SlideShare a Scribd company logo
1 of 20
Download to read offline
Standard Content Guide
IPv6
ArcSight ESM 6.5c
October 11, 2013
Copyright © 2013 Hewlett-Packard Development Company, L.P.
Confidential computer software. Valid license from HP required for possession, use or copying. Consistent
with FAR 12.211 and 12.212, Commercial Computer Software, Computer Software Documentation, and
Technical Data for Commercial Items are licensed to the U.S. Government under vendor's standard
commercial license.
The information contained herein is subject to change without notice. The only warranties for HP products
and services are set forth in the express warranty statements accompanying such products and services.
Nothing herein should be construed as constituting an additional warranty. HP shall not be liable for
technical or editorial errors or omissions contained herein.
Follow this link to see a complete statement of copyrights and acknowledgements:
http://www.hpenterprisesecurity.com/copyright
Contact Information
Revision History
Phone A list of phone numbers is available on the HP ArcSight Technical
Support page: http://www8.hp.com/us/en/software-
solutions/software.html?compURI=1345981#.URitMaVwpWI.
Support Web Site http://support.openview.hp.com
Protect 724 Community https://protect724.arcsight.com
Date Product Version Description
10/11/2013 IPv6 content for
ArcSight ESM 6.5c
Final revision for release.
Confidential IPv6 Standard Content Guide 3
Contents
Chapter 1: IPv6 Overview ................................................................................................... 5
What is Standard Content? ............................................................................................... 5
Standard Content Packages .............................................................................................. 7
IPv6 Content .................................................................................................................. 7
Chapter 2: Installation and Configuration ........................................................................... 9
Installing the IPv6 Package ............................................................................................... 9
Configuring IPv6 Content ............................................................................................... 10
Chapter 3: IPv6 Use Case .................................................................................................. 11
Configuration ................................................................................................................ 11
Resources .................................................................................................................... 11
Index ...................................................................................................................................................... 19
Contents
4 IPv6 Standard Content Guide Confidential
Confidential IPv6 Standard Content Guide 5
Chapter 1
IPv6 Overview
This chapter discusses the following topics.
What is Standard Content?
Standard content is a series of coordinated resources (filters, rules, dashboards, reports,
and so on) that address common security and management tasks. Standard content is
designed to give you comprehensive correlation, monitoring, reporting, alerting, and case
management out-of-the box with minimal configuration. The content provides a full
spectrum of security, network, and configuration monitoring tasks, as well as a
comprehensive set of tasks that monitor the health of the system.
Standard content is installed using a series of packages, some of which are installed
automatically with the ArcSight Manager to provide essential system health and status
operations. The remaining packages are presented as install-time options organized by
category.
Standard content consists of the following:
 ArcSight Core Security content is installed automatically with the ArcSight Manager
and consists of key resources for monitoring Microsoft Windows, firewall, IPS and IDS,
NetFlow, and other essential security information.
 ArcSight Administration content contains several packages that provide statistics
about the health and performance of ArcSight products.
 ArcSight Administration is installed automatically with the ArcSight Manager and is
essential for managing and tuning the performance of content and components.
 ArcSight Admin DB CORR is installed automatically with the ArcSight Manager for
ArcSight ESM with CORR- (Correlation Optimized Retention and Retrieval) Engine
and provides information on the health of the CORR-Engine.
 ArcSight Content Management is an optional package that shows information
about content package synchronization with the ESM Content Management
feature. The information includes a history of content packages synchronized from
a primary ESM source to multiple ESM destinations, and any common issues or
errors encountered. You can install this package during ArcSight ESM installation
or from the ArcSight Console any time after installation.
“What is Standard Content?” on page 5
“Standard Content Packages” on page 7
“IPv6 Content” on page 7
1 IPv6 Overview
6 IPv6 Standard Content Guide Confidential
 ArcSight Search Filters is installed automatically with the ArcSight Manager for use
in the ArcSight Command Center. You cannot edit or use these filters in the
ArcSight Console. For information about the search filters, refer to the ArcSight
Command Center User’s Guide.
 ArcSight System content is installed automatically with the ArcSight Manager and
consists of resources required for basic security processing functions, such as threat
escalation and priority calculations, as well as basic throughput channels required for
out-of-the-box functionality.
 ArcSight Foundation content (such as Cisco Monitoring, Configuration Monitoring,
Intrusion Monitoring, IPv6, NetFlow Monitoring, Network Monitoring, and Workflow)
provide a coordinated system of resources with real-time monitoring capabilities for a
specific area of focus, as well as after-the-fact analysis in the form of reports and
trends. You can extend these foundations with additional resources specific to your
needs or you can use them as a template for building your own resources and tasks.
You can install a Foundation during ArcSight ESM installation or from the ArcSight
Console any time after installation.
 Shared Libraries - ArcSight Administration and several of the ArcSight Foundations
rely on a series of common resources that provide core functionality for common
security scenarios. Dependencies between these resources and the packages they
support are managed by the Package resource.
 Anti Virus content is a set of filters, reports, and report queries used by ArcSight
Foundations, such as Configuration Monitoring and Intrusion Monitoring.
 Conditional Variable Filters content is a library of filters used by variables in
standard content report queries, filters, and rule definitions. The Conditional
Variable Filters are used by ArcSight Administration and certain ArcSight
Foundations, such as Configuration Monitoring, Intrusion Monitoring, Network
Monitoring, and Workflow.
 Global Variables content is a set of variables used to create other resources and to
provide event-based fields that cover common event information, asset, host, and
user information, and commonly used timestamp formats. The Global Variables
are used by ArcSight Administration and certain ArcSight Foundations.
 Monitoring Support Data content is a set of active lists that store mapping
information for HTTP return status code classes, Cisco firewall syslog message
types, and encoded logon types.
 Network filters content is a set of filters required by ArcSight Administration and
certain ArcSight Foundations, such as Intrusion Monitoring and Network
Monitoring.
The ArcSight Admin DB CORR and ArcSight Search Filters content
packages are installed automatically when you perform a new
ArcSight ESM installation. However, when you upgrade your ArcSight
ESM system, these content packages are not installed automatically.
You can install these packages from the ArcSight Console any time
after upgrade by right-clicking the package on the Packages tab in the
Navigator and selecting Install Package.
Refer to the ArcSight ESM Upgrade Guide for information about
upgrading ArcSight ESM.
The resources in the ArcSight Core Security, ArcSight Administration,
ArcSight DB CORR, Conditional Variable Filters, Global Variables, and
Network Filters content packages are not locked even though they
manage core functionality; HP recommends that you do not delete or
modify these resources unless you are an advanced user who
understands fully the resources and their dependencies.
1 IPv6 Overview
Confidential IPv6 Standard Content Guide 7
Standard Content Packages
Standard content comes in packages (.arb files) that are either installed automatically or
presented as an install-time option. The following graphic outlines the packages.
Figure 1-1 The ArcSight Core Security, ArcSight Administration, and ArcSight System
packages at the base provide content required for basic ArcSight functionality. The common
packages in the center contain shared resources that support multiple packages. The
packages shown on top are ArcSight Foundations that address common network security and
management scenarios.
Depending on the options you install, you will see the ArcSight Core Security, ArcSight
Administration, and ArcSight System resources and some or all of the other package
content.
IPv6 Content
The IPv6 content reports on data that comes from networks with IPv6 addresses.
This guide describes the IPv6 content. For information about ArcSight Core Security,
ArcSight Administration, or ArcSight System content, refer to the ArcSight Core Security,
ArcSight Administration, and ArcSight System Standard Content Guide. For information
about an optional ArcSight Foundation, refer to the Standard Content Guide for that
Foundation. ESM documentation is available on Protect 724
(https://protect724.arcsight.com).
When creating your own packages, you can explicitly include or exclude system
resources in the package. Exercise caution if you delete packages that might
have system resources; for example, zones. Make sure the system resources
either belong to a locked group or are themselves locked. For more information
about packages, refer to the ArcSight Console User’s Guide.
1 IPv6 Overview
8 IPv6 Standard Content Guide Confidential
Confidential IPv6 Standard Content Guide 9
Chapter 2
Installation and Configuration
This chapter discusses the following topics.
Installing the IPv6 Package
The IPv6 package is one of the standard content packages that are presented as
install-time options. If you selected all of the standard content packages to be installed at
installation time, the packages and their resources are installed in the ArcSight Database
and available in the Navigator panel resource tree. The package icons in the Navigator
panel package view appear blue.
If you opted to exclude a Foundation package during ESM installation, the package is
imported into the Packages tab in the Navigator panel automatically, but is not available in
the resource view. The package icon in the package view appears grey.
If you do not want the package to be available in any form, you can delete the package.
To install a package that is imported, but not installed:
1 On the Navigator panel Packages tab, navigate to the package you want to install.
2 Right-click the package and select Install Package.
3 In the Install Package dialog, click OK.
4 When the installation is complete, review the summary report and click OK.
The package resources are fully installed to the ArcSight Database, the resources are
fully enabled and operational, and available in the Navigator panel resource tree.
To uninstall a package that is installed:
1 On the Navigator Panel Packages tab, navigate to the package you want to uninstall.
2 Right-click the package and select Uninstall Package.
3 In the Uninstall Package dialog, click OK.
The progress of the uninstall displays in the Progress tab of the Uninstalling Packages
dialog. If a message displays indicating that there is a conflict, select an option in the
Resolution Options area and click OK.
4 When uninstall is complete, review the summary and click OK.
“Installing the IPv6 Package” on page 9
“Configuring IPv6 Content” on page 10
2 Installation and Configuration
10 IPv6 Standard Content Guide Confidential
The package is removed from the ArcSight Database and the Navigator panel resource
tree, but remains available in the Navigator panel Packages tab, and can be
re-installed at another time.
To delete a package and remove it from the ArcSight Console and the ArcSight
Database:
1 On the Navigator Panel Packages tab, navigate to the package you want to delete.
2 Right-click the package and select Delete Package.
3 When prompted for confirmation, click Delete.
The package is removed from the Navigator panel Packages tab.
Configuring IPv6 Content
The IPv6 content is triggered by events from IPv6-enabled SmartConnectors. Contact your
HP ArcSight sales representative for a list of IPv6-enabled SmartConnectors.
A network model keeps track of the network nodes participating in the event traffic.
Modeling your network and categorizing critical assets using the standard asset categories
is what activates some of the standard content and makes it effective. For information
about populating the network model, refer to the ArcSight Console User’s Guide. To learn
more about the architecture of the ESM network modeling tools, refer to the ESM 101
guide.
The IPv6 content contains many reports. You can run reports on demand, automatically on
a regular schedule, or both. By default, IPv6 reports are not scheduled to run
automatically. Evaluate the reports that come with IPv6, and schedule the reports that are
of interest to your organization and business objectives. For instructions about how to
schedule reports, refer to the ArcSight Console User’s Guide.
Confidential IPv6 Standard Content Guide 11
Chapter 3
IPv6 Use Case
The IPv6 content shows data that comes from networks with IPv6 addresses.
Configuration
Refer to “Configuring IPv6 Content” on page 10 for configuration information.
Resources
The following table lists all the resources explicitly assigned to the IPv6 use case and
includes dependent resources. Dependent resources are not listed in a use case resource
on the ArcSight Console.
Table 3-1 Resources that Support the IPv6 Group
Resource Description Type URI
Monitor Resources
Successful Logins
by Destination
IPv6 Address
This report shows
authentication successes
from login attempts by
destination IPv6 address. A
chart shows the top
destination addresses with
successful login attempts. A
table shows the count of
authentication successes by
destination-source pair and
by user.
Report ArcSight Foundation/IPv6/
Top Alert IPv6
Destinations
This report shows the top IDS
and IPS alert destinations per
day.
Report ArcSight Foundation/IPv6/
Top IDS Signature
IPv6 Sources per
Day
This report shows the top IDS
signature sources per day.
Report ArcSight Foundation/IPv6/
Attacker IPv6
Counts by ArcSight
Priority
This report displays a table
with the priority, attacker
IPv6 address and the count of
attack events where the
category significance starts
with Compromise or Hostile.
Report ArcSight Foundation/IPv6/
3 IPv6 Use Case
12 IPv6 Standard Content Guide Confidential
Attacker Counts by
IPv6 Device
This report displays a table
with the device IPv6 address,
attacker IPv6 address, and
the count of attacker events
where the category
significance starts with
Compromise or Hostile.
Report ArcSight Foundation/IPv6/
Top IDS Signature
IPv6 Destinations
per Day
This report shows the top IDS
signature destinations per
day.
Report ArcSight Foundation/IPv6/
Target Counts by
IPv6 Attacker
This report displays the
attacker address, target
address, and the sum of the
aggregated event count for
events matching the Attack
Events filter.
Report ArcSight Foundation/IPv6/
Target Counts by
IPv6 Device
This report displays the
device address, target
address, and the sum of the
aggregated event count for
events matching the Attack
Events filter.
Report ArcSight Foundation/IPv6/
Denied Outbound
Connections by
IPv6 Address
This report shows a summary
of the denied outbound traffic
by local address. A chart
shows the top IPv6 addresses
with the highest denied
connections count. A report
lists all the addresses sorted
by connection count.
Report ArcSight Foundation/IPv6/
Target IPv6 Counts
by ArcSight Priority
This report displays the
priority, target address, and
the sum of the aggregated
event count for events
matching the Attack Events
filter.
Report ArcSight Foundation/IPv6/
Top Alert IPv6
Sources
This report shows the top IDS
and IPS alert sources per day.
A chart shows the top IDS
and IPS alert source IP
addresses. A table shows the
top alert source IP addresses,
as well as the device vendor
and product of the reporting
device.
Report ArcSight Foundation/IPv6/
Successful Logins
by Source IPv6
Address
This report shows
authentication successes
from login attempts by
source IPv6 address. A chart
shows the top source
addresses with successful
login attempts. A table shows
the count of authentication
successes by
source-destination pair and
by user.
Report ArcSight Foundation/IPv6/
Resource Description Type URI
3 IPv6 Use Case
Confidential IPv6 Standard Content Guide 13
Top IPv6 Talkers This report shows the top
talkers and a detailed list of
the top talkers.
Report ArcSight Foundation/IPv6/
Denied Inbound
Connections by
IPv6 Address
This report shows a summary
of the denied inbound traffic
by foreign address. A chart
shows the top IPv6 addresses
with the highest denied
connections count. A report
lists all the addresses sorted
by connection count.
Report ArcSight Foundation/IPv6/
Top N Attacked
IPv6 Targets
This report shows the Target
Address and the sum of the
Aggregated Event Count for
events matching the Attack
Events filter.
Report ArcSight Foundation/IPv6/
Alert Counts by
IPv6 Device
This report shows the count
of IDS and IPS alerts by
device. A chart shows the top
device IPv6 addresses with
the highest counts. A table
shows the list of all the
devices, grouped by device
vendor and product, then
sorted by count.
Report ArcSight Foundation/IPv6/
Top IPv6 Attackers This report displays a chart of
the attacker address, and the
count of events where the
category significance starts
with Compromise or Hostile.
Report ArcSight Foundation/IPv6/
Top N IPv6
Attacker Details
This report displays the
priority, attacker address,
and the count of attack
events where the category
significance starts with
Compromise or Hostile. The
query uses the sum of the
aggregated event count
instead of counting the
EventID so that attackers are
not split by the attack type.
Report ArcSight Foundation/IPv6/
Failed Logins by
Destination IPv6
Address
This report shows
authentication failures from
login attempts by destination
IPv6 address. A chart shows
the top destination addresses
with failed login attempts. A
table shows the count of
authentication failures by
destination-source pair and
by user.
Report ArcSight Foundation/IPv6/
Resource Description Type URI
3 IPv6 Use Case
14 IPv6 Standard Content Guide Confidential
Failed Logins by
Source IPv6
Address
This report shows
authentication failures from
login attempts by source IPv6
address. A chart shows the
top source addresses with
failed login attempts. A table
shows the count of
authentication failures by
source-destination pair and
by user.
Report ArcSight Foundation/IPv6/
Attacker Counts By
IPv6 Target
This report displays the
attacker IPv6 address, the
event name, and the count of
attack events where the
category significance starts
with Compromise or Hostile,
for the address specified in
the parameters.
Report ArcSight Foundation/IPv6/
Target IPv6 Counts
by Event Name
This report displays the event
name, target address, and
the sum of the aggregated
event count for events
matching the Attack Events
filter.
Report ArcSight Foundation/IPv6/
Library Resources
Protected This is a site asset category. Asset
Category
Site Asset
Categories/Address Spaces
Agent IPv6
Address
This variable is an alias for
Device Custom IPv6
Address4.
Global
Variable
ArcSight
Foundation/Variables
Library/IPv6
Target IPv6
Address
This field denotes the Target
IPv6 address. The term
target is dependent upon the
originator field, such as
Source or Destination,
depending on the specific
event. If the originator field is
Destination, return Device
Custom IPv6 Address2
(aliased as Destination IPv6
Address), or return Device
Custom IPv6 Address1
(aliased as Source IPv6
Address).
Global
Variable
ArcSight
Foundation/Variables
Library/IPv6
Source IPv6
Address
This variable is an alias for
Device Custom IPv6
Address1.
Global
Variable
ArcSight
Foundation/Variables
Library/IPv6
Destination IPv6
Address
This variable is an alias for
Device Custom IPv6
Address2.
Global
Variable
ArcSight
Foundation/Variables
Library/IPv6
Resource Description Type URI
3 IPv6 Use Case
Confidential IPv6 Standard Content Guide 15
Attacker IPv6
Address
This field denotes the
Attacker IPv6 address. The
term attacker is dependent
upon the originator field,
such as Source or
Destination, depending on
the specific event. If the
originator field is Source,
return Device Custom IPv6
Address1 (aliased as Source
IPv6 Address), or return
Device Custom IPv6
Address2 (aliased as
Destination IPv6 Address).
Global
Variable
ArcSight
Foundation/Variables
Library/IPv6
Device IPv6
Address
This variable is an alias for
Device Custom IPv6
Address3.
Global
Variable
ArcSight
Foundation/Variables
Library/IPv6
Attack IPv6 Events This filter selects events
where the category
significance starts with
Compromise or Hostile.
Filter ArcSight Foundation/IPv6/
External Source This filter identifies events
originating from outside the
company network.
Filter ArcSight
Foundation/Common/Network
Filters/Boundary Filters
Inbound Events This filter identifies events
coming from the outside
network targeting inside the
company network.
Filter ArcSight
Foundation/Common/Network
Filters/Location Filters
External Target This filter identifies events
targeting the outside
network.
Filter ArcSight
Foundation/Common/Network
Filters/Boundary Filters
Outbound Events This filter identifies events
originating from inside the
company network, targeting
the outside network.
Filter ArcSight
Foundation/Common/Network
Filters/Location Filters
Internal Source This filter identifies events
coming from inside the
company network.
Filter ArcSight
Foundation/Common/Network
Filters/Boundary Filters
Internal Target This filter identifies events
targeting inside the company
network.
Filter ArcSight
Foundation/Common/Network
Filters/Boundary Filters
IDS -IPS IPv6
Events
This filter passes Intrusion
Detection System (IDS) and
Intrusion Prevention System
(IPS) events.
Filter ArcSight Foundation/IPv6/
Denied Inbound
Connections by
IPv6 Address
This query identifies the
count of denied inbound
connections by foreign
address (address and
hostname).
Query ArcSight Foundation/IPv6/
Resource Description Type URI
3 IPv6 Use Case
16 IPv6 Standard Content Guide Confidential
Failed Logins by
IPv6 Source-
Destination Pair
This query returns
authentication failure events
from login attempts. The
query returns the source
address, source host name,
destination address,
destination host name, user
name, user ID, count of failed
logins, and device group.
Query ArcSight Foundation/IPv6/
Denied Outbound
Connections by
IPv6 Address
This query identifies the
count of denied outbound
connections by local address
(address and hostname).
Query ArcSight Foundation/IPv6/
Failed Logins by
Destination IPv6
Address (Chart)
This query returns
authentication failure events
from login attempts,
including the count of failed
login attempts by destination
address.
Query ArcSight Foundation/IPv6/
Target IPv6 Counts
by Event Name
This query returns the event
name, target address and the
sum of the aggregated event
count for events matching
the Attack Events filter.
Query ArcSight Foundation/IPv6/
Top 10 IPv6
Attackers
This query identifies the
attacker address, and the
count of events where the
category significance starts
with Compromise or Hostile.
The query uses the sum of
the aggregated event count
instead of counting the
EventID so that attackers are
not split by the attack type.
Query ArcSight Foundation/IPv6/
Target Counts by
IPv6 Attacker
This query returns the
attacker address, target
address and the sum of the
aggregated event count for
events matching the Attack
Events filter.
Query ArcSight Foundation/IPv6/
Target Counts by
IPv6 Device
This query returns the device
address, target address and
the sum of the aggregated
event count for events
matching the Attack Events
filter.
Query ArcSight Foundation/IPv6/
Top 10 Attacked
IPv6 Targets
This query selects the Target
IPv6 Address and the sum of
the Aggregated Event Count
for events matching the
Attack IPv6 Events filter.
Query ArcSight Foundation/IPv6/
Resource Description Type URI
3 IPv6 Use Case
Confidential IPv6 Standard Content Guide 17
Attacker Counts by
IPv6 Device
This query identifies the
device address, attacker
address, and the count of
events where the category
significance starts with
Compromise or Hostile.
Query ArcSight Foundation/IPv6/
Successful Logins
by Source IPv6
Address (Chart)
This query returns
authentication success events
from login attempts.
Query ArcSight Foundation/IPv6/
Alert Counts by
IPv6 Device
This query returns the count
of IDS and IPS alerts by
device vendor, product,
address and hostname.
Query ArcSight Foundation/IPv6/
Top 10 IPv6 Talkers This query returns the
attacker address and the
count of events in which the
category significance starts
with Compromise or Hostile.
The query uses the sum of
the aggregated event count
instead of counting the
EventID so that attackers are
not split by the event name.
Query ArcSight Foundation/IPv6/
Top IDS Signature
IPv6 Sources per
Day
This query returns the
attacker address, device
vendor, device product, and
the count of the events within
the query timeframe.
Query ArcSight Foundation/IPv6/
Top IDS Signature
IPv6 Destinations
per Day
This query returns the target
address, device vendor,
device product, and the count
of the events within the
query timeframe.
Query ArcSight Foundation/IPv6/
Successful Logins
by Destination
IPv6 Address
(Chart)
This query returns
authentication success events
from login attempts,
including the count of failed
login attempts by destination
address.
Query ArcSight Foundation/IPv6/
Top Alert IPv6
Sources
This query identifies the
count of IDS and IPS alerts
by source address, device
vendor, and device product.
Query ArcSight Foundation/IPv6/
Top 10 IPv6
Attacker Details
This query identifies the
priority, attacker address,
and the count of events
where the category
significance starts with
Compromise or Hostile. The
query uses the sum of the
aggregated event count
instead of counting the
EventID so that attackers are
not split by the attack type.
Query ArcSight Foundation/IPv6/
Resource Description Type URI
3 IPv6 Use Case
18 IPv6 Standard Content Guide Confidential
Target IPv6 Counts
by ArcSight Priority
This query returns the
priority, target address and
the sum of the aggregated
event count for events
matching the Attack Events
filter.
Query ArcSight Foundation/IPv6/
Attacker Counts By
IPv6 Target
This query identifies the
attacker IPv6 address, the
event name, and the count of
events where the category
significance starts with
Compromise or Hostile for
the target information given
in the parameters.
Query ArcSight Foundation/IPv6/
Failed Logins by
Source IPv6
Address (Chart)
This query returns
authentication failure events
from login attempts,
including the count of failed
login attempts by source
address.
Query ArcSight Foundation/IPv6/
Attacker IPv6
Counts by ArcSight
Priority
This query identifies the
priority, attacker address,
and the count of events
where the category
significance starts with
Compromise or Hostile.
Query ArcSight Foundation/IPv6/
Successful Logins
by IPv6
Source-Destination
Pair
This query returns
authentication success events
from login attempts.
Query ArcSight Foundation/IPv6/
Top Alert IPv6
Destinations
This query returns the count
of IDS and IPS alerts by
destination address, device
vendor, and device product.
Query ArcSight Foundation/IPv6/
Top 10 IPv6
Targets
This query returns the target
address and the sum of the
aggregated event count for
events matching the Attack
Events filter used in several
reports.
Query ArcSight Foundation/IPv6/
Resource Description Type URI
Confidential IPv6 Standard Content Guide 19
A
Agent IPv6 Address global variable 14
Alert Counts by IPv6 Device query 16
Alert Counts by IPv6 Device report 13
ArcSight Administration overview 5
ArcSight Core Security overview 5
ArcSight Foundations overview 6
ArcSight System overview 6
asset categories
Protected 14
Attack IPv6 Events filter 15
Attacker Counts by IPv6 Device query 16
Attacker Counts by IPv6 Device report 12
Attacker Counts By IPv6 Target query 17
Attacker Counts By IPv6 Target report 14
Attacker IPv6 Address global variable 14
Attacker IPv6 Counts by ArcSight Priority query 17
Attacker IPv6 Counts by ArcSight Priority report 11
C
content packages 7
D
Denied Inbound Connections by IPv6 Address query 15
Denied Inbound Connections by IPv6 Address report 13
Denied Outbound Connections by IPv6 Address query 15
Denied Outbound Connections by IPv6 Address report 12
Destination IPv6 Address global variable 14
Device IPv6 Address global variable 14
E
External Source filter 15
External Target filter 15
F
Failed Logins by Destination IPv6 Address (Chart) query
15
Failed Logins by Destination IPv6 Address report 13
Failed Logins by IPv6 Source-Destination Pair query 15
Failed Logins by Source IPv6 Address (Chart) query 17
Failed Logins by Source IPv6 Address report 13
filters
Attack IPv6 Events 15
External Source 15
External Target 15
IDS -IPS IPv6 Events 15
Inbound Events 15
Internal Source 15
Internal Target 15
Outbound Events 15
G
global variables
Agent IPv6 Address 14
Attacker IPv6 Address 14
Destination IPv6 Address 14
Device IPv6 Address 14
Source IPv6 Address 14
Target IPv6 Address 14
I
IDS -IPS IPv6 Events filter 15
Inbound Events filter 15
Internal Source filter 15
Internal Target filter 15
O
Outbound Events filter 15
P
packages
deleting 10
installing 9
uninstalling 9
Protected asset category 14
Q
queries
Alert Counts by IPv6 Device 16
Attacker Counts by IPv6 Device 16
Attacker Counts By IPv6 Target 17
Attacker IPv6 Counts by ArcSight Priority 17
Denied Inbound Connections by IPv6 Address 15
Denied Outbound Connections by IPv6 Address 15
Failed Logins by Destination IPv6 Address (Chart)
15
Failed Logins by IPv6 Source-Destination Pair 15
Failed Logins by Source IPv6 Address (Chart) 17
Successful Logins by Destination IPv6 Address
(Chart) 17
Successful Logins by IPv6 Source-Destination Pair
18
Successful Logins by Source IPv6 Address (Chart)
16
Target Counts by IPv6 Attacker 16
Index
20 IPv6 Standard Content Guide Confidential
Target Counts by IPv6 Device 16
Target IPv6 Counts by ArcSight Priority 17
Target IPv6 Counts by Event Name 16
Top 10 Attacked IPv6 Targets 16
Top 10 IPv6 Attacker Details 17
Top 10 IPv6 Attackers 16
Top 10 IPv6 Talkers 16
Top 10 IPv6 Targets 18
Top Alert IPv6 Destinations 18
Top Alert IPv6 Sources 17
Top IDS Signature IPv6 Destinations per Day 17
Top IDS Signature IPv6 Sources per Day 17
R
reports
Alert Counts by IPv6 Device 13
Attacker Counts by IPv6 Device 12
Attacker Counts By IPv6 Target 14
Attacker IPv6 Counts by ArcSight Priority 11
Denied Inbound Connections by IPv6 Address 13
Denied Outbound Connections by IPv6 Address 12
Failed Logins by Destination IPv6 Address 13
Failed Logins by Source IPv6 Address 13
Successful Logins by Destination IPv6 Address 11
Successful Logins by Source IPv6 Address 12
Target Counts by IPv6 Attacker 12
Target Counts by IPv6 Device 12
Target IPv6 Counts by ArcSight Priority 12
Target IPv6 Counts by Event Name 14
Top Alert IPv6 Destinations 11
Top Alert IPv6 Sources 12
Top IDS Signature IPv6 Destinations per Day 12
Top IDS Signature IPv6 Sources per Day 11
Top IPv6 Attackers 13
Top IPv6 Talkers 12
Top N Attacked IPv6 Targets 13
Top N IPv6 Attacker Details 13
S
shared libraries 6
Source IPv6 Address global variable 14
Successful Logins by Destination IPv6 Address (Chart)
query 17
Successful Logins by Destination IPv6 Address report 11
Successful Logins by IPv6 Source-Destination Pair query
18
Successful Logins by Source IPv6 Address (Chart) query
16
Successful Logins by Source IPv6 Address report 12
T
Target Counts by IPv6 Attacker query 16
Target Counts by IPv6 Attacker report 12
Target Counts by IPv6 Device query 16
Target Counts by IPv6 Device report 12
Target IPv6 Address global variable 14
Target IPv6 Counts by ArcSight Priority query 17
Target IPv6 Counts by ArcSight Priority report 12
Target IPv6 Counts by Event Name query 16
Target IPv6 Counts by Event Name report 14
Top 10 Attacked IPv6 Targets query 16
Top 10 IPv6 Attacker Details query 17
Top 10 IPv6 Attackers query 16
Top 10 IPv6 Talkers query 16
Top 10 IPv6 Targets query 18
Top Alert IPv6 Destinations query 18
Top Alert IPv6 Destinations report 11
Top Alert IPv6 Sources query 17
Top Alert IPv6 Sources report 12
Top IDS Signature IPv6 Destinations per Day query 17
Top IDS Signature IPv6 Destinations per Day report 12
Top IDS Signature IPv6 Sources per Day query 17
Top IDS Signature IPv6 Sources per Day report 11
Top IPv6 Attackers report 13
Top IPv6 Talkers report 12
Top N Attacked IPv6 Targets report 13
Top N IPv6 Attacker Details report 13

More Related Content

What's hot

Configuration Monitoring Standard Content Guide for ESM 6.5c
Configuration Monitoring Standard Content Guide for ESM 6.5c	Configuration Monitoring Standard Content Guide for ESM 6.5c
Configuration Monitoring Standard Content Guide for ESM 6.5c Protect724migration
 
ESM5.6_SCG_NetFlow.pdf
ESM5.6_SCG_NetFlow.pdfESM5.6_SCG_NetFlow.pdf
ESM5.6_SCG_NetFlow.pdfProtect724v3
 
Network Monitoring Standard Content Guide for ESM 6.5c
Network Monitoring Standard Content Guide for ESM 6.5c	Network Monitoring Standard Content Guide for ESM 6.5c
Network Monitoring Standard Content Guide for ESM 6.5c Protect724migration
 
Configuration Monitoring Standard Content Guide for ESM 6.8c
Configuration Monitoring Standard Content Guide for ESM 6.8cConfiguration Monitoring Standard Content Guide for ESM 6.8c
Configuration Monitoring Standard Content Guide for ESM 6.8cProtect724migration
 
Esm scg configuration_6.0c
Esm scg configuration_6.0cEsm scg configuration_6.0c
Esm scg configuration_6.0cProtect724
 
ESM5.6_SCG_Workflow.pdf
ESM5.6_SCG_Workflow.pdfESM5.6_SCG_Workflow.pdf
ESM5.6_SCG_Workflow.pdfProtect724v3
 
ArcSight Administration and ArcSight System Standard Content Guide (ESM v6.9.1c)
ArcSight Administration and ArcSight System Standard Content Guide (ESM v6.9.1c)ArcSight Administration and ArcSight System Standard Content Guide (ESM v6.9.1c)
ArcSight Administration and ArcSight System Standard Content Guide (ESM v6.9.1c)Protect724tk
 
Oracle Database Security: Top 10 Things You Could & Should Be Doing Differently
Oracle Database Security: Top 10 Things You Could & Should Be Doing DifferentlyOracle Database Security: Top 10 Things You Could & Should Be Doing Differently
Oracle Database Security: Top 10 Things You Could & Should Be Doing DifferentlyPythian
 
Esm rel notes_6.0c
Esm rel notes_6.0cEsm rel notes_6.0c
Esm rel notes_6.0cProtect724
 
Presentation database security audit vault & database firewall
Presentation   database security audit vault & database firewallPresentation   database security audit vault & database firewall
Presentation database security audit vault & database firewallxKinAnx
 
What's new in oracle trace file analyzer 18.2.0
What's new in oracle trace file analyzer 18.2.0What's new in oracle trace file analyzer 18.2.0
What's new in oracle trace file analyzer 18.2.0Sandesh Rao
 
Esm scg workflow_6.0c
Esm scg workflow_6.0cEsm scg workflow_6.0c
Esm scg workflow_6.0cProtect724v3
 
What's new in Oracle ORAchk & EXAchk 19.2
What's new in Oracle ORAchk & EXAchk 19.2What's new in Oracle ORAchk & EXAchk 19.2
What's new in Oracle ORAchk & EXAchk 19.2Sandesh Rao
 
AIOUG - Groundbreakers - Jul 2019 - 19 Troubleshooting Tips and Tricks for Da...
AIOUG - Groundbreakers - Jul 2019 - 19 Troubleshooting Tips and Tricks for Da...AIOUG - Groundbreakers - Jul 2019 - 19 Troubleshooting Tips and Tricks for Da...
AIOUG - Groundbreakers - Jul 2019 - 19 Troubleshooting Tips and Tricks for Da...Sandesh Rao
 
Oracle Key Vault Overview
Oracle Key Vault OverviewOracle Key Vault Overview
Oracle Key Vault OverviewTroy Kitch
 
Replicate data between environments
Replicate data between environmentsReplicate data between environments
Replicate data between environmentsDLT Solutions
 
Cisco Monitoring Standard Content Guide for ESM 6.5c
Cisco Monitoring Standard Content Guide for ESM 6.5c	Cisco Monitoring Standard Content Guide for ESM 6.5c
Cisco Monitoring Standard Content Guide for ESM 6.5c Protect724migration
 
Streamline it management
Streamline it managementStreamline it management
Streamline it managementDLT Solutions
 
Využijte svou Oracle databázi na maximum!
Využijte svou Oracle databázi na maximum!Využijte svou Oracle databázi na maximum!
Využijte svou Oracle databázi na maximum!MarketingArrowECS_CZ
 
AIOUG : ODEVCYathra 2018 - Oracle Autonomous Database What Every DBA should know
AIOUG : ODEVCYathra 2018 - Oracle Autonomous Database What Every DBA should knowAIOUG : ODEVCYathra 2018 - Oracle Autonomous Database What Every DBA should know
AIOUG : ODEVCYathra 2018 - Oracle Autonomous Database What Every DBA should knowSandesh Rao
 

What's hot (20)

Configuration Monitoring Standard Content Guide for ESM 6.5c
Configuration Monitoring Standard Content Guide for ESM 6.5c	Configuration Monitoring Standard Content Guide for ESM 6.5c
Configuration Monitoring Standard Content Guide for ESM 6.5c
 
ESM5.6_SCG_NetFlow.pdf
ESM5.6_SCG_NetFlow.pdfESM5.6_SCG_NetFlow.pdf
ESM5.6_SCG_NetFlow.pdf
 
Network Monitoring Standard Content Guide for ESM 6.5c
Network Monitoring Standard Content Guide for ESM 6.5c	Network Monitoring Standard Content Guide for ESM 6.5c
Network Monitoring Standard Content Guide for ESM 6.5c
 
Configuration Monitoring Standard Content Guide for ESM 6.8c
Configuration Monitoring Standard Content Guide for ESM 6.8cConfiguration Monitoring Standard Content Guide for ESM 6.8c
Configuration Monitoring Standard Content Guide for ESM 6.8c
 
Esm scg configuration_6.0c
Esm scg configuration_6.0cEsm scg configuration_6.0c
Esm scg configuration_6.0c
 
ESM5.6_SCG_Workflow.pdf
ESM5.6_SCG_Workflow.pdfESM5.6_SCG_Workflow.pdf
ESM5.6_SCG_Workflow.pdf
 
ArcSight Administration and ArcSight System Standard Content Guide (ESM v6.9.1c)
ArcSight Administration and ArcSight System Standard Content Guide (ESM v6.9.1c)ArcSight Administration and ArcSight System Standard Content Guide (ESM v6.9.1c)
ArcSight Administration and ArcSight System Standard Content Guide (ESM v6.9.1c)
 
Oracle Database Security: Top 10 Things You Could & Should Be Doing Differently
Oracle Database Security: Top 10 Things You Could & Should Be Doing DifferentlyOracle Database Security: Top 10 Things You Could & Should Be Doing Differently
Oracle Database Security: Top 10 Things You Could & Should Be Doing Differently
 
Esm rel notes_6.0c
Esm rel notes_6.0cEsm rel notes_6.0c
Esm rel notes_6.0c
 
Presentation database security audit vault & database firewall
Presentation   database security audit vault & database firewallPresentation   database security audit vault & database firewall
Presentation database security audit vault & database firewall
 
What's new in oracle trace file analyzer 18.2.0
What's new in oracle trace file analyzer 18.2.0What's new in oracle trace file analyzer 18.2.0
What's new in oracle trace file analyzer 18.2.0
 
Esm scg workflow_6.0c
Esm scg workflow_6.0cEsm scg workflow_6.0c
Esm scg workflow_6.0c
 
What's new in Oracle ORAchk & EXAchk 19.2
What's new in Oracle ORAchk & EXAchk 19.2What's new in Oracle ORAchk & EXAchk 19.2
What's new in Oracle ORAchk & EXAchk 19.2
 
AIOUG - Groundbreakers - Jul 2019 - 19 Troubleshooting Tips and Tricks for Da...
AIOUG - Groundbreakers - Jul 2019 - 19 Troubleshooting Tips and Tricks for Da...AIOUG - Groundbreakers - Jul 2019 - 19 Troubleshooting Tips and Tricks for Da...
AIOUG - Groundbreakers - Jul 2019 - 19 Troubleshooting Tips and Tricks for Da...
 
Oracle Key Vault Overview
Oracle Key Vault OverviewOracle Key Vault Overview
Oracle Key Vault Overview
 
Replicate data between environments
Replicate data between environmentsReplicate data between environments
Replicate data between environments
 
Cisco Monitoring Standard Content Guide for ESM 6.5c
Cisco Monitoring Standard Content Guide for ESM 6.5c	Cisco Monitoring Standard Content Guide for ESM 6.5c
Cisco Monitoring Standard Content Guide for ESM 6.5c
 
Streamline it management
Streamline it managementStreamline it management
Streamline it management
 
Využijte svou Oracle databázi na maximum!
Využijte svou Oracle databázi na maximum!Využijte svou Oracle databázi na maximum!
Využijte svou Oracle databázi na maximum!
 
AIOUG : ODEVCYathra 2018 - Oracle Autonomous Database What Every DBA should know
AIOUG : ODEVCYathra 2018 - Oracle Autonomous Database What Every DBA should knowAIOUG : ODEVCYathra 2018 - Oracle Autonomous Database What Every DBA should know
AIOUG : ODEVCYathra 2018 - Oracle Autonomous Database What Every DBA should know
 

Similar to IPv6 Standard Content Guide for ESM 6.5c

ArcSight Core, ArcSight Administration, and ArcSight System Standard Content ...
ArcSight Core, ArcSight Administration, and ArcSight System Standard Content ...ArcSight Core, ArcSight Administration, and ArcSight System Standard Content ...
ArcSight Core, ArcSight Administration, and ArcSight System Standard Content ...Protect724migration
 
Network Monitoring Standard Content Guide for ESM 6.8c
Network Monitoring Standard Content Guide for ESM 6.8cNetwork Monitoring Standard Content Guide for ESM 6.8c
Network Monitoring Standard Content Guide for ESM 6.8cProtect724migration
 
Cisco Monitoring Standard Content Guide for ESM 6.8c
Cisco Monitoring Standard Content Guide for ESM 6.8cCisco Monitoring Standard Content Guide for ESM 6.8c
Cisco Monitoring Standard Content Guide for ESM 6.8cProtect724migration
 
Esm5.5 scg net_flow
Esm5.5 scg net_flowEsm5.5 scg net_flow
Esm5.5 scg net_flowProtect724
 
NetFlow Monitoring 1.1 Standard Content Guide
NetFlow Monitoring 1.1 Standard Content GuideNetFlow Monitoring 1.1 Standard Content Guide
NetFlow Monitoring 1.1 Standard Content GuideProtect724
 
Esm5.5 scg workflow
Esm5.5 scg workflowEsm5.5 scg workflow
Esm5.5 scg workflowProtect724
 
Esm5.5 scg workflow
Esm5.5 scg workflowEsm5.5 scg workflow
Esm5.5 scg workflowProtect724
 
Workflow Standard Content Guide
Workflow Standard Content GuideWorkflow Standard Content Guide
Workflow Standard Content GuideProtect724
 
Standard Content Guide for ArcSight Express w/ CORR-Engine v3.0
Standard Content Guide for ArcSight Express w/ CORR-Engine v3.0Standard Content Guide for ArcSight Express w/ CORR-Engine v3.0
Standard Content Guide for ArcSight Express w/ CORR-Engine v3.0Protect724
 
Esm5.5 scg network (1)
Esm5.5 scg network (1)Esm5.5 scg network (1)
Esm5.5 scg network (1)Protect724
 
Esm5.5 scg configuration
Esm5.5 scg configurationEsm5.5 scg configuration
Esm5.5 scg configurationProtect724v2
 
Network Monitoring Standard Content Guide
Network Monitoring Standard Content GuideNetwork Monitoring Standard Content Guide
Network Monitoring Standard Content GuideProtect724
 
ESM 6.9.1c Release Notes
ESM 6.9.1c Release NotesESM 6.9.1c Release Notes
ESM 6.9.1c Release NotesProtect724tk
 
Configuration Monitoring Standard Content Guide
Configuration Monitoring Standard Content GuideConfiguration Monitoring Standard Content Guide
Configuration Monitoring Standard Content GuideProtect724
 
Esm scg configuration
Esm scg configurationEsm scg configuration
Esm scg configurationProtect724
 
ArcMC 2.5.1 Release Notes
ArcMC 2.5.1 Release Notes	ArcMC 2.5.1 Release Notes
ArcMC 2.5.1 Release Notes Protect724mouni
 
ArcSight Connector Appliance v6.0 Release Notes
ArcSight Connector Appliance v6.0 Release NotesArcSight Connector Appliance v6.0 Release Notes
ArcSight Connector Appliance v6.0 Release NotesProtect724tk
 
ArcSight Management Center 2.2 Release Notes.pdf
ArcSight Management Center 2.2 Release Notes.pdfArcSight Management Center 2.2 Release Notes.pdf
ArcSight Management Center 2.2 Release Notes.pdfProtect724mouni
 

Similar to IPv6 Standard Content Guide for ESM 6.5c (20)

ArcSight Core, ArcSight Administration, and ArcSight System Standard Content ...
ArcSight Core, ArcSight Administration, and ArcSight System Standard Content ...ArcSight Core, ArcSight Administration, and ArcSight System Standard Content ...
ArcSight Core, ArcSight Administration, and ArcSight System Standard Content ...
 
Network Monitoring Standard Content Guide for ESM 6.8c
Network Monitoring Standard Content Guide for ESM 6.8cNetwork Monitoring Standard Content Guide for ESM 6.8c
Network Monitoring Standard Content Guide for ESM 6.8c
 
Cisco Monitoring Standard Content Guide for ESM 6.8c
Cisco Monitoring Standard Content Guide for ESM 6.8cCisco Monitoring Standard Content Guide for ESM 6.8c
Cisco Monitoring Standard Content Guide for ESM 6.8c
 
Esm5.5 scg net_flow
Esm5.5 scg net_flowEsm5.5 scg net_flow
Esm5.5 scg net_flow
 
NetFlow Monitoring 1.1 Standard Content Guide
NetFlow Monitoring 1.1 Standard Content GuideNetFlow Monitoring 1.1 Standard Content Guide
NetFlow Monitoring 1.1 Standard Content Guide
 
Esm5.5 scg workflow
Esm5.5 scg workflowEsm5.5 scg workflow
Esm5.5 scg workflow
 
Esm5.5 scg workflow
Esm5.5 scg workflowEsm5.5 scg workflow
Esm5.5 scg workflow
 
Workflow Standard Content Guide
Workflow Standard Content GuideWorkflow Standard Content Guide
Workflow Standard Content Guide
 
Standard Content Guide for ArcSight Express w/ CORR-Engine v3.0
Standard Content Guide for ArcSight Express w/ CORR-Engine v3.0Standard Content Guide for ArcSight Express w/ CORR-Engine v3.0
Standard Content Guide for ArcSight Express w/ CORR-Engine v3.0
 
Esm5.5 scg network (1)
Esm5.5 scg network (1)Esm5.5 scg network (1)
Esm5.5 scg network (1)
 
Esm5.5 scg configuration
Esm5.5 scg configurationEsm5.5 scg configuration
Esm5.5 scg configuration
 
Network Monitoring Standard Content Guide
Network Monitoring Standard Content GuideNetwork Monitoring Standard Content Guide
Network Monitoring Standard Content Guide
 
ArcMC 2.6 Release Notes
ArcMC 2.6 Release NotesArcMC 2.6 Release Notes
ArcMC 2.6 Release Notes
 
ESM 6.9.1c Release Notes
ESM 6.9.1c Release NotesESM 6.9.1c Release Notes
ESM 6.9.1c Release Notes
 
ESM_UpgradingTo5.6.pdf
ESM_UpgradingTo5.6.pdfESM_UpgradingTo5.6.pdf
ESM_UpgradingTo5.6.pdf
 
Configuration Monitoring Standard Content Guide
Configuration Monitoring Standard Content GuideConfiguration Monitoring Standard Content Guide
Configuration Monitoring Standard Content Guide
 
Esm scg configuration
Esm scg configurationEsm scg configuration
Esm scg configuration
 
ArcMC 2.5.1 Release Notes
ArcMC 2.5.1 Release Notes	ArcMC 2.5.1 Release Notes
ArcMC 2.5.1 Release Notes
 
ArcSight Connector Appliance v6.0 Release Notes
ArcSight Connector Appliance v6.0 Release NotesArcSight Connector Appliance v6.0 Release Notes
ArcSight Connector Appliance v6.0 Release Notes
 
ArcSight Management Center 2.2 Release Notes.pdf
ArcSight Management Center 2.2 Release Notes.pdfArcSight Management Center 2.2 Release Notes.pdf
ArcSight Management Center 2.2 Release Notes.pdf
 

More from Protect724migration

ESM 101 for ArcSight Express v4.0
ESM 101 for ArcSight Express v4.0ESM 101 for ArcSight Express v4.0
ESM 101 for ArcSight Express v4.0Protect724migration
 
ArcSight Web User's Guide for ESM 6.5c
ArcSight Web User's Guide for ESM 6.5c	ArcSight Web User's Guide for ESM 6.5c
ArcSight Web User's Guide for ESM 6.5c Protect724migration
 
Administrator's Guide for ESM 6.5c
Administrator's Guide for ESM 6.5c	Administrator's Guide for ESM 6.5c
Administrator's Guide for ESM 6.5c Protect724migration
 
Administrator's Guide for ArcSight Express v4.0
Administrator's Guide for ArcSight Express v4.0Administrator's Guide for ArcSight Express v4.0
Administrator's Guide for ArcSight Express v4.0Protect724migration
 
Forwarding Connector Release Notes for version 6.0.4.6830.0
Forwarding Connector Release Notes for version 6.0.4.6830.0	Forwarding Connector Release Notes for version 6.0.4.6830.0
Forwarding Connector Release Notes for version 6.0.4.6830.0 Protect724migration
 
Forwarding Connector User's Guide for version 6.0.4.6830.0
Forwarding Connector User's Guide for version 6.0.4.6830.0	Forwarding Connector User's Guide for version 6.0.4.6830.0
Forwarding Connector User's Guide for version 6.0.4.6830.0 Protect724migration
 
ArcSight Core Security, ArcSight Administration, and ArcSight System Standard...
ArcSight Core Security, ArcSight Administration, and ArcSight System Standard...ArcSight Core Security, ArcSight Administration, and ArcSight System Standard...
ArcSight Core Security, ArcSight Administration, and ArcSight System Standard...Protect724migration
 
Intrusion Monitoring Standard Content Guide for ESM 6.5c
Intrusion Monitoring Standard Content Guide for ESM 6.5c	Intrusion Monitoring Standard Content Guide for ESM 6.5c
Intrusion Monitoring Standard Content Guide for ESM 6.5c Protect724migration
 
Asset Model Import FlexConnector Developer's Guide
Asset Model Import FlexConnector Developer's GuideAsset Model Import FlexConnector Developer's Guide
Asset Model Import FlexConnector Developer's GuideProtect724migration
 
Risk Insight High Availability Tech Note for ESM 6.8c
Risk Insight High Availability Tech Note for ESM 6.8cRisk Insight High Availability Tech Note for ESM 6.8c
Risk Insight High Availability Tech Note for ESM 6.8cProtect724migration
 

More from Protect724migration (20)

Upgrade Guide for ESM 6.8c
Upgrade Guide for ESM 6.8cUpgrade Guide for ESM 6.8c
Upgrade Guide for ESM 6.8c
 
Arcsight ESM Support Matrix
Arcsight ESM Support MatrixArcsight ESM Support Matrix
Arcsight ESM Support Matrix
 
HPE ArcSight ESM Support Matrix
HPE ArcSight ESM Support MatrixHPE ArcSight ESM Support Matrix
HPE ArcSight ESM Support Matrix
 
ESM 101 for ArcSight Express v4.0
ESM 101 for ArcSight Express v4.0ESM 101 for ArcSight Express v4.0
ESM 101 for ArcSight Express v4.0
 
ArcSight Web User's Guide for ESM 6.5c
ArcSight Web User's Guide for ESM 6.5c	ArcSight Web User's Guide for ESM 6.5c
ArcSight Web User's Guide for ESM 6.5c
 
Installation Guide for ESM 6.8c
Installation Guide for ESM 6.8cInstallation Guide for ESM 6.8c
Installation Guide for ESM 6.8c
 
Administrator's Guide for ESM 6.5c
Administrator's Guide for ESM 6.5c	Administrator's Guide for ESM 6.5c
Administrator's Guide for ESM 6.5c
 
Administrator's Guide for ArcSight Express v4.0
Administrator's Guide for ArcSight Express v4.0Administrator's Guide for ArcSight Express v4.0
Administrator's Guide for ArcSight Express v4.0
 
ESM 101 for ESM 6.8c
ESM 101 for ESM 6.8cESM 101 for ESM 6.8c
ESM 101 for ESM 6.8c
 
ESM 101 for ESM 6.5c
ESM 101 for ESM 6.5c	ESM 101 for ESM 6.5c
ESM 101 for ESM 6.5c
 
Arcsight ESM Support Matrix
Arcsight ESM Support MatrixArcsight ESM Support Matrix
Arcsight ESM Support Matrix
 
Upgrade Guide for ESM 6.5c
Upgrade Guide for ESM 6.5c	Upgrade Guide for ESM 6.5c
Upgrade Guide for ESM 6.5c
 
Forwarding Connector Release Notes for version 6.0.4.6830.0
Forwarding Connector Release Notes for version 6.0.4.6830.0	Forwarding Connector Release Notes for version 6.0.4.6830.0
Forwarding Connector Release Notes for version 6.0.4.6830.0
 
Forwarding Connector User's Guide for version 6.0.4.6830.0
Forwarding Connector User's Guide for version 6.0.4.6830.0	Forwarding Connector User's Guide for version 6.0.4.6830.0
Forwarding Connector User's Guide for version 6.0.4.6830.0
 
ArcSight Core Security, ArcSight Administration, and ArcSight System Standard...
ArcSight Core Security, ArcSight Administration, and ArcSight System Standard...ArcSight Core Security, ArcSight Administration, and ArcSight System Standard...
ArcSight Core Security, ArcSight Administration, and ArcSight System Standard...
 
Intrusion Monitoring Standard Content Guide for ESM 6.5c
Intrusion Monitoring Standard Content Guide for ESM 6.5c	Intrusion Monitoring Standard Content Guide for ESM 6.5c
Intrusion Monitoring Standard Content Guide for ESM 6.5c
 
HPE ArcSight ESM Support Matrix
HPE ArcSight ESM Support MatrixHPE ArcSight ESM Support Matrix
HPE ArcSight ESM Support Matrix
 
Asset Model Import FlexConnector Developer's Guide
Asset Model Import FlexConnector Developer's GuideAsset Model Import FlexConnector Developer's Guide
Asset Model Import FlexConnector Developer's Guide
 
Risk Insight High Availability Tech Note for ESM 6.8c
Risk Insight High Availability Tech Note for ESM 6.8cRisk Insight High Availability Tech Note for ESM 6.8c
Risk Insight High Availability Tech Note for ESM 6.8c
 
ESM_101_5.6.pdf
ESM_101_5.6.pdfESM_101_5.6.pdf
ESM_101_5.6.pdf
 

Recently uploaded

Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureDinusha Kumarasiri
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based projectAnoyGreter
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfAlina Yurenko
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Hr365.us smith
 
Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Velvetech LLC
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityNeo4j
 
Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)Ahmed Mater
 
Xen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdfXen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdfStefano Stabellini
 
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作qr0udbr0
 
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Natan Silnitsky
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEEVICTOR MAESTRE RAMIREZ
 
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Cizo Technology Services
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Andreas Granig
 
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...OnePlan Solutions
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxTier1 app
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWave PLM
 
What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...Technogeeks
 
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)jennyeacort
 

Recently uploaded (20)

Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with Azure
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based project
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)
 
Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
 
Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)
 
Xen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdfXen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdf
 
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作
 
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEE
 
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024
 
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need It
 
What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...
 
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
 

IPv6 Standard Content Guide for ESM 6.5c

  • 1. Standard Content Guide IPv6 ArcSight ESM 6.5c October 11, 2013
  • 2. Copyright © 2013 Hewlett-Packard Development Company, L.P. Confidential computer software. Valid license from HP required for possession, use or copying. Consistent with FAR 12.211 and 12.212, Commercial Computer Software, Computer Software Documentation, and Technical Data for Commercial Items are licensed to the U.S. Government under vendor's standard commercial license. The information contained herein is subject to change without notice. The only warranties for HP products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein. Follow this link to see a complete statement of copyrights and acknowledgements: http://www.hpenterprisesecurity.com/copyright Contact Information Revision History Phone A list of phone numbers is available on the HP ArcSight Technical Support page: http://www8.hp.com/us/en/software- solutions/software.html?compURI=1345981#.URitMaVwpWI. Support Web Site http://support.openview.hp.com Protect 724 Community https://protect724.arcsight.com Date Product Version Description 10/11/2013 IPv6 content for ArcSight ESM 6.5c Final revision for release.
  • 3. Confidential IPv6 Standard Content Guide 3 Contents Chapter 1: IPv6 Overview ................................................................................................... 5 What is Standard Content? ............................................................................................... 5 Standard Content Packages .............................................................................................. 7 IPv6 Content .................................................................................................................. 7 Chapter 2: Installation and Configuration ........................................................................... 9 Installing the IPv6 Package ............................................................................................... 9 Configuring IPv6 Content ............................................................................................... 10 Chapter 3: IPv6 Use Case .................................................................................................. 11 Configuration ................................................................................................................ 11 Resources .................................................................................................................... 11 Index ...................................................................................................................................................... 19
  • 4. Contents 4 IPv6 Standard Content Guide Confidential
  • 5. Confidential IPv6 Standard Content Guide 5 Chapter 1 IPv6 Overview This chapter discusses the following topics. What is Standard Content? Standard content is a series of coordinated resources (filters, rules, dashboards, reports, and so on) that address common security and management tasks. Standard content is designed to give you comprehensive correlation, monitoring, reporting, alerting, and case management out-of-the box with minimal configuration. The content provides a full spectrum of security, network, and configuration monitoring tasks, as well as a comprehensive set of tasks that monitor the health of the system. Standard content is installed using a series of packages, some of which are installed automatically with the ArcSight Manager to provide essential system health and status operations. The remaining packages are presented as install-time options organized by category. Standard content consists of the following:  ArcSight Core Security content is installed automatically with the ArcSight Manager and consists of key resources for monitoring Microsoft Windows, firewall, IPS and IDS, NetFlow, and other essential security information.  ArcSight Administration content contains several packages that provide statistics about the health and performance of ArcSight products.  ArcSight Administration is installed automatically with the ArcSight Manager and is essential for managing and tuning the performance of content and components.  ArcSight Admin DB CORR is installed automatically with the ArcSight Manager for ArcSight ESM with CORR- (Correlation Optimized Retention and Retrieval) Engine and provides information on the health of the CORR-Engine.  ArcSight Content Management is an optional package that shows information about content package synchronization with the ESM Content Management feature. The information includes a history of content packages synchronized from a primary ESM source to multiple ESM destinations, and any common issues or errors encountered. You can install this package during ArcSight ESM installation or from the ArcSight Console any time after installation. “What is Standard Content?” on page 5 “Standard Content Packages” on page 7 “IPv6 Content” on page 7
  • 6. 1 IPv6 Overview 6 IPv6 Standard Content Guide Confidential  ArcSight Search Filters is installed automatically with the ArcSight Manager for use in the ArcSight Command Center. You cannot edit or use these filters in the ArcSight Console. For information about the search filters, refer to the ArcSight Command Center User’s Guide.  ArcSight System content is installed automatically with the ArcSight Manager and consists of resources required for basic security processing functions, such as threat escalation and priority calculations, as well as basic throughput channels required for out-of-the-box functionality.  ArcSight Foundation content (such as Cisco Monitoring, Configuration Monitoring, Intrusion Monitoring, IPv6, NetFlow Monitoring, Network Monitoring, and Workflow) provide a coordinated system of resources with real-time monitoring capabilities for a specific area of focus, as well as after-the-fact analysis in the form of reports and trends. You can extend these foundations with additional resources specific to your needs or you can use them as a template for building your own resources and tasks. You can install a Foundation during ArcSight ESM installation or from the ArcSight Console any time after installation.  Shared Libraries - ArcSight Administration and several of the ArcSight Foundations rely on a series of common resources that provide core functionality for common security scenarios. Dependencies between these resources and the packages they support are managed by the Package resource.  Anti Virus content is a set of filters, reports, and report queries used by ArcSight Foundations, such as Configuration Monitoring and Intrusion Monitoring.  Conditional Variable Filters content is a library of filters used by variables in standard content report queries, filters, and rule definitions. The Conditional Variable Filters are used by ArcSight Administration and certain ArcSight Foundations, such as Configuration Monitoring, Intrusion Monitoring, Network Monitoring, and Workflow.  Global Variables content is a set of variables used to create other resources and to provide event-based fields that cover common event information, asset, host, and user information, and commonly used timestamp formats. The Global Variables are used by ArcSight Administration and certain ArcSight Foundations.  Monitoring Support Data content is a set of active lists that store mapping information for HTTP return status code classes, Cisco firewall syslog message types, and encoded logon types.  Network filters content is a set of filters required by ArcSight Administration and certain ArcSight Foundations, such as Intrusion Monitoring and Network Monitoring. The ArcSight Admin DB CORR and ArcSight Search Filters content packages are installed automatically when you perform a new ArcSight ESM installation. However, when you upgrade your ArcSight ESM system, these content packages are not installed automatically. You can install these packages from the ArcSight Console any time after upgrade by right-clicking the package on the Packages tab in the Navigator and selecting Install Package. Refer to the ArcSight ESM Upgrade Guide for information about upgrading ArcSight ESM. The resources in the ArcSight Core Security, ArcSight Administration, ArcSight DB CORR, Conditional Variable Filters, Global Variables, and Network Filters content packages are not locked even though they manage core functionality; HP recommends that you do not delete or modify these resources unless you are an advanced user who understands fully the resources and their dependencies.
  • 7. 1 IPv6 Overview Confidential IPv6 Standard Content Guide 7 Standard Content Packages Standard content comes in packages (.arb files) that are either installed automatically or presented as an install-time option. The following graphic outlines the packages. Figure 1-1 The ArcSight Core Security, ArcSight Administration, and ArcSight System packages at the base provide content required for basic ArcSight functionality. The common packages in the center contain shared resources that support multiple packages. The packages shown on top are ArcSight Foundations that address common network security and management scenarios. Depending on the options you install, you will see the ArcSight Core Security, ArcSight Administration, and ArcSight System resources and some or all of the other package content. IPv6 Content The IPv6 content reports on data that comes from networks with IPv6 addresses. This guide describes the IPv6 content. For information about ArcSight Core Security, ArcSight Administration, or ArcSight System content, refer to the ArcSight Core Security, ArcSight Administration, and ArcSight System Standard Content Guide. For information about an optional ArcSight Foundation, refer to the Standard Content Guide for that Foundation. ESM documentation is available on Protect 724 (https://protect724.arcsight.com). When creating your own packages, you can explicitly include or exclude system resources in the package. Exercise caution if you delete packages that might have system resources; for example, zones. Make sure the system resources either belong to a locked group or are themselves locked. For more information about packages, refer to the ArcSight Console User’s Guide.
  • 8. 1 IPv6 Overview 8 IPv6 Standard Content Guide Confidential
  • 9. Confidential IPv6 Standard Content Guide 9 Chapter 2 Installation and Configuration This chapter discusses the following topics. Installing the IPv6 Package The IPv6 package is one of the standard content packages that are presented as install-time options. If you selected all of the standard content packages to be installed at installation time, the packages and their resources are installed in the ArcSight Database and available in the Navigator panel resource tree. The package icons in the Navigator panel package view appear blue. If you opted to exclude a Foundation package during ESM installation, the package is imported into the Packages tab in the Navigator panel automatically, but is not available in the resource view. The package icon in the package view appears grey. If you do not want the package to be available in any form, you can delete the package. To install a package that is imported, but not installed: 1 On the Navigator panel Packages tab, navigate to the package you want to install. 2 Right-click the package and select Install Package. 3 In the Install Package dialog, click OK. 4 When the installation is complete, review the summary report and click OK. The package resources are fully installed to the ArcSight Database, the resources are fully enabled and operational, and available in the Navigator panel resource tree. To uninstall a package that is installed: 1 On the Navigator Panel Packages tab, navigate to the package you want to uninstall. 2 Right-click the package and select Uninstall Package. 3 In the Uninstall Package dialog, click OK. The progress of the uninstall displays in the Progress tab of the Uninstalling Packages dialog. If a message displays indicating that there is a conflict, select an option in the Resolution Options area and click OK. 4 When uninstall is complete, review the summary and click OK. “Installing the IPv6 Package” on page 9 “Configuring IPv6 Content” on page 10
  • 10. 2 Installation and Configuration 10 IPv6 Standard Content Guide Confidential The package is removed from the ArcSight Database and the Navigator panel resource tree, but remains available in the Navigator panel Packages tab, and can be re-installed at another time. To delete a package and remove it from the ArcSight Console and the ArcSight Database: 1 On the Navigator Panel Packages tab, navigate to the package you want to delete. 2 Right-click the package and select Delete Package. 3 When prompted for confirmation, click Delete. The package is removed from the Navigator panel Packages tab. Configuring IPv6 Content The IPv6 content is triggered by events from IPv6-enabled SmartConnectors. Contact your HP ArcSight sales representative for a list of IPv6-enabled SmartConnectors. A network model keeps track of the network nodes participating in the event traffic. Modeling your network and categorizing critical assets using the standard asset categories is what activates some of the standard content and makes it effective. For information about populating the network model, refer to the ArcSight Console User’s Guide. To learn more about the architecture of the ESM network modeling tools, refer to the ESM 101 guide. The IPv6 content contains many reports. You can run reports on demand, automatically on a regular schedule, or both. By default, IPv6 reports are not scheduled to run automatically. Evaluate the reports that come with IPv6, and schedule the reports that are of interest to your organization and business objectives. For instructions about how to schedule reports, refer to the ArcSight Console User’s Guide.
  • 11. Confidential IPv6 Standard Content Guide 11 Chapter 3 IPv6 Use Case The IPv6 content shows data that comes from networks with IPv6 addresses. Configuration Refer to “Configuring IPv6 Content” on page 10 for configuration information. Resources The following table lists all the resources explicitly assigned to the IPv6 use case and includes dependent resources. Dependent resources are not listed in a use case resource on the ArcSight Console. Table 3-1 Resources that Support the IPv6 Group Resource Description Type URI Monitor Resources Successful Logins by Destination IPv6 Address This report shows authentication successes from login attempts by destination IPv6 address. A chart shows the top destination addresses with successful login attempts. A table shows the count of authentication successes by destination-source pair and by user. Report ArcSight Foundation/IPv6/ Top Alert IPv6 Destinations This report shows the top IDS and IPS alert destinations per day. Report ArcSight Foundation/IPv6/ Top IDS Signature IPv6 Sources per Day This report shows the top IDS signature sources per day. Report ArcSight Foundation/IPv6/ Attacker IPv6 Counts by ArcSight Priority This report displays a table with the priority, attacker IPv6 address and the count of attack events where the category significance starts with Compromise or Hostile. Report ArcSight Foundation/IPv6/
  • 12. 3 IPv6 Use Case 12 IPv6 Standard Content Guide Confidential Attacker Counts by IPv6 Device This report displays a table with the device IPv6 address, attacker IPv6 address, and the count of attacker events where the category significance starts with Compromise or Hostile. Report ArcSight Foundation/IPv6/ Top IDS Signature IPv6 Destinations per Day This report shows the top IDS signature destinations per day. Report ArcSight Foundation/IPv6/ Target Counts by IPv6 Attacker This report displays the attacker address, target address, and the sum of the aggregated event count for events matching the Attack Events filter. Report ArcSight Foundation/IPv6/ Target Counts by IPv6 Device This report displays the device address, target address, and the sum of the aggregated event count for events matching the Attack Events filter. Report ArcSight Foundation/IPv6/ Denied Outbound Connections by IPv6 Address This report shows a summary of the denied outbound traffic by local address. A chart shows the top IPv6 addresses with the highest denied connections count. A report lists all the addresses sorted by connection count. Report ArcSight Foundation/IPv6/ Target IPv6 Counts by ArcSight Priority This report displays the priority, target address, and the sum of the aggregated event count for events matching the Attack Events filter. Report ArcSight Foundation/IPv6/ Top Alert IPv6 Sources This report shows the top IDS and IPS alert sources per day. A chart shows the top IDS and IPS alert source IP addresses. A table shows the top alert source IP addresses, as well as the device vendor and product of the reporting device. Report ArcSight Foundation/IPv6/ Successful Logins by Source IPv6 Address This report shows authentication successes from login attempts by source IPv6 address. A chart shows the top source addresses with successful login attempts. A table shows the count of authentication successes by source-destination pair and by user. Report ArcSight Foundation/IPv6/ Resource Description Type URI
  • 13. 3 IPv6 Use Case Confidential IPv6 Standard Content Guide 13 Top IPv6 Talkers This report shows the top talkers and a detailed list of the top talkers. Report ArcSight Foundation/IPv6/ Denied Inbound Connections by IPv6 Address This report shows a summary of the denied inbound traffic by foreign address. A chart shows the top IPv6 addresses with the highest denied connections count. A report lists all the addresses sorted by connection count. Report ArcSight Foundation/IPv6/ Top N Attacked IPv6 Targets This report shows the Target Address and the sum of the Aggregated Event Count for events matching the Attack Events filter. Report ArcSight Foundation/IPv6/ Alert Counts by IPv6 Device This report shows the count of IDS and IPS alerts by device. A chart shows the top device IPv6 addresses with the highest counts. A table shows the list of all the devices, grouped by device vendor and product, then sorted by count. Report ArcSight Foundation/IPv6/ Top IPv6 Attackers This report displays a chart of the attacker address, and the count of events where the category significance starts with Compromise or Hostile. Report ArcSight Foundation/IPv6/ Top N IPv6 Attacker Details This report displays the priority, attacker address, and the count of attack events where the category significance starts with Compromise or Hostile. The query uses the sum of the aggregated event count instead of counting the EventID so that attackers are not split by the attack type. Report ArcSight Foundation/IPv6/ Failed Logins by Destination IPv6 Address This report shows authentication failures from login attempts by destination IPv6 address. A chart shows the top destination addresses with failed login attempts. A table shows the count of authentication failures by destination-source pair and by user. Report ArcSight Foundation/IPv6/ Resource Description Type URI
  • 14. 3 IPv6 Use Case 14 IPv6 Standard Content Guide Confidential Failed Logins by Source IPv6 Address This report shows authentication failures from login attempts by source IPv6 address. A chart shows the top source addresses with failed login attempts. A table shows the count of authentication failures by source-destination pair and by user. Report ArcSight Foundation/IPv6/ Attacker Counts By IPv6 Target This report displays the attacker IPv6 address, the event name, and the count of attack events where the category significance starts with Compromise or Hostile, for the address specified in the parameters. Report ArcSight Foundation/IPv6/ Target IPv6 Counts by Event Name This report displays the event name, target address, and the sum of the aggregated event count for events matching the Attack Events filter. Report ArcSight Foundation/IPv6/ Library Resources Protected This is a site asset category. Asset Category Site Asset Categories/Address Spaces Agent IPv6 Address This variable is an alias for Device Custom IPv6 Address4. Global Variable ArcSight Foundation/Variables Library/IPv6 Target IPv6 Address This field denotes the Target IPv6 address. The term target is dependent upon the originator field, such as Source or Destination, depending on the specific event. If the originator field is Destination, return Device Custom IPv6 Address2 (aliased as Destination IPv6 Address), or return Device Custom IPv6 Address1 (aliased as Source IPv6 Address). Global Variable ArcSight Foundation/Variables Library/IPv6 Source IPv6 Address This variable is an alias for Device Custom IPv6 Address1. Global Variable ArcSight Foundation/Variables Library/IPv6 Destination IPv6 Address This variable is an alias for Device Custom IPv6 Address2. Global Variable ArcSight Foundation/Variables Library/IPv6 Resource Description Type URI
  • 15. 3 IPv6 Use Case Confidential IPv6 Standard Content Guide 15 Attacker IPv6 Address This field denotes the Attacker IPv6 address. The term attacker is dependent upon the originator field, such as Source or Destination, depending on the specific event. If the originator field is Source, return Device Custom IPv6 Address1 (aliased as Source IPv6 Address), or return Device Custom IPv6 Address2 (aliased as Destination IPv6 Address). Global Variable ArcSight Foundation/Variables Library/IPv6 Device IPv6 Address This variable is an alias for Device Custom IPv6 Address3. Global Variable ArcSight Foundation/Variables Library/IPv6 Attack IPv6 Events This filter selects events where the category significance starts with Compromise or Hostile. Filter ArcSight Foundation/IPv6/ External Source This filter identifies events originating from outside the company network. Filter ArcSight Foundation/Common/Network Filters/Boundary Filters Inbound Events This filter identifies events coming from the outside network targeting inside the company network. Filter ArcSight Foundation/Common/Network Filters/Location Filters External Target This filter identifies events targeting the outside network. Filter ArcSight Foundation/Common/Network Filters/Boundary Filters Outbound Events This filter identifies events originating from inside the company network, targeting the outside network. Filter ArcSight Foundation/Common/Network Filters/Location Filters Internal Source This filter identifies events coming from inside the company network. Filter ArcSight Foundation/Common/Network Filters/Boundary Filters Internal Target This filter identifies events targeting inside the company network. Filter ArcSight Foundation/Common/Network Filters/Boundary Filters IDS -IPS IPv6 Events This filter passes Intrusion Detection System (IDS) and Intrusion Prevention System (IPS) events. Filter ArcSight Foundation/IPv6/ Denied Inbound Connections by IPv6 Address This query identifies the count of denied inbound connections by foreign address (address and hostname). Query ArcSight Foundation/IPv6/ Resource Description Type URI
  • 16. 3 IPv6 Use Case 16 IPv6 Standard Content Guide Confidential Failed Logins by IPv6 Source- Destination Pair This query returns authentication failure events from login attempts. The query returns the source address, source host name, destination address, destination host name, user name, user ID, count of failed logins, and device group. Query ArcSight Foundation/IPv6/ Denied Outbound Connections by IPv6 Address This query identifies the count of denied outbound connections by local address (address and hostname). Query ArcSight Foundation/IPv6/ Failed Logins by Destination IPv6 Address (Chart) This query returns authentication failure events from login attempts, including the count of failed login attempts by destination address. Query ArcSight Foundation/IPv6/ Target IPv6 Counts by Event Name This query returns the event name, target address and the sum of the aggregated event count for events matching the Attack Events filter. Query ArcSight Foundation/IPv6/ Top 10 IPv6 Attackers This query identifies the attacker address, and the count of events where the category significance starts with Compromise or Hostile. The query uses the sum of the aggregated event count instead of counting the EventID so that attackers are not split by the attack type. Query ArcSight Foundation/IPv6/ Target Counts by IPv6 Attacker This query returns the attacker address, target address and the sum of the aggregated event count for events matching the Attack Events filter. Query ArcSight Foundation/IPv6/ Target Counts by IPv6 Device This query returns the device address, target address and the sum of the aggregated event count for events matching the Attack Events filter. Query ArcSight Foundation/IPv6/ Top 10 Attacked IPv6 Targets This query selects the Target IPv6 Address and the sum of the Aggregated Event Count for events matching the Attack IPv6 Events filter. Query ArcSight Foundation/IPv6/ Resource Description Type URI
  • 17. 3 IPv6 Use Case Confidential IPv6 Standard Content Guide 17 Attacker Counts by IPv6 Device This query identifies the device address, attacker address, and the count of events where the category significance starts with Compromise or Hostile. Query ArcSight Foundation/IPv6/ Successful Logins by Source IPv6 Address (Chart) This query returns authentication success events from login attempts. Query ArcSight Foundation/IPv6/ Alert Counts by IPv6 Device This query returns the count of IDS and IPS alerts by device vendor, product, address and hostname. Query ArcSight Foundation/IPv6/ Top 10 IPv6 Talkers This query returns the attacker address and the count of events in which the category significance starts with Compromise or Hostile. The query uses the sum of the aggregated event count instead of counting the EventID so that attackers are not split by the event name. Query ArcSight Foundation/IPv6/ Top IDS Signature IPv6 Sources per Day This query returns the attacker address, device vendor, device product, and the count of the events within the query timeframe. Query ArcSight Foundation/IPv6/ Top IDS Signature IPv6 Destinations per Day This query returns the target address, device vendor, device product, and the count of the events within the query timeframe. Query ArcSight Foundation/IPv6/ Successful Logins by Destination IPv6 Address (Chart) This query returns authentication success events from login attempts, including the count of failed login attempts by destination address. Query ArcSight Foundation/IPv6/ Top Alert IPv6 Sources This query identifies the count of IDS and IPS alerts by source address, device vendor, and device product. Query ArcSight Foundation/IPv6/ Top 10 IPv6 Attacker Details This query identifies the priority, attacker address, and the count of events where the category significance starts with Compromise or Hostile. The query uses the sum of the aggregated event count instead of counting the EventID so that attackers are not split by the attack type. Query ArcSight Foundation/IPv6/ Resource Description Type URI
  • 18. 3 IPv6 Use Case 18 IPv6 Standard Content Guide Confidential Target IPv6 Counts by ArcSight Priority This query returns the priority, target address and the sum of the aggregated event count for events matching the Attack Events filter. Query ArcSight Foundation/IPv6/ Attacker Counts By IPv6 Target This query identifies the attacker IPv6 address, the event name, and the count of events where the category significance starts with Compromise or Hostile for the target information given in the parameters. Query ArcSight Foundation/IPv6/ Failed Logins by Source IPv6 Address (Chart) This query returns authentication failure events from login attempts, including the count of failed login attempts by source address. Query ArcSight Foundation/IPv6/ Attacker IPv6 Counts by ArcSight Priority This query identifies the priority, attacker address, and the count of events where the category significance starts with Compromise or Hostile. Query ArcSight Foundation/IPv6/ Successful Logins by IPv6 Source-Destination Pair This query returns authentication success events from login attempts. Query ArcSight Foundation/IPv6/ Top Alert IPv6 Destinations This query returns the count of IDS and IPS alerts by destination address, device vendor, and device product. Query ArcSight Foundation/IPv6/ Top 10 IPv6 Targets This query returns the target address and the sum of the aggregated event count for events matching the Attack Events filter used in several reports. Query ArcSight Foundation/IPv6/ Resource Description Type URI
  • 19. Confidential IPv6 Standard Content Guide 19 A Agent IPv6 Address global variable 14 Alert Counts by IPv6 Device query 16 Alert Counts by IPv6 Device report 13 ArcSight Administration overview 5 ArcSight Core Security overview 5 ArcSight Foundations overview 6 ArcSight System overview 6 asset categories Protected 14 Attack IPv6 Events filter 15 Attacker Counts by IPv6 Device query 16 Attacker Counts by IPv6 Device report 12 Attacker Counts By IPv6 Target query 17 Attacker Counts By IPv6 Target report 14 Attacker IPv6 Address global variable 14 Attacker IPv6 Counts by ArcSight Priority query 17 Attacker IPv6 Counts by ArcSight Priority report 11 C content packages 7 D Denied Inbound Connections by IPv6 Address query 15 Denied Inbound Connections by IPv6 Address report 13 Denied Outbound Connections by IPv6 Address query 15 Denied Outbound Connections by IPv6 Address report 12 Destination IPv6 Address global variable 14 Device IPv6 Address global variable 14 E External Source filter 15 External Target filter 15 F Failed Logins by Destination IPv6 Address (Chart) query 15 Failed Logins by Destination IPv6 Address report 13 Failed Logins by IPv6 Source-Destination Pair query 15 Failed Logins by Source IPv6 Address (Chart) query 17 Failed Logins by Source IPv6 Address report 13 filters Attack IPv6 Events 15 External Source 15 External Target 15 IDS -IPS IPv6 Events 15 Inbound Events 15 Internal Source 15 Internal Target 15 Outbound Events 15 G global variables Agent IPv6 Address 14 Attacker IPv6 Address 14 Destination IPv6 Address 14 Device IPv6 Address 14 Source IPv6 Address 14 Target IPv6 Address 14 I IDS -IPS IPv6 Events filter 15 Inbound Events filter 15 Internal Source filter 15 Internal Target filter 15 O Outbound Events filter 15 P packages deleting 10 installing 9 uninstalling 9 Protected asset category 14 Q queries Alert Counts by IPv6 Device 16 Attacker Counts by IPv6 Device 16 Attacker Counts By IPv6 Target 17 Attacker IPv6 Counts by ArcSight Priority 17 Denied Inbound Connections by IPv6 Address 15 Denied Outbound Connections by IPv6 Address 15 Failed Logins by Destination IPv6 Address (Chart) 15 Failed Logins by IPv6 Source-Destination Pair 15 Failed Logins by Source IPv6 Address (Chart) 17 Successful Logins by Destination IPv6 Address (Chart) 17 Successful Logins by IPv6 Source-Destination Pair 18 Successful Logins by Source IPv6 Address (Chart) 16 Target Counts by IPv6 Attacker 16 Index
  • 20. 20 IPv6 Standard Content Guide Confidential Target Counts by IPv6 Device 16 Target IPv6 Counts by ArcSight Priority 17 Target IPv6 Counts by Event Name 16 Top 10 Attacked IPv6 Targets 16 Top 10 IPv6 Attacker Details 17 Top 10 IPv6 Attackers 16 Top 10 IPv6 Talkers 16 Top 10 IPv6 Targets 18 Top Alert IPv6 Destinations 18 Top Alert IPv6 Sources 17 Top IDS Signature IPv6 Destinations per Day 17 Top IDS Signature IPv6 Sources per Day 17 R reports Alert Counts by IPv6 Device 13 Attacker Counts by IPv6 Device 12 Attacker Counts By IPv6 Target 14 Attacker IPv6 Counts by ArcSight Priority 11 Denied Inbound Connections by IPv6 Address 13 Denied Outbound Connections by IPv6 Address 12 Failed Logins by Destination IPv6 Address 13 Failed Logins by Source IPv6 Address 13 Successful Logins by Destination IPv6 Address 11 Successful Logins by Source IPv6 Address 12 Target Counts by IPv6 Attacker 12 Target Counts by IPv6 Device 12 Target IPv6 Counts by ArcSight Priority 12 Target IPv6 Counts by Event Name 14 Top Alert IPv6 Destinations 11 Top Alert IPv6 Sources 12 Top IDS Signature IPv6 Destinations per Day 12 Top IDS Signature IPv6 Sources per Day 11 Top IPv6 Attackers 13 Top IPv6 Talkers 12 Top N Attacked IPv6 Targets 13 Top N IPv6 Attacker Details 13 S shared libraries 6 Source IPv6 Address global variable 14 Successful Logins by Destination IPv6 Address (Chart) query 17 Successful Logins by Destination IPv6 Address report 11 Successful Logins by IPv6 Source-Destination Pair query 18 Successful Logins by Source IPv6 Address (Chart) query 16 Successful Logins by Source IPv6 Address report 12 T Target Counts by IPv6 Attacker query 16 Target Counts by IPv6 Attacker report 12 Target Counts by IPv6 Device query 16 Target Counts by IPv6 Device report 12 Target IPv6 Address global variable 14 Target IPv6 Counts by ArcSight Priority query 17 Target IPv6 Counts by ArcSight Priority report 12 Target IPv6 Counts by Event Name query 16 Target IPv6 Counts by Event Name report 14 Top 10 Attacked IPv6 Targets query 16 Top 10 IPv6 Attacker Details query 17 Top 10 IPv6 Attackers query 16 Top 10 IPv6 Talkers query 16 Top 10 IPv6 Targets query 18 Top Alert IPv6 Destinations query 18 Top Alert IPv6 Destinations report 11 Top Alert IPv6 Sources query 17 Top Alert IPv6 Sources report 12 Top IDS Signature IPv6 Destinations per Day query 17 Top IDS Signature IPv6 Destinations per Day report 12 Top IDS Signature IPv6 Sources per Day query 17 Top IDS Signature IPv6 Sources per Day report 11 Top IPv6 Attackers report 13 Top IPv6 Talkers report 12 Top N Attacked IPv6 Targets report 13 Top N IPv6 Attacker Details report 13