
the Components tab of Rule view.
24
To import component entries from a .TGZ file, right click on a component type then select
MER file.
Editing a rule
Once a rule has been created it is added to the Rule view. The rule can be edited using the
Basic tab. Use this task to edit an existing rule.
Task
1
Click Tools | Rule building and Catalog. The Rule Builder and Catalog wizard appears.
Select a Product Name and a Product Version, then click Next. The rule for the select
product and version appears on the Rule view.
NOTE: The Product name and Product Version fields contains all versions for all McAfee
for products which rule have not previously been created.
On the Basic tab, edit the required details then click Save All.
NOTE: A more detailed explaination is availabe in the Detail tab.
Type the email address and WebMER password, then click Login. Once the user is
authenticated with the server the Rule Upload window appears.
Select the rules to upload, then click Upload Rules. Before the rules are available to other
MERAnalyzer users, the uploaded rules should be approved by the administrator.
Click Tools | Rule building and Catalog. The Rule Builder and Catalog wizard appears.
Select Approve Rules, then click Next. The User Credentials window appears.
Type in email address and WebMER administrator password, then click Login. The
Requests submitted for review window appears.
25
In the Approve/Reject column, select Approved or Rejected then click Submit. The
approved rules are now available to other MERAnalyzer users.
26
Index
C
cancelling parsing 10
MER Analyzer
loading file 10
L
loading file 10
27
Index
28