SEM Getting Started Guide
SEM Getting Started Guide
This document may not be reproduced by any means nor modified, decompiled, disassembled,
published or distributed, in whole or in part, or translated to any electronic medium or other means
without the prior written consent of SolarWinds. All right, title, and interest in and to the software,
services, and documentation are and shall remain the exclusive property of SolarWinds, its affiliates,
and/or its respective licensors.
The SolarWinds, SolarWinds & Design, Orion, and THWACK trademarks are the exclusive property of
SolarWinds Worldwide, LLC or its affiliates, are registered with the U.S. Patent and Trademark Office,
and may be registered or pending registration in other countries. All other SolarWinds trademarks,
service marks, and logos may be common law marks or are registered or pending registration. All
other trademarks mentioned herein are used for identification purposes only and are trademarks of
(and may be registered trademarks) of their respective companies.
page 2
Table of Contents
Get started with SolarWinds Security Event Manager (SEM) 4
SEM Console 16
Dashboard 16
Rules 16
Nodes 17
Configuration 17
page 3
ADMINISTRATOR GUIDE: SECURITY EVENT MANAGER
SEM provides access to log data for forensic and troubleshooting purposes, and tools to help you
manage log data. SEM leverages collected logs, analyzes them in real time, and notifies you of a
problem before it causes further damage.
For example, advanced persistent threats can come from a combination of network events such as
software installations, authentication events, and inbound and outbound network traffic. Log files
contain all information about these events. The SEM correlation engine identifies advanced threat
activity, and then notifies you of any anomalies.
If you are interested in evaluating SolarWinds SEM, you can download the product, fully-functional
for 30 days. After the evaluation period, you can convert your evaluation license to a production
license by obtaining and applying a license key.
The purpose of this guide is to familiarize you with commonly used features of SolarWinds SEM that
will allow you to begin detecting suspicious activity, mitigate security threats, achieve auditable
compliance, and maintain continuous security.
l If you are a customer and need implementation help, search the SolarWinds Customer Success
Center, or contact our Support Team. Read SolarWinds Customer Support Information to learn
how to open a support case.
l If you are evaluating this product and need assistance, contact sales@solarwinds.com.
page 4
Checklist to get started with SolarWinds SEM
Complete the following tasks to get started with SolarWinds SEM:
Before you begin, decide which logs you want to monitor. If you monitor too many logs,
working on the SEM Console can be overwhelming.
Only events that you have designated to be sent to SEM are visible on the SEM Console.
Learn how to use the SEM Contego Management Console (CMC) to verify that syslog event
data is being sent to SEM.
Learn how to add a Cisco® Adaptive Security Appliance (ASA) firewall to SEM.
After SEM is receiving log data, use the SEM Console to search, view, and filter the data.
page 5
ADMINISTRATOR GUIDE: SECURITY EVENT MANAGER
l Identify your goals by listing what you want to accomplish with your log data. Consider the
business drivers that require you to monitor logs. If you have a compliance-related goal, you
could focus on your data center and monitor security events. If your goal is to monitor logs for
outages, you could verify that your servers are sending logs, and that you are receiving events
from Microsoft Windows® Event Logs.
l Identify the systems that have the log data you want to monitor: If your goal is to monitor logs
so you are PCI-compliant, identify the systems and network devices that are in scope for
compliance. For each identified system and network device, identify which specific logs are in
scope, and the level of logging, if applicable.
l Begin with what you know: Another strategy for determining which logs to monitor is to begin
with what you know so that you can avoid learning about SEM and your logs at the same time.
Monitor the logs with which you are familiar, and scale from there. For example, if you are most
familiar with your Windows security, application, and system event logs, begin monitoring those
logs first. SEM also provides connectors to read many other different types of logs.
Application-specific logs
Application-specific logs
page 6
If You Need To Track... Collect These Kinds Of Logs
Application logs
Application logs
page 7
ADMINISTRATOR GUIDE: SECURITY EVENT MANAGER
You may find the following topics of the SEM Installation Guide helpful:
Be sure to reserve memory and CPU resources for SEM, and not just allocate these resources.
For more information on reserving resources for SEM, see The Reason why SEM Needs Memory
and CPU Resource Reservations.
After you have installed SEM, return to this guide and continue to the next section.
page 8
Configure your devices to send events to SEM
After you install SEM and determine the types of log files to monitor, ensure your devices are
configured to send log data to SEM. SEM does not automatically scan your environment for network
devices and systems and start collecting and analyzing log files. You must configure identified
devices and systems to send log data of interest, and then add those devices to SEM.
If you are seeing so much data coming into SEM that it seems meaningless, or you are not seeing
data at all, then ensure you have:
For example, the following graphic shows a section of a sample audit policy for a workstation. If you
are expecting Plug and Play events to be written to the log file and the policy is set to No Auditing,
then those events are not sent to SEM.
Find information on adding a syslog device to SEM here, and configuring the corresponding
connector here. For additional guidance, refer to your vendor documentation or contact
SolarWinds Customer Support.
See Audit Policies and Best Practices for SEM for more information on Windows audit policies.
See Understanding syslog in SEM for more information on configuring your syslog device to send log
data to SEM.
page 9
ADMINISTRATOR GUIDE: SECURITY EVENT MANAGER
The following example shows how to use PuTTY to verify that SEM is receiving events.
page 10
6. Open the local facility to determine if it is receiving the logs you are expecting.
In this example, local facility 4 is receiving traffic from the Cisco ASA firewall that was
configured to send logs.
page 11
ADMINISTRATOR GUIDE: SECURITY EVENT MANAGER
If you are not seeing the log data that you expect to see:
l Check the network device vendor documentation for instructions on configuring your device.
l See How to Troubleshoot Syslog Nodes in SolarWinds Security Event Manager for guidance on
troubleshooting situations when SEM is not receiving log data.
page 12
Configure an agent in SEM
For non-network devices, you can install the SEM agent on workstations and servers to collect and
normalize log data before it is sent to SEM. The SEM Agent also collects security data from each
device (such as Windows event logs, database logs, and local antivirus logs) and transmits this data
to SEM. The SEM Agent has a small footprint on the device and prevents log tampering during data
collection and transmission.
SEM provides access to the most frequently installed agents. See Additional SEM downloads for in
the SolarWinds Customer Portal for a comprehensive list of agents.
page 13
ADMINISTRATOR GUIDE: SECURITY EVENT MANAGER
When you add a syslog device to SEM, select a connector that is specific to the network device you
are adding. The connector normalizes the log data into a standard format that can be compared with
logs received from other vendors' devices. See SEM Connector List for a list of supported connectors.
The following example describes how to add a Cisco ASA firewall to SEM. See Integrate Cisco
network devices with SolarWinds SEM for more information on adding Cisco devices to SEM.
After you configure your firewall to log to your SEM appliance, configure the corresponding connector
on your SolarWinds SEM Manager. Many of the firewall connectors are similar, and some will include
unique settings.
This example describes how to configure a Cisco PIX and IOS connector on your SEM Manager.
page 14
2. Find the connector to configure. Type part of the connector name (Cisco PIX) in the search box,
or use the filter menus in the Refine Results pane.
3. Select the connector, and then click Add Connector.
4. Complete the connector configuration form. The following fields are common across most
connectors:
l Name: Enter a user-friendly label for your connectors.
l Log File: Enter the location of the log file that the connector will normalize. This is a
location on either the local computer (Agents), or the SEM appliance (non-Agent devices).
l Output: Normalized, Raw + Normalized, Raw. You only need to configure these values if
SEM is configured to save raw (unnormalized) log messages.
5. Click Add.
6. Under Configured connectors, select your connector, and then click Start.
page 15
ADMINISTRATOR GUIDE: SECURITY EVENT MANAGER
SEM Console
The SEM Console is presented in HTML5 format, which means there is no requirement for Adobe
Flash or other third-party media players. This update also results in a more robust console that can
run on any computer operating system as well as most web browsers. As SolarWinds continues to
transition existing SEM legacy functionality from Adobe Flash to HTML5, the following features are
currently available in the HTML5 SEM Console.
Dashboard
Access the SEM Dashboard (formerly SEM Ops Center) to highlight and summarize trends and
suspicious activity through a series of interactive widgets. You can create, edit, and arrange widgets
to display log data in a variety of tables and graphs based on filters within your Events viewer. Upon
initial login, the SEM Dashboard appears by default. Learn more here.
Rules
Rules monitor event traffic and automatically respond to security events in real time, whether you are
monitoring the console or not. When an event (or a series of events) meets a rule condition, the rule
prompts the SEM manager to act. A response action can be discreet (for example, sending a
notification to select users by email), or active (for example, blocking an IP address or stopping a
process). Learn more here.
page 16
Nodes
Through the HTML5-based node management feature, you can add agent nodes, configure
connectors and connector profiles, and then monitor activity on the SEM Console. Upon node and
connector configuration, click the Events tab to view your network activity, and then create and apply
filters to tailor your log feed to view event logs vital to maintaining the health of your network
environment. Learn more here.
Configuration
Rules monitor event traffic and automatically respond to security events in real time, whether you are
monitoring the console or not. When an event (or a series of events) meets a rule condition, the rule
prompts the SEM manager to act. A response action can be discreet (for example, sending a
notification to select users by email), or active (for example, blocking an IP address or stopping a
process). Learn more here.
You can use email templates to customize your email notifications when triggered as responses in
your custom rules. An email template includes static and dynamic text (or parameters). The static
text lets you customize the message body of the email. The dynamic text is filled in from the original
event that caused the rule to fire. Learn more here.
page 17
ADMINISTRATOR GUIDE: SECURITY EVENT MANAGER
The SEM Legacy Flash Console is a browser-based interface for monitoring your SEM appliance. The
console is organized into functional areas called views. Views organize and present different
information about the components that comprise the SEM system. The SEM Console provides the
views listed below.
The majority of SEM Legacy Flash Console functionality can now be accomplished in the HTML5-
based SEM Console. For more information, review the feature comparison.
l Ops Center: Provides a graphical representation of your log data. It includes several widgets
that help you identify problem areas and show trends in your network. You can select additional
widgets from the widget library or add custom widgets that reflect your log activity.
l Monitor: Displays events in real time in your network. You can view the details of a specific
event or focus on specific types of events. This view also includes several widgets to help you
identify trends or anomalies that occur in your network.
l Explore: Provides tools for investigating events and related details. Select nDepth to search or
view event data or log messages. Select Utilities to view additional utilities.
l Build: Create user components that process data on the SEM Manager. Select Groups to build
and manage groups. Select Rules to build and manage policy rules. Select Users to add and
manage console users.
l Manage: Manages properties for appliances and nodes. Select Appliances to add and manage
appliances. Select Nodes to manage agents, and to view syslog devices & agents.
l Analyze: Provides an overview of the Reports feature that extracts and presents data from the
database. You must install this feature separately.
3 List pane Displays categorized lists of events, event groups, event variables,
and additional options you can use to create conditions for your
filters.
page 18
Number Item Description
4 Search bar Searches all event data or the original log messages that pass
through SEM. Switch to select Drag & Drop or Text Search mode.
5 Respond Displays a list of corrective actions you can execute when an event
occurs, such as shutting down a workstation or blocking an IP
address.
6 Explore Displays several utilities you can use to research an event, including
Whois, Traceroute, and NSlookup.
7 Time A drop-down list to select the time range for your search.
9 Histogram Displays the number of events or log messages reported within the
selected search time range.
10 Dashboard Displays the search results in all available widgets. You can change
this view by clicking a widget in the nDepth toolbar.
The icon indicates you are exploring event data. The icon
indicates you are exploring log messages.
page 19