Role Availability | Read-Only | Investigator | Analyst | Manager |
After you initialize a new USM Anywhere Sensor, you must configure it in the Setup Wizard. As you complete the Hyper-V Sensor configuration, USM Anywhere performs specific actions, like running an asset discovery scan and collecting logs.
Accessing the Setup Wizard
The Setup Wizard is accessible under the following circumstances:
- After you first log in to the USM Anywhere web user interface (UI) and see the Welcome to USM Anywhere page, click Get Started to launch the Setup Wizard.
-
If you have already registered one USM Anywhere Sensor but did not complete the setup before logging out, the USM Anywhere Sensor Configuration page launches automatically at your next login to remind you to finalize configuration of the sensor. From that page, you click Configure to launch the Setup Wizard and complete the sensor configuration.
-
If you registered an additional USM Anywhere Sensor, but did not complete the setup, the Sensors page displays an error () in the Configured column. See Sensors Page Overview for more information.
Go to Data Sources > Sensors, and then click the sensor name to complete the sensor configuration. See USM Anywhere Sensor Management for more information.
Configuring the Sensor in the Setup Wizard
The first time you log in from the Welcome to USM Anywhere web page, the Setup Wizard prompts you to complete the configuration of the first deployed sensor. Thereafter, you can use the Sensors page to configure an additional sensor or to change the configuration options for a deployed sensor. See Sensors Page Overview for more information.
Note: You must have already configured your network interfaces for Hyper-V. See Set Up USM Anywhere on the Hyper-V Virtual Machine for more information.
Within the Setup Wizard, complete the configuration on each page.
When you move forward to Asset Discovery, a dialog box automatically opens and prompts you to allow asset scanning. USM Anywhere must discover your assets to enable security monitoring on them.
To complete the asset discovery task
-
Click Yes to start the automatic asset discovery.
Or if you prefer to add the assets manually or scan another network, click No and skip to the next step.
During the automated scan, the Scan Networks status bar opens and displays the number of assets detected in your network range.
When the scan stops, you have these options:
- Click Scan Another to scan a different set of assets
- Click Next to continue with asset discovery setup options
When the initial asset scan dialog box closes, the Asset Discovery page displays status information for an ongoing scan or any discovered assets for completed scans.
-
(Optional.) Add assets manually
Enter the name and IP address or fully qualified domain name (FQDN) to specify an asset for discovery. The scan option is selected by default. Click Save to add the asset.
You can repeat this for each individual asset you want to add.
-
(Optional.) Add assets by scanning network range
Click Scan Networks to scan a network range that you specify. This runs asset discovery to scan hosts and services running on the specified network range.
-
When all the needed assets are discovered, click Next at the bottom of the page.
The wizard opens the next page in the setup process, Active Directory.
The optional Active Directory (AD) Active Directory (AD) is a directory service that Microsoft developed for Windows domain networks. setup page configures USM Anywhere to collect information from your AD account. To monitor Microsoft Windows systems effectively, USM Anywhere needs access to the AD server to collect inventory information.
Note: This configuration is only for one AD server. If you want to scan different AD servers, you must create an AD scan job for each of them. See Scheduling Active Directory Scans from the Job Scheduler Page for more information.
LevelBlue recommends that you create a dedicated AD account with membership in the Domain Admins group to be used by USM Anywhere to log in to the Windows systems. You also need to activate Microsoft Windows Remote Management (WinRM) in the domain controller and in all the hosts that you want to scan. You can do this by using a group policy for all the systems in your AD.
Important: Before this feature is fully functional, you must configure access to the USM Anywhere Sensor on the AD server. See Granting Access to Active Directory for USM Anywhere for more information.
To complete the AD access configuration
-
Provide the AD credentials for USM Anywhere:
- Active Directory IP Address: Enter the IP address for the AD server.
- Username: Enter your username as admin of the account.
- Password: Enter your admin's password.
- Domain: Enter the domain for the AD instance.
-
Click Scan Active Directory.
After a successful launch of the scan, a confirmation dialog box opens.
-
Click Accept.
The scan continues in the background.
Upon completion, another dialog box opens and provides information about the number of assets USM Anywhere discovered. It also prompts you to decide if you want to scan for hosts and services running in your environment.
Click Cancel to opt out of this scan.
-
(Optional.) If you want to scan for other hosts and services, click OK.
-
Click Next after the scan ends.
The wizard opens the next page in the setup process, Network Security Monitoring.
The Network Security Monitoring page shows the status of the network interfaces monitored by the sensor (it could take a few moments to load the interfaces). All network adapters are configured for network monitoring by default.
You must manually enable port mirroring or port spanning Method of network monitoring in which a system passively collects network traffic on the same ports as other network devices., promiscuous mode Mode in which network IDS monitoring operates in passive listening mode, checking all IP packet traffic passing through it for threats., or both in a virtual switch to send a copy of the network traffic you want to analyze to these interfaces. This page provides links to documentation about how to configure your networking to allow for the interfaces to see the network traffic and perform network intrusion detection.
Note: You must have already configured your network interfaces for Hyper-V. See Set Up USM Anywhere on the Hyper-V Virtual Machine for more information.
USM Anywhere connectivity and communications are handled by the first network interface connection on the Network Security Monitoring page. This is the primary network that provides asset scanning and log collection for the particular network.
You can connect additional interfaces to other networks for monitoring, or connect them to individual vSwitch port groups for virtual networks. Each interface should be connected to a vSwitch that mirrors a different subnet within your network.
Use this page to verify that USM Anywhere can monitor your network traffic for security events.
Note: You can see red X icons next to the interfaces if the port mirroring or promiscuous mode is not configured. You might also see these icons if the network interfaces have not seen any traffic in the past 30 seconds.
To access detailed information about port mirroring set up
-
Click How do I set up port mirroring.
This opens a dialog box that can direct you to specific information about your VM.
If you have not yet set up port mirroring, see Direct Traffic from Your Physical Network to the Hyper-V Sensor for more information.
-
Click Next.
On the Log Management page are syslog port numbers. (These ports are the same for all USM Anywhere Sensors.)
USM Anywhere collects third-party device, system, and application data through syslog An industry standard message logging system that is used on many devices and platforms. over UDP on port 514 and over TCP on ports 601 or 602 by default. It collects Transport Layer Security (TLS)-encrypted Transport layer security. Successor to Secure Sockets Layer (SSL) protocol. Provides security for communication over the Internet between client and server applications. data through TCP on ports 6514 or 6515 by default. These ports support the RFC 3164 and RFC 5424 formats. To configure any third-party devices to send data to USM Anywhere, you must provide the IP address and the port number of your USM Anywhere Sensor.
To enable log collection and configure your log management
- Make sure that you have granted the necessary permissions for your OS to allow USM Anywhere to access its logs. You can also integrate a wide variety of data sources to send log data over syslog to the USM Anywhere Sensor.
To learn how to configure your operating systems and supported third-party devices to forward syslog log data, see the following related topics:
- The Syslog Server Sensor App: Log collection (UDP, TCP, and TLS-encrypted TCP) from rsyslog
- Collecting Linux System Logs: Log collection from a Linux system
- Collecting Windows System Logs: Log collection from a Windows system
- Go to the specific BlueApp in USM Anywhere for instructions about syslog forwarding
- When you have finished the log collection setup and integrated any needed plugins, verify that the data transfer is occurring.
- Click Next when this step is complete.
Note: Because the log scan can take some time, you might not see all of the automatically discovered log sources immediately after deploying the first USM Anywhere Sensor.
Use the Cloud Services page to configure USM Anywhere to collect information from any of the supported cloud services apps. These apps allow you to monitor and detect threats against your cloud services accounts, such as G Suite (Google Apps) and Office 365, directly from USM Anywhere. When configured , the BlueApp collects log data from via the cloud service API and analyzes that data against our built-in threat intelligence to look for anomalies and intrusions.
To setup cloud services in USM Anywhere
-
Select the BlueApp for each cloud service where you want to monitor activity.
-
Click Next.
USM Anywhere displays a configuration page for each cloud service you selected.
-
Complete the form for its configuration and click Save Credentials.
The following topics provide detailed information about these BlueApps:
-
Click Next. when this step is complete.
LevelBlue Labs™ Open Threat Exchange® (OTX™) is an open information-sharing and analysis network providing users with the ability to collaborate, research, and receive alerts on emerging threats and indicators of compromise (IoCs) such as IP addresses, file hashes, and domains.
You must have an OTX account to receive alerts based on threats identified in OTX. This account is separate from your USM Anywhere account. Go to The World’s First Truly Open Threat Intelligence Community to create an OTX account.
Note: If you do not already have an OTX account, click the Sign up link. This opens another browser tab or window that displays the OTX signup page. After you confirm your email address, you can log in to OTX and retrieve the unique API key for your account.
See Open Threat Exchange® and USM Anywhere for more information about OTX integration in USM Anywhere.
To enable USM Anywhere to evaluate event data against the latest OTX intelligence
- Log in to OTX and open the API page (https://otx.alienvault.com/api).
-
In the DirectConnect API Usage pane, click the icon to copy your unique OTX connection key.
-
Return to the Open Threat Exchange (OTX) page of the USM Anywhere Sensor Setup Wizard and paste the value in the OTX Key text box.
-
Click Validate OTX Subscription Key.
With a successful validation of the key, the status at the top of the page changes to "Valid OTX key".
- Click Next when this task is complete.
The Congratulations page summarizes the status of your configuration.
Click Start Using USM Anywhere, which takes you to the Overview dashboard.
Next...
Now is a great time to run a vulnerability scan. See Vulnerability Assessment for detailed information about running a vulnerability scan.