Sem Admin Guide
Sem Admin Guide
This document may not be reproduced by any means nor modified, decompiled, disassembled,
published or distributed, in whole or in part, or translated to any electronic medium or other means
without the prior written consent of SolarWinds. All right, title, and interest in and to the software,
services, and documentation are and shall remain the exclusive property of SolarWinds, its affiliates,
and/or its respective licensors.
The SolarWinds, SolarWinds & Design, Orion, and THWACK trademarks are the exclusive property of
SolarWinds Worldwide, LLC or its affiliates, are registered with the U.S. Patent and Trademark Office,
and may be registered or pending registration in other countries. All other SolarWinds trademarks,
service marks, and logos may be common law marks or are registered or pending registration. All
other trademarks mentioned herein are used for identification purposes only and are trademarks of
(and may be registered trademarks) of their respective companies.
SolarWinds advises that, as a best practice, the SEM appliance should not be set up to be
available to the Internet or any public-facing network. In addition, using this practice will help
prevent access by unauthorized users. For further information on SEM security, see the SEM
security checklists.
Log in to SEM
This section describes how to log into the user interfaces you will need to work with SEM.
2. Enter your user name and password, and then click Log in.
If SSO is enabled, you can log in by clicking Log in with SSO and using your Windows
credentials.
Log in to the CMC command-line interface using the hypervisor virtual console
See your hypervisor documentation for information about using the virtual console.
a. Click Action > Connect, and then click the Console tab.
b. Use the arrow keys to navigate to Advanced Configuration, and press Enter.
2. Enter the CMC user name and password.
The CMC menu appears with a cmc> prompt.
Next steps:
l See CMC: Using the SEM command line tool for a list of supported commands.
See CMC Access Restrictions for information about credentials and SSH access restrictions.
You can connect to SEM using a secure shell (SSH) client (such as PuTTY). The following steps show
how to configure PuTTY to open the CMC command line, but these settings will work in any SSH
client.
1. Open PuTTY and verify that Session is selected in the Category section.
The next time, double-click SEM Manager in the Saved Session box to open the
connection.
The default CMC password is password. See Change the SEM CMC password to
change it. For help recovering a lost CMC password, contact SolarWinds Support.
Next steps:
l See CMC: Using the SEM command line tool for a list of supported commands.
SolarWinds advises that, as a best practice, the SEM appliance should not be set up to be
available to the Internet or any public-facing network. In addition, using this practice will help
prevent access by unauthorized users. For further information on SEM security, see the SEM
security checklists.
1. Open a web browser and connect to the SEM Console using the URL you were provided. For
example, http://10.199.129.1/webui/auth.
2. Enter your user name and password, and then click Login.
3. To accept the terms of license agreement, select the check box, and then click Next.
4. Enter and confirm your new password, and then click Next.
5. Enter your email address for contact and download verification, and then select or clear the
check box to send usage statistics to SolarWinds.
Run the activate command to secure SEM and configure network settings
You can still evaluate SEM without running the activate command. You can also turn off HTTP.
Run the Activate command after you install the license (see Manage SEM licenses for help). This
command will help secure SEM from unauthorized users.
Port 8080 is unsecure and is automatically disabled after activation has been completed. Port
8443 is always available.
When the activation is complete, the SEM VM automatically exports the SSL certificate, and the SEM
desktop console connects with the SEM Manager using secure communications on port 8443.
1. Open the CMC command line. See Log in to the SEM CMC command line interface for steps.
The default password is password.
2. At the cmc> prompt, type manager.
3. At the cmc::manager> prompt, type exportcert.
This command exports the CA certificate so that you can import it into a computer running the
SEM console.
4. Follow the prompts to export the SEM Manager CA certificate.
An accessible network share is required. Once the export is successful, you will see the
following message: Exporting CA Cert to \\server\share\SWICAer -hostname.crt ...
Success.
SolarWinds recommends configuring a static IP address for the SEM VM. If you use
DHCP instead and your IP address changes, your deployed Agents may be disconnected
and require additional troubleshooting to resolve.
a. At the cmc> prompt, type appliance, and then press Enter.
The prompt changes to cmc::appliance> to indicate that you are in the appliance
configuration menu.
Be sure to enter a value for each prompt. Leaving blank entries results in a faulty
network configuration that requires you to rerun netconfig.
h. Record the IP address assigned to the SEM VM. You will use this IP address to log in to
the SEM console.
3. When prompted to change the hostname, select either Yes to specify a hostname, or No to
accept the default hostname. To specify a hostname, use the following naming conventions:
l Hostname labels can only contain the following:
o ASCII letters A through Z (letters are not case sensitive)
o Digits 0 through 9
o Hyphens (-)
l Hostnames cannot start with a digit or a hyphen, and must not end with a hyphen.
l No other symbols, punctuation characters, or white spaces are permitted.
4. When prompted to specify a list of IP addresses that can access reports, SolarWinds
recommends selecting Yes.
To ensure secure communications between SEM and the SEM desktop console, the
SEM VM automatically exports an SSL certificate when the activation completes.
Following activation, the SEM desktop console securely connects with the SEM VM
on port 8443.
See Sending logs and event data to SEM to learn how to configure SEM to receive log events
from other systems and services in your IT environment.
Tab Settings
Authentication In the Authentication settings, you can manage Single Sign On (SSO) connection
settings, create LDAP configurations, and set minimum password requirements
for local SEM user accounts.
Events Limits You can set the maximum number of results per historical search query, as well
as the maximum number of events appearing in each Events viewer filter and
dashboard widget.
Improvement Enter your email address to send usage statistics to SolarWinds to help us
Program improve our products.
Log Forwarding Enable log forwarding to direct your raw (unnormalized) log messages to a
dedicated server. This option allows you to forward log data to third-party
systems and other SIEM tools.
System Lists the platform name, memory and CPU information, and the manager name,
Resources version, and IP address. Also includes the one-click download debugs feature.
Threat Enable the Threat Intelligence feed, which enables SEM to detect threats based on
Intelligence lists of known malicious IP addresses. Learn more here.
Web Console Create a customized plain-text notification banner to provide information to users
before they gain access to SEM.
Do not right-click the host and choose power off or shutdown guest. You can corrupt the SEM
database and file system if you do not shut down SEM properly.
1. Open the CMC command line. See Log in to the SEM CMC command line interface for steps.
2. Type appliance at the cmc> prompt.
3. Either:
l Shut down the VM:
When you configure connectors to send original log data to SEM, the messages are then auto-
forwarded to the designated location. To use this feature, configure rawlogs and applicable
connectors accordingly.
When enabled, you can switch between storing logs in the raw logs database and forwarding logs
with syslog protocols (RFC3164 and RFC 5244). There is no option to filter logs based on IP address,
connectors, rules, etc.
l Rules do not fire on raw (unnormalized) log data. Rules can only fire on normalized data.
l Raw (unnormalized) log messages do not appear in Monitor view in the console.
l If you enable original log storage (raw database storage), and you enable connectors to
send data to both databases, SEM storage requirements may double for the same
retention period, and extra resource reservations of at least two additional CPUs and 8-
16GB of RAM may be required.
3. Select a node connecter, click Stop, and then click Edit.
3. To enable log forwarding for adjusted connectors, select the Enable log forwarding for adjusted
connectors check box.
Log Forwarding can only be enabled for connectors whose Output setting includes raw
logs.
4. Enter the destination IP address or host name, and then enter the destination port.
5. Make a selection from each of the following drop-down lists (the standard settings appear by
default):
l Protocol: UDP or TCP
l RFC format: 3164 or 5424
l Severity: The severity level is applied to all forwarded logs
l Facility: The destination application
6. Enter an App name (optional), and then click Save.
7. To return to the SEM Console, click the Events tab.
2. On the Settings page, select the System Resources tab, and then click Download Debug logs.
The debug logs (.tgz file) will download to your system.
The SEM VM is configured to synchronize with the hypervisor date and time by default. If the time is
off by more than five minutes, the SEM rules will not operate properly.
1. Open the CMC command line. See Log in to the SEM CMC command line interface for steps.
2. Update the time zone in your SEM Manager.
a. At the cmc> prompt, type appliance, and then press Enter.
b. At the cmc::appliance> prompt, type dateconfig, and then press Enter.
c. Press Enter, and then enter the current date in month/day/year format (MM/DD/YYYY).
d. At the cmc::appliance> prompt, type tzconfig, and then press Enter.
e. To configure the time zone, press Enter, and then follow the onscreen prompts.
f. At the cmc::appliance> prompt, type exit, and then press Enter to return to the main
menu.
3. Update the time in your hypervisor.
a. At the cmc> prompt, type manager, and then press Enter.
b. At the cmc::manager> prompt, type viewsysinfo, and then press Enter.
The system information info displays.
c. Using the keyboard, scroll down to Hypervisor Time and change the date and time so they
match the date and time in the SEM Manager.
d. Using the keyboard, scroll down to Guest Time and ensure that the date and time matches
the same settings in the SEM appliance.
4. Type Exit, and then press Enter.
5. To exit the CMC interface, type Exit, and then press Enter again.
See Choose a licensing method for your SEM deployment in the SEM Installation Guide to learn
how SEM is licensed.
Manage licenses
On the Settings page, you can view, upgrade, activate, and deactivate your SEM license.
To display license information, click the Settings icon, and click Manage License.
The link on the upper right will depend upon whether the license is active or inactive.
l For online activation: click Activate license, enter your license key, name, email, and phone
number, and then click Activate.
l For offline activation: click Activate license, use your unique ID to generate the license file, or
click Browse to select your license file, and then click Activate.
If you do not have a license key, click Purchase license key. This directs you to the current
licensing options available for SEM on the SolarWinds website.
If SEM is already licensed and activated, license information will be displayed and the options will be
to Upgrade or Deactivate.
Field Description
Configuration Enter a friendly name of your choosing for the LDAP configuration.
Name
Domain Enter the fully-qualified domain name for the account store.
Use SSL (Optional) Select to use the transport layer security protocol (LDAPS) for a
Encryption secure connection. This option directs traffic from the SEM VM to a
designated server (usually a domain controller) for use with the Directory
Service tool.
LDAP Port If SSL encryption is not used, the default for this setting is 389. If SSL
encryption is used, the default for the port is 636.
Use for Select, then click Next if you wish to use Advanced Settings shown below.
Authentication
Domain Aliases Specify any Domain Alias names that should be authenticated using this
(Optional) LDAP configuration. (The role/group names configured on this page will
also apply.)
NetBIOS Names Specify any NetBIOS names that should be authenticated using this LDAP
(Optional) configuration. (The role/group names configured on this page will also
apply.)
Admin Group Specify the DS group in Active Directory to use for the SEM administrator
(Optional) role. If you do not specify a name, the default ROLE_LEM_
ADMINISTRATORS group is used.
Alerts Only Group Specify the DS group in Active Directory to use for the SEM auditor role. If
(Optional) you do not specify a name, the default ROLE_LEM_AUDITOR group is used.
Field Description
Guest Group Specify the DS group in Active Directory to use for the SEM guest role. If
(Optional) you do not specify a name, the default ROLE_LEM_GUESTS group is used.
Notify Only Group Specify the DS group in Active Directory to use for the SEM notifications
(Optional) role. If you do not specify a name, the default ROLE_LEM_CONTACTS
group is used.
Reports Group Specify the DS group in Active Directory to use for the SEM reports role. If
(Optional) you do not specify a name, the default ROLE_LEM_REPORTS group is
used.
A warning message is displayed if you disable a configuration informing you that users will be
unable to log on from that domain and any logged-in users from that domain will be
immediately logged out.
2. Either:
l Click Edit to display the Configure LDAP details for this configuration, which can now be
edited and saved.
Or:
l Click Delete to remove this configuration.
If you used the SEM Setup Wizard to set up your SEM environment, then the Email Active
Response connector is already configured. See SEM Setup Wizard for more information.
Requirements
l An email server that allows SEM to relay email messages through it
l IP address or hostname of your email server
l A return email address for bounced messages and replies
l User credentials for your email server, only if your email server requires internal users to
authenticate to send email
To configure SEM to use Office 365 as a mail host, see Configure SEM to send email via Office
365 in the SolarWinds Success Center.
4. In the Name field, enter a new name, or keep the existing name.
5. In the Mail Host field, enter the mail host IP address.
If you use a hostname in the Mail Host field, SEM Manager must be able to resolve the mail host
from the DNS entries you entered during your SEM network configuration.
6. In the Port field, enter 25.
7. From the Transport Protocol drop-down list, select SMTP or TLS.
TLS 1.2 is supported for email connections in SEM 2020.2.1 and later.
9. If the email server requires an Active Directory user to send email, enter the authentication
server user name and password in the appropriate fields.
If the email server requires an email to be sent from a computer within the domain, the
email server must have an exception created for the SEM hostname. SEM cannot join the
domain.
10. Click Add. The connector appears on the Manager Connectors tab under Configured
connectors.
11. Under Configured connectors, select your connector, and then click Start.
Modify the connector configuration as required and then resend a test email.
See also:
l Troubleshoot SEM rules and email responses
Enable SEM to receive SNMP traps by turning on the SNMP Trap Logging
Service
Turn on the SNMP Trap Logging Service to enable SEM to receive SNMP traps from devices and
applications on your network. SEM can correlate events sent as SNMP traps from devices that have a
device-specific connector.
SEM can also correlate performance alerts sent as SNMP traps from the following SolarWinds
solutions:
l Network Performance Monitor (NPM)
l Server & Application Monitor (SAM)
l Virtualization Manager (VMAN)
The SNMP Trap Logging Service must be enabled to correlate events sent by these SolarWinds
products.
See also:
l To configure SEM to output SNMP traps, turn on the SNMP Request Service. See Provide SNMP
traps from SEM to other applications by turning on the SNMP Request Service to learn how.
l To configure SEM to communicate with NPM and the Orion Web Console, see Monitor SEM
from NPM and the Orion Web Console using SNMP.
Complete the following steps to enable (or disable) the SNMP Trap Logging Service in SEM.
Would you like to ENABLE the SNMP Trap Logging Service? [Y/n]
Would you like to STOP the SNMP Trap Logging Service? [Y/n]
The SNMP Request Service is not the same as the SNMP Trap Logging Service:
l The SEM SNMP Request Service sends SNMP traps outside of SEM
l The SEM SNMP Trap Logging Service receives SNMP traps from other devices. See
Provide SNMP traps from SEM to other applications by turning on the SNMP
Request Service for more information.
l If you disabled the SNMP Trap Logging Service, the following message appears:
Send SNMP traps from SEM to other applications by turning on the SNMP
Request Service
Turn on the SNMP Request Service to allow SEM to output SNMP traps to one or more applications
on your network. SEM supports SNMP version 2 and SNMP version 3.
1. Enable the SNMP Request Service using the steps on this page.
2. To set up the Orion Console for SNMP monitoring, see Set up SEM to communicate
with NPM and the Orion Web Console using SNMP.
l To configure SEM to receive SNMP traps, see Enable SEM to receive SNMP traps by
turning on the SNMP Trap Logging Service for steps.
The SNMP Trap Logging Service is not the same as the SNMP Request Service. The SEM SNMP
Trap Logging Service receives SNMP traps from other devices, whereas the SEM SNMP Request
Service outputs SNMP traps outside of SEM. See Enable the SNMP Trap Logging Service in
SEM for more information.
4. Do not change the status of this service unless you know what you are doing.
To go to the next step, type Y or n, and then press Enter.
5. To enable or disable the service, type Y or n, and then press Enter.
If you enabled the SNMP Request Service, the following prompt appears:
6. Type the port number that SEM should use to communicate with SolarWinds Network
Performance Monitor (NPM), and then press Enter.
7. Type the user name to use, and then press Enter.
The following prompt appears:
The Windows Security Log connector stopped collecting WFP data in SEM version 6.2.
SolarWinds strongly recommends that you keep WFP logging turned off.
To collect WFP events in SEM, configure the Windows Filtering Platform Events connector. Enabling
this connector will result in SEM collecting a huge volume of data. To manage this data, see the
following sections.
If you collect WFP events in SEM, SolarWinds recommends tuning WFP in your Active Directory group
policies to decrease the load that background events place on the SEM Manager. The following tables
describe alerts located in the Event Distribution Policy in SEM Manager. You can filter out these
events by clearing the appropriate check boxes in the Console, Database, Warehouse, and Rules
columns. SEM will process the remaining events.
The ProviderSID value in the following alerts match the Windows Security Auditing Event
ID format where Event ID is one of the Windows Event IDs listed in the following table.
PPTPTrafficAudit 5152
Monitor SEM from NPM and the Orion Web Console using SNMP
If you use Network Performance Monitor (NPM) and the SolarWinds Orion Web Console, you can use
it to monitor CPU, memory, and other critical resources utilized by SEM. Complete the steps in this
topic to configure SEM to communicate with NPM.
SEM can use SNMP version 3 to communicate with SolarWinds Network Performance Monitor
(NPM).
6. In the lower section of the form, ensure the fields remain blank.
This is a SEM-specific setting for SNMPv3. Completing the Username and Context fields,
for example, will cause the connection test to fail.
The Orion Platform authenticates the SEM Manager and runs a discovery to locate the
resources available to monitor on the SEM appliance. The discovered resources will list all the
elements that are available to monitor. The Orion Platform will automatically provide a list of
selected resources based on the device type.
9. In the Choose Resources dialog, select the resources to monitor on the node, and then click
Next.
10. In the Add Application Monitors dialog, click Next.
11. In the Change Properties dialog, click Next.
12. Click OK, Add Node.
The SEM appliance is added to the Orion Web Console for monitoring.
See Unable to add nodes through the Web Console for additional troubleshooting information.
2. On the Settings page, click the SolarWinds Platform Web Console tab.
3. Move the toggle button to the On setting.
CPU Reservation The reserved CPU memory. Reserving CPU memory ensures enough
system resources are available for the allocated CPUs.
Memory The maximum amount of memory the Manager can use. Set this value at
Allocation or above the reservation value. You can define this value in the VM
configuration. Setting memory allocation to a greater value than the
memory reservation has little effect on SEM performance.
See SEM system requirements in the SEM Installation Guide for hardware and software sizing
requirements.
SEM can send SNMP version 3 alerts to SolarWinds Network Performance Monitor (NPM). This
configuration allows you to monitor CPU, memory, and other critical SEM components from the
SolarWinds Orion Web Console.
Security Event Manager collects data from a continuous stream of traffic that fluctuates based on
user, server, and network activity. The type and volume of traffic varies based on the device sending
the traffic and the audit and log settings on those devices.
The events appear in the Monitor view, pass through the rules engine for specified actions, and then
move into a database for retrieval by the SEM Reports or nDepth search function. To process the data
in real time, SEM requires system resource reservations from the virtual appliance host.
When the volume of traffic exceeds 15 million events per day, be sure to reserve additional system
resources to support the additional data traffic.
CPU Reservation The reserved CPU memory. Reserving CPU memory ensures enough
system resources are available for the allocated CPUs.
Memory The maximum amount of memory the Manager can use. Set this value at
Allocation or above the reservation value. You can define this value in the VM
configuration. Setting memory allocation to a greater value than the
memory reservation has little effect on SEM performance.
You can view your reservation settings using vSphere or an SSH client (such as PuTTY). See your
VMware vSphere documentation for details about configuring resources, reservations, and storage on
a vSphere virtual appliance.
SEM requires at least two CPUs. The highest working setting for any SEM appliance is 16
CPUs.
3. Provisioned Storage on the right side of the screen shows the total disk space SEM can use.
l If SEM is set for thick provisioning, the used storage is always the total disk space.
l Thin provisioning allows the used storage to grow to the total amount of storage
allocated.
4. On the Resource Allocation tab, note the CPU reservation on the left, and the memory
reservations on the right.
5. At the bottom left, check the CPU reservation. 2.0Ghz is SEM's minimum setting. To support
higher speeds, see your VMware documentation for configuration information.
6. See the Memory reservation at the bottom right. This reservation is normally set at 8 GB or
higher. The Memory must be the same value or higher than the reservation. Memory
reservations can be set as high as 64GB of RAM, which can support over 150 million events per
day.
Memory settings
Setting Value
Static RAM 8GB, 16GB, 24GB, 32GB, 64GB, 128GB, 256GB
Setting Value
Setting Value
CPU memory details Click the Advanced tab and set the view and details
Setting Value
Reserve CPU cycle 100%
The syslog store consists of all syslog or SNMP log data sent to the SEM VM. SEM reads and
processes the data in real time, and then sends it to the event store for long-term storage. SEM stores
the original data for 50 days in its original format (in case you need to review it). The data in the
syslog store is compressed and rotated daily to maintain a consistent 50-days' worth of data. The
amount of data stored here should level off at around the 50-day mark.
The event store (the second store) contains all normalized events generated by the SEM Manager
and SEM Agents. Data in this store is compressed at ratios of 40:1 to 60:1, which equates to an
average compression rate of 95–98 percent. Both nDepth and the SEM reports application query the
event store for event data when they run.
The original log store (the third store) is an optional store for original or raw log messages. The data
in this store can come from SEM Agents or other devices logging to the SEM appliance. You can
configure if data is sent to this store at the connector level, so not all devices have to store raw log
messages in this manner.
To get help with any of these methods, submit a ticket to Customer Support:
https://customerportal.solarwinds.com/support/submit-a-ticket
When you use the command line to log in to SEM, SEM automatically generates a Disk Usage
summary. You can also generate an ad hoc disk usage summary by running the diskusage
command from the cmc >appliance prompt. The two lines to note here are Logs/Data and Logs.
l The Logs/Data figure represents the total space being utilized by the SEM database. This value
is presented in the percent % (usedG/allocatedG) format, where percent is the percent of the
allocated space currently being used, and allocated is the total amount of space currently
allocated to the SEM database.
l The Logs figure represents the amount of space used by the syslog store. This figure is
included in the used figure noted above. To figure out how much space is currently being used
by the Event store, subtract the Logs value from the used value. If you are storing original log
messages in the SEM database, the above calculation shows the combined space utilized by
both your Event and original log stores.
Run the Database Maintenance Report in SEM reports to view a snapshot of your current database
usage. The report includes the following values:
l Disk Usage Summary – provides disk usage values in terms of the percentage of space
allocated to the SEM database
l Disk Usage Details – provides disk usage values in terms of physical file size
l Database Time Span (days) – shows how many days' worth of live event data is currently stored
in the SEM database
l Other Files – represents the amount of space used by the syslog store
For more information, see the following KB article in the Customer Success Center:
Use the SEM Database Maintenance Report to See Retention and Volume of Traffic
Run the log storage maintenance report in SEM reports to get detailed information about the original
log store. If you have not enabled SEM to store original log messages, this report will be blank.
For more information, see the following KB article in the Customer Success Center: Live Data
Storage Retention in SEM.
Create a disk usage alert in SEM to warn you when a disk reaches a set limit
You can create a disk usage alert from the CMC command line to warn you when a disk partition
reaches a preselected use limit. When the limit is reached, an InternalWarning event displays in the
Monitor view.
You can define the disk use limit by the percentage of unavailable disk space (such as 75 percent), or
by the amount of free disk space (such as 58G).
1. Open the CMC command line. See Log in to the SEM CMC command line interface for steps.
2. To access the Appliance menu, at the cmc> prompt, enter appliance.
3. To view the disk use of each partition, at the cmc::appliance> prompt, enter diskusage. For
example:
Logs/Data: 1% (901M/234G)
Temp: 2% (252M/5.9G)
cmc::appliance >
5. Enter the partition number you want to change, and then press Enter.
6. Enter the disk usage limit value in percentage (such as 75 percent) or size (such as 58G), and
then press Enter.
For example, to change the OS disk partition limit in step 3 from 45 percent to 4 percent, enter
40 percent. To change the OS disk partition limit from 1.3 GB to 2.0 GB, enter 2GB.
Disk usage limit [90%, sizeK, sizeM, sizeG, sizeT] (default 90%): 40%
Limit '40%' for the 'OS' partition is set.
Press <Enter> to set the next partition. Enter 'exit' and press <Enter>
to quit.
7. Press Enter to set the next partition and repeat step 6 (if required).
See Set the Logs/Data partition for additional information.
8. When you are finished, type exit, and then press Enter to quit.
When you set the Logs/Data partition (3), a message prompts you to consider changing the database
disk configuration using the dbdiskconfig command. SolarWinds recommends setting the
Logs/Data partition and the database disk configuration to the same value.
Current configuration:
DoNotExceedPercentage = 90%
The Manager will restart and apply your changes. To exit, enter 'exit'
and press Enter.
Enter a new value for DoNotExceedPercentage (default 90):
Please enter an inter number 0-100 or 'exit'
3. At the prompt, enter a usage limit value between 0 and 100, and then press Enter.
If you enter a value less than 25, the partition will be deleted when this value is reached.
The database disk configuration value is saved, and the appliance restarts the Manager Service.
For example, if you set the OS disk partition limit as a percentage, the following event displays in the
Events viewer table when the limit is reached:
InternalWarning Manager Monitor Warning! Disk Usage: The OS filesystem is over 40% full!
If you set the OS disk partition limit as a file size, the following event displays in the All Events grid
when the limit is reached:
InternalWarning Manager Monitor Warning! Disk Usage: The OS filesystem has under 2G left!
Complete the following tasks to ensure that SEM uses processor and memory resources efficiently.
Review your rules periodically to ensure that they are not triggering too frequently. This can be caused
by:
l Low threshold settings: consider increasing the threshold for rules that trigger due to network
traffic.
l Broadly-defined conditions: define rules to apply only to specific user names, IP addresses, or
systems. Consider whether a different set of rules with different conditions could serve two
distinct areas of your environment.
l Rules using event groups instead of a single event or subset of events: rules that detect
authentication or network traffic may trigger on additional events, but may only apply to a
subset of those events.
Secure SEM
This section describes how to secure SEM to prevent unauthorized access.
SEM security checklists: Ensure that only authorized users can access
SEM
Complete the following tasks to help prevent unauthorized users from accessing SEM.
Run this command to export the SSL certificate that ensures secure communications
between the SEM desktop console and the SEM manager.
See Run the activate command to secure SEM and configure network settings for steps.
Set the minimum password requirements for local SEM user accounts.
See Set the global password policy for SEM users for steps.
See "Specify the filters that users assigned the Monitor role can use on the SEM Console
for steps.
(Optional) This procedure blacklists everyone from logging in to the CMC interface except
those users who connect from an explicitly allowed IP address or host name.
See Restrict SSH access to the SEM CMC interface for steps.
Enable transport layer security (TLS) between the SEM reports application and the SEM
database.
(Optional) The Transport Layer Security (TLS) option introduces an extra level of security
for data transfers between a SEM database and the Reports application.
See Enable transport layer security (TLS) in the SEM reports application for steps.
1. Open the CMC command line. See Log in to the SEM CMC command line interface for steps.
2. Type service, and then press Enter.
3. Type restrictssh, and then press Enter.
4. Complete the wizard to limit access to the SEM cmc console by IP address or host name. You
can enter multiple addresses and host names separated by a space.
Test the restriction by attempting to log in from a blacklisted host or IP address. Repeat the test to
confirm that you can log in from whitelisted hosts and IP addresses.
1. Open the CMC command line. See Log in to the SEM CMC command line interface for steps.
2. Type service, and then press Enter.
3. Type unrestrictssh, and then press Enter.
4. Complete the wizard to remove access restrictions.
As with all versions of SEM, there is one additional level of security for the Reports application, but the
same holds true for the SSH connection or the Console connection (web-based or air-based). You
only need to run the restrictreports command (or restrictconsole or restrictssh commands) to create
a whitelist of computer hostnames or IP addresses that can run reports and access the database (or
the console or SSH, if using that parameter).
l Access can be restricted to specific computers.
l Access can be restricted by port number. The Reports application communicates over port
9001, using TLS or no encryption. Console access only on port 8443/443 when the SEM is
activated, but port 8080/80 is available during evaluation period. SSH access is allowed on port
22 or 32022, but support can assist you with forcing only one port.
l The SEM reports application can be configured to require a user name and password.
Ensure that the list you provide is complete. Your entry will override any previous entries.
Removing SEM reports restrictions will make the SEM database accessible to any
computer on your network that is running the SEM reports application.
5. To return to the cmc> prompt, type exit, and then press Enter.
6. To log out of the CMC command line, type exit, and then press Enter.
old Transport layer security (TLS) and the SEM reports application
The Transport Layer Security (TLS) option introduces an extra level of security for data transfers
between the SEM reports application and the SEM database. From SEM 2021.2, TLS for Reports has
been enabled by default.
From SEM 2022.2, the option to disable TLS has been removed.
For information on using the SEM reports application, see the SEM reports section.
1. Open the CMC command line. See Log in to the SEM CMC command line interface for steps.
1. Open the CMC command line. See Log in to the SEM CMC command line interface for steps.
2. At the prompt, enter manager.
3. At the cmc::manager> prompt, type importcert.
4. Choose the network share path.
5. When prompted, confirm the share name.
6. When prompted for a file name, enter the full name of the certificate, including the CER
extension.
7. When completed, the following message appears:
Certificate successfully imported.
SEM Console
Dashboard
Access the SEM Dashboard to highlight and summarize trends and suspicious activity through a
series of interactive widgets. You can create, edit, and arrange widgets to display log data in a variety
of tables and graphs based on filters within your Events viewer. Upon initial login, the SEM Dashboard
appears by default. Learn more here.
Rules
Rules monitor event traffic and automatically respond to security events in real time, whether you are
monitoring the console or not. When an event (or a series of events) meets a rule condition, the rule
prompts the SEM manager to act. A response action can be discreet (for example, sending a
notification to select users by email), or active (for example, blocking an IP address or stopping a
process). Learn more .
Configure
The Configure menu option gives you access to node and connector management, and the creation of
users, email templates, directory service groups, and user defined groups.
You can add agent nodes, configure connectors and connector profiles, and then monitor activity on
the SEM Console. Upon node and connector configuration, click the Events tab to view your network
activity, and then create and apply filters to tailor your log feed to view event logs vital to maintaining
the health of your network environment. Learn more here.
Create user-defined groups to organize related elements for use with rules and filters. Groups can
contain elements such as events, IP addresses, computer names, and user accounts. After a group is
defined, it can be referenced from multiple rules and filters.
You can use email templates to customize your email notifications when triggered as responses in
your custom rules. An email template includes static and dynamic text (or parameters). The static
text lets you customize the message body of the email. The dynamic text is filled in from the original
event that caused the rule to fire.
SEM provides a library of widgets, or you can create your own by using filters that you have
customized to monitor specific activity. If your widget includes charts, you can click a specific line,
bar, or pie wedge to open the source filter. The corresponding filter opens the Events viewer, and
displays the targeted filter information. The filter lists only the events that correspond with the
selected chart item.
To access the SEM Dashboard, click the Dashboard tab on the SEM Console.
Click an event or data point in a widget to view associated details in the Events viewer.
Clicking the Others grouping in select widgets will show all events associated with that widget.
You can create, edit, and customize the following widget types:
New Time Series - Shows event data for up to the last seven days. Displays a broad range of
Long Term records with less granularity than short-term widgets.
New Time Series - Shows more granularity by allowing you to select filter and property data for a
Short Term specified number of groups. For example, it can display a timeline chart of
failed log-ons for the designated groups.
New Nodes Table Displays a variety of properties for each node in your network, such as IP
Widget address, operating system, connector profile, status, and more.
If you created custom widgets with the old Flash console, these are not automatically migrated
to the current SEM Dashboard, and you will need to recreate them.
Widget Description
Active Directory Group Changes by Displays a donut chart of group changes by group name.
Group
Active Directory Group Changes by Type Displays a donut chart of group changes by event type.
Active Directory Group Changes by User Displays a pie chart of group changes by user source
account.
Active Directory User Changes by Type Displays a donut chart of user account changes by event
type.
All Events - Last 12 Hours Displays a time series view of all events occurring in the
last 12 hours.
All Events - Last 24 Hours Displays a time series view of all events occurring in the
last 24 hours.
All Events by Connector Name Displays a pie chart of all events by connector name via
the ToolAlias log property.
All Events by Event Type Displays a donut chart of the number of all event types.
Widget Description
Blocked Web Traffic by Source Machine Displays a donut chart of the top sources of blocked web
traffic.
Events Per Second - Last Hour Displays the total count of events per second for the past
hour.
File Audit Failures by User Displays a donut chart of the file audit failure events by
user.
Firewall Events by Type Displays a donut chart of the top firewall events by event
type.
HIPAA Events by Type Displays a pie chart of top HIPAA events by event type.
Interactive Logons by User Displays a vertical bar chart of user logons by destination
account.
Log Database Used Storage Percent Displays the logs/data used percentage (KPI widget) with
an 80 percent warning threshold and a 90 percent critical
threshold.
Logon Failures - Last 24 Hours Displays a time series chart of failed logons for the past
24 hours.
Logon Failures by Reason Displays a pie chart of failed logons by failure reason.
Logon Failures by Source Machine Displays a pie chart of failed logons by destination
machine.
PCI Events by Type Displays a donut chart of the top PCI events by event
type.
Rules Fired by Rule Name Displays a pie chart of rule activity by inference rule.
Widget Description
Threat Events by Type Displays a pie chart of threat events by event type.
Traffic by Destination Port Displays a vertical bar chart of all network traffic by
destination port.
Traffic by Source Port Displays a vertical bar chart of all network traffic by
source port.
User Account Changes by Destination Displays a horizontal bar chart of all user account
Account changes by destination account.
User Account Changes by Source Displays a horizontal bar chart of all user account
Account changes by source account.
User Logon by Source Machine Displays a donut chart of all user logons by source
machine.
Virus Attacks by Machine Displays a pie chart of virus attacks by source machine.
Virus Attacks by Virus Name Displays a pie chart of virus attacks by virus name.
3. To resize a widget, drag the lower-right corner to increase or decrease the size.
4. To move a widget, drag the widget header to a different location on the SEM Dashboard.
In edit mode, you can also, add, edit, and remove widgets.
5. After you have completed your edits, click Done editing on the Edit dashboard toolbar.
The Creating Widget pane expands displaying a variety of widgets and widget templates.
4. From the Widget type drop-down list, select a widget category.
5. From the Data shown drop-down list, select Any, Events, or Nodes.
6. To further refine your search, enter a term in the search box.
7. Select a widget template (For example, New Proportional Widget), and then click Customize.
8. Click the edit icon in each template section to name the widget, add widget features and
establish the graphic style and content derived from the designated data source. You can click
Filter and property to set values based on your existing Event table filters.
For example, If you would like to see the number of logon failures, and the reason why, set your
filter to Failed Logons and your properties to FailureReason.
l The filter and properties are the primary values that populate widgets. You can
create and customize numerous widgets to present key data points associated with
your network environment. Reference the Filters pane in the Events tab to review
specific event filters to use when customizing your widgets. Learn more about
filters here.
l The number of events that display in your widgets are established in your filter
threshold settings here.
9. Click the arrows to set the number of groups to display in your widget.
10. Select your chart type (Donut, Pie, Horizontal, Vertical), legend, and refresh rate. As you make
your changes, the widget preview updates to the left of the widget template.
The data refresh rate is set to 30 seconds by default. You can increase it up to one hour,
or decrease it to one second.
11. When complete, click Create Widget, and then click Save changes.
The new widget appears on the SEM dashboard.
12. Move and resize the widget as needed.
13. To edit the widget (in edit mode), click the vertical ellipsis on the upper right of the widget, and
then select Edit widget.
14. To leave edit mode, click Save changes on the Edit dashboard toolbar.
15. To view the associated widget records in the Events viewer, click the widget chart.
3. To edit the widget, click the vertical ellipsis on the upper right of the widget, and then click Edit
widget.
Starting with version 2020.2, SEM introduces a new data indicator to the KPI widget that
displays the age of the oldest stored event in your database. This can be especially helpful
when managing database storage and adjusting your data retention settings.
The Creating Widget pane expands displaying a variety of widgets and widget templates.
6. Click Add New Value to set your Description, Indicator Data, and Threshold values for a specific
data set. For example:
a. Expand Data Source, and select Logs/Data used storage percentage from the dropdown.
This option allows you to monitor the amount of free storage space.
b. Expand Thresholds, and select Use custom thresholds to establish notifications when
storage space is low. For example, you can set the warning to 80 percent full, and critical
to 90 percent full.
7. Continue to add more values to monitor in the KPI widget, such as events per second, or
manager memory used. As you continue to add values, The widget preview updates to the left of
the widget template.
8. To add your KPI widget to the dashboard, click Create Widget, and then click Save changes.
4. Select New Time Series Widget - Short Term*, and then click Customize.
5. Expand Title and Description, and enter a title for the widget (subtitle and description are
optional).
6. Expand the Filter and property section.
a. From the drop-down lists, select the specific event groupings to appear in the widget. For
example, if you want to monitor a time line of failed logons, select Failed Logons from the
Filters drop-down list, and then select DestinationAccount from the properties drop-down
list.
b. Click the arrows to set your number of shown groups (between one and 10).
7. Expand the Timeseries Metadata section, and select your starting time span, chart legend
display option, and then the auto refresh rate.
As you make your changes, the widget preview updates to the left of the widget template.
9. To view event logs for a designated time, click a specific point in the chart.
The Creating Widget pane expands displaying a variety of widgets and widget templates.
4. Select New Table Widget and then click Customize.
5. Expand Title and Description, and enter a title for the widget (subtitle and description are
optional).
6. Expand Sorting, and select a sorting option.
7. Under Refresh, enable Refresh if required and set the refresh rate.
8. To add values and formatting to each column, select Add New Column.
9. Expand Description, and enter the column name.
10. Expand Property, and select the format and column value from the drop-downs .
11. Continue to add columns and values. As you make your changes, the widget preview updates to
the left of the widget template.
12. To add your widget to the dashboard, click Create Widget, and then click Save changes.
Role Description
Administrator The default user. This role cannot be deleted and has full access to the SEM
console.
Auditor User has extensive view rights to the system, but cannot modify anything
other than their own filters.
Monitor User has read-only access to the SEM console. See Modify filters for Monitor
role users to configure the filters assigned to this role. Users assigned to this
role cannot edit filters.
Guest User has extensive view rights to the system, but cannot modify anything
other than their own filters.
Contact User cannot log in to the SEM console, but can receive external notifications
such as email sent to either the user's email address, imported distribution
lists, or cellular email-to-SMS addressees for texts. Use this role if you have
an external incident resolution or trouble ticket system, or if you have a user
who does not need to access the console.
Role Description
Reports User cannot log in to the SEM console, but can access the SEM reports
application. This role can access the SEM database over a secure channel.
See Enable transport layer security (TLS) in the SEM reports application for
details.
SolarWinds recommends using Active Directory accounts if Microsoft Active Directory is in use
at your organization.
Each user should have a valid email address so that the user can receive notifications sent by SEM.
SolarWinds recommends that you create distinct users for everyone who needs to receive email
notifications from SEM Manager. If you want to send identical notifications to your IT department
personnel, associate a distribution list email address to all relevant users.
To establish minimum password requirements for local user accounts in SEM, see Set the
global password policy for SEM users.
See Set up Active Directory authentication in SEM to configure SEM to allow users to log in
with their Active Directory credentials.
See Configure or View Active Directory authentication settings in SEM to look up which Active
Directory groups are mapped to SEM roles.
SEM supports Active Directory single sign-on (SSO). If SSO is enabled, users can bypass the SEM
login screen and go straight to the application if they are already logged in to another application that
accepts the user's AD credentials.
See Set up single sign-on (SSO) in SEM to configure SEM to allow users to bypass the SEM
login screen if they are already logged in to an application that accepts the user's AD
credentials.
SEM can use Active Directory groups of Windows users and computer accounts in SEM rules and
filters. Any changes made to users or groups in Active Directory propagate to rules and filters in SEM.
User accounts need to be assigned to a SEM role to restrict access to sensitive data. There are five
SEM role types: Administrator, Auditor, Monitor, Guest, and Reports. Role types are described in the
following table.
Field Description
Password User password to access the Manager. This can be an initial system password
or a temporary password that is assigned to replace a forgotten password.
If password restrictions are enabled ( > Authentication > Local Users), SEM
enforces the following policy:
Passwords must:
l Be between 6-40 characters
l Not include user names
l Not include forbidden characters
Passwords must also include at least three of the following:
l One upper case letter
l One lower case letter
l One special character
l One digit
Field Description
Description Type a brief description (up to 50 characters). For example, provide the user
title, position, or area of responsibility.
Contact e- Email address. SEM notifies users by email about network security events. You
mail can add as many email addresses as required.
4. Select a user in the list to edit the user account, change the user's password, require the user to
change passwords, or delete the user account.
In the Refine Results pane, you can filter users based on account type and last login.
Under Last modified, click the time setting to adjust the login time frame.
Admin
Area Access Modify Audit
General
Options
Add Agents
Remove agents
Users
Policy
Database warehouse
Actions
Explorer
Nslookup
Traceroute
Whois
Get IP information
Tools
Manager tools
Agent tools
Groups
Alert groups
Time-of-day sets
Tool profiles
User-defined groups
Properties
Manager tools
Agent status
Agent tools
Filters
Filter Editor
Organize
Rename
Export
Import
Clone
Delete
Enable/disable
Rules
Rule Editor
State variables
Notification templates
FIM
Reports
Report viewer
Return to top
Auditor
Area Access Modify Audit
General
Options
Add Agents
Remove agents
Users
Policy
Database warehouse
Actions
Explorer
Nslookup
Traceroute
Whois
Get IP information
Tools
Manager tools
Agent tools
Groups
Alert groups
Time-of-day sets
Tool profiles
User-defined groups
Properties
Manager tools
Agent status
Agent tools
Filters
Filter Editor
Organize
Rename
Export
Import
Clone
Delete
Enable/disable
Rules
Rule Editor
State variables
Notification templates
FIM
Reports
Report viewer
Return to top
Monitor
Area Access Modify Audit
General
Options
Add Agents
Remove agents
Users
Policy
Database warehouse
Actions
Explorer
Nslookup
Traceroute
Whois
Get IP information
Tools
Manager tools
Agent tools
Groups
Alert groups
Time-of-day sets
Tool profiles
User-defined groups
Properties
Manager tools
Agent status
Agent tools
Filters
Filter Editor
Organize
Rename
Export
Import
Clone
Delete
Enable/disable
Rules
Rule Editor
State variables
Notification templates
FIM
Reports
Report viewer
Return to top
Guest
Area Access Modify Audit
General
Options
Add Agents
Remove agents
Users
Policy
Database warehouse
Actions
Explorer
Nslookup
Traceroute
Whois
Get IP information
Tools
Manager tools
Agent tools
Groups
Alert groups
Time-of-day sets
Tool profiles
User-defined groups
Properties
Manager tools
Agent status
Agent tools
Filters
Filter Editor
Organize
Rename
Export
Import
Clone
Delete
Enable/disable
Rules
Rule Editor
State variables
Notification templates
FIM
Reports
Report viewer
Return to top
Reports
Area Access Modify Audit
General
Options
Add Agents
Remove agents
Users
Policy
Database warehouse
Actions
Explorer
Nslookup
Traceroute
Whois
Get IP information
Tools
Manager tools
Agent tools
Groups
Alert groups
Time-of-day sets
Tool profiles
User-defined groups
Properties
Manager tools
Agent status
Agent tools
Filters
Filter Editor
Organize
Rename
Export
Import
Clone
Delete
Enable/disable
Rules
Rule Editor
State variables
Notification templates
FIM
Reports
Report viewer
Return to top
Contact
Area Access Modify Audit
General
Options
Add Agents
Remove agents
Users
Policy
Database warehouse
Actions
Explorer
Nslookup
Traceroute
Whois
Get IP information
Tools
Manager tools
Agent tools
Groups
Alert groups
Time-of-day sets
Tool profiles
User-defined groups
Properties
Manager tools
Agent status
Agent tools
Filters
Filter Editor
Organize
Rename
Export
Import
Clone
Delete
Enable/disable
Rules
Rule Editor
State variables
Notification templates
FIM
Reports
Report viewer
Return to top
2. On the Settings page, click the Authentication tab, and then select Local Users.
3. To require complex passwords for SEM users, click the Password Restrictions toggle button.
Passwords should be at least nine-characters long, cannot contain user names or control
characters, or be longer than 40 characters.
Complex passwords must include any three of the following four character types:
l One upper-case letter
l One lower-case letter
l One Number
l One special character (!, @, #, etc.)
4. Adjust the Minimum Password Length setting according to your preference, and then click Save.
This task configures SEM for Active Directory authentication. See Configure Active Directory
and SEM to work with SEM rules and filters to configure SEM to monitor Active Directory
accounts for security violations.
To get directory server details, open a Windows command prompt on a computer on the
correct network and type nslookup.
l You can use your existing Active Directory groups for alerts, reports, and so on. Skip this
section and go to the next section: Configure or Active Directory authentication settings in
SEM.
1. Log in to the domain controller and open Active Directory Users and Computers.
2. Create at least one security group called ROLE_LEM_ADMINISTRATORS. Group names must be
identical to the names given below, otherwise users cannot log in to the SEM console.
SolarWinds recommends creating SEM group names using capital letters to help you quickly
identify SEM groups in Active Directory.
You can add up to six of the following SEM custom groups:
l ROLE_LEM_ADMINISTRATORS
l ROLE_LEM_ALERTS_ONLY
l ROLE_LEM_AUDITOR
l ROLE_LEM_GUESTS
l ROLE_LEM_CONTACTS
l ROLE_LEM_REPORTS
The ROLE_LEM_CONTACTS group is only used for email notification in rules. Users added to
this group do not have login rights.
Field Description
Configuration Enter a friendly name of your choosing for the LDAP configuration.
Name
Domain Enter the fully-qualified domain name for the account store.
Use SSL (Optional) Select to use the transport layer security protocol (LDAPS) for a
Encryption secure connection. This option directs traffic from the SEM VM to a
designated server (usually a domain controller) for use with the Directory
Service tool.
LDAP Port If SSL encryption is not used, the default for this setting is 389. If SSL
encryption is used, the default for the port is 636.
Use for Select, then click Next if you wish to use Advanced Settings shown below.
Authentication
Domain Aliases Specify any Domain Alias names that should be authenticated using this
(Optional) LDAP configuration. (The role/group names configured on this page will
also apply.)
NetBIOS Names Specify any NetBIOS names that should be authenticated using this LDAP
(Optional) configuration. (The role/group names configured on this page will also
apply.)
Admin Group Specify the DS group in Active Directory to use for the SEM administrator
(Optional) role. If you do not specify a name, the default ROLE_LEM_
ADMINISTRATORS group is used.
Field Description
Alerts Only Specify the DS group in Active Directory to use for the SEM auditor role. If
Group you do not specify a name, the default ROLE_LEM_AUDITOR group is used.
(Optional)
Guest Group Specify the DS group in Active Directory to use for the SEM guest role. If you
(Optional) do not specify a name, the default ROLE_LEM_GUESTS group is used.
Notify Only Specify the DS group in Active Directory to use for the SEM notifications
Group role. If you do not specify a name, the default ROLE_LEM_CONTACTS group
(Optional) is used.
Reports Group Specify the DS group in Active Directory to use for the SEM reports role. If
(Optional) you do not specify a name, the default ROLE_LEM_REPORTS group is used.
A warning message is displayed if you disable a configuration informing you that users will be
unable to log on from that domain and any logged-in users from that domain will be
immediately logged out.
2. Either:
l Click Edit to display the Configure LDAP details for this configuration, which can now be
edited and saved.
Or:
l Click Delete to remove this configuration.
3. Add the user to an Active Directory security group that is configured for use with SEM. To see
which groups are configured for SEM, open the LDAP Configuration Management page and
expand the list under Advanced Settings. See Configure or View Active Directory settings in
SEM for details.
When configuring user accounts, make sure the user's Primary group is not assigned to a
custom group, otherwise the user cannot log in to SEM. The user will see an Invalid username
and password message instead, and a message like the following will be logged:
[SemSpringSecurityAuthManager] {http-nio-8080-exec-1:349} Authentication
failed: User is not member of any required role group!
With SEM 2022.2 and later, the weak, deprecated 3DES and RC4 Kerberos encryption types
have been disabled by default. These have been replaced with AES-based encryption.
After upgrading to SEM 2022.2, users who were using 3DES or RC4 encryption will be unable to
log into SEM using the SSO login. In this case, Kerberos AES encryption needs to be enabled in
the respective Active Directory:
1. Locate the user account in Active Directory Users and Computers.
2. Select Properties.
3. Select the Account tab.
4. In the section titled Account Options, ensure one or both of the following options are
selected.
After upgrading to SEM 2022.2, users who were using 3DES or RC4 encryption will be unable to
log into SEM using the SSO login.
1. Open the Group Policy Management Console, locate the relevant domain and select Default
Domain Policy
1. Locate the user account in Active Directory Users and Computers.
2. Select Properties.
3. Select the Account tab.
4. In the section titled Account Options, ensure the following options are selected.
See the Microsoft Technical Documentation article, ktpass, for further information about the
ktpass command and ktpass arguments.
Before you run the ktpass command, gather the following information:
l Fully-qualified domain name (FQDN) of the SEM VM – The FQDN is the complete domain name
of the SEM virtual machine on the Internet. It includes the host name (the label assigned to a
device on the network), and the name of the domain that hosts the device. For example, if the
device name is swi-sem and the company domain is yourcompany.local, the FQDN is swi-
sem.yourcompany.local.
l Realm – This is the Active Directory Domain Services (AD DS) domain name. The realm name is
used to route authentication requests to the AD server that holds user credentials. The realm
name is case sensitive and normally appears in upper-case letters. To simplify your Kerberos
client configuration, make the realm name identical to your DNS domain name by only using
upper-case letters. For example, if YourCompany belongs to the DNS domain name
yourcompany.com, the Kerberos realm should be YOURCOMPANY.COM.
l Service principal name (SPN) – The SPN provides an alias (or pointer) to your domain account.
The SPN consists of the FQDN, followed by the @ symbol, followed by the realm.
For example, the SPN for a device named swi-sem located at http://www.yourcompany.com
would be http/swi-sem.yourcompany.local@YOURCOMPANY.COM where swi-
sem.yourcompany.local is the FQDN, and YOURCOMPANY.COM is the realm.
1. Do the following to obtain the SEM host name and IP address:
a. Open the SEM CMC command line. See Log in to the SEM CMC command line interface
for steps.
b. At the prompt, enter appliance to access the Appliance menu.
e. Record the domain name, host name, and the host name's resolved IP address.
f. Exit the management console.
2. Create a new user (host) in DNS:
a. Open DNS manager on your domain controller.
b. Create an A record entry for SEM on the DNS server using the host name and IP address.
Verify that DNS Manager populated the domain field with the correct domain membership.
3. Open Active Directory Users and Computers.
4. Create an organizational unit (OU) and name it Keytab.
5. Select the Keytab OU and create a new user account (or Service Principle Name [SPN]).
Write down the SPN. You will need it in a later step.
6. Use the Kerberos keytab file using the ktpass command:
a. Log in to the Active Directory server as an administrator.
b. Open a command prompt as an administrator.
c. Run the following ktpass command:
If you receive an error when you run the command, replace the -mapuser argument
with -mapuser <user_name>.
7. Navigate to the keytab file location (for example, c:\sem.keytab specified in the -out
argument).
8. To allow SEM access to Active Directory, import the keytab file into SEM.
SEM uses HTTP/2 protocols and rejects HTTP/1 requests. However, if you use Single Sign-On,
HTTP/1 has to be enabled as SSO uses Kerberos/NTLM authentication which does not support
HTTP/2. If SSO is subsequently disabled, HTTP/1 is also disabled.
Existing SSO Configurations are listed. These can be temporarily deactivated using the green
toggle switches.
1. Click Create Configuration to display the Create SSO Configuration window.
6. Scroll down to the User Authentication section at the very end of the list of options.
7. Check that Automatic logon only in Intranet zone is enabled. If not, check the box.
8. Still on the Security tab, click Sites.
9. Check that all boxes are checked, then click Advanced.
10. Add your FQDN or URL as a website in the Local Intranet zone.
For example:
https://swi-sem.yourcompany.local
12. To test your settings, close all browser windows (clear cache, if needed), and then open the SEM
FQDN to confirm it is working.
Mozilla Firefox
1. Open Firefox, and then enter about:config in the address bar.
2. In the Filter field, enter network.negotiate-auth.trusted-uris.
3. In the list, double-click network.negotiate-auth.trusted-uris.
4. Enter the fully-qualified domain name (FQDN) or URL that you use for SEM.
For example: mysemappliance.example.com
The web browser is now configured for SSO.
2. Use the toggle switches to select the login options to be used.
Updates take place immediately. Log in using the appropriate credentials to verify that the
settings are correct.
Use these alternate steps if you do not want to use the SEM admin user interface to upload the keytab
file. (You do not have to repeat this process if you already uploaded the keytab file to SEM.)
1. Log in to the CMC command-line interface. See Log in to the CMC command line interface for
steps.
2. At the cmc> prompt, enter import.
9. Arrow down to Add New Configuration, and then press Enter.
The content on this screen may vary with your SEM implementation.
a. Enter the Service Principle Name (SPN). See Generate a keytab file using Ktpass for
details.
For example: http/swi-sem.yourcompany.local@YOURCOMPANY.COM
b. Enter the path to your keytab file using the following syntax:
/var/transfer/storage/<your_keytab_file_name>.keytab
Updates take place immediately. Log in using the appropriate credentials to verify that the settings
are correct.
These steps require the current CMC password. The default password is password.
1. Log in to the CMC command-line interface. See Log in to the SEM CMC command line interface
for steps.
2. Type appliance, and then press Enter.
3. Type password, and then press Enter.
4. Complete the wizard to change the password. See Special characters allowed in CMC
commands and passwords for help choosing a CMC password.
5. To return to the root CMC command line, type exit, and then press Enter.
6. To log out and close the CMC interface, type exit, and then press Enter again.
Test the new CMC password by logging back in to the CMC interface.
By default, this role has access to the same set of filters as other users. To remove and/or modify the
filters that Monitor-role users can access in the console, complete the following steps. You will need
to complete some of these steps on the end-user's computer. When the user logs in to SEM using the
same computer and Windows profile, they will only have access to the filters specified.
If you created and exported the filters in a previous procedure, you can add new filters to
the user Filters list by creating or importing the filter as appropriate. To remove a filter
from the user Filter list, point to the filter and click x that appears to the right.
6. Log out the user and close the console window.
7. Using your administrator login, change the user back to the Monitor role.
8. From the user computer, have the user log in with their credentials, and then click Monitor.
The user should only see the specified filters.
SEM can correlate SNMP traps from devices and applications that have a corresponding
connector. To configure SEM to receive SNMP traps, turn on the SNMP Trap Logging Service.
See Enable SEM to receive SNMP traps by turning on the SNMP Trap Logging Service for
details.
There are two ways to configure computers and devices on your network to send log events to SEM:
l To add servers, domain controllers, and workstations, install a SEM agent.
l To add firewalls, routers, or switches, configure your devices to send log events directly to the
SEM VM using syslog or SNMP traps. After configuring your device to log to SEM, configure the
appropriate connectors directly on the SEM Manager.
Click the video icon to view a tutorial about adding devices to SEM.
See Install SEM agents to protect servers, domain controllers, and workstations in the SEM
Installation Guide for installation steps.
In addition to monitoring local events, the agent provides event alerting on workstations and servers.
It is also required for some active responses, including logging off a user, shutting down a computer,
and detaching a USB device.
Install the SEM agent on computers that allow third-party software, including servers, domain
controllers, and workstations. On Windows, the SEM agent captures log information from sources
such as Windows Event Logs, a variety of database logs, and local anti-virus logs.
SolarWinds recommends installing the SEM agent if you have the option. If installing the SEM
agent is not feasible, send log events directly to SEM.
See Add syslog and Agent nodes to forward log and event data to SEM for more information
about configuring devices that do not allow third-party software.
After installation, the SEM agent captures log information from sources such as Windows Event Logs,
database logs, and local antivirus logs. Additionally, the SEM agent allows SEM to take specific
actions that you can define as rules.
For broader coverage on your Windows computers, configure specific connectors to obtain your
targeted data.
Connector profiles maintain all agents in a profile by updating only the profile connector
configuration. The system then propagates your changes to all the agents in the profile.
Most agents in a network have only a few different connector configurations. Using connector
profiles, you can streamline the process of connecting your network security products to SEM. If you
decide not to use connector profiles, you must create at least one connector instance for every
product that you intend to integrate with SEM, and then repeat this process for each agent.
A well-planned set of connector profiles provides you with a versatile and efficient method for
configuring and maintaining your agent connector configurations. You can create as many connector
profiles as you need to reflect each of your common connector configurations. For example, you can
set up a standard user workstation profile, a web server profile, and so on. SolarWinds provides
several default connector profiles that address common configurations.
Groups organize related elements for use with SEM rules and filters. See About SEM groups for
information about the various SEM group types.
When you configure your connector profiles, use the following guidelines:
l An agent can only be a member of one connector profile.
l You cannot add an agent to multiple connector profiles.
1. Install the SEM agent software on all the systems that you want to include in your new
connector profile, then configure a single SEM agent to serve as the template for your connector
profile.
2. Add the agents to the connector profile. When completed, the system applies the template to all
agents in the profile.
3. Verify the connector status.
When you select an agent for a template, ensure the agent has a configuration that mirrors your
concept of the final connector configuration.
You can prepare a template agent in advance by configuring an agent you know will be a member of
the new profile. When completed, use the agent as the template for the new profile. This process
minimizes your need to edit the profile connector configuration in the future.
2. On the Connector Profile toolbar, click Create Connector Profile, select New profile, and then
click Continue.
3. Enter a name for the profile and a description (optional), and then click Create and Next.
6. Find the connector to configure. Type part of the connector name in the search box, or use the
filter menus in the Refine Results pane.
7. Complete the connector configuration form. The following fields are common across most
connectors:
l Name: Enter a user-friendly label for your connectors.
l Log File: Enter the location of the log file that the connector will normalize. This is a
location on either the local computer (Agents), or the SEM appliance (non-Agent devices).
l Output: Normalized, Raw + Normalized, Raw. You only need to configure these values if
SEM is configured to save raw (unnormalized) log messages.
8. Click Add.
9. Continue to add more connectors to the profile as needed, and then click Next.
10. Click Assign agents.
11. Filter and select one or more agents to add to the profile, and then click Assign.
An agent can only be a member of one connector profile. Learn more about connector
profiles here.
2. On the Connector Profile toolbar, click Create, and then select From template.
3. From the Connector profile template drop-down list, select a template, and then click Continue.
4. Enter a new name and description for the profile, and then click Create and Next.
8. Complete the connector configuration form. The following fields are common across most
connectors:
l Name: Enter a user-friendly label for your connectors.
l Log File: Enter the location of the log file that the connector will normalize. This is a
location on either the local computer (Agents), or the SEM appliance (non-Agent devices).
l Output: Normalized, Raw + Normalized, Raw. You only need to configure these values if
SEM is configured to save raw (unnormalized) log messages.
9. Click Add.
10. Continue to add more connectors to the profile as needed, and then click Next.
11. Click Assign agents to add one or more agents to the profile.
An agent can only be a member of one connector profile. Learn more about connector
profiles here.
2. On the Connector Profile toolbar, click Create, and then select From agent.
Connectors that were already configured for this agent node will appear in the connector
list
8. Find the connector to configure. Type part of the connector name in the search box, or use the
filter menus in the Refine Results pane.
9. Complete the connector configuration form. The following fields are common across most
connectors:
l Name: Enter a user-friendly label for your connectors.
l Log File: Enter the location of the log file that the connector will normalize. This is a
location on either the local computer (Agents), or the SEM appliance (non-Agent devices).
l Output: Normalized, Raw + Normalized, Raw. You only need to configure these values if
SEM is configured to save raw (unnormalized) log messages.
10. Click Add.
11. Continue to add more connectors to the profile as needed, and then click Next.
12. Click Assign agents.
An agent can only be a member of one connector profile. Learn more about connector
profiles here.
The Add agent node window appears displaying options for remote and local installation.
2. Select an option, and then follow the instructions to add the monitored node. Find how to add
your node connectors here.
A dialog box prompts you to choose the type of node you want to add.
Click the drop-down list, select an Agent or non-Agent node to monitor, and then follow the
instructions to add the monitored node.
You can also click Add Node in the Node Health widget to perform the same function.
This setting determines the number of agents that can be updated at the same time.
Manually upgrade SEM agents on Unix, Linux, Mac, and Windows hosts
using SEM agent installers
If you are installing SEM agents on the far end of a WAN link, copy the SEM Agent Installer executable
to the end of the WAN link and run it there.
Check the SEM release notes or readme file first to be sure that the SEM agent version you are
planning to install is compatible with your installed SEM Manager version.
If you are installing SEM agents on the far end of a WAN link, copy the SEM Agent Installer executable
to the end of the WAN link and run it there.
Check the SEM release notes or readme file first to be sure that the SEM agent version you are
planning to install is compatible with your installed SEM Manager version.
You can monitor your switches, routers, and firewalls using a syslog server. This server collects and
sends syslog messages from non-Agent devices to the SEM Manager over TCP or UDP. SEM uses
this information to monitor syslog events and displays them in the Live and Historical Events.
Each device is paired with a connector, enabling SEM to parse messages from the syslog server and
normalize the log message content to a SEM event.
To set up a separate syslog server, you must deploy another SEM VM to function as a syslog server.
Contact SolarWinds Customer Support for assistance.
Node management
You can add agent nodes, configure connectors, and then monitor activity. Once you have configured
nodes and connectors, you can click the Events tab to view your network activity, and then create and
apply filters to tailor your log feed to view event logs vital to maintaining the health of your network
environment.
To display nodes, navigate to Configure > Nodes. This displays the two types of node:
l Agents: An agent is a software application installed on the device that collects and normalizes
log data before it is sent to the SEM Manager.
l Non-Agent devices: These are devices that send log data directly to the SEM Manager for
normalization and processing, such as firewalls, switches, and routers.
On the Nodes tab, you can view a list of both agent and non-agent nodes, and select multiple nodes to
conduct bulk operations, such as deleting nodes, upgrading agent nodes, and starting File Integrity
Monitoring (FIM) on agent nodes.
Select one or more items in the Refine Results pane to organize your nodes view, or use the Nodes
toolbar to search for nodes, or organize nodes by Name, IP address, OS type, or version.
Verify that the correct alias value is associated with the connector 141
4. To configure the agent connector directly, click Agent Connector Configuration.
Check the SEM release notes or readme file first to be sure that the SEM agent version you are
planning to install is compatible with your installed SEM Manager version.
3. In the Connector Updates section, click the toggle button to allow automatic updates.
4. Select a profile from the list, and then click Add.
1. Select an agent, and then navigate to More > Remove from Profile. A confirmation dialog
appears.
4. In the Name field, enter a new name, or keep the existing name.
5. In the Mail Host field, enter the mail host IP address.
If you use a hostname in the Mail Host field, SEM Manager must be able to resolve the mail host
from the DNS entries you entered during your SEM network configuration.
6. In the Port field, enter 25.
7. From the Transport Protocol drop-down list, select SMTP or TLS.
TLS 1.2 is supported for email connections in SEM 2020.2.1 and later.
9. If the email server requires an Active Directory user to send email, enter the authentication
server user name and password in the appropriate fields.
If the email server requires an email to be sent from a computer within the domain, the
email server must have an exception created for the SEM hostname. SEM cannot join the
domain.
10. Click Add. The connector appears on the Manager Connectors tab under Configured
connectors.
11. Under Configured connectors, select your connector, and then click Start.
4. If USB Defender is not installed on one or more SEM Agents, reinstall the agent and ensure that
you select Install USB-Defender after you confirm the Manager Communication Settings.
Enter a keyword in the search box, or use the Category drop-down list to filter connectors
by category.
This example describes how to configure a Cisco PIX and IOS connector on your SEM Manager.
2. Find the connector to configure. Type part of the connector name (Cisco PIX) in the search box,
or use the filter menus in the Refine Results pane.
3. Select the connector, and then click Add Connector.
4. Complete the connector configuration form. The following fields are common across most
connectors:
l Name: Enter a user-friendly label for your connectors.
l Log File: Enter the location of the log file that the connector will normalize. This is a
location on either the local computer (Agents), or the SEM appliance (non-Agent devices).
l Output: Normalized, Raw + Normalized, Raw. You only need to configure these values if
SEM is configured to save raw (unnormalized) log messages.
5. Click Add.
6. Under Configured connectors, select your connector, and then click Start.
2. Under Configured connectors, select the connector instance you want to verify.
3. On the connector toolbar, click Edit.
4. Verify the connector name (alias) is correct (change the name, if not), and click Save.
5. On the connector toolbar, click Start.
2. If necessary, use the options in the left column to refine the list of nodes shown.
Configure the sensor and actor connectors for each SEM agent
SEM lets you set up agent connectors for the target products that are either installed on or are
remotely logging to the agent computer. After configuring agent connectors, SEM can monitor and
interact with the products and devices on that computer.
Agent connectors run locally to monitor log files, as well as data logged to the agent computer from
remote devices that cannot run an agent. The active response connectors (actors) allow the agent to
receive instructions from the Manager and perform active responses locally on the agent computer,
such as sending pop-up messages or detaching USB devices.
For more information, see Create connector profiles to manage and monitor SEM agents.
On the SEM Console Settings page, you can enable automatic updates for SEM connectors and
initiate a manual connector update.
3. In the Connector Updates section, click the toggle button to allow automatic updates.
1. Go to the SolarWinds Customer Portal and download the Connector Update package from the
Additional Components page.
An InternalWarning alert may appear, indicating that a connector started at the beginning of the
corresponding log file. This alert may be caused by:
l An unnecessary connector. For example, you could have an NT DNS connector configured on a
server that is not running the DNS service.
l A misconfigured connector. For example, you could have a connector pointing to the wrong
location for the requisite log file.
l The device associated with the connector rotated its logs while the connector was offline.
StackTrace:
Application Switch This category lets you configure sensors for use
with application switches. Application-Layer
switches transmit and monitor data at the
application layer.
Identity and This category lets you configure sensors for use
Access with identity access, identity management, and
Management other single-sign on connectors. These products
provide authentication and single-sign on
capabilities, account management, and other
user access features. Monitoring these products
provides information about authentication and
management of accounts.
Network Services This category lets you configure sensors for use
with different network services. These
connectors monitor service-level activity for
different network services, including DNS and
DHCP. Most network services are configured to
log locally on an Agent's system. However, some
are configured to log remotely.
Proxy Servers and This category lets you configure sensors for use
Content Filters with different content monitoring connectors.
These connectors monitor user network activity
for such activities as web surfing, IM/chat, and
file downloads, and events related to
administering the monitoring systems
themselves. Generally, these connectors are
configured to log remotely from the monitoring
system.
System Scan This category lets you configure sensors for use
Reporters with different asset scanning connectors, such
as vulnerability scanners. These connectors
provide information about potential
vulnerabilities, exposures, and misconfigurations
with different devices on the network. Generally,
these connectors create events in the 'Asset'
categories in the event tree.
VPN and Remote This category lets you configure sensors and
Access actors for use with Virtual Private Network (VPN)
server products that provide secure remote
access to networks. Normally, you will configure
these connectors on the Manager.
Web Server This category lets you configure sensors for use
with Web server products. To configure a web
server connector, the web server software must
already be installed on the Agent or Manager
computer.
SQL Authentication
SQL authentication is the simplest solution.
l There must be a user created in the database to which you are trying to connect.
l Database connectors have the option attribute defined in DefaultReaderConfiguration,
but in this case this attribute should be empty
l The user connecting must have the privilege to read from accessed table/view.
Windows Authentication
Windows authentication takes advantage of Windows Users and Active Directory to authenticate to
the database. However, Microsoft's JDBC driver does not support remote logging as a specific user,
so you have to work around that. To do so, SEM should be configured as following:
l Agent needs to be installed on the machine with database
l Agent service must run as User, and want to connect to the database:
4. Fill in the credentials for the required user to login to the database.
5. Restart the service.
l The user connecting must have the privilege to read from the accessed table/view.
l The account filled in service must have administrator rights for FIM and USB Defender to work.
l When configuring the connector, the option field should have integratedSecurity=true
filled in
To set up a firewall monitor, configure your firewalls to log to SEM, and then configure a new
connector in the SEM Manager. When an unauthorized user attempts to access SEM, the event
displays in the default Firewall filter running on the SEM console. You can also create custom filters
that display network traffic to and from specific computers, as well as view web traffic and other
traffic events across your network.
Click the video icon to view a tutorial about the Threat Intelligence feed available in SEM.
For more information, see Using the Threat Intelligence feed in SEM in the SolarWinds Success
Center.
This example describes how to configure a Cisco PIX and IOS connector on your SEM Manager.
2. Find the connector to configure. Type part of the connector name (Cisco PIX) in the search box,
or use the filter menus in the Refine Results pane.
3. Select the connector, and then click Add Connector.
4. Complete the connector configuration form. The following fields are common across most
connectors:
l Name: Enter a user-friendly label for your connectors.
l Log File: Enter the location of the log file that the connector will normalize. This is a
location on either the local computer (Agents), or the SEM appliance (non-Agent devices).
l Output: Normalized, Raw + Normalized, Raw. You only need to configure these values if
SEM is configured to save raw (unnormalized) log messages.
5. Click Add.
6. Under Configured connectors, select your connector, and then click Start.
Or:
To create a filter at the root level, click the add icon, and then select Add New Filter.
5. Under Network Audit Alerts, drag SourceMachine into the filter builder.
6. Click Drop item here, or add it, enter the domain name of the computer, and click Save.
7. Click Save to return to the Live Events screen.
8. To view associated activity, click the Events tab, and then select your new filter. You can also set
up a rule to alert on this activity by moving your mouse pointer over the filter, clicking the vertical
ellipsis, and then selecting Send Filter to Rule. Learn more here.
4. Select the PortScans rule template, and then click Next.
5. Review the existing conditions and values, and click Edit if you need to change any of these.
6.
7.
8. C
9. click Next.
10. Review and adjust the rule details where needed, and then click Create.
Only administrators have permissions to enable or disable the Threat Intelligence feed.
Disabling and re-enabling the Threat Intelligence feed forces a threat intelligence update and
creates an InternalAudit event. Restarting SEM also forces the Threat Intelligence feed to
update.
Because the integration process is different for each vendor, each proxy server is documented
separately in the SolarWinds Success Center. If a knowledge base article is not available, contact
Customer Support.
The following example procedure describes how to set up a connector for a Websense proxy server.
You can find instructions for additional firewall connectors in the SolarWinds knowledge base.
Before you enable this rule, ensure your proxy server transmits complete URL addresses to your SEM
Manager by checking the URL field of any WebTrafficAudit event generated by your proxy server. If
your proxy server does not log web traffic events with this level of detail, check the events coming
from your firewalls, as they can sometimes be used for this rule as well.
3. In the search box, enter "known spyware site traffic". As you type the list of templates will be
filtered to show just the one required.
4. Select the Known Spyware Site Traffic rule template, and click Next.
5. Review and edit the existing conditions and values where needed, and click Next.
6. Review and adjust the rule details where needed, and click Create.
You can integrate SEM with antivirus software from manufacturers such as Symantec and McAfee.
See the SolarWinds Knowledge Base or contact SolarWinds Support for more information.
4. In the Name field, enter a new name, or keep the existing name.
5. Click Add.
The connector appears on the Manager Connectors tab under Configured connectors.
6. Under Configured connectors, select your connector, and then click Start.
The default action for this rule is to generate a HostIncident event, which you can use in conjunction
with the Incidents report to notify auditors you are auditing the critical events on your network.
4. Select the Virus Attack - Bad State rule template, and then click Next.
5. Review and edit the existing conditions and values where needed, and then click Next.
6. Review and adjust the rule details where needed, and then click Create.
Please note that FIM does not support the monitoring of network shares. Only local drives are
supported.
FIM monitors Windows systems that are configured to process data through the supported
SEM agent for Windows. See the SEM system requirements for more information.
FIM can detect unauthorized modifications to configuration files, executables, log and audit files,
content files, database files, web files, and so on. When FIM detects that a monitored file has
changed, it logs an event. The event then prompts SEM to execute the configured action. You can
build correlation rules to act as a second-level filter to send an alert if certain patterns of activity occur
(not just single instances). When an alert is triggered, the data is in context with your network and
other system log data.
Features of FIM
l Monitor real-time access and identify users who change file and registry keys.
l Configure file and directory logic and registry keys and values to monitor different types of
access (create, write, delete, change permissions/metadata).
l Standardize configurations across many systems.
l Configure monitoring templates to monitor the basics and create and customize your own
monitors.
l Configure templates for rules, filters, and reports to assist in including FIM events.
See:
5. From the More drop-down list, select Start FIM Driver.
6. Upon successful configuration, a success dialog appears in the upper-right console.
From the More drop-down list, you can start an FIM driver, and enable or disable FIM on Agent
startup.
3. In the agent list, select an agent, and then click Manage node connectors on the toolbar.
4. In the search box, type FIM to view the configured and available FIM connectors.
5. Select a connector, and then click Create Configuration or Configure from template on the
connector toolbar.
6. Click Save. A confirmation message appears in the upper-right corner of the SEM Console.
7. Under Configured connectors, select your connector, and then click Start.
On the Applied Conditions page, you can create inclusions and exclusions , import
conditions from the monitor, and export to monitor.
Depending on your connector type, you can add file and directory inclusions/exclusions or
registry inclusions/exclusions.
5. Establish your applied conditions, and then click Next.
6. Expand and adjust the advanced configuration settings, if necessary, and then click Create.
3. To locate an available FIM connector, type FIM in the search box.
8. Keep the current settings or change the output and sleep time.
The sleep time must be a numeric value and cannot be less than one. This is the time (in
seconds) the connector sensor is to wait between event monitoring sessions.
9. If you do not want to run the connector after saving, click the toggle button.
10. Click Save.
3. To locate an available FIM connector, type FIM in the search box.
5. Enter one or more paths to the file or directory that FIM is watching and click Add Path, or click
Browse to locate and select one or more files or directories.
6. Select whether the files are recursive or non-recursive.
Recursive The folder selected and all its sub-folders which match the given mask will be
monitored for corresponding selected operations.
7. Enter a mask using the asterisk (*) as a wildcard, for example: *.exe or directory*.
8. For a FIM File and Directory, select Create, Read, Write, and/or Delete for Directory, File,
Permissions, and Other operations, and then click Create.
For information about the Other option, refer to the Microsoft MSDN information.
5. Enter a mask using the asterisk (*) as a wildcard, for example: *.exe or directory*.
Directory* can be used as an exclusion, and it will exclude any file/folder that matches
the name from monitoring. It will not exclude the contents of the directory from
monitoring.
For example, if there is directory named DirectoryContent with files content1.txt
and content2.txt in it, modifications to the directory itself will not be monitored (for
example, a permissions change), but changes to the files in that directory will be
monitored. You cannot exclude files in specific folders from being monitored, other than
set up inclusions to not watch the folder at all.
5. Manually enter the registry key to watch, and then click Add Key, or click Browse to locate and
select one or more keys.
7. Enter a mask using the asterisk (*) as a wildcard, for example: *.exe or directory*.
8. Select Create, Read, Write, and Delete for the Key and Value, and then click Create.
For information about the Other option, refer to the Microsoft MSDN information.
5. Enter a mask using the asterisk (*) as a wildcard, for example: *.exe or directory*.
6. Click Create.
Field Description
Wrapper Name This is an identification key that the SolarWinds SEM uses to uniquely identify the
and number properties that apply to this connector. This is read-only information for
SolarWinds reference purposes.
Log Data Type Select either Normalized, Raw + Normalized, or Raw (unnormalized). Storage for
to Save original log data must also be enabled on the appliance.
Sleep Time Type or select the time (in seconds) the connector sensor is to wait between
event monitoring sessions. The default (and minimum) value for all connectors is
one (1) second. If you experience adverse effects due to too many rapid readings
of log entries, increase the Sleep Time for the appropriate connectors.
Run connector When this option is selected, the connector starts when you click Create.
after saving
Complete the two-part process below to first enable object auditing on your server, and then enable
file auditing on the files and folders that you want to audit. Provided Windows is logging the events
and your server has a SEM agent installed on it, the SEM console will begin displaying the new file
auditing alerts immediately.
See Microsoft's TechNet knowledge base for details on Windows Audit Policy Definitions. These
definitions are effective from both a best-practice and compliance standpoint, and are based on
customer experience and recommendations from Microsoft.
See also:
l Audit Policies and Best Practices for SEM in the SolarWinds Success Center.
Requirements
Using the Windows Audit Policy with SEM requires:
l Windows Server 2008 SR or higher
l Permissions to change the Windows Audit Policy at the domain controller and domain level
l SolarWinds SEM installation
Event Description
Audit account logon events Represents user log on or log off instances on a computer logging
those events. These events are specifically related to domain logon
events and logged in the security log for the related domain
controller.
Audit account management The change management events on a computer. These events
include all changes made to users, groups and machines.
Audit logon events Represents user log on or log off instances from a computer logging
those events. These events are logged in the security log of the local
computer onto which the user is logging, even when the user is
logging onto the domain using their local computer.
Audit object access Track users accessing objects with their own system access control
lists. These objects include files, folders and printers.
Audit policy change Represents instances where local or group policy changed. These
changes include user rights assignments, audit policies and trust
policies.
Audit privilege use Track users accessing objects based on their privilege level. These
objects include files, folders and printers, or any object with its own
system access control list defined.
Audit process tracking Logs all instances of process, service, and program starts and stops.
This can be useful to track both wanted and unwanted processes,
such as AV services and malicious programs.
Event Description
Audit system events Includes start up and shut down events on the computer logging
them, along with events that affect the system’s security. These are
operating system events and are only logged locally.
Best practice
Windows audit policy is defined locally for each computer. SolarWinds recommends using group
policy to manage the audit policy at both the domain controller and domain levels.
1. Expand Computer Configuration > Windows Settings > Security Settings > Local Policies >
Security Options > Audit > Force Audit Policy Subcategory Settings, and then select enabled.
2. Change or set the policies in Computer Configuration > Windows Settings > Security Settings >
Advanced Audit Policy Configuration > Audit Policies.
When enabling the Force Audit Policy Subcategory option, set the subcategory auditing to
enabled and the category-level auditing will be disabled.
You can also select Success and Failure for audit process tracking critical processes (such as the AV
service) or unauthorized programs (such as games or malicious executable files).
Enabling auditing at the audit level will increase the number of events in the system logs. As a result,
your SEM database will quickly expand as it collects these logs.
Similarly, there could be bandwidth implications as well. This is dependent upon your network traffic
volume and bandwidth capacity. Since Agent traffic is transmitted to the Manager as a real-time
trickle of data, bandwidth impact is minimal.
SolarWinds recommends meeting PCI Auditing. However, this may be applicable to other auditing as
well. For more information, see PCI Compliance and Security Event Manager.
Logon/Logoff
Object access
SAM No Auditing
Privilege Use
Detailed Tracking
Policy Change
Account Management
DS Access
Account Logon
See also Configure the Detach USB Device active response in SEM
When the Agent is connected to the Manager through the network, the Manager rule also applies. Any
devices listed in the local white list must be in the User Defined Group for authorized devices.
Otherwise, the rule takes effect and the device detaches even though it was allowed by the white list
in the USB Defender local policy. When the Agent is connected, the USB Defender Local Policy and the
SEM rule are active.
8. Click Add. The connector appears on the Manager Connectors tab under Configured
connectors.
9. Under Configured connectors, select your connector, and then click Start.
The authorized devices in the local white list must also be in the UDG for Manager Detach
Unauthorized USB rule or the rule on the Manager enforces detachment when the laptop is
connected to the network. In reverse, if you are using a blacklist and the device is in the USB
Local Policy and not in the User Defined Group of the rule, the device still detaches.
Having a device or user in one white list or black list and not in the other is not recommended
and yields inconsistent results.
MSSQL Auditor runs as a service in conjunction with the SEM Agent service.
You can now configure SQL audit events and use our new SQL Audit Events connector to parse
those events. Learn more here.
To enable the SolarWinds SEM Agent access to details about your database configuration changes,
install the following software on your database server:
l Microsoft SQL Server 2008 or later
When completed, install the MSSQL Auditor for Windows on your server.
1. Enter the name of the SQL server to monitor in the SQL Server\Instance field, and then click Add
Server.
To specify an instance other than the default, enter your server name in the following format:
Server\Instance
2. Repeat step 1 for any additional servers you need to monitor.
3. To use an account other than the Local System Account to run MSSQL Auditor on your database
server, select This Account in the Run Service As and provide the appropriate credentials.
SolarWinds recommends using an account in the sysadmin role on your database. The
account only requires Execute permissions for any stored procedures with the xp_trace
prefix.
4. In the Manage Auditor Service section, click Start Auditor Service, and then click OK.
5. Select the SolarWinds Security Event Manager MSSQL Auditor connector, and then click Add
Connector.
6. In the Name field, enter a new name, or keep the existing name.
7. Click Add.
8. Under Configured connectors, select your connector, and then click Start.
9. Repeat the steps for the MSSQL 2000 Application Log connector.
Install the SolarWinds SEM agent on all domain controllers to ensure the SEM Manager captures all
your domain events (even if they are not replicated across all domain controllers).
You can view the events on the SEM Console using the change management filter and create custom
filters to report all activity on your domain controllers.
For additional security, Microsoft implemented a method in their operating system to log security
events. As a result, SolarWinds SEM agents on systems running Windows Server 2008, Windows
Vista, or Windows 7 require different connectors than the agents running on systems with the legacy
Windows operating systems.
If you are running both old and legacy Windows operating systems in your environment, create a
connector profile for each operating system.
For SEM agent software and hardware requirements, see the system requirements in the SEM
Installation Guide.
7. Confirm the Manager Communication settings, and then click Next.
8. (Optional) To install USB Defender with the SEM agent, select the check box.
9. Confirm the settings on the pre-Installation summary, and then click Install.
10. When the installation is complete, click Next to start the SEM agent service.
11. Inspect the agent log for any errors, and then click Next.
12. To exit the installer, click Done.
The SEM Agent is installed on your system and begins sending events to your SEM Manager
and SEM console.
The SEM Agent continues running on your system until you uninstall the software or manually
stop the SEM Agent service.
Connector Profiles help you maintain and monitor multiple domain controllers in your SEM console.
You can use these profiles to configure and modify connector settings at the profile level, as well as
provide a group you can use to filter incoming event traffic from your SEM Agents to your SEM
console.
Follow this procedure to create a connector profile based on a single SEM Agent and a corresponding
filter to monitor activity on all systems in the profile.
1. Install the SEM Agent software on all systems you want to include in your new connector profile.
2. Configure a single SEM Agent to serve as the template for your connector profile.
3. On the SEM menu bar, navigate to Configure > Connector Profile.
4. Click Create Connector Profile.
5. Enter a profile name and description.
6. From the Template list, select the new SEM Agent, and then click Save.
7. In the Groups list, locate your new connector profile.
8. Next to your connector profile, click , and then select Edit.
9. In the Available Agents pane, locate the SolarWinds SEM Agents you want to add to your
connector profile.
10. Click the arrow next to each SEM Agent you want to add to the Contained Agents pane.
Or:
To create a filter at the root level, click the add icon, and then select Add New Filter.
3. Enter a descriptive name for your new filter in the Name field on the right.
4. In the first column under Filter Values on the left, expand Event Groups, and select Any Alert.
5. Drag DetectionIP from the second column on the left into the filter builder.
When you drag a value into the filter builder, the correct drop location is illuminated with a blue
line.
6. In the same way, expand the Connector Profiles group, select your profile, and drag it into the
filter value drop location.
4. Select the Critical Account Logon Failures rule template, and then click Next.
5. Review and edit the existing conditions and values where needed, and then click Next.
6. Review and adjust the rule details where needed, and then click Create.
To monitor accepted traffic, use the log target in your accepted ACLs instead of the buildup logging.
This lets you control the accepted traffic that will generate an alert. To monitor the information about
the actual NAT, consider the event load this will create. Plan a test phase where you turn it on and
determine if it is valuable to you for further investigation.
If you need to monitor unmodified log data (versus the normalized data), consider the original log
message store. Remember that this process requires additional disk space.
Also, consider whether you need both buildups and tear-downs, or just buildup messages. The tear-
down NAT messages include the same information as the built messages, along with some duration
and size information that may or may not be useful. Colleges and universities that use the built
messages do not rely on the tear-down messages. They only need to know a connection was
established for verification, analysis, and correlation.
Be sure to check your syslog data to determine and enable only those buildup or teardown events are
of use.
You can configure SEM to capture Cisco firewall buildup events as well. The primary buildup event to
use for TCP tracking is 302013. Other buildup events include 302015, 302017, 302020, 302303,
305009, 305011, and 609011. Check the description of these events in the Cisco System Log
Messages Guide located on the Cisco website to ensure you need to capture these events.
You can also enable SEM to capture Cisco firewall tear-down NAT events. The teardown sibling to
buildup even 302013 is 302014. Other events include 302016, 302018, 302021, 302304, 305010,
305012, 617100, and 609002. You can see description of these events in the Cisco System Log
Messages Guide to make sure they are ones you want to capture.
If Active Directory is available, use directory service groups to add user and computer accounts
to rules and filters. A user-defined group cannot be synchronized with Active Directory, but a
directory service group can synchronize with Active Directory every five minutes. See Configure
Directory Service Groups in SEM for details.
Rules and filters typically make use of user-defined groups in slightly different ways:
l In a rule, user-defined groups are typically used like a white list or black list that tell SEM which
events it should include or ignore.
l In a filter, user-defined groups limit the scope of the filter to items that belong to the group.
The Domain Controllers (all) filter uses a connector profile in the constant position by
default. You can replace the profile with a user-defined group or a directory service group
if the tool profile is not sufficient for your environment. For additional information about
connector profiles, see Create connector profiles to manage and monitor SEM Agents.
You can only add a group to one SEM manager at a time. To copy a group for use with another
SEM manager, export the group and then import it into the other manager's Groups grid.
5. In the Name field, enter a nickname for the element. This name is for reference only.
6. In the Value field, enter a value to define the element. You can use wildcard characters, such as
asterisks (*), to abbreviate these entries.
7. In the description field, enter a description (optional), and then click Add.
In the elements list, you can search for a specific element, and select an element to edit
the values or delete it. You can also export the elements to a CSV file to import into other
user-defined groups.
9. Add your group name and description (optional), and then click Create. The new group appears
in the user-defined groups list, and can now be used when configuring rules and filters.
10. To edit a user-defined group, select a group in the list, and then click Edit on the toolbar. In the
Refine Results pane, you can also filter the groups by the modifier and the time last modified.
The Admin Accounts group is used in several template rules as a placeholder for a custom list
of administrative users. This group represents the default administrative accounts in Windows
and Unix/Linux environments.
User-defined groups
User-defined groups contain data specific to your environment, such as user and computer names,
the names of sensitive files, trusted IP addresses, and so on. User-defined groups are typically used in
rules and filters to whitelist or blacklist events that SEM should include or ignore when evaluating
rules and filters. SEM ships with more than two dozen user-defined groups that need to be populated
with values for your environment. See Configure user-defined groups in SEM for more information.
You can also create rules that auto-populate user-defined groups with values.
Event groups
Event groups gather similar events into a single category for use with rules and filters. For example,
create an event group for events that should all trigger the same response from SEM. If an event in
the group occurs, SEM will fire the rule for that group. SEM ships with more than a dozen predefined
event groups, such as: virus/scanner events, process start/stop events, change management events,
and so on.
Time-of-day sets
Time-of-day sets are defined time periods that you can use in rules and filters. Use time-of-day sets to
perform specific actions at different hours of the day. For example, if you define a time-of-day set for
Working Hours, and another for Outside Working Hours, you can assign different rules to each set.
SEM ships with the following predefined time-of-day sets: business hours, early shift, graveyard shift,
late shift, normal shift, and reboot cycle.
Connector profiles
Connector profiles are groups of Agents with common connector configurations. Most Agents in a
network only have a few different network security connector configurations. Using connector
profiles, you can group Agents by their common connector configurations, and enable your rules and
filters to include or exclude the Agents associated with a profile.
Email templates
Email templates are pre-formatted email messages that your rules use to notify you when an event
occurs.
State variables
State variables are used in rules to represent temporary or transitional states. For example, you can
create a state variable to track the state of a system, setting it to a different value depending on
whether the system comes online or goes offline.
How groups are added to filters and rules on the SEM Console
This section demonstrates how groups are used in filters and rules.
In the left drag panel, groups are organized by group type. On the right side, the filter builder shows
that the Service Audit Alerts event group is included as a condition of the filter.
Again, groups are organized by group-type on the left side. On the right side, the rule definition builder
shows two different groups in the rule conditions: the Network Audit Alerts event group, and the
Approved DNS Servers user-defined group. Four child fields are specified in the Network Audit Alerts
event group: SourcePort, DestinationPort, SourceMachine, and DestinationMachine.
For each element a name and value are required. The asterisk (*) wildcard symbol can be used in
values, if appropriate. In addition an optional description can be added for each element.
The CSV file must begin with the Name, Value, Description header. For example:
Name,Value,Description
Administrators,Administrators, Top level administrators only
Backup Operators,backup oper*,
DNS Admins,DNSAdmin*,
Domain Admin,domain admin*,
Importing elements will not overwrite an existing element list in a user-defined group. Imported
elements are added to the list, and duplicate elements are skipped.
3. On the toolbar, click Create User-defined group, or select an existing user-defined group and
click Edit.
4. Click Import elements, navigate to your CSV file, and then click Open.
The CSV file must include populated Name and Value columns. The Description column
is optional.
3. On the toolbar, click Create User-defined group, or select an existing user-defined group and
click Edit.
4. Click Export elements. The CSV file downloads to your local system.
1. On the SEM Manager menu bar, navigate to Configure > Directory Service Groups.
3. Select the LDAP Configuration to use from the dropdown menu.
4. Click Add Groups. This opens a dialog into which you should enter the Distinguished Name (DN)
of the directory service group you want to add. For example: cn=A-group, ou=support,
dc=mycompany, dc=com.
1. On the SEM Manager menu bar, navigate to Configure > Directory Service Groups.
2. Select the group by checking the box in front of its name, and click Show members.
The Directory Service Group pane is displayed listing the group members.
1. On the SEM Manager menu bar, navigate to Configure > Directory Service Groups.
2. Select the group by checking the box in front of its name, and click Delete.
The Directory Service Group is removed.
The Live Events view consists of three panes: the filters, the event table and the event details.
2 Filters The Filters pane displays the filters that can be applied to the event
messages. To apply a filter, click to expand a filter group, and click on
the filter. The events table title changes to the name of the filter and the
table is refreshed to displays the incoming events matching the filter
conditions.
For more on using filters, see About Filters. To create or edit filters, see
Create filters in SEM. Click the Hide Pane icon to collapse this pane,
or the Show Pane icon to expand it. For information on importing and
exporting filters, see Export and Import live event filters.
4 Detail The Detail pane displays information about the highlighted event in the
Events table. When you click an event, the event details are displayed.
Click the Hide Pane icon to collapse the pane, or the Show Pane
icon to expand it. Click the icon to copy CSV-formatted event details
to your system clipboard. You can also enter specific keywords in the
pane to filter and view specific event data.
Since a network of any size will generate vast numbers of events and alerts, only some of which are of
interest or use at any particular time, SEM filters let you capture and display just those that meet your
specific requirements.
You can turn filters on and off, pause filters to sort or investigate events, perform actions to respond
to events, and configure filters to notify you when they capture an event. Filters can also be used with
widgets, which are charts and graphs that visually represent event data.
Create rules when you want SEM to take action in response to one or more events. For more on rules,
see SEM rules: Automate how SEM responds to events.
Rules can be quickly created from filters as described in Create a rule from a filter.
A failed authentication is an event triggered by three logon failures by the same account
within an extremely short period of time.
l Rule Scenario Event filters to determine if you have the appropriate events to create a rule for a
specific scenario.
l Daily Problem Event filters to monitor basic operational problems (such as account lockouts) in
real time.
By default, filters are grouped into the following seven categories in the Filters pane:
l Overview
l Security
l IT Operations
l Change Management
l Authentication
l Endpoint Monitoring
l Compliance
Overview filters
Security filters
Network Event Filters events with source or destination detected in the threat On
Threats intelligence feed as potentially bad actors.
All Firewall Events Filters events from firewall devices that match the targeted On
name.
All Threat Events Filters all events with the source or destination detected in the On
threat intelligence feed as potentially bad actors.
Denied ACL Traffic Filters events from network devices that indicate denied ACL Off
activity.
Blocked Web Traffic Filters events from proxy servers or other web servers that On
blocked an attempt to access a URL.
Proxy Bypassers Filters web traffic users who are bypassing your proxy server. Off
Web Traffic - Filters web traffic events to potential spyware sites. Off
Spyware
IDS Scan / Attack Filters security events detected by IDS tools (such as Snort). On
Activity
File Audit Failures Filters events that indicate failed attempts to access files. On
IT Operations filters
All Web Traffic Filters all web traffic-related events from network devices, On
proxy servers, and web servers.
Error Events Filters events from all sources that contain "error". On
Warning Events Filters events from all sources that contain "warning". On
Windows Error Events Filters events from Microsoft Windows event logs that On
contain "error".
Error Events for Device Filters events from a specific device that contain "error". Off
Web Traffic for Source Filters web traffic emanating from a certain source machine. Off
Machine
All Network Traffic Filters all network traffic-related events from all devices and On
systems.
FTP Traffic Filters TCP traffic events between one or more FTP ports On
reported by any device or system.
SNMP Traffic Filters UDP traffic events between one or more SNMP ports On
reported by any device or system.
SMTP Traffic Filters UDP traffic events between one or more SMTP ports On
reported by any device or system.
Domain & Membership Filters new and deleted domain accounts (including On
Changes users/groups) and domain changes.
All File Audit Activity Filters events related to all types of audited file access. On
USB File Auditing Filters file-related alerts from Agents running USB Defender On
Authentication filters
Remote User Logons Filters events that indicate remote Windows system logons. On
Failed Logons Filters events that indicate failed logon attempts to devices On
and systems.
Account Lockouts Filters events that indicate an account was locked out. On
Local Account Filters any user-related audit events that are not to or On
Authentication/Changes from the corporate domain.
Workstation Events with Filters all events detected on endpoints with a source or On
Threats destination detected in the threat intelligence feed as
potentially bad actors.
Compliance filters
Top HIPAA Events Filters file activity, changes, and incidents related to HIPAA Off
events.
Top Banking Filters common banking compliance events, including change Off
Compliance Events management, users and groups, and potentially suspicious
attack activity.
3. Click on the vertical ellipsis icon , and select Add New Filter.
To create a filter outside of the groups, click the add icon at the very top of the column, and
select Add New Filter.
To establish notifications for the new filter, you can create a rule based on your filter with
one click.
5. There are several ways to add filter fields to a filter, but the drag and drop method is easiest:
a. Expand Events or Event Groups in the left column to display filter entities.
b. Some filter entities, such as those in the Events group, can be expanded to show filter
fields.
When you drag a filter field into the filter builder, the place to drop it is illuminated
with a blue line.
d. Move the cursor over the condition you have just created.
e. The current condition is displayed. Use the drop-downs to change this to your required
condition. For example, in this case the only meaningful change you can make is from
"Access.IsThreat is equal to True" to "Access.IsThreat is equal to False", but other
conditions can involve strings, numerical values, or group values (see below for using
group values). For information on using operators (such as "is equal to", "is in", etc) see
Compare values with operators in SEM.
f. Click save when you have set up the condition how you want it.
6. A filter can consist of one or more conditions. To add further conditions, drag the required field
to just beneath the previous condition. As before a blue line shows where to drop it.
Initially, multiple conditions are assumed to be additive, and the AND operator is displayed.
7. To change the operator, click AND, and then select OR.
If you create a multiple condition that combines conditions with AND and OR operators, you will
need to group the conditions accordingly. For example, the following condition flags an error as
the condition is ambiguous.
To show that you want this filter to display events where the access severity does not matter
but detection time is during business hours or events where the detection time is during the late
shift and the severity is not less than 5, you need to group as follows.
8. Click on AND, and select Group.
9. Click Save to save the filter. It is now be available in the column on the left.
The following table describes each operator and how it should be interpreted when used as a filter
condition.
A list item (indicated with an * in the following table) can be another event variable, such as an
event field. For example, you may want to evaluate if an event's source is equal to a certain
destination. In this case, you would compare two event fields, such as SourceMachine =
DestinationMachine.
Operator Description
Exists Use these operators to specify if a particular event or Event Group exists. Read
conditions with these operators as follows: This [event/Event Group] must [exist/not
exist].
Not exist
Not exist is only used in rules.
is in Use these operators when comparing event fields with groups (such as Event Groups,
User-Defined Groups, etc.). They determine the filter’s behavior, based on whether or
the field is contained a specific Group.
Less than
OR
equal to
AND Conditions and groups of conditions are subject to AND and OR comparisons.
l The AND symbol means two or more conditions (or groups) must occur
together for the filter to apply. This is the default comparison for new groups.
l The OR symbol means any one of several conditions (or groups) may occur for
OR the filter to apply. When comparing groups of distinct events, you must use the
OR symbol.
Filter groups and conditions, and rule groups and correlations, are all subject to AND and OR
conditions. By default, new groups, conditions, and correlations appear with an AND condition. Both
AND and OR conditions can surround nested groups, and they can be used between groups on the
same level to create complex filter conditions or rule correlations.
Example Description
If x AND y AND z occur, report the event. If all the conditions apply, report the event.
If x OR y OR z occurs, report the event. If any of the conditions apply, report the event.
If (x AND y) OR z occurs, report the If conditions x and y occur, or if condition z occurs, report
event. the event.
If (a AND b) OR (x AND y) OR (z), occurs, In this case, you would create three groups, two nested
report the event. within the third:
l The nested groups are configured as (a AND b) and
(x AND y), joined with an OR.
l The outer group is configured as (z), surrounding
the nested groups with an OR.
Condition1 AND In this example, the filter reports the event when it meets
Condition2 AND Condition3 OR the following conditions:
Condition4 AND Condition5. Condition1 and Condition2 and Condition3, or
Condition1 and Condition4 and Condition5.
The following procedure gives an example of a filter that monitors all traffic from a targeted
computer.
Or, to create a filter at the root level, outside of all the groups, click the add icon, and select
Add New Filter.
3. Enter a descriptive name for your new filter in the Name field.
4. In the first column of the Filter Values on the left, expand Event Groups, and drag Network Audit
Alerts into the filter builder.
When you drag a value into the filter builder, the correct drop location is illuminated with a blue
line.
5. From the second column of the Filter Values, drag SourceMachine to the filter builder
6. Mouse over Network Audit Alerts.SourceMachine to expose the filter builder toolbar.
7. Click the "or add it" link and enter the fully qualified domain name of the computer.
8. Click Save.
Or:
To create a filter at the root level, click the add icon, and then select Add New Filter.
3. Enter a descriptive name for your new filter in the Name field on the right.
4. In the first column under Filter Values on the left, expand Event Groups, and select Any Alert.
5. Drag DetectionIP from the second column on the left into the filter builder.
When you drag a value into the filter builder, the correct drop location is illuminated with a blue
line.
6. In the same way, expand the Connector Profiles group, select your profile, and drag it into the
filter value drop location.
Use the ToolAlias field in SEM rules and filters to capture traffic from a specific device
The ToolAlias field is a useful field to know if you have to create filters, rules, and searches that
target traffic from a specific device. Every device that sends events to SEM has an Alias property
that you can customize with a device-specific name. Use the ToolAlias field to examine the Alias
property and find events that match your filter criteria.
You can also use the DetectionIP event to monitor events from a device that has a specific IP
address, for example AnyAlert.DetectionIP=10.1.1.1.
Or:
To create a filter at the root level, click the add icon, and then select Add New Filter.
5. From the second column list, drag ToolAlias into the filter builder.
When you drag a value into the filter builder, the correct drop location is illuminated with a blue
line.
6. Click the or add it hyperlink.
7. Enter a filter value to match the alias property of the device that you want to track. Use asterisks
(*) as wildcard characters if required.
For example, consider the default Firewall filter. Its condition is Any Alert.ToolAlias =
*firewall*. This assumes that the firewall connector was configured with a Tool Alias that
includes "firewall" in the name.
8. Click Save.
Verify that the correct Alias value is associated with the connector
The following procedure applies to devices configured to send logs to SEM. To verify agent
connectors, use this same procedure, but apply it to the agent associated with the connector instead.
2. Under Configured connectors, select the connector instance you want to verify.
3. On the connector toolbar, click Edit.
4. Verify the connector name (alias) is correct (change the name, if not), and click Save.
5. On the connector toolbar, click Start.
2. Click the vertical ellipsis icon at the top of the filters list.
Import filters
To import filters:
3. Click Browse file, navigate to the required JSON file, and click Open.
4. Click Next.
The filters contained in the selected JSON file are listed.
5. Remove any filters you do not want to import by unchecking the boxes in front of the filter
names, and then click Next.
The import process begins. The filters that are successfully imported are listed. Those that
cannot are shown along with the reasons why.
You can export records from live mode, paused mode, and historical search. The number
of returned historical events is determined by your search results threshold on the
Settings page.
Change the location and name of the download file if necessary. and click Save.. By default the
file will be named yyyy_mm_dd_hhmm.csv
SEM exports the CSV file containing the search results to your local system.
Since certain searches parameters can result in huge number of matching results and thus
negatively impact performance, SEM limits the number of events that are retrieved. For more
on this, see Event Limits.
When you first open Historical Events it shows unfiltered events (that is, all events on the
network) for the last ten minutes as a chart and a table.
1 Query This is where you build queries to filter the historical results. For information
Builder on creating queries, see Create a search query.
2 Time Click to specify the time period for this query. You can either use preset
Picker "quick picks" or create your own custom periods.
3 Options The options displayed when you click this depend on whetherthe search
query has already been saved and scheduled.
Save query as new: Save the new query currently being viewed with a user-
supplied name. The query will then be available from the Queries list.
Save and schedule: Save the query and open the Schedule search window so
that you can run the currently viewed query at specified dates and times, and
have the results emailed to selected email addresses and LDAP users or
used in Scheduled Query Severity dashboard widgets.
Edit saved query: Apply tags and thresholds to a query for use in Scheduled
Query Severity dashboard widgets.
Schedule this query: Open the Schedule search window so that you can run
the currently viewed query at specified dates and times, and have the results
emailed to selected email addresses and LDAP user or used in Scheduled
Query Severity dashboard widgets.
4 Queries/ Switch between the list of saved queries and the Refine Results. The Refine
Refine Results lists the fields available for filtering historical events by category.
results Drag these to the Query Builder field, or click the Add icon. For more
information on using these fields and creating queries, see Create a search
query.
5 Event The number of events over the specified period of time are displayed as a
chart simple bar chart. Drag the cursor over a time period to zoom in on that period;
click on the icon when then appears in the top right of the chart to return to
the previously specified period.
6 Event Select a single event in the table to display additional information in the Event
Detail Details pane.
Since searches with a high maximum threshold can negatively impact performance, you can set the
maximum number of events that are loaded. On average, every 1000 returned search results
consumes approximately 100MB of RAM. This can result in up to 10GB being consumed by one
search query if the threshold is set to the 100,000 maximum.
2. To change the maximum limit, click Change limits and see Set search and filter thresholds.
You can select a quick pick, or set a specific date and time range.
By default, the initial search period covers the last hour. Specifically, the search period starts at the
time you go to Historical Events, and stops one hour before.
As you build your search query, keep in mind the available operators and functions:
Operator Definition
= Equals
!= Not equal to
Operator Definition
in True if the operand is equal to one of a list of expressions.
Function Definition
And Displays results if all the conditions separated by And are true.
() Parentheses: gives solving priority to the conditions inside of the first grouping when
more than one grouping is listed.
3. Move the mouse over the plus icon and click.
4. Continue adding other fields until you have created your query. By default, the query is built up
using ANDs but these can be changed to OR conditions and parenthesis added as required.
You can also manually enter query data. As you type in the query builder, tips and suggestions appear
to guide you as you enter your query parameters.
When you have created the query fields you can use the time picker to select the date range you want
the query to cover.
You can also chain the conditions using logical operators "AND" and "OR." For example:
someText" AND "someOtherText" OR "someOtherText2"
To make sure your conditions are properly executed, you can also use brackets (parentheses). For
example:
someText" AND ( "someOtherText" OR "someOtherText2" )
Advanced conditions
Aside from basic conditions, you can add conditions with two operands connected by an operator.
For example, if you want to search for an event NOT containing certain text, you can write it as
follows:
Text != "someText"
You can also search for events containing a value in a specific property. For example:
DestinationPort = 1234
Also, you can specify the event type and condition. For example:
Access.DestinationPort = 1234
And, you can enter name of the event group if it contains non-alphanumerical characters. For
example:
Any Alert".DestinationPort = 1234
Queries support a wide range of special characters, including Unicode characters like ☃ ☀ ♫, for
example. One of the main restrictions is using spaces and double quotes in names of custom groups
and other things a user can create. To use them in a query, the value must be wrapped in quotes. For
example:
If the name or value contains a double quote, it must be doubled in the query. For example:
Text = "sometext""containing""quotes"
Wildcards in strings
Wildcards can be used in string values, but it's important to understand where to place them.
Starting wildcard
Ending wildcard
Combination of wildcards
"sometext xxx
someothertext"
Custom Groups
The following are supported groups used with the "in" operator:
l SubscriptionGroup
l UserDefinedGroup
l DirectoryServiceGroup
l ConnectorProfileGroup
Unsupported groups:
l TimeGroup
Since groups do not currently restrict unique names across group types, use the prefix to search for a
group
DirectoryServiceGroup DSGroup
ConnectorProfileGroup Profile
Hinter
This feature provides suggestions possible query values. The provided "hints" are based on cursor
position in the input. As you type, hints are filtered to provide more specific options.
From previous versions, there is change, that it's not supported having Event Group named same as
some Event Type. That will end up not being able to recognize which is which and match first to find.
Troubleshooting
Currently, there is a known issue that hinter is a bit horizontally misaligned to the input. On some
occasions, the hinter suggestions may be vertically misaligned to the input. To fix the issue, close or
open it.
Details
Here you can edit the name and add tags to this query. Tags enable you to group queries into
categories.
Thresholds
(Thresholds are used to determine the severity level and colors on Dashboard overview widgets.
No tags set up. Thresholds will only be shown if widget and a query have corresponding tags set up.
Seems like this query has currently no tags up. Tag settings)
If you load a saved query and make changes to it, an additional menu entry is displayed,
enabling you to Update the saved query.
This query will now be available in the Queries tab in the left column.
If this is a newly- created query the option will be Save and schedule. If it has already been
saved the option will be Schedule this query.
2. You are asked to enter a unique name for this query.
3. Select when you want the query to be run. This can be daily, weekly or monthly.
4. Select the time or times on the selected day or days that you want the query to be run.
5. Select the start and optional end date.
6. Enter or select the email addresses to which you want the results of this query to be sent. You
can add LDAP users if you have configured SEM for LDAP.
Favorites: Queries that have been created in other categories but marked as favorites appear here.
See Manage search queries below for more information.
User-created: These are queries that have been created by the current user for their own use and
have not been made accessible or editable by other users. By default, all queries that you create are
only visible to, and usable by, you. However, you can share queries, and also make them editable if
required. See Manage search queries below for more information.
Predefined: These are a set of the most commonly required queries set up in advance.
Public: Queries that have been made public can be used by any SEM user on your system. If followed
by the Use Only icon a query can be used but cannot not edited. (However, it can be copied and the
copy can be edited.) If followed by the Editable icon , the query can be edited, renamed and saved.
Once a query has been made editable, it cannot be made non-editable or made private.
To access queries:
If a query has a clock icon after its name then it has a schedule running.
l Click Export to export this query as a JSON file. To export more than one query, see Import and
export queries for information.
l Click Favorite to highlight this query with a star icon and place it in the Favorites category.
l Click Manage queries option to open the Manage Saved queries window. This allows you to
perform the above options on multiple queries by searching, sorting and selecting the queries.
You can also import and export filtered queries from this window.
In this window, schedules (if created) and query timeframes are displayed.
The Manage Saved queries window is also available by clicking the gear icon at the top of
the queries list.
Load queries
When you load a query, its name is displayed in the upper left and the query is displayed in the search
query builder box.
If there is a icon after the name, this indicates that the query has a schedule. Move the cursor over
this icon to display the schedule details.
If you make any changes to a saved search query, this is indicted by the icon after the
name. Click this icon if you want to revert to the original query.
You can now save this updated search query as either a new query with a new name or update the
existing query.
Click the Unload Current Query icon if you do not want to use the loaded query. Note that the
contents of the search query builder box are not automatically cleared by this action.
4. Click Add tag and select the required tag or tags to apply to this query. Tags applied to the query
are displayed above the Add tags link.
Once you have selected a tag or tags, you can specify the thresholds that determine whether event
search results are shown as Critical, Warning or OK on the dashboard widgets.
Thresholds
You can apply threshold values to search queries to set the number of occurrences per evaluation
(that is, when the query was last run) that result in an event query result being deemed critical,
warning or OK severity.
Once you have set up tags and thresholds for a query, you can use this data to set up widgets on the
SEM dashboard.
Widgets
The scheduled query widgets are created and customized in the same way as other SEM Dashboard
widgets.
The following widget has been customized to list all search queries that have returned one or more
event within the most recent evaluation. It shows the number of occurences and the time the query
was last run.
Click on the red, yellow or green area of the query severity widget to display the corresponding query
on the Historical Events page. If more than one query is tagged, the Manage Saved queries window
will be displayed listing all the queries to which this severity level applies.
You are asked to provide a filename and file path, or accept the default.
3. Click the gear icon at the top of the queries list.
5. Initially the options are Import and Export All. These change depending on how you proceed.
l To export all your queries, click Export All.
l To export a set of queries, use the checkboxes on the left to filter queries by category,
whether scheduled or not, etc and select Export Filtered.
l To export specific queries use the checkboxes in front of the query names and click
Export.
6. Enter a meaningful filename and click Save.
Import queries
To import search queries that have been previously saved as a JSON file:
5. Click Browse file, navigate to the required JSON file, and click Open.
6. Click Next.
The queries contained in the selected JSON file are listed.
7. Filter out any queries you do not want to import by unchecking the boxes in front of the query
names, then click Next.
The import process begins. The queries that are successfully imported are listed. Those that
cannot be imported are shown along with the reasons why.
8. When the import is complete, click OK to close the box. The queries will now be listed in the
appropriate categories in the Queries column.
On average, every 1,000 returned search results consumes approximately 100MB of RAM,
which can increase up to 10GB for one search query if the threshold is set to the 100,000 max-
imum. Predictably, executing multiple search queries simultaneously will add additional strain
to system resources and cause diminished performance.
Occurrence settings
By default, a condition only has to occur once to satisfy part of a rule. However, you can change this
using the occurrence setting. For example you might only want to know if an occurrence happens five
times in thirty seconds.
To apply occurrence settings for this part of the rule, click the icon on the SEM rule builder tool bar.
If you change the number of times this condition occurs to satisfy this part of the rule, the window is
expanded as shown below.
You can also specify additional conditions. For example the following would be true if the event
occurred twice within ten minutes with the same DetectionIP.
You can additionally set a period that must elapse before this part of the rule can be triggered again
by checking the Occurrence time box.
Editing expressions
To change the expression for a rule part, click the icon on the SEM rule builder tool bar. A popup
window is displayed showing the components of the expression. For an entity, this will show two
field: the entity name and whether or not the condition occurred. For an entity field, the following
fields are displayed.
See About SEM response actions for information about response actions.
Use caution when creating rules. SolarWinds recommends that you practice creating filters before
you start creating rules. Creating rules is similar to creating filters, but filters report event occurrences
whereas rules act on them.
Begin configuring rules when you are comfortable with configuring filters. Always test your
rules before implementing them.
You can create rules by configuring conditions between alert variables and other components (such
as time of day sets, user-defined groups, constants, and so on). Using rules, you can correlate alert
variables with other alerts and their alert variables.
You can configure rules to fire after multiple alerts occur. SEM remembers alerts that meet the basic
rule conditions and waits for additional conditions to be met. The rule does not execute until the
alerts meet all the conditions and correlations defined for the rule. You can specify how often and in
what time frame the correlations must be met before the rule is triggered. The combined correlations
dictate when the rule initiates an active response.
Rules can only fire on normalized data and not on raw log data that is received.
Rules play a key role in detecting operational and compliance issues on your network, such as
external breaches, insider abuse, and policy violations. SEM comes with a set of preconfigured rules
to help you get started.
Any activity or event that can pose a threat to your network warrants a SEM rule.
Enable rules whenever you create a new rule, edit an existing rule, or change the test mode status.
Otherwise, the SEM Manager will not recognize your changes. After enabling rules, SEM begins
processing rules.
The Create new rule screen is displayed. The left area shows categories such as Events, Event
Groups, User Defined Groups, etc.
1. Click a category to show the entities it contains, and click an entity to show the entity fields it
contains.
The search box can be used to help find entitles and entity fields. All matches are highlighted as
shown below:
3. Drag the appropriate entity or entity field into the rule definition builder.
When you drag a value into the rule builder, the correct drop location is shown with a blue
line.
Click on "is equal to" to change to an alternative operator as required, and either enter a
value for the comparison, click to display the available valuesor drag across another field
as appropriate.
4. Once you have set up a part of a rule, you can change it by moving the cursor over it to display
the rule builder toolbar.
8. By default, the actions are triggered whenever the conditions that make up the rule are true.
However, you can change this so that the rule has to be true multiple times. For information, see
Occurrence settings.
10. Under Details and actions, enter a rule name and optional description.
11. Click the icon to select one or more optional tags for this rule.
12. Turn off the Click Enable rule after saving option if you want to save a rule without adding an
action. The rule can be enabled afterward from the Rules screen.
13. Turn on the Enable test mode option if you want to use this rule test mode. This means it will
run but will not trigger actions. This lets you see how the activated rule will behave without
disrupting your network. You can Identify test mode rules in your list by the Test icon .
14. Click Add new action to add an action when the rule triggers.
15. Enter a search term, or select an action from the list, and then click Next.
16. Define the trigger action, and then click Add.
SEM provides over 30 actions that can be triggered using rules, ranging from Sending a
pop-up message to Disabling Networking. For each the procedure is similar: select or
enter the required parameters, and click Add.
17. You can add multiple actions to a rule by clicking Add new action.
18. Click Create when you have finished adding actions to this rule. The rule will now be available in
the list of rules.
19. To edit, delete, and toggle test mode, click the vertical ellipsis next to a rule.
Occurrence settings
By default, a condition only has to occur once to satisfy part of a rule. However, you can change this
using the occurrence setting. For example you might only want to know if an occurrence happens five
times in thirty seconds.
To apply occurrence settings for this part of the rule, click the icon on the SEM rule builder tool bar.
If you change the number of times this condition occurs to satisfy this part of the rule, the window is
expanded as shown below.
You can also specify additional conditions. For example the following would be true if the event
occurred twice within ten minutes with the same DetectionIP.
You can additionally set a period that must elapse before this part of the rule can be triggered again
by checking the Occurrence time box.
Editing expressions
To change the expression for a rule part, click the icon on the SEM rule builder tool bar. A popup
window is displayed showing the components of the expression. For an entity, this will show two
field: the entity name and whether or not the condition occurred. For an entity field, the following
fields are displayed.
3. Select a template from the list (or enter a search term for a specific template), and then click
Next.
4. Review the existing conditions and values, and click Edit Rule if you need to change these.
For help on changing rule settings see Create a new rule.
5. When you have amended the rule, click Next.
6. Review and adjust the rule details and actions where needed, and then click Create.
The rule builder appears displaying the existing values for the filter.
If rule definition changes are made to a rule that was created from a filter, those changes are
not reflected in the existing filter. Likewise, if the filter changes, the associated rule is not
updated with the filter changes.
4. Under details and actions, click the toggle button to enable the rule after saving, and then click
Save.
4. Under details and actions, click the toggle button to enable or disable test mode, and then click
Save.
4. Under details and actions, toggle off the Enable the rule after saving, and then click Save.
2. Click Browse file and navigate to the JSON file containing the SEM rules.
3. Click Next.
This list can be sorted, filtered or searched. Initially all rules are selected for import, but you can
select or unselect all or individual rules as required.
If any rules are invalid a message is displayed showing how many are invalid. Invalid rules
cannot be imported and are shown in the list in gray with a brief message explaining why
they are invalid.
4. When you have selected the rules you want to import, click Import.
5. If any of the rules you are trying to import have the same name as a rule already set up, the
following screen is displayed allowing you to skip, overwrite or rename the imported rule.
Create email templates to report specific information about an alert event and variables that capture
specific parameters about that event. For example, you can report which server is affected, what time
the event occurred, or which Agent was shut down. Or you can create an Account Lockout template to
notify key personnel when an account is locked out, or automatically file a trouble ticket. Create static
text to describe the event, and incorporate dynamic text that provides the account information from
the original event.
Create templates that are specific to an event type to avoid having to create one email template per
rule. For example, you can have one template for Account Modification that can provide a notification
when a user is added or removed from a group, when a password is reset, or when other account
details are changed. There is no limit to the number of templates you can create.
When you receive the email, you can identify the email template, the rule that fired, and the event that
caused the rule to fire.
3. In the Email template name field, enter a descriptive name for the template.
4. In the Subject field, enter the subject of the template email.
5. In the Message field, enter the text of the message to be included in this email. This text is static
and cannot be editing within emails created from this template, but you can include parameters
which are replaced by the appropriate metrics (or string) when an email is generated by a rule
that uses this template.
6. To add parameters, either type $ or click Add parameter, then add the parameter. You do not
need to specify the values here, and can use any combination of letters, number and the "." ,"_",
and "-" characters.
When you create the rule, the fields that can be substituted for these parameters are displayed.
For example, if your message is:
This $info event occurred at $time.
And you create a rule triggered by Access.IsThreat, you will be able to assign any of the Access
fields to replace the parameters.
The new template is now available as an action type in your custom rule builder. To learn more, see
Create a new rule.
In the Refine Results pane, you can also filter the groups by the modifier and the time last
modified.
4. Select the PortScans rule template, and then click Next.
5. Review the existing conditions and values, and click Edit if you need to change any of these.
6.
7.
8. C
Before you enable this rule, ensure your proxy server transmits complete URL addresses to your SEM
Manager by checking the URL field of any WebTrafficAudit event generated by your proxy server. If
your proxy server does not log web traffic events with this level of detail, check the events coming
from your firewalls, as they can sometimes be used for this rule as well.
3. In the search box, enter "known spyware site traffic". As you type the list of templates will be
filtered to show just the one required.
4. Select the Known Spyware Site Traffic rule template, and click Next.
5. Review and edit the existing conditions and values where needed, and click Next.
6. Review and adjust the rule details where needed, and click Create.
The default action for this rule is to generate a HostIncident event, which you can use in conjunction
with the Incidents report to notify auditors you are auditing the critical events on your network.
4. Select the Virus Attack - Bad State rule template, and then click Next.
5. Review and edit the existing conditions and values where needed, and then click Next.
6. Review and adjust the rule details where needed, and then click Create.
You can create a general change management rule to instruct SEM to notify you when a user changes
your network configuration, or you can create a more specific rule that applies to specific users,
groups, or types of changes. Generally, if you can see an event in your console, you can create a rule
for the event. Use your filters as a starting point for creating custom rules.
3. Under Rule Values, expand the Events group, and then select NewGroupMember.
4. Under NewGroupMember fields, locate EventInfo, and then drag it into the rule builder.
5. To account for all variations on the word administrator, click the or add it hyperlink and enter
*admin*.
6. Keep the default occurrence and trigger actions settings.
7. Click Next.
8. Enter an appropriate rule name. For example, New Admin User.
9. Under Options, click the toggle button to enable the rule after saving.
10. Click Add new action, select Send Email Action, and then click Next.
11. From the Email Template drop-down list, select a template.
12. From the Recipients drop-down list, select one or more recipients, and then click Add.
13. Review your details and actions, and then click Create.
Add the Send Email Message action to a rule created from a template
1. On the SEM Console, select Rules.
2. On the Rules toolbar, click Create rule from template.
6. Under Rule details, click Add new action, select Send Email Message, and select Next..
7. Select an email template and add recipients.
8. Select the data fields to use for any parameters in the email template.
The Select action type list in the rules builder provides a list of actions you can execute for a specific
event. Each Respond command opens the Respond form. This form includes data from the field you
selected and options for customizing the action—similar to configuring the active response for a rule
in the Rule Creation.
The Respond menu is context-sensitive. The event type or cell currently selected in the event grid
determines which responses you can choose.
These actions are useful to respond to unauthorized change management activity and to automate
user-related maintenance. They can be automated in a SEM rule, or executed manually from the
Respond menu on the SEM Console.
You can deploy your SEM agents and configure the Windows active response connector based on
where you want to perform these actions. To perform actions at the domain level, deploy a SEM agent
to at least one domain controller. To perform actions at the local level, deploy a SEM agent to each
computer that requires a response.
6. Enter a custom alias name for the new connector, or accept the default, and then click Add.
7. Under Configured connectors, select your configured connector, and then click Start.
The table’s Action column lists the actions that are available. They are alphabetized for easy
reference. The Description column briefly states how the action behaves. The Fields column lists the
primary data fields that apply with each action. Some data fields will vary, depending on the options
you select.
Group Name
Username
Group Name
Username
Text
Account Name
Account Password
Account Name
Group Name
Destination Account
Destination Account
Destination Account
Destination Account
From the list pane, select the events and constants that
define the appropriate data elements for each event
fields The fields vary, depending on which Incident Event
is selected.
Account Name
Account Name
User Name
User Name
Value
Account Name
New Password
Delay (sec)
Type the time (in seconds) after the event occurs that the
Manager is to wait before rebooting the Agent.
Service Name
Email Fields
Account Name
Message
Delay (sec)
Type the time (in seconds) after the event occurs that the
Manager is to wait before shutting down the Agent.
Service Name
Service Name
Requirements
Configure the Windows Active Response connector on each SEM Agent on which you want to be able
to use these active responses.
Deploy your SEM Agents and configure the Windows Active Response connector based on where you
want to perform these actions. To perform actions at the domain level, deploy a SEM Agent to at least
one domain controller. To perform actions at the local level, deploy a SEM Agent to each computer
you want to be able to respond to.
Requirements
To use this active response, ensure that the file you want to append already exists. Follow these
guidelines when creating the file:
l Use a .txt file, or a similar flat-text file format.
l Avoid using spaces in the file path or name.
l Note the complete file path and name, because you will need it to configure the active response.
Configure the Append Text to File active response and Windows active response connectors on each
SEM Agent on which you want to be able to use this active response.
Configure the Append Text to File Active Response connector on a SEM Agent
You can deploy your SEM agents and configure the Windows active response connector based on
where you want to perform these actions. To perform actions at the domain level, deploy a SEM agent
to at least one domain controller. To perform actions at the local level, deploy a SEM agent to each
computer that requires a response.
Requirements
You can use the Block IP active response with the following firewalls/modules:
l Cisco PIX
l Cisco ASA
l Cisco Firewall Services Module
l FortiGate Firewalls
l Juniper NetScreen
l Check Point OPSEC
l SonicWALL
l WatchGuard Firebox (including Vclass)
Configure the Active Response connector for one of the firewalls listed above on your SEM manager.
When you drag a value into the filter builder, the correct drop location is illuminated with a
blue line. Learn more here.
8. Click Add new action, select Block IP, and then click Next.
9. Enter the IP address to be blocked, click Add, and then click Create.
Additional Information
The Block IP active response creates a rule on your firewall to block the IP addresses you specify. To
allow an IP address through your firewall, delete or modify the rule on your firewall as appropriate.
USB Defender is an option when the Agent is originally installed. If not installed at the time of Agent
install, re-install the Agent with USB Defender. Additionally, configure the Windows Active Response
tool on each SEM Agent where you require an active response.
4. If USB Defender is not installed on one or more SEM Agents, reinstall the Agent and ensure that
you select Install USB-Defender after you confirm the Manager Communication Settings.
USB devices are not detached by default. You must configure a rule to detach the device. The SEM
Console includes several templates you can access modify as needed.
You can enforce USB Defender policy locally. See Configure the USB Defender local policy
connector for details.
Use caution with this active response, because it responds to the SEM Agent at the Device Manager
level. To avoid disabling networking unintentionally, consider placing new rules with this action in Test
mode until you are sure your correlations are configured appropriately.
Configure the Windows active response connector on each SEM agent that requires active responses.
You can deploy your SEM agents and configure the Windows active response connector based on
where you want to perform these actions. To perform actions at the domain level, deploy a SEM agent
to at least one domain controller. To perform actions at the local level, deploy a SEM agent to each
computer that requires a response.
6. Enter a custom alias name for the new connector, or accept the default, and then click Add.
7. Under Configured connectors, select your configured connector, and then click Start.
Configure the Windows active response connector on each SEM agent that requires active responses.
You can deploy your SEM agents and configure the Windows active response connector based on
where you want to perform these actions. To perform actions at the domain level, deploy a SEM agent
to at least one domain controller. To perform actions at the local level, deploy a SEM agent to each
computer that requires a response.
2. Under Refine Results, expand the Type group, and then select the Agent check box.
3. Select an agent, and then click Manage node connectors.
4. In the search box, type Windows Active Response.
5. Select the Windows Active Response connector, and then click Add Connector.
6. Enter a custom alias name for the new connector, or accept the default, and then click Add.
7. Under Configured connectors, select your configured connector, and then click Start.
See Install the SEM reports application in the SEM Installation Guide if you have not yet
installed the reports application.
Standard and Custom reports are essentially the same report. The only difference is that Custom
reports are undocumented and created specifically by (or for) you.
SolarWinds recommends identifying who needs to receive performance or status reports, and
how often they should receive them.
After you run a report, you can print it or export it to several supported formats, including PDF and
Microsoft Word).
1. Log in to a Windows computer that has the SEM reports application.
Click Start, and then select All Programs.
2. Choose the SolarWinds folder, and then click the Reports shortcut.
The SEM reports application opens.
See Install the SEM reports application" in the SEM Installation Guide if you have not yet
installed the reports application.
1. Open the SEM reports application. See Open the SEM reports application for steps.
l Launch Reports as an administrator the first time you run the application.
Depending on your Windows security set up, you may always need to run reports
using the Run as administrator option. See To automatically Run as administrator
every time you run Reports for help.
l The first time you open Reports, a pop-up dialog displays the message: A manager
list was not found. Please create a list containing at least one manager. This is not
an error. Click OK to close the pop-up dialog.
2. On the Settings tab, click the Configure button (the button with a gear icon).
3. Choose Managers - Credentials and Certificates.
You can select a different data source when you open the SEM reports application. The next time you
open the application, the setting defaults to the primary data source.
1. Open the SEM reports application. See Open the SEM reports application for steps.
2. On the Settings tab, click Configure, and then select Primary Data Source.
3. In the Primary Data Source list, select the default data source.
4. To verify your connection to the data source, click Test Connection.
If the test succeeds, Ping Test success appears in the dialog box. If the test fails, an error
message appears. See Troubleshoot the SEM reports application database connection.
5. Click OK.
The default primary data source is configured.
The syslog server is set to the Primary Manager by default, but can be set to any server running a
standard syslog service. The server must have an Agent installed to communicate with the SEM
Manager.
1. Open the SEM reports application. See Open the SEM reports application for steps.
2. On the Settings tab, click Configure, and then select Syslog Server.
The Set Syslog Server form appears.
3. In the Syslog Server (Host Name) box, enter the server host name.
You must test the connection before the server can be accepted. A successful test does
not confirm that the host is a syslog server.
l If the ping test succeeds, The Ping Test succeeded notification appears in the dialog box
with the host IP address.
l If the ping test fails, an error message appears. Verify that you entered a host name that
matches a valid DNS entry, and then click Test.
5. Click OK.
The syslog server is configured.
3 Ribbon Locates the commands you need to complete a task. Commands are
organized in logical groups under tabs. Each tab relates to a type of activity,
such as running and scheduling reports, or viewing and printing reports. To
save space, you can minimize the Ribbon, displaying only the tabs. See
Minimize the ribbon for more information.
4 Settings tab Helps you select the reports you want to run, open, and schedule. You can
also configure reports and the report data source settings.
5 View tab Provides options to print, export, resize and view a report.
Click this tab after you run a report to view the report contents.
6 Grouping Provides options to group, sort, and organize the reports list.
bar
7 Report list/ Displays a list of standard reports by default. When you select a new report
Preview category, the grid displays the reports for your selected category. Use this
pane grid to select report that you want to run or schedule.
You can also filter and sort the grid to quickly find the reports you want to
work with.
When you open or run a report, this section changed into a report preview
pane that displays the report. The ribbon automatically switches to the View
tab with a toolbar to print, export, resize, or view the report.
Menu button
Click the menu button to open a drop-down menu and execute the most common report commands.
In Reports, the menu button opens a menu that lets you execute the most common report commands,
as described below.
Schedule Report Configures a schedule to automatically run the selected report in the report list.
Printer Setup Opens a Print Setup dialog box to select a printer and customize the print
settings.
Refresh Report Refreshes the report list for each report category. Select this option when you add
List new report files (such as new custom reports) that do not appear in the report list.
Default commands
By default, the Quick Access toolbar shows the commands listed in the following table.
Run Runs the report currently selected in the report list. If the report requires
any parameters, the Enter Parameter Values form appears. See Run and
schedule reports to run a report.
Refresh Refreshes the report list for each report category. Use this command if
Report List you added new report files (such as new custom reports) and they do
not appear in the report list. This command accesses the Reports
directory on your computer, retrieves information about all of the reports,
and rebuilds the lists for each report category.
1. Next to the Quick Access toolbar, click the drop-down list.
2. In the Customize Quick Access Toolbar form, add or remove commands from the toolbar.
To add a button to the toolbar, select the corresponding command check box.
To remove a button from the toolbar, clear the corresponding command check box.
To choose from a list of additional commands, click More Commands, and then use the
Customize view to add or remove commands to the toolbar.
1. On the ribbon, click the appropriate tab or group to display the command you want to add to the
toolbar.
2. Right-click the command, and then click Add to Quick Access Toolbar on the shortcut menu.
1. Next to the Quick Access toolbar, click the drop-down list.
The Customize Quick Access toolbar form appears.
2. In the Customize Quick Access toolbar form, move the toolbar below or above the ribbon.
To move the toolbar below the Ribbon, click Show Quick Access toolbar Below the Ribbon.
To move the toolbar above the Ribbon, click Show Quick Access toolbar Above the Ribbon.
To keep the ribbon minimized, click the drop-down list next to the Quick Access toolbar and select
Minimize the Ribbon. To use the ribbon while it is minimized, click the tab you want to use and select
the option or command you want to use. After you click the command, the ribbon returns to a
minimized view.
To restore the Ribbon, click the drop-down list next to the Quick Access toolbar and clear the
Minimize the Ribbon check box.
To toggle between full and minimized view, double-click the name of the active tab or press Ctrl+F1.
Primary Data Source Provides the default data source to run reports when you open the SEM
reports application. This option becomes the default setting in the Data
Source drop-down menu.
Syslog Server Enables the selected SEM Manager to send report log information to a
syslog server. This server logs basic report activity, such as the user name,
report type, targeted database, report time, and any error messages that
occur while generating the report.
Managers - Enables the SEM reports application to communicate with the SEM
Credentials and database server. You can use the Reports credentials to provide secure
Certificates reporting, audit users who access the server running on the SEM VM,
enable third-party authentication servers (such as Active Directory) for SEM
reporting, and set up roles for user access to prevent unauthorized users
from accessing the SEM reports application.
The selected SEM Manager name or IP address appears in and above the
Reports Data Sources drop-down menu.
Data Source
Data Source Selects the targeted data source to run reports. When you select a data
source in the drop-down menu, the data source temporarily overrides the
Primary Data Source (default) you selected as the primary data source in
the Configure drop-down menu.
1. Open the SEM reports application. See Open the SEM reports application for steps.
2. On the Settings tab, click Manage, and then select Manage Categories.
3. In the Manage Categories form, click the Industry Setup tab.
The Classifications section lists industries and regulatory areas supported by standard Reports.
The Reports for section displays the standard reports that support your classification
selections.
4. Select the check box for each industry related to your company.
The Reports for section displays all standard reports that support your selected industry.
5. Select the check box for each regulatory area related to your company.
See Industry options for more information.
6. Click OK.
Industry Options
Industry reports are standard reports designed to support the compliance and auditing needs of
certain industries. SolarWinds provides reports that support the financial services and health care
industries, as well as the accountability reporting needs of publicly traded companies. The following
table describes the compliance and auditing areas supported in the reports.
FERPA Federal Educational Rights and Privacy Act (FERPA), which gives parents
and eligible students certain rights with respect to their children's
education records.
Federal
Finance
NCUA is the federal agency that charters and supervises federal credit
unions and insures savings in federal and most state-chartered credit
unions across the country through the National Credit Union Share
Insurance Fund (NCUSIF), a federal fund backed by the United States
government.
PCI Payment Card Industry (PCI) Data Security Standard requirements of VISA
CISP and AIS, MasterCard SDP, American Express and Discover Card.
General
ISO 17799/ ISO 17799, ISO 27001, and ISO 27002 international security standards.
27001/27002
Healthcare
Each report list column header includes a drop-down list that displays column filter options, as shown
below.
For example, selecting Audit reduces the list to show only the reports associated with the Audit
category.
When you apply a filter, a yellow status bar appears below the reports list. The status bar lists which
filters are currently applied. You can use this list to remove each filter individually, or to remove them
all at once.
l The column header appears indicating the report list is sorted by this column in ascending
order.
l Click the column header again to reverse-sort the report list in descending order. The column
header appears indicating the report list is sorted by this column in descending order.
To turn off a filter, clear the check box next to the filter in the status bar.
To turn off all of the filters, click in the status bar. The report list refreshes to display the list
without any filters.
Using the Industry Setup tab, you can select the industries and areas of regulatory compliance related
to your company. Reports related to the options you select display in the Industry Reports list.
The Favorites Setup tab includes a search option to list, sort, and group the report list by industry and
regulatory area. It highlights reports currently listed in your Favorite Reports list and allows you to add
new reports to the list.
The tab also includes a Favorites tab that displays your current list of favorite reports. You can use
this view to sort and group your favorite reports to locate a specific report. When needed, this view is
also used to remove a report from your list of favorites.
Each authorized reports application user can set up a list of favorite reports. Each list is unique to the
user logged in to the console. A reports application user is determined by the user’s Windows
account. If two users on the same computer log in to the same account, they will share a list of
favorites.
5. In the Classifications section, select each industry or regulatory area related to your company.
6. Click Search.
The Reports Matching Search Criteria section displays all standard reports that support your
options.
For example, if you select Finance, Search lists reports associated with Finance. If you selected
Finance and PCI, Search lists every report that is associated with either Finance or PCI.
You can organize the report list by sorting, filtering, and grouping the report list.
1. Open the SEM reports application. See Open the SEM reports application for steps.
2. On the Settings tab, click Manage, and then select Manage Categories.
3. Click the Favorites tab.
4. Select a report, and then click Remove From Favorites.
This tool only works when you are viewing a text-based view of a report in the Preview pane. You
cannot use this tool with graphical-only reports, or the default graphical view that is displayed when
you first run the report.
4. In the Find what box, type the text you want to search for.
5. Select Match whole word only to search for entire words that match, omitting matching letters
within words.
6. Select Match case to make the search sensitive to uppercase or lowercase letters.
7. In the Direction area, select Up to search from where you are now to the start of the document.
Select Down to search from where you are now to the end of the document.
8. Click Find Next.
The tool locates the next instance of the text in the report and highlights it for easy viewing.
9. Continue clicking Find Next for each remaining instance of the text you want to find.
10. To close the Search form, click Cancel.
You can rearrange the report list into groups defined by items from the Category column, as shown
below.
Groups change the report list into a series of nodes. There is a separate node for each unique item or
category from the column that defines the grouping. The nodes are alphabetized, and each node is
named by the column and category that defines the grouping.
For example, the Category column that defines the grouping in the example above includes three
unique categories: Audit, Security, and Support. Grouping by the Category column creates three
nodes: Category: Audit, Category: Security, and Category: Support. Opening a particular node displays
only the reports associated with the particular grouping configuration.
You can group reports by any column header in the report list (such as Title, Category, Level, and
Type). You can also create sub-groups to create parent-child hierarchies. For example, you could
create a Category group and a Type sub-group.
Next, drag the column header into the area above the Reports Title column. In this example, the
Category header was dragged to the area above the Reports Title column. The report list now displays
a separate node for each unique item that is in the column that is defining the grouping. The nodes
are alphabetized and labeled for easy reference.
3. To view the reports within a particular grouping, click a higher-level group node, and then a sub-
group node.
The report list displays only those reports that apply to both groupings.
4. Repeat Steps 1 and 2 for each additional grouping you require.
3. From the Category drop-down list, select a report category filter—for example, Audit (Optional).
4. Select a report title, and then click Run in the toolbar.
5. Select your start and end date and time parameters, and then click OK.
7. To export the report to the appropriate format (such as a PDF or a Microsoft Word document),
click Export.
1. Open the SEM reports application. See Open the SEM reports application for steps.
2. Select the report that you want to schedule, and then click Schedule.
3. Name the scheduled task to distinguish it from other similar tasks.
You can create more than one schedule for the same report. This allows you to run the same
report on different SEM Managers or run the same report in different intervals (such as daily,
weekly, or monthly), each with a different scope.
1. Open the SEM reports application. See Open the SEM reports application for steps.
2. On the Settings tab, click the Category drop-down menu and select a report category
The Event Summary box only displays the tasks that apply to your selected report.
3. Verify that the path in the Run field is correct. Click Browse and select the correct path, if
required.
4. Verify that the user name in the Run as field is correct.
5. To set up a password for the current user to run the report, click Set password.
6. To run the scheduled task using the schedule you select in the Schedule tab, select the Enabled
check box.
To disable the schedule, clear the check box.
7. To save your changes, click Apply.
8. Complete the Task tab as described in the table.
9. To save your changes, click Apply.
You can create multiple schedules for each report that is within the same scope. For example, you
can run an event summary report for the current week and display the running total for the week at
each hour. When completed, you can set the report to Week: Current and have multiple schedules
that run on an hourly schedule and on a twice-daily schedule.
For new tasks, the tab states that the task is not scheduled.
By limiting the task run time, you can prevent the task from running continuously if a
problem should occur.
5. Select If the task is still running, stop it at this time to stop the system from running a report
when the Time or Duration setting occurs. Clear this check box to have the system finish
running a report that overlaps the Time or Duration setting.
The following illustration displays the valid and invalid date formats for reports.
In this example, the configured report runs every four hours, starting on Monday, August 18, and
running through Sunday, August 30. Each time the task runs, the system will stop it if it
continues to run for more than one hour.
6. To save your changes and exit the form, click OK.
You return to the task scheduler form.
Step 5: Stating when the system can or cannot run the task
Use the Settings tab to select when the system can and cannot run the task.
You can only assign a task to a single Manager. If you need to assign a similar or identical
task to a second Manager, create a new task.
1. From the Date Range drop-down list, select the date range you want the report to cover for this
task and data source.
In this example, the date range is Day: Today. The report will cover the period from 12:00:00 AM
to 11:59:59 PM of the current date.
If you select Week: Previous, the scheduled report will contain information from the last full
week—from 12:00:00 AM the last Monday to 11:59:59 PM the last Sunday. For example, if today
is Wednesday the 11th, the task runs from 12:00:00 AM on the 2nd to 11:59:59 PM on the 8th.
Select one of the following date ranges:
l Day: Today: Run for the specified time frame on the current (today’s) date.
l Day: Yesterday: Run for the specified time frame on the previous (yesterday’s) date.
l Week: Current: Run from one week ago to the current time.
l Week: Previous: Run from 12:00:00 AM last Monday to at most 11:59:59 Sunday. This
report will capture the last full week of data.
l Month: Current: Run from one month ago to the current time.
l Month: Previous: Run from 12:00:00 AM on the first of the month until 11:59:59 PM on the
last day of the month. This will report will capture the last full month of data.
l User Defined: Run another report scope. Use this option to schedule reports for arbitrary
periods or periods that are outside of the conventional scope of a day, week, or month.
2. Enter or select a start time and end time for reporting events that occurred on this Manager. The
report will only show those events that occurred on the Manager within this period.
If you select a week or month scope, you cannot edit the Start and End date and time
fields.
3. To configure the report so it automatically exports to a file, go to the next step. Otherwise, click
Save.
The Count Settings area only applies to count-based reports, such as Top 20 reports.
4. In the Number of Items box, type or select the number of items you want the report to track.
4. From the Format drop-down list, select a file format for the exported report.
5. Click the folder icon, locate the folder where you want to save the report, and a unique file name
for the report.
If the report has multiple schedules, give each scheduled report a different name. Otherwise, the
exported file names files will overwrite each other or increment according to the If File Exists
setting.
6. In the If File Exists list, choose one of the following options:
l Select Increment to store the new report along with any previous versions of the report in
the folder. The reports application increments each report by appending the report file
name with an underscore and a digit. For example, [FileName]_1.pdf.
l Select Overwrite to have each new version of the report overwrite the previous version of
the report in the folder.
7. Click Save.
8. Click Close to close the Report Scheduler Tasks dialog and return to the Reports dialog.
9. Repeat Step 2: Adding a new scheduled report task through Step 7: Export a scheduled report
for each report you want to schedule and assign to a particular data source.
Configure Windows Task Scheduler to run the default SEM Batch Reports
The SEM reports application includes a default batch set of .ini files used to schedule reports.
These files contain the configurations necessary to schedule several best-practice reports on either a
daily or weekly basis, depending on the scope.
1. Navigate to the SEM Reports installation directory and open the SchedINI folder:
l On 32-bit computers: C:\Program Files\SolarWinds Security Event Manager
Reports
l On 64-bit computers: C:\Program Files (x86)\SolarWinds Security Event
Manager Reports
2. Open each of the BRPT*.ini files and make the following changes in a text editor:
l Replace the default value next to Manager1 with the hostname of the SEM Manager or
database appliance in your environment. Use the hostname of your SEM database
appliance if you have a dedicated appliance to store your normalized SEM alert data.
l Modify the ExportDest file path if you want to customize the location to which SEM
Reports saves the exported reports. The default file path is
%ProgramFiles%\SolarWinds Security Event Manager Reports\Export.
1. Create a new scheduled task by opening Control Panel > Administrative Tools > Task Scheduler.
2. Select Task Scheduler Library.
3. In the Actions pane, click Create Basic Task.
4. Enter a name for your task that reflects the frequency of the scheduled task. For example, enter
SEM Reports - Weekly for the weekly task, and then click Next.
5. Select Daily or Weekly, depending on what batch of reports you are scheduling, and then click
Next.
6. Set the start time and frequency for your scheduled reports, and then click Next.
l For the daily task: 1 AM, Recur every 1 Day
l For the weekly task: 3 AM, Recur every 1 week, Monday
15. On the Properties dialog, select Run whether user is logged on or not.
16. Select Run with highest privileges.
17. Select the appropriate operating systems in the Configure menu, and then click OK to save your
changes and exit the Properties dialog.
18. Enter the Windows password for the user specified for this task, and then click OK.
Daily Reports
l EventSummary.pdf
l SubscriptionsByUser.pdf
l Incidents.pdf
l NetworkTrafficAudit.rpt
Weekly Reports
l MaliciousCode.rpt
l NetSuspicious.rpt
l NetAttackAccess.rpt
l NetAttackDenial.rpt
l Authentication.rpt
l FileAudit.rpt
l MachineAudit.rpt
l ResourceConfiguration.rpt
l You can open reports with the .rpt extension in the SEM reports application for filtering
and exporting. If you have a program like Crystal Reports associated with this file format,
you can access these reports with the SEM reports application by opening SEM Reports
first and then clicking Open on the Settings tab.
l If you create a scheduled report, you can remove the task from Windows task scheduler,
and the .ini file will still be under the SchedINI directory. You can change the name of
the RPTxxxxx-x.ini to BRPTxxxxx-x.ini, and add the file to the BatchDay.INI or the
BatchWeek.INI.
The scheduled Report INI files are located in: Program Files\SolarWinds Security Event
Manager Reports\SchedINI. These report INI files are generated automatically when you schedule
a report on the SEM Console. If you need to edit an INI file or change a report format, add the
corresponding report format after the equal sign to the line containing "ExportFormat= ".
The following table identifies the number assigned to each possible format for a SEM report.
[TaskSetup]
Keyword=2009331
Filename=C:\Program Files\SolarWinds Security Event Manager
Reports\Reports\RPT2009-33-1.rpt
[DSNManager]
Manager1=sherman
[RptParams]
RptDateRangeDesc=DAY_P
RptDateRange=2
RptStartTime=12:00:00 AM
RptStopTime=11:59:59 PM
TopN=20
[Export]
DoExport=T
ExportDesc=EXCEL
ExportFormat=1
ExportDest=C:\Program Files\SolarWinds Security Event Manager Reports\Export
ExportFileName=format1.xls
ExportOverWrite=INCREMENT
1. Run a report. See "Run an on-demand report in the SEM reports application for help.
The report opens on the View tab.
2. In the left column of the report, select the field you want to query.
3. On the View tab, examine the report to identify the value you want to use in your filter.
Hover over any value in the report to view a tooltip that contains its complete field name
as it is used in Select Expert.
The Select Expert tool filters the report to show only the type of data that you want to see
in your custom report. See "Use the Select Expert tool to create a more focused report for
more information.
7. From the Boolean drop-down list, select your comparison value.
8. Select or enter a second value. Click New to select or enter additional fields and expand your
query.
Export and save a copy of the filtered SEM report with a new name
1. Create and run the custom report. See Create a custom report in the SEM reports application
for help.
2. On the View tab, click Export.
The Export dialog box opens.
3. Select Crystal Reports (RPT) from the Format menu.
Leave Destination set to Disk file, and then click OK.
4. In the Save File window, navigate to the following folder:
C:\Program Files (x86)\SolarWinds Security Event Manager
Reports\CustomReports
This is the default location for 64-bit operating systems. If you are using a 32-bit
operating system, the default folder would be C:\Program Files\SolarWinds
Security Event Manager Reports\CustomReports.
5. In the File name field, type a name for your filtered report to identify the report by the file name
under Custom Reports
6. Click Save.
You can use this tool when you are viewing the text-based view of a report in the Preview frame. You
cannot use this tool with the default graphical view displayed when you first run the report.
To View the text-based details of a report, check that the View tab is open and click the tree
button to open the subtopics in the reports list. Click the content-based subtopic to jump to that
section of the report.
If using the Select Expert to filter report data by date or time fields (such as InsertionTime or
DetectionTime) results in an error, clear the error prompt, return to the Select Expert, and
delete the time-based filter. To filter by time and date, you must run the report with the
specified range.
2. On the View tab, locate the View group, and then click Select Expert.
3. Click either the New button or the <New> tab.
The Fields form appears with the various report fields you can query on this report.
Click Browse to display a list of available fields you can select with the tool.
4. Select the field you want to query, and then click OK.
The Select Expert form appears.
The first tab displays your selected field name. It lists the query options for that field and
includes an adjacent list where you can select a specific value.
5. From the left drop-down list, select a query option for the field.
6. From the adjacent drop-down list, select a specific value for the field.
You can click Browse Data to view a complete list of values in the report for that field. From the
Browse Data box, you can select a value, and then click Close to apply that value to the query.
7. Repeat Steps 3 – 6 for each field you want to add to the query.
8. To close the form and apply the query, click OK.
The new report appears in the Preview frame.
You can use the Preview frame’s toolbar to save or export the report.
Restore the original report after using the Select Expert tool
When you are through querying a report with the Select Expert tool, you can restore the report to its
original state.
1. On the View tab in the View group, click Select Expert.
The Select Expert form appears.
1. Open the SEM reports application. See Open the SEM reports application for steps.
2. Click the Menu button, and then select Open Report.
The Open Report File form appears.
3. Use the Open Report File form to locate the report file you want to view.
If you cannot locate the report, be sure you selected Crystal Reports (*.rpt) in the File type list.
4. Select the file and click Open.
The report opens in the Reports Preview pane.
When a report includes more than one subtopic, a subtopic pane appears in the Preview pane. The
subtopic pane lists the subtopics found in the report. If you click a subtopic, the Preview pane
displays the first page of that section of the report.
To view a section of a primary report, select the subtopic you want to review. The Preview pane
displays the first page of that section in the report.
You can hide the subtopic pane in the View group by clicking Tree. The subtopic pane is hidden, as
shown below.
To restore the subtopic pane, click Tree again. The subtopic pane appears again.
Click or to move to the first or last page of the report. Click or to move to the previous or
next page of the report.
The Page field displays the page number currently active in the Preview frame, as well as the total
number of pages in the report. A plus (+) next to a page number indicates additional pages in the
report.
To determine how many pages are in the report, click in the toolbar. This takes you to the last page
of the report, forcing the console to determine how many pages there are. It also causes the + to
display the actual number of pages.
You can also use this feature to display a particular page of the report. In the Page box, enter a page
number you want to view and press Enter. The Preview frame displays your selected page.
1. Open the Reports application. See Open the SEM reports application for steps.
2. Click the Settings tab.
3. From the Category drop-down list, select Standard Reports or Custom Reports.
4. In the Report Title column, select the report that requires a schedule change, and then click
Schedule.
5. In the Report Scheduler Tasks window, select the report schedule you want to edit, and then
click Modify.
6. In the Scheduler window, edit the Task, Schedule, and Settings tabs as required.
To change the settings for a particular schedule, click the Schedule tab and select the schedule
you want to change. Use the boxes to change the settings, and then click Apply.
7. To close the window, click OK.
8. Make any additional changes to the Report Settings as required in the Report Schedule Tasks
window.
9. Click Save.
10. To close the Report Scheduler Tasks window, click Close.
Export a report
You can export a report from the Preview pane into several formats, including:
l Adobe Portable Document File (PDF)
l Crystal Reports RPT file
l HTML
l Microsoft Excel file
1. In the Reports window, open or run the report you want to export.
3. In the Format list, select the fine type to save the report.
The Description box at the bottom of the form describes your selected file format.
4. Use the Destination list to browse to the folder and save the file.
5. Click OK.
The system saves the file in your selected format to your destination folder.
Print reports
You can print any report displayed in the Preview pane.
1. In the Reports window, open or run the report you want to print.
The report appears in the Preview pane.
1. In the Reports window, open or run the report you want to print.
The report appears in the Preview pane.
2. On the View tab, click Printer Setup in the Preferences group.
3. In the Page Setup dialog box, select the appropriate options.
Schedule Description
Daily Run and review this report once each day.
As needed SolarWinds suggests that you run these reports only when needed for specific
auditing purposes, or when you need the details surrounding a Priority event or a
suspicious event.
As requested These reports are diagnostic tools and should only be run at the request of
SolarWinds' technical support personnel.
Authentication This report lists event events that are RPT2003-02-10.rpt As needed
Report - related to authentication and authorization
Authentication of accounts and account “'containers'”
Audit such as groups or domains. These events
can be produced from any network node
including firewalls, routers, servers, and
clients.
Authentication This report lists the Top User Log On RPT2003-02-6-2.rpt As needed
Report - Top User events grouped by user name.
Log On by User
Authentication This report lists the Top User Log On RPT2003-02-7-2.rpt As needed
Report - Top User Failure events grouped by user name.
Log On Failure by
User
Authentication This report shows logon, logoff, and logon RPT2003-02-8.rpt As needed
Report - failure activity to the SolarWinds Console.
SolarWinds
Authentication
Authentication This report lists all account logon events, RPT2003-02-6-1.rpt As needed
Report - User Log grouped by user name.
On by User
Authentication This report lists all account logon failure RPT2003-02-7-1.rpt As needed
Report - User Log events, grouped by user name.
On Failure by User
Change This report lists event events that occur RPT2006-20-01- As needed
Management - upon removal of a trust relationship 8.rpt
General between domains, deletion of a
Authentication: subdomain, or deletion of account
Domain Events - containers within a domain. Usually, these
Delete Domain changes are made by a user account with
administrative privileges.
Change This report lists event events that occur RPT2006-20-01- As needed
Management - when an account or account container has 3.rpt
General been removed from a domain. Usually,
Authentication: these changes are made by a user account
Domain Events - with administrative privileges, but
Delete Domain occasionally they occur when local system
Member maintenance activity takes place.
Change This report lists event events that happen RPT2006-20-01- As needed
Management - when the alias for a domain member has 5.rpt
General been changed. This means an account or
Authentication: account container within a domain has an
Domain Events - alias created, deleted, or otherwise
Domain Member modified. This event is uncommon and is
Alias used to track links between domain
members and other locations in the
domain where the member may appear.
Change This report lists event events that occur RPT2006-20-01- As needed
Management - upon creation of a new trust relationship 6.rpt
General between domains, creation of a new
Authentication: subdomain, or creation of new account
Domain Events - containers within a domain. Usually, these
New Domain creations are done by a user account with
administrative privileges.
Change This report lists event events that occur RPT2006-20-01- As needed
Management - when an account or an account container 2.rpt
General (a new user, machine, or service account)
Authentication: has been added to the domain. Usually,
Domain Events - these additions are made by a user
New Domain account with administrative privileges, but
Member occasionally they occur when local system
maintenance activity takes place.
Change This report lists event events that occur RPT2006-20-02- As needed
Management - when a group type is modified. Usually, 6.rpt
General these changes are made by a user account
Authentication: with administrative privileges, but
Group Events - occasionally they occur when local system
Change Group maintenance activity takes place.
Attribute
Change This report lists event events that occur RPT2006-20-02- As needed
Management - when an account or group has been 3.rpt
General removed from a group. Usually, these
Authentication: changes are made by a user account with
Group Events - administrative privileges, but occasionally
Delete Group they occur when local system
Member maintenance activity takes place.
File Audit Events This report tracks file system activity RPT2003-05.rpt Weekly
associated with audited files and system
objects, such as file access successes and
failures.
File Audit Events - File Attribute Change is a specific File RPT2003-05-41.rpt As needed
File Attribute Write event generated for the modification
Change of file attributes (including properties such
as read-only status). These events may be
produced by any tool that is used to
monitor the activity of file usage, including
a Host-Based IDS and some Operating
Systems.
File Audit Events - File Audit events are used to track file RPT2003-05-11.rpt As needed
File Audit activity on monitored network devices,
usually through the Operating System or a
Host-Based IDS. These events will note
success or failure of the requested
operation.
File Audit Events - File Audit Failure events are used to track RPT2003-05-12.rpt As needed
File Audit Failure failed file activity on monitored network
devices, usually through the Operating
System or a Host-Based IDS. These events
will note what requested operation failed.
File Audit Events - File Create is a specific File Write event RPT2003-05-42.rpt As needed
File Create generated for the initial creation of a file.
These events may be produced by any tool
that is used to monitor the activity of file
usage, including a Host-Based IDS and
some Operating Systems.
File Audit Events - File Data Write is a specific File Write event RPT2003-05-43.rpt As needed
File Data Write generated for the operation of writing data
to a file (not just properties or status of a
file). These events may be produced by
any tool that is used to monitor the activity
of file usage, including a Host-Based IDS
and some Operating Systems.
File Audit Events - File Delete is a specific File Write event RPT2003-05-44.rpt As needed
File Delete generated for the deletion of an existing
file. These events may be produced by any
tool that is used to monitor the activity of
file usage, including a Host-Based IDS and
some Operating Systems.
File Audit Events - File Execute is a specific File Read event RPT2003-05-32.rpt As needed
File Execute generated for the operation of executing
files. These events may be produced by
any tool that is used to monitor the activity
of file usage, including a Host-Based IDS
and some Operating Systems.
File Audit Events - File Handle Audit events are used to track RPT2003-05-21.rpt As needed
File Handle Audit file handle activity on monitored network
devices, usually through low level access
to the Operating System, either natively or
with or a Host-Based IDS. These events
will note success or failure of the
requested operation.
File Audit Events - File Handle Copy is a specific File Handle RPT2003-05-23.rpt As needed
File Handle Copy Audit event generated for the copying of
file handles. These events may be
generated by a tool that has low-level file
access, such as an Operating System or
some Host-Based IDS'.
File Audit Events - File Handle Open is a specific File Handle RPT2003-05-24.rpt As needed
File Handle Open Audit event generated for the opening of
file handles. These events may be
generated by a tool that has low-level file
access, such as an Operating System or
some Host-Based IDS'.
File Audit Events - File Link is a specific File Write event RPT2003-05-45.rpt As needed
File Link generated for the creation, deletion, or
modification of links to other files. These
events may be produced by any tool that is
used to monitor the activity of file usage,
including a Host-Based IDS and some
Operating Systems.
File Audit Events - File Move is a specific File Write event RPT2003-05-46.rpt As needed
File Move generated for the operation of moving a
file that already exists. These events may
be produced by any tool that is used to
monitor the activity of file usage, including
a Host-Based IDS and some Operating
Systems.
File Audit Events - File Write is a specific File Audit event RPT2003-05-47.rpt As needed
File Write generated for the operation of writing to a
file (including writing properties of a file or
changing the status of a file). These events
may be produced by any tool that is used
to monitor the activity of file usage,
including a Host-Based IDS and some
operating systems.
File Audit Events - Object Audit events are used to track RPT2003-05-51.rpt As needed
Object Audit special object activity on monitored
network devices, usually through the
Operating System or a Host-Based IDS.
Generally, Objects are special types of
system resources, such as registry items
or user account databases. These objects
may be actual 'files' on the system, but are
not necessarily human readable. These
events will note success or failure of the
requested operation.
File Audit Events - Object Audit Failure events are used to RPT2003-05-52.rpt As needed
Object Audit track special object activity on monitored
Failure network devices, usually through the
Operating System or a Host-Based IDS.
Generally, Objects are special types of
system resources, such as registry items
or user account databases. These objects
may be actual 'files' on the system, but are
not necessarily human readable. These
events will note a failure of the requested
operation.
File Audit Events - Object Link is a specific Object Audit event RPT2003-05-54.rpt As needed
Object Link generated for the creation, deletion, or
modification of links to other objects.
These events may be produced by any tool
that is used to monitor the activity of file
and object usage, including a Host-Based
IDS and some Operating Systems.
Inferred Events This report tracks events that are triggered RPT2006-27.rpt As needed
by correlations built in the SolarWinds Rule
Builder.
Inferred Events by This report tracks events that are triggered RPT2006-27-01.rpt As needed
Inference Rule by correlations, and orders them by the
correlation rule name.
Network Traffic This report lists all Application Traffic RPT2003-06-11- As needed
Audit - Application events (such as WebTrafficAudit), grouped 2.rpt
Traffic by by destination machine/IP.
Destination
Machine
Network Traffic This report lists all Application Traffic RPT2033-06-11- As needed
Audit - Application events (such as WebTrafficAudit), grouped 3.rpt
Traffic by Provider by provider SID.
SID
Network Traffic This report lists all Application Traffic RPT2003-06-11- As needed
Audit - Application events (such as WebTrafficAudit), grouped 1.rpt
Traffic by Source by source machine/IP.
Machine
Network Traffic This report lists all Core Traffic events RPT2003-06-03- As needed
Audit - Core Traffic (such as TCPTrafficAudit), grouped by 2.rpt
by Destination destination machine/IP.
Machine
Network Traffic This report lists all Core Traffic events RPT2003-06-03- As needed
Audit - Core Traffic (such as TCPTrafficAudit), grouped by 3.rpt
by Provider SID provider SID.
Network Traffic This report lists all Core Traffic events RPT2003-06-03- As needed
Audit - Core Traffic (such as TCPTrafficAudit), grouped by the 0.rpt
by Tool Alias SolarWinds tool sensor alias that reported
the event.
Network Traffic Link Control Traffic Audit events are RPT2003-06-05.rpt As needed
Audit - generated for network events related to
Link Control Traffic link level configuration. Link Control Traffic
Audit events generally indicate normal
traffic, however, events of this type could
also be symptoms of misconfiguration at
the link level, inappropriate usage, or other
abnormal traffic.
Network Traffic Members of the Network Audit tree are RPT2003-06-06.rpt As needed
Audit - Network used to define events centered on usage of
Traffic network resources/bandwidth.
Network Traffic Point To Point Traffic Audit events reflect RPT2003-06-07.rpt As needed
Audit - application-layer data related to point-to-
Point to Point point connections between hosts. Included
Traffic in Point To Point Traffic Audit are
encrypted and unencrypted point-to-point
traffic.
Network Traffic Routing Traffic Audit events are generated RPT2003-06-09.rpt As needed
Audit - Routing for network events related to configuration
Traffic of network routes, using protocols such as
IGMP, IGRP, and RIP. RoutingTrafficAudit
events generally indicate normal traffic,
however, events of this type could also be
symptoms of misconfigured routing,
unintended route configuration, or other
abnormal traffic.
Network Traffic This report lists the Top Application Traffic RPT2003-06-01- As needed
Audit - events (such as WebTrafficAudit), grouped 2.rpt
Top Application by source machine/IP.
Traffic by Source
Network Traffic This report lists all WebTrafficAudit events RPT2003-06-01- As needed
Audit - Web Traffic grouped by destination machine/IP. 2.rpt
by Destination
Machine
Network Traffic This report lists Web Traffic Audit events RPT2003-06-01- As needed
Audit - grouped by provider SID. 3.rpt
Web Traffic by
Provider SID
Network Traffic This report lists all WebTrafficAudit events RPT2003-06-01- As needed
Audit - Web Traffic grouped by source machine/IP. 1.rpt
by Source Machine
Network Traffic This report lists Web Traffic Audit events RPT2003-06-01- As needed
Audit - grouped by tool alias. 0.rpt
Web Traffic by
Tool Alias
Network Traffic This report lists the most frequently visited RPT2003-06-01- As needed
Audit - URLs grouped by the requesting client 5.rpt
Web URL Requests source machine.
by Source Machine
Resource Events that are part of the Auth Audit tree RPT2003-08-01.rpt As needed
Configuration - are related to authentication and
Authorization Audit authorization of accounts and account
containers such as groups or domains.
These events can be produced from any
network node including firewalls, routers,
servers, and clients.
Authentication This report shows logins to various Guest accounts. RPT2003- As needed
Report - Guest 02-2.rpt
Login
Console The Console report shows every event that passes RPT2003- As needed
through the system in the given time interval. It 10.rpt
mimics the basic management console view. It does
not contain the same level of field detail, but it is
useful to get a quick snapshot of activity for a period,
a lunch hour, for example. This report can be very
large, so you will only want to run for small time
intervals, such as hours.
Console - An overview of all events during the specified time RPT2003- As needed
Overview range. Shows graphs of the most common generic 10-00.rpt
event field data from the console report.
Event Summary Event Summary Sub Report - Authorization Audit RPT2003- As needed
- Authorization Statistics 01-03.rpt
Audit Statistics
Event Summary The event summary report gathers statistical data RPT2003- Daily
- from all major event categories, summarizes it with a 01.rpt
Graphs one-hour resolution, and presents a quick, graphical
overview of activity on your network.
Event Summary Event Summary Sub Report - Machine Audit Statistics RPT2003- As needed
- 01-05.rpt
Machine Audit
Statistics
Event Summary Event Summary Sub Report - Policy Audit Statistics RPT2003- As needed
- 01-06.rpt
Policy Audit
Statistics
Event Summary Event Summary Sub Report - Resource Audit Statistics RPT2003- As needed
- 01-07.rpt
Resource Audit
Statistics
Event Summary Event Summary Sub Report - Suspicious Behavior RPT2003- As needed
- Statistics 01-08.rpt
Suspicious
Behavior
Statistics
Event Summary Event Summary Sub Report - Top Level Statistics RPT2003- As needed
- 01-01.rpt
Top Level
Statistics
Machine Audit - This report tracks activity associated with file system RPT2003- As needed
File System audit events including mount file system and 09-010.rpt
Audit unmount file system events. These events are
generally normal system activity, especially during
system boot.
Machine Audit - Mount File System events are a specific type of File RPT2003- As needed
File System System Audit that reflect the action of creating an 09-012.rpt
Audit - Mount active translation between hardware to a usable files
File System system. These events are generally normal during
system boot.
Machine Audit - Unmount File System events are a specific type of File RPT2003- As needed
File System System Audit that reflect the action of removing a 09-013.rpt
Audit - Unmount translation between hardware and a usable files
File System system. These events are generally normal during
system shutdown.
Machine Audit - This report tracks activity related to processes, RPT2003- As needed
Process Audit including processes that have started, stopped, or 09-030.rpt
reported useful process-related information.
Machine Audit - This report lists Process Audit events that are RPT2003- As needed
Process Audit - generated to track launch, exit, status, and other 09-031.rpt
Process Audit events related to system processes. Usually, these
events reflect normal system activity. Process-related
activity that may indicate a failure will be noted
separately from normal activity in the event detail.
Machine Audit - Process Info is a specific type of Process Audit event RPT2003- As needed
Process Audit - that reflects information related to a process. Most of 09-032.rpt
Process Info these events can safely be ignored, as they are
generally normal activity that does not reflect a failure
or abnormal state.
Machine Audit - Process Stop is a specific type of Process Audit event RPT2003- As needed
Process Audit - that indicates a process has exited. Usually, Process 09-034.rpt
Process Stop Stop reflects normal application exit, however in the
event of an unexpected error the abnormal state will
be noted.
Machine Audit - Process Warning is a specific type of Process Audit RPT2003- As needed
Process Audit - event that indicates a process has returned a 09-035.rpt
Process 'Warning' message that is not a fatal error and may
Warning not have triggered an exit of the process.
Machine Audit - This report tracks activity related to services, RPT2003- As needed
Service Audit including services that have started, stopped, or 09-040.rpt
reported useful service-related information or
warnings.
Machine Audit - This report tracks ServiceInfo events, which reflect RPT2003- As needed
Service Audit - information related to a particular service. Most of 09-041.rpt
Service Info these events can safely be ignored, as they are
generally normal activity that does not reflect a failure
or abnormal state.
Machine Audit - This report tracks ServiceStart events, which indicate RPT2003- As needed
Service Audit - that a new system service is starting. 09-042.rpt
Service Start
Machine Audit - This report tracks ServiceStop events, which indicate RPT2003- As needed
Service Audit - that a system service is stopping. This activity is 09-043.rpt
Service Stop generally normal, however, in the event of an
unexpected stop the abnormal state will be noted.
Machine Audit - This report lists ServiceWarning events. These events RPT2003- As needed
Service Audit - indicate a service has returned a Warning message 09-044.rpt
Service Warning that is not a fatal error and may not have triggered an
exit of the service.
Machine Audit - This report tracks activity associated with system RPT2003- As needed
System Audit status and modifications, including software changes, 09-020.rpt
system reboots, and system shutdowns.
Machine Audit - System Reboot events occur on monitored network RPT2003- As needed
System Audit - devices (servers, routers, etc.) and indicate that a 09-022.rpt
System Reboot system has restarted.
Machine Audit - System shutdown events occur on monitored network RPT2003- As needed
System Audit - devices (servers, routers, etc.) and indicate that a 09-023.rpt
System system has been shutdown.
Shutdown
Machine Audit - SystemStatus events reflect general system state RPT2003- As needed
System Audit - events. These events are generally normal and 09-024.rpt
System Status informational, however, they could potentially reflect a
failure or issue which should be addressed.
Machine Audit - This report tracks activity associated with USB- RPT2003- As needed
USB-Defender Defender, including insertion and removal events 09-050.rpt
related to USB Mass Storage devices.
Malicious Code This report tracks event activity associated with RPT2003- Weekly
malicious code such as virus, Trojans, and worms, 04.rpt
both on the network and on local machines, as
detected by anti-virus software.
Malicious Code Trojan Command Access events reflect malicious or RPT2003- As needed
- Trojan abusive usage of network resources where the 04-05.rpt
Command intention, or the result, is gaining access to resources
Access through malicious code commonly known as Trojan
Horses. This event detects the communication related
to Trojans sending commands over the network
(infecting other clients, participating in a denial of
service activity, being controlled remotely by the
originator, etc.). Trojans are generally executables
that generally require no user intervention to spread
and contain malicious code that is placed on the
client system and used to exploit the client (and return
access to the originator of the attack) or exploit other
clients (used in attacks such as distributed denial of
service attacks).
Malicious Code Trojan Infection Access events reflect malicious or RPT2003- As needed
- Trojan abusive usage of network resources where the 04-04.rpt
Infection intention, or the result, is gaining access to resources
Access through malicious code commonly known as a Trojan
Horse. This event detects the infection traffic related
to a Trojan entering the network (generally with intent
to infect a client). Trojans are generally executables
that generally require no user intervention to spread
and contain malicious code that is placed on the
client system and used to exploit the client (and return
access to the originator of the attack) or exploit other
clients (used in attacks such as distributed denial of
service attacks).
Malicious Code Trojan Traffic Denial events are a specific type of RPT2003- As needed
Report - Trojan Denial event where the transport of the malicious or 04-03.rpt
Traffic Denial abusive usage originates with malicious code on a
client system known as a Trojan. The intent, or the
result, of this activity is inappropriate or abusive
access to network resources through a denial of
service attack. Trojan Traffic Denial events may be
attempts to exploit weaknesses in software to gain
access to a host system, attempts to exploit
weaknesses in network infrastructure equipment to
enumerate or reconfigure devices, attempts to spread
the Trojan to other hosts, or other denial of service
activities.
Malicious Code Virus Attack events reflect malicious code placed on a RPT2003- As needed
Report - Virus client or server system, which may lead to system or 04-06.rpt
Attack other resource compromise and may lead to further
attack. The severity of this event will depend on the
ActionTaken field, which reflects whether the virus or
other malicious code was successfully removed.
Malicious Code Virus Traffic Access events reflect malicious or RPT2003- As needed
Report - Virus abusive usage of network resources where the 04-08.rpt
Traffic Access intention, or the result, is gaining access to resources
through malicious code commonly known as viruses.
This event detects the communication related to
viruses over the network (generally, the spread of a
virus infection or an incoming virus infection). Viruses
are generally executables that require user
intervention to spread, contain malicious code that is
placed on the client system, and are used to exploit
the client and possibly spread itself to other clients.
Network Events: This report tracks activity associated with top-level RPT2003- As needed
Attack Behavior NetworkAttack events. 11-00.rpt
Network Events: This report shows malicious asset access via the RPT2003- Weekly
Attack Behavior network. For example, attacks on FTP or Windows 11.rpt
- Access Network servers, malicious network database access,
abuses of services, or attempted unauthorized entry.
Network Events: Children of the Access tree define events centered on RPT2003- As needed
Attack Behavior malicious or abusive usage of network 11-01.rpt
- Access - bandwidth/traffic where the intention, or the result, is
Access inappropriate or abusive access to network resources.
Network Events: Core Access events reflect malicious or abusive RPT2003- As needed
Attack Behavior usage of network resources where the intention, or 11-04.rpt
- Access - Core the result, is gaining access to resources where the
Access related data is mostly or all core protocols (TCP, UDP,
IP, ICMP). Generally, CoreAccess events will reflect
attempted exploitation of weaknesses in network
protocols or devices with intent to gain access to
servers, clients, or network infrastructure devices.
Network Events: Database Access events reflect malicious or abusive RPT2003- As needed
Attack Behavior usage of network resources where the intention, or 11-05.rpt
- Access - the result, is gaining access to resources via
Database application-layer database traffic. Generally, these
Access events will reflect attempted exploitation of
weaknesses in database server or client software.
Network Events: File Transfer Access events reflect malicious or RPT2003- As needed
Attack Behavior abusive usage of network resources where the 11-07.rpt
- Access - File intention, or the result, is gaining access to resources
Transfer via application-layer file transfer traffic. Generally,
these events will reflect attempted exploitation of
weaknesses in file transfer server or client software.
Network Events: Link Control Access events reflect malicious or RPT2003- As needed
Attack Behavior abusive usage of network resources where the 11-08.rpt
- Access - Link intention, or the result, is gaining access to resources
Control Access where the related data is low-level link control (using
protocols such as ARP). Generally, Link Control
Access events will reflect attempted exploitation of
weaknesses in switching devices by usage of
malformed incoming or outgoing data, with intent to
enumerate or gain access to or through switching
devices, clients that are also on the switching device,
and entire networks attached to the switching device.
In some cases, a managed switch with restrictions on
port analyzing activity may be forced into an
unmanaged switch with no restrictions - allowing a
malicious client to sniff traffic and enumerate or
attack.
Network Events: Mail Access events reflect malicious or abusive usage RPT2003- As needed
Attack Behavior of network resources where the intention, or the 11-09.rpt
- Access - Mail result, is gaining access to resources via application-
Access layer mail transfer, retrieval, or service traffic.
Generally, these events will reflect attempted
exploitation of weaknesses in mail-related server or
client software.
Network Events: News Access events reflect malicious or abusive RPT2003- As needed
Attack Behavior usage of network resources where the intention, or 11-11.rpt
- Access - News the result, is gaining access to resources via
Access application-layer news traffic (over protocols such as
NNTP). Generally, these events will reflect attempted
exploitation of weaknesses in the news server or
client software.
Network Events: Point To Point Access events reflect malicious or RPT2003- As needed
Attack Behavior abusive usage of network resources where the 11-12.rpt
- Access - Point intention, or the result, is gaining access to resources
to Point Access via point to point traffic (using protocols such as
PPTP). Generally, these events will reflect attempted
exploitation of weaknesses in point to point server or
client software, attempts to enumerate networks, or
attempts to further attack devices on trusted
networks.
Network Events: Printer Access events reflect malicious or abusive RPT2003- As needed
Attack Behavior usage of network resources where the intention, or 11-13.rpt
- Access - the result, is gaining access to resources via
Printer Access application-layer remote printer traffic. Generally,
these events will reflect attempted exploitation of
weaknesses in the remote printer server or client
software.
Network Events: Remote Console Access events reflect malicious or RPT2003- As needed
Attack Behavior abusive usage of network resources where the 11-14.rpt
- Access - intention, or the result, is gaining access to resources
Remote via application-layer remote console service traffic
Console Access (services such as telnet, SSH, and terminal services).
Generally, these events will reflect attempted
exploitation of weaknesses in the remote console
server or client software.
Network Events: Routing Access events reflect malicious or abusive RPT2003- As needed
Attack Behavior usage of network resources where the intention, or 11-16.rpt
- Access - the result, is gaining access to resources where the
Routing Access related data is routing-related protocols (RIP, IGMP,
etc.). Generally, Routing Access events will reflect
attempted exploitation of weaknesses in routing
protocols or devices with intent to enumerate or gain
access to or through routers, servers, clients, or other
network infrastructure devices. These routing
protocols are used to automate the routing process
between multiple devices that share or span
networks.
Network Events: Time Access events reflect malicious or abusive RPT2003- As needed
Attack Behavior usage of network resources where the intention, or 11-17.rpt
- Access - Time the result, is gaining access to resources via
Access application-layer remote time service traffic (using
protocols such as NTP). Generally, these events will
reflect attempted exploitation of weaknesses in the
remote time server or client software.
Network Events: Virus Traffic Access events reflect malicious or RPT2003- As needed
Attack Behavior abusive usage of network resources where the 11-19.rpt
- Access - Virus intention, or the result, is gaining access to resources
Traffic Access through malicious code commonly known as viruses.
Generally, these events will reflect attempted
exploitation of weaknesses in the web server or client
software.
Network Events: Track activity associated with network denial or relay RPT2003- Weekly
Attack Behavior attack behaviors. This report shows malicious asset 12.rpt
- Denial / Relay relay attempts and denials of service via the network.
For example, FTP bouncing, Distributed Denial of
Service events, and many protocol abuses.
Network Events: Application Denial events are a specific type of Denial RPT2003- As needed
Attack Behavior event where the transport of the malicious or abusive 12-01.rpt
- Denial / Relay - usage is application-layer protocols. The intent, or the
Application result, of this activity is inappropriate or abusive
Denial access to network resources through a denial of
service attack. Application Denial events may be
attempts to exploit weaknesses in software to gain
access to a host system, attempts to exploit
weaknesses in network infrastructure equipment to
enumerate or reconfigure devices, or other denial of
service activities.
Network Events: Configuration Denial events are a specific type of RPT2003- As needed
Attack Behavior Denial event where the transport of the malicious or 12-02.rpt
- Denial / Relay - abusive usage is protocols related to configuration of
Configuration resources (DHCP, BootP, SNMP, etc.). The intent, or
Denial the result, of this activity is inappropriate or abusive
access to network resources through a denial of
service attack. ConfigurationDenial events may be
attempts to exploit weaknesses in configuration-
related software to gain access to a host system,
attempts to exploit weaknesses in network
infrastructure equipment to enumerate or reconfigure
devices, or other denial of service activities.
Network Events: Children of the Denial tree define events centered on RPT2003- As needed
Attack Behavior malicious or abusive usage of network 12-04.rpt
- Denial / Relay - bandwidth/traffic where the intention, or the result, is
Denial inappropriate or abusive access to network resources
through a denial of service attack.
Network Events: File System Denial events are a specific type of Denial RPT2003- As needed
Attack Behavior event where the transport of the malicious or abusive 12-05.rpt
- Denial / Relay - usage is remote file system-related protocols (NFS,
File System SMB, etc.). The intent, or the result, of this activity is
Denial inappropriate or abusive access to network resources
through a denial of service attack. File System Denial
events may be attempts to exploit weaknesses in
remote file system services or software to gain
access to a host system, attempts to exploit
weaknesses in network infrastructure equipment to
enumerate or reconfigure devices, or other denial of
service activities.
Network Events: File Transfer Denial events are a specific type of RPT2003- As needed
Attack Behavior Denial event where the transport of the malicious or 12-06.rpt
- Denial / Relay - abusive usage is application-layer file transfer-related
File Transfer protocols (FTP, TFTP, etc.). The intent, or the result, of
Denial this activity is inappropriate or abusive access to
network resources through a denial of service attack.
FileTransferDenial events may be attempts to exploit
weaknesses in file transfer-related software to gain
access to a host system, attempts to exploit
weaknesses in the software to enumerate or
reconfigure, or other denial of service activities.
Network Events: MailDenial events are a specific type of Denial event RPT2003- As needed
Attack Behavior where the transport of the malicious or abusive usage 12-08.rpt
- Denial / Relay - is application-layer mail-related protocols (SMTP,
Mail Denial IMAP, POP3, etc.) or services (majordomo, spam
filters, etc.). The intent, or the result, of this activity is
inappropriate or abusive access to network resources
through a denial of service attack. MailDenial events
may be attempts to exploit weaknesses in mail-
related software to gain access to a host system,
attempts to exploit weaknesses in the software to
enumerate or reconfigure, or other denial of service
activities.
Network Events: Children of the Relay tree define events centered on RPT2003- As needed
Attack Behavior malicious or abusive usage of network 12-09.rpt
- Denial / Relay - bandwidth/traffic where the intention, or the result, is
Relay relaying inappropriate or abusive access to other
network resources (either internal or external).
Generally, these attacks will have the perimeter or an
internal host as their point of origin. When sourced
from remote hosts, they may indicate a successful
exploit of an internal or perimeter host.
Network Events: Routing Denial events are a specific type of Denial RPT2003- As needed
Attack Behavior event where the transport of the malicious or abusive 12-11.rpt
- Denial / Relay - usage is routing-related protocols (RIP, IGMP, etc.).
Routing Denial The intent, or the result, of this activity is inappropriate
or abusive access to network resources through a
denial of service attack. Routing Denial events may be
attempts to exploit weaknesses in routers or routing
software to gain access to a host system, attempts to
exploit weaknesses in the routing software or service
to enumerate or reconfigure, or other denial of service
activities.
Network Events: Web Denial events are a specific type of Denial event RPT2003- As needed
Attack Behavior where the transport of the malicious or abusive usage 12-12.rpt
- Denial / Relay - is application-layer web-related protocols (HTTP,
Web Denial HTTPS, etc.) or services (CGI, ASP, etc.). The intent, or
the result, of this activity is inappropriate or abusive
access to network resources through a denial of
service attack. Web Denial events may be attempts to
exploit weaknesses in web-related software to gain
access to a host system, attempts to exploit
weaknesses in the software to enumerate or
reconfigure, or other denial of service activities.
Network Events: Banner Grabbing Enumerate events reflect attempts RPT2003- As needed
Suspicious to gather information about target hosts, or services 07-02.rpt
Behavior - on target hosts, by sending a request which will elicit
Banner a response containing the host or service's 'banner'.
Grabbing This 'banner' contains information that may provide a
Enumerate potential attacker with such details as the exact
application and version running behind a port. These
details could be used to craft specific attacks against
hosts or services that an attacker may know will work
correctly the first time - enabling them to modify their
methodology go on relatively undetected.
Network Events: General Security events are generated when a RPT2003- As needed
Suspicious supported product outputs data that has not yet been 07-17.rpt
Behavior - normalized into a specific event, but is known to be
General Security security issue-related.
Network Events: ICMP Query events reflect attempts to gather RPT2003- As needed
Suspicious information about specific target hosts, or networks, 07-07.rpt
Behavior - ICMP by sending ICMP-based queries that will elicit
Query responses that reveal information about clients,
servers, or other network infrastructure devices. The
originating source of the scan is generally attempting
to acquire information that may reveal more than
normal traffic to the target would, such as operating
system information and other information that a
probe may discover without enumeration of the
specific services or performing attack attempts.
These scans generally do not occur across entire
networks, contain many sequential ICMP packets, and
generally have the intent of discovering operating
system and application information which may be
used for further attack preparation.
Network Events: Members of the NetworkSuspicious tree are used to RPT2003- As needed
Suspicious define events regarding suspicious usage of network 07-09.rpt
Behavior - bandwidth/traffic. These events include unusual
Network traffic and reconnaissance behavior detected on
Suspicious network resources.
Network Events: Children of the Recon tree reflect suspicious network RPT2003- As needed
Suspicious behavior with intent of gathering information about 07-11.rpt
Behavior - target clients, networks, or hosts. Reconnaissance
Recon behavior may be valid behavior on a network,
however, only as a controlled behavior in small
quantities. Invalid reconnaissance behavior may
reflect attempts to determine security flaws on
remote hosts, missing access control policies that
allow external hosts to penetrate networks, or other
suspicious behavior that results in general
information gathering without actively attacking.
Network Events: Scan events reflect attempts to gather information RPT2003- As needed
Suspicious about target networks, or specific target hosts, by 07-13.rpt
Behavior - Scan sending scans which will elicit responses that reveal
information about clients, servers, or other network
infrastructure devices. The originating source of the
scan is generally attempting to acquire information
that may reveal more than normal traffic to the target
would, information such as a list of applications
listening on ports, operating system information, and
other information that a probe may discover without
enumeration of the specific services or performing
attack attempts.
Network Events: Trojan Scanner events reflect attempts of Trojans on RPT2003- As needed
Suspicious the network to gather information about target 07-15.rpt
Behavior - networks, or specific target hosts, by sending scans
Trojan Scanner which will elicit responses that reveal information
about the host. The originating Trojan source of the
scan is generally attempting to acquire information
that will reveal whether a target host or network has
open and available services for further exploitation,
whether the target host or network is alive, and how
much of the target network is visible. A Trojan may
run a scan before attempting an attack operation to
test potential effectiveness or targeting information.
Network Events: Unusual Traffic events reflect suspicious behavior on RPT2003- As needed
Suspicious network devices where the traffic may have no known 07-16.rpt
Behavior - exploit, but is unusual and could be potential
Unusual Traffic enumerations, probes, fingerprints, attempts to
confuse devices, or other abnormal traffic. Unusual
Traffic may have no impending response, however, it
could reflect a suspicious host that should be
monitored closely.
Priority Event By This report is no longer in use. This report mirrors the RPT2003- As needed
User (reference) standard Priority Event report but groups the events 17.rpt
received by Console User account. The same event
may be seen by many users, so this report tends to be
much larger than the standard Priority Event report.
Rule The Rule Subscriptions report tracks those events that RPT2006- Daily
Subscriptions the user has subscribed to monitor. 28-01.rpt
by User
SolarWinds The SolarWinds Action Report lists all commands or RPT2003- As needed
Actions actions initiated by SolarWinds Network Security. 18.rpt
List of Rules This report lists available rules for the Rule RPT2006- As needed
for Rule Subscriptions. 29-02.rpt
Subscriptions
List of This report lists the rules that users have subscribed RPT2006- As needed
Subscription to. 29-03.rpt
Rules by User
List of Users This report lists each user entered. Currently, the users RPT2006- As needed
are only used for Rule Subscriptions. 29-01.rpt
See Log in to the SEM CMC command line interface for login steps and information about
credentials and SSH access restrictions.
Character Example
Capital letters ABCDEFGHIJKLMNOPQRSTUVWXYZ
Numerals 0123456789
See About the CMC command line in SEM for information about using the CMC command line.
Command Description
appliance Displays the appliance menu to run network and system commands on the
SEM VM. You can activate the VM, configure network parameters, and change
the CMC password. See SEM CMC appliance menu for more information.
manager Displays the manager menu where you can run upgrade and debug commands
on the SEM Manager. You can install a SEM hotfix, start and stop the SEM
Manager service, and import a certificate used for desktop console
communication. See SEM CMC manager menu for more information.
service Displays the service menu to run restrictions and SSH. You can start and
stop the SSH Service and restrict access to the reports application by IP
address or host name. See SEM CMC service menu for more information.
rawlogs Displays the rawlogs menu to run nDepth configuration and maintenance
commands.
Command Description
upgrade Installs the SEM upgrade package that you will use to upgrade your SEM VM.
This command functions the same as the hotfix command.
admin Opens the admin command-line interface in the Lynx text browser.
import Imports a keytab file from Active Directory into SEM. This file is required to
configure SEM for Active Directory single sign-on. See Set up single sign-on
(SSO) in SEM for details.
help Displays the Help menu.
exit Exits the CMC management console.
See About the CMC command line in SEM for information about using the CMC command line.
Type the appliance command at the main menu to open the cmc::appliance> prompt. Commands
available from the appliance menu are listed in the following table in alphabetical order.
Y in the "Restart Required" column indicates that a command requires an automatic restart of the
SEM Manager service. See Starting and Stopping SEM components for help.
diskusageconfig Sets the SEM Manager disk usage limit by the percentage N
of unavailable disk space or the amount of free disk space.
editbanner Edits the SSH login banner. N
exit Exits the appliance menu and returns to the main menu. N
exportsyslog Exports the system logs. N
hostname Changes the hostname of the SEM VM. N
See About the CMC command line in SEM for information about using the CMC command line.
Type the manager command at the main menu to open the cmc::manager> prompt. Commands
available from the manager menu are listed in the following table in alphabetical order. Y in the
Restart Required column indicates a command requires an automatic restart of the SEM Manager
service. See Starting and Stopping SEM components for help.
See About the CMC command line in SEM for information about using the CMC command line.
Type the service command at the main menu to open the cmc::service> prompt. Commands
available from the service menu are listed in the following table in alphabetical order. Y in the "Restart
Required" column indicates that a command requires an automatic restart of the SEM Manager
service. See Starting and Stopping SEM components for help.
restartssh Restarts the SSH service. If the SSH service is running, this N
command stops and then restarts the service.
restrictconsole Restricts access to the SEM console to only certain IP N
addresses or hostnames. This command prompts you to
provide the IP addresses or hostnames that should be
allowed access. Once the restriction is in place, only the
listed IP addresses or hostnames can connect to the SEM
console. Also see unrestrictconsole.
restrictreports Restricts access to reports to only certain IP addresses or N
hostnames. This command prompts you to provide the IP
addresses or hostnames that should be allowed access.
Once the restriction is in place, only the listed IP addresses
or hostnames can create and view reports. Also see
unrestrictreports.
Type the rawlogs command at the main menu to open the cmc::rawlogs> prompt. Commands
available from the rawlogs menu are listed in the following table in alphabetical order. Y in the
"Restart Required" column indicates that a command requires an automatic restart of the SEM
Manager service. See Starting and Stopping SEM components for help.
SEM troubleshooting
Additional troubleshooting topics:
l SEM reboot for troubleshooting
l Troubleshoot Network Devices Logging to SEM
l How to Troubleshoot Syslog Nodes in SolarWinds Log & Event Manager - Video
l How-To Use Log & Event Manager to Troubleshoot Network Issues - Video
l Startup errors display after increasing the SEM disk size
Typically, unmatched data and internal new connector data alerts indicate that one or more of the
connectors on the SEM VM or appliance cannot properly normalize the associated log data.
1. Ensure that your syslog devices are sending logs to a syslog facility on your SEM appliance.
2. Determine which devices are logging to each facility, and whether those devices conflict with
each another.
3. Ensure that your SEM Agent connectors, such as Windows-based and database connectors are
running correctly.
4. Apply the latest connector update package.
5. Generate a syslog sample from the SEM appliance, and then open a ticket with SolarWinds
Technical Support for further assistance.
1. Verify the connector and device are pointed at the same local facility.
2. Check the configuration on your device to determine what local facility it is logging to on your
SEM appliance. In some cases, you cannot modify this setting.
For additional information, search for your device in the SolarWinds Success Center.
Except for CheckPoint firewall, the SEM receives UDP syslog data on port 514.
3. Verify that the connector is pointed to the same logging facility as the device.
a. On the SEM Console, navigate to Configure > Manager Connectors.
b. Under Configured connectors, locate the connector in the list.
c. Select the configured connector, and then click Edit.
d. View its details, and verify the Log File value matches the output value in the device
configuration.
4. If the device and connector configurations do not match, point the connector to the appropriate
location.
a. Select the configured connector, and then click Stop.
b. Click Edit, and then change the Log File value so it matches your device.
c. Click Save, and then click Start.
1. Open the CMC command line. See Log in to the SEM CMC command line interface for steps.
2. At the cmc> prompt, type appliance.
6. If two or more devices are logging to the same facility, see Troubleshoot conflicting devices"
below to determine whether those devices conflict with each other.
SolarWinds recommends splitting the devices and vendors to different facilities. Having all
devices pointed at one facility with multiple connectors reading that facility will impact your
SEM performance.
Group Devices
Group 1 Cisco ASA
Cisco IOS
Cisco PIX
1. Verify the connector is pointing to the appropriate folder or event log.
2. Check the configuration on the host computer to determine which folder or event log it is
logging in to.
In some cases, you cannot modify this setting. For additional information, search the
SolarWinds Success Center for your device.
3. Verify that the connector is pointed to the same folder or event log as the device:
a. On the SEM Console, navigate to Configure > Nodes.
b. Under Refine Results, expand the Type group, and then select the Agent check box.
c. Select the SEM Agent for the host computer, and then click Manage node connectors.
d. Locate the configured connector in the list.
e. Select the configured connector, and then click edit.
f. View its details, and ensure the Log File value matches the output value in the host
computer configuration.
4. If the host computer and connector configurations do not match, point the connector to the
appropriate location:
a. Select the configured connector, and then click Stop.
b. Click Edit, and then change the Log File value so it matches your device.
c. Click Save, and then click Start.
Determine if SEM is receiving data from the device that you are
troubleshooting
SolarWinds recommends starting with this task before moving on to the other troubleshooting tasks.
1. Open the CMC command line. See Log in to the SEM CMC command line interface for steps.
2. At the cmc> prompt, enter:
appliance
See also:
l Troubleshoot devices not logging to a log file " below
l Troubleshoot devices logging to a log file " on the facing page
1. Ensure that the device is configured to log to the SEM appliance.
2. Ensure that the device is logging to the correct IP address for the SEM appliance.
3. If the device sends SNMP traps to the SEM appliance, ensure that the SEM Manager is
configured to accept SNMP traps.
See Enable SEM to receive SNMP traps by turning on the SNMP Trap Logging Service for
details.
4. Ensure that a firewall is not blocking data communications between the device and the SEM
appliance.
1. Ensure that the appropriate connector is configured on the SEM appliance.
2. Ensure that your configured connector is running.
3. If the connector is running, delete and recreate the connector instance.
See also:
l Troubleshoot SEM Agent connections, 64-bit in the SolarWinds Customer Success Center
l Troubleshoot SEM Agent connections, 32-bit in the SolarWinds Customer Success Center
https://support.solarwinds.com/Success_Center
If you are running a 32-bit Windows system, send the following files to SolarWinds Customer Support:
l C:\Windows\System32\ContegoSPOP\spoplog.txt (the most recent version)
l C:\Windows\ System32\ContegoSPOP\tools\readerState.xml
If you are running a 64-bit Windows system, send the following files to SolarWinds Customer Support:
l C:\Windows\SysWOW64\ContegoSPOP\spoplog.txt (the most recent version)
l C:\Windows\SysWOW64\ContegoSPOP\tools\readerState.xml
If your devices are configured correctly and your SEM appliance is still not receiving syslog data,
identify the facilities that are collecting log data. When you complete this process, configure the
appropriate connector from the facility to the log device so Security Event Manager can normalize and
monitor this information in the SEM Manager.
See your hypervisor documentation for information about using the virtual console.
1. Open the CMC command line. See Log in to the SEM CMC command line interface for steps.
2. At the cmc> prompt, type Appliance.
The appliance displays all facilities receiving logs from syslog devices, such as firewalls,
routers, and switches.
In this example, 1, 12, and 18 are active syslog facilities because they contain stored log data.
Facilities 13, 15, 16, and 17 are inactive because their syslog log files are empty.
4. Match a facility with a monitored device.
a. Choose a facility number and record the local number (such as local2) for a future step.
b. Enter your chosen facility number (for example, 14 for local2), and then press Enter.
c. Enter b or E to view the beginning or end of the log file, respectively, and press Enter.
d. Enter the number of lines to display on your screen, and then press Enter.
local1 /var/log/local1.log
local3 /var/log/local3.log
local4 /var/log/local4.log
local5 /var/log/local5.log
local6 /var/log/local6.log
local7 /var/log/local7.log
Sending the Reports could resolve and connect Confirm that the host name (or IP
authentication packet to the IP address, but could not address) is correct and allows
failed. Could not flush authenticate to the database server connections from the location
socket buffer. at that location. where you are running the reports
application.
Actor: A connector sub-type that can perform an active response. The actor connector allows the
Agent to receive instructions from the SEM Manager and perform active responses locally on the
Agent computer, for example, sending pop-up messages or detaching USB devices. On the SEM
Console, an orange connector icon represents an actor connector. Also see sensor.
Agent: In SEM, a software application that collects and normalizes log data before it is sent to the
SEM Manager. The Agent runs as a standalone service and provides additional event alerting on
workstations and servers. An Agent is required for some active responses, including logging off a
user, shutting down a computer, and detaching a USB device. SEM Agents use Secure Socket
Layer/Transport Layer Security (SSL/TLS) to securely transmit log data. Also see connector.
Agent node: In SEM, a single Agent, syslog, or SMTP instance that sends events to SEM. For example,
an environment with 10 routers, 50 switches, 5 firewalls, 300 servers, and 500 workstations has 865
nodes sending data to SEM Manager.
Appliance: Originally, SEM was sold as a physical appliance that you deployed on your network.
Today, SEM is the virtual image of a Linux-based appliance.
CMC: A command-line interface you can use to interact with the SEM Manager VM to perform routine
administrative tasks without root access.
Connector: In SEM, a connector is a stand-alone file that allows SEM to monitor and interact with
third-party vendor products, for example a firewall, an anti-virus application, a router, and so on. Each
connector is named after the specific product that it is designed to support.
Connectors can reside either on a SEM Agent, or on the SEM VM. Connectors installed on an Agent
monitor local log files, but they can also monitor events sent from remote devices that cannot run an
Agent. Connectors can intercept syslog events sent by third-party network devices and translate them
into normalized events. Whereas SEM Agents actively send normalized log events to the SEM
Manager, connectors rely on the host system to send syslog events to the SEM Manager.
Connectors have two subtypes: sensors and actors. A sensor retrieves data from the product that the
connector supports, whereas an actor carries out active responses.
Directory service group: In SEM, directory service groups are Windows users and computer accounts
that SEM pulls from Active Directory. You can associate directory service groups with rules and filters.
Use directory service groups if Active Directory is available so that you do not have to manually
update lists of user and computer accounts in user-defined groups.
Event: Any alert or notification written to a log that is monitored by SEM. In SEM, the terms event and
alert are interchangeable.
Event correlation: The process of extracting useful and/or significant information from the large
number of events flowing in to SEM. Event correlation works by looking for and analyzing
relationships between different event sources.
Event distribution policy: SEM's event distribution policy controls how events are routed through the
system. By configuring the event distribution policy, you can disable (or exclude) specific event types
at the event level from being sent to the SEM console and/or the SEM database. Use the event
distribution policy to prevent events of little or no value from being processed by the console or
stored in the database.
Event group: A group type used to organize events for use with rules and filters. If you use an event
group in a rule, SEM fires the rule when any event in the group triggers an alert.
Facility code: A numeric code specified by the syslog protocol to identify the type of program that is
logging the message. Sixteen facility codes, ranging from 0 (kernel messages) to 15 (clock daemon),
are reserved for known program types, whereas facility codes 16 through 23 are reserved for local use
(local use 0 up to local use 7). In SEM, facility codes are used to route vendor-specific events to
designated log files.
Filters: Filters capture events and alerts that take place on your network. Filter conditions can be
broad or specific. For example, you can create a filter without conditions that captures all events,
regardless of the source or event type, or you can create a filter that has one specific condition, such
as UserLogon Exists, which only captures user logon events. SEM ships with filters that support best
practices in the security industry. You can modify these filters to meet your needs.
Filter groups: Also called filter categories. Filter categories are used to organize filters in SEM. SEM
installs with seven default categories in the Filters pane: Overview, Security, IT Operations, Change
Management, Authentication, Endpoint Monitoring, and Compliance. Administrators can remove or
rename these categories, or add new categories as needed.
File Integrity Monitoring: Also called FIM. A SEM feature that monitors system and user file activity to
protect sensitive information from theft, loss, and malware. FIM detects changes to critical files and
registry keys to ensure that they are not accessed or modified by unauthorized users. FIM ensures
systems comply with regulatory regulations, including Payment Card Industry Data Security Standard
(PCI DSS), Health Insurance Portability and Accountability Act of 1996 (HIPAA), and Sarbanes-Oxley.
FIM is enabled either by adding a FIM connector to a node, or by adding FIM to an existing connector
profile.
Flat file log: Any log output to one or more ASCII-based text files. Systems that write to flat file logs
include Linux system logs, web server logs, DNS server logs, custom application logs, and others.
Groups: In SEM, groups organize related elements into logical units so that they can be used in rules
and filters. Various group types are used to group events, data elements (such as IP addresses, user
names, web site URLs, and so on), Active Directory users and computers, email templates, Agents and
connectors, and time-of-day sets.
Hypervisor: Computer software that runs virtual machines. The SEM VM can be installed on two
hypervisors: Microsoft Hyper-V Server, and VMware vSphere ESX 4.0 or ESXi 4.0 and later.
SEM Manager: The SEM component that collects and processes log messages sent by one or more
network systems. The SEM Manager consists of a syslog server, an optimized database, a web
server, a correlation engine, and a hardened Linux operating system. SEM Manager is deployed as a
single VM to a hypervisor (either Hyper-V or vSphere) running on Windows Server.
Local Agent Installer: A standalone installer that you or another administrator runs on a local host
system to install the SEM Agent. The Local Agent Installer can be used for attended or unattended
SEM Agent installations. Also see Remote Agent Installer.
NCR: An initialism for New Connector Request. An NCR is a request for SolarWinds to create a
connector for a system or application that does not have one.
NCD: An initialism for New Connector Data. An NCD is a request for SolarWinds to update an existing
connector to receive data that is either being missed or is coming in as unmatched.
nDepth search engine: The nDepth search engine can locate any event data, or any original log
message that passes through a particular SEM Manager instance. The log data is stored in real time
as it occurs from each host (network device) and source (application or tool) that is monitored by the
SEM Manager. You can use nDepth to conduct custom searches, investigate your search results with
graphical tools, investigate event data in other SEM explorer utilities, and take action on your findings.
Node: An Agent instance monitored by SEM. On the SEM Console, navigate to Configure > Nodes to
display the Agents monitored by each of your SEM Managers.
Normalization: The process by which SEM translates raw log data into a standard format prior to
storing the message in the database. The SEM Manager component and the SEM Agent component
are both capable of normalizing raw event messages received from devices on a network. If the
nDepth log retention feature is enabled, SEM also saves raw (unnormalized) log messages in a
separate nDepth data store.
Ops Center view: In the web console, the user interface view that provides a dashboard made up of
multiple widgets to help identify trends and problem areas in the network. Administrators can
customize the dashboard by adding, editing, and removing widgets.
raw log retention: The raw log retention component in SEM is a separate data store to which you can
send raw (unnormalized) log messages. The database is an optional component that is disabled by
default. To save raw log messages, you need to enable it. (Prior to 2020.4 this was called nDepth log
retention. Note that, other than the name, the nDepth log retention component was unrelated to the
nDepth search engine.)
Remote Agent Installer: A standalone installer that pushes SEM Agents to Microsoft Windows hosts
across your network without the need to step through an installation wizard. The installer unzips the
installation files to a temporary folder of your choice, searches for Windows systems across the
network, and installs the SEM Agent one at a time to the targeted systems. Also see Local Agent
Installer.
Reports application: An optional SEM component that can schedule and execute over 300 audit-
proven reports. Install the reports application on either a workstation or a separate networked server.
The SEM reports application requires the free Crystal Reports runtime application.
Roles: SEM uses roles to restrict user access to sensitive data. Each SEM user account must be
assigned to one of six SEM role types: Administrator, Auditor, Monitor, Contact, Guest, and Reports.
Rules: Rules monitor event traffic and automatically respond to events in real time. When an event (or
a series of events) meets a rule condition, the rule prompts the SEM Manager to carry out a response
action. A response action can be discreet, such as sending notifications to the appropriate users by
email; or it can be active, for example blocking an IP address or stopping a process.
Sensor: A connector sub-type that cannot perform an active response. On the SEM Console, a blue
connector icon represents a sensor connector. See also actor.
Severity: In the syslog protocol, severity is a numeric code used to specify the urgency of the
notification. Severity ranges from 0 (emergency: system is unusable) to 7 (debug: debug-level
messages).
SIEM: A category of software products and services that monitor and analyze security events
generated by applications and hardware devices on a network and send notifications when a set
threshold is reached. Security Event Manager (SEM) is a fully-featured SIEM solution. SIEM is an
initialism for security information and event management.
Single sign-on: SEM supports Active Directory single sign-on (SSO). When enabled, SEM does not
request a user name and password if the user is already logged in to Active Directory (AD). Instead,
AD authenticates the user in the background, and automatically logs the user in to SEM with the
appropriate user access rights.
SNMP, SNMP monitoring: Simple Network Management Protocol is used to collect information from
network devices. SEM can receive SNMP traps from SolarWinds solutions to correlate performance
alerts with SEM events. SEM can also send SNMP traps to SolarWinds solutions to enable NPM to
monitor CPU, memory, and other critical SEM components.
Syslog: A message logging protocol used by a wide range of devices, including most network devices,
such as routers, switches, and firewalls. Devices send event notification messages to a central
logging server (a syslog server) that consolidates logs from multiple sources. Syslog messages have
a numeric facility code that SEM uses to route messages to a log. to specify the type of program that
is logging the message, and a numeric severity level to specify the urgency of the notification.
Syslog server: A software application (such as Kiwi Syslog Server) that collects syslog messages and
SNMP traps from network devices (such as routers, switches, and firewalls).
USB defender: A free add-on for all SEM Agents installed on Windows computers. USB defender
tracks events related to USB mass storage devices like flash drives and smart phones, and allows the
SEM Manager to send commands to detach offending devices both manually and automatically.
User-defined group: User-defined groups are groups of data elements that can be used in rules and
filters to match, include, or exclude events, information, and data fields. Data elements can be IP
addresses, user names, email addresses, web site URLs, and so on.
Virtual appliance: A type of virtual machine that hosts a single application on a hypervisor. To keep
things simple, the SEM documentation refers to the SEM virtual appliance as the SEM virtual machine
(or the SEM VM). The SEM virtual appliance runs on a hardened, Linux-based software stack that
includes a database, a web server, a correlation engine, a syslog server and a SNMP trap receiver.
vSphere: A hypervisor distributed by VMware. The SEM virtual machine can be deployed on vSphere.
Widget: A user interface component that provides special dashboard functionality, such as displaying
real-time information about network activity, or providing tools for investigating events and related
details.