System Settings is used to configure all the system related settings.
Go to Settings >> System Settings from the navigation bar and click System Settings.
Select General.
General - System Settings¶
Enter a Logpoint Name.
Enter a Browser tab title, this title is appended to the title of the tab.
Enter or update the Server Alias. Updating it does not update the system IP Address or the DNS.
Note
Identifier is the unique value given to each Logpoint.
Modes contains the options Search Head and Distributed Logpoint. Selecting either of these options does not have any effect on Logpoint. The Modes field is made available for future implementation of the Logpoint Director (Director Console).
Select the Default Login Screen for the Logpoint.
In Session Inactivity Timeout, Timeout (minutes), enter a specific period of time, in minutes, when Logpoint users are timed out.
Provide the Base Repo Path for High Availability to alter the default path /opt/immune/storage/. It is the base path for the repos from the remote machine.
Select either Collection Timestamp (col_ts) or Log Timestamp (log_ts) as per your requirement. The col_ts denotes the time when the log was collected in Logpoint, and the log_ts denotes the time when a device generated the log. The time conversion of log_ts occurs when a Normalization Policy is applied to the appropriate Collectors/Fetchers. Depending on the selection made in the Apply Time Range On section, either log_ts or col_ts value is displayed on the top of each row of the search results. Similarly, the time displayed in the search graph may either be log_ts or col_ts depending on the selection made.
Choose the Over Scan Period (in minutes and a Time Zone. The overscan period is the extra period (apart from the selected period) in which Logpoint searches for logs. Both the col_ts and the log_ts fields are saved in UTC and displayed according to the selected time zone.
Note
Both the log_ts and col_ts key-value pairs are displayed in the search results.
The Time Range is applied either on the col_ts or the log_ts across all the Distributed Logpoints.
Select a Time Zone.
Select Enable SOAR in Logpoint to enable incident investigation with Playbooks and Cases. Go to Getting Started with SOAR for details.
Note
Enabling or disabling SOAR may take some time depending on available memory.
SOAR is always disabled in the Logpoint Collector and Syslog Forwarder modes.
Click Save.
You need to configure SMTP so the alert engine can use it to forward information and Logpoint can send e-mails. You will also need to configure SMTP before using the Data Privacy Module.
Go to Settings >> System Settings from the navigation bar and click System Settings.
Select SMTP.
SMTP - System Settings¶
Provide the Server/Port.
Provide a Sender Name and an Email address.
If you enable the Login Required option, provide the Username and the Password.
Click Save.
To test the configuration, go through the following steps:
Click the SMTP Test section.
Enter the Subject of the test e-mail.
Provide an Email address.
Enter a Message.
Click Test SMTP.
SNMP Test¶
NTP synchronizes the time of your Logpoint with a network timeserver.
Go to Settings >> System Settings from the navigation bar and click System Settings.
Select NTP.
NTP - System Settings¶
Select Is NTP enable?.
Provide the Server address. You can add multiple server addresses by clicking the plus icon.
Click Save.
If you enable the SNMP port, your Logpoint listens to the OIDs that are forwarded to the 161 port.
Go to Settings >> System Settings from the navigation bar and click System Settings.
Select SNMP.
SNMP - System Settings¶
Choose to Enable or Disable the SNMPD(UDP 161) port. Provide the Community String if you choose the Enable option.
Click Save.
Note
To get the exposed OID for the Logpoint, run the following snmpwalk command:
snmpwalk -v 2c -c public <ip_of_Logpoint>.
HTTPS authenticates Logpoint and prevents eavesdroppers from accessing the data in the network. HTTPS secures the server connection so Logpoint users can safely access Logpoint from the Internet.
You must have a certificate and a key to enable the HTTPS.
Go to Settings >> System Settings from the navigation bar and click System Settings.
Select HTTPS.
HTTPS - System Settings¶
Click Browse to find and select the Certificate. The certificate file must have a .CRT extension and must meet the PEM encoded x.509 standard. If you have HTTPS certificates less than 2048 bits, you can’t upgrade to Logpoint v6.0.0 Patch. Logpoint certificates do not replace existing user certificates of 2048 bits.
Click Browse to find and select the Key. The key file must have a .Key extension.
Click Save.
You can add a custom TLS certificate for log collection via Syslog. The added certificate is used by the Syslog collector to collect logs through TLS on port 6514.
Go to Settings >> System Settings from the navigation bar and click System Settings.
Select Syslog.
Syslog TLS - System Settings¶
Upload your TLS Certificate and Key. The certificate must have the .crt extension and the key must have the .key extension. Only Logpoint Administrators can add a certificate and key. The certificate must be of PEM encoded x.509 standard.
Enable Add sequence numbers on log received from syslog collector to provide a sequence number to the syslogs. The number is assigned on a device per protocol basis to each log collected from the Syslog Collector.
In Message length, you can define the size for Syslog messages. The maximum message size can be 64 KB, with a default size of 12 KB. Any message that exceeds the maximum size is divided into multiple events and truncated at the defined size. For example, if the message length is 40 KB, logs larger than that size are chunked into 40 KB segments.
Click Save.
The Support Connection creates an encrypted end-to-end communication channel between Logpoint and Logpoint support. It is used by Logpoint Support to understand, troubleshoot, and fix the issues on your deployment issues.
Before enabling support connection, make sure that your firewall is not blocking the connection from your Logpoint to the following:
Domain |
Port |
|---|---|
reverse.logpoint.com |
1193/UDP |
customer.logpoint.com |
443/TCP |
Go to Settings >> System Settings from the navigation bar and click System Settings.
Select Support Connection.
Enabling Support Connection¶
Enable Support Connection. Logpoint starts retrieving the support connection IP.
![]()
Retrieved Support Connection IP¶
Provide the retrieved support connection IP to the Logpoint Support team.
Provide the Support Connection Enable Duration. The support session expires after it exceeds the duration.
Note
Support connection never expires if you select 0:0:0 as the time duration, or Enable Support Connection Forever.
Click Save.
Logpoint can be operated in two modes using the Modes of Operation.
Logpoint Collector
Syslog Forwarder
You can convert a regular Logpoint into either a Logpoint Collector or a Syslog Forwarder.
Modes of Operation - System Settings¶
Logpoint Collector collects logs from different sources, normalizes them using the signatures applied, and forwards them to a configured remote Logpoint. The remote Logpoint configures the sources and the storage locations for the logs. Logpoint Collector can only collect the logs. Therefore, it does not contain the Dashboards, the Search, the Report, and the Logpoint SOAR sections. The name of each Logpoint node must be unique in a distributed deployment.
You need at least two Logpoint servers, one as the Collector and another as the Main Logpoint.
Go to Settings >> System Settings from the navigation bar and click System Settings.
Select Modes of Operation.
Configuring Logpoint Collector¶
In Logpoint Collector Configuration, select Is this a Logpoint Collector Installation?.
Select Enable Buffering to store the data in local persistence during a network outage.
Note
By default, the logs are stored in the buffer for 7 days. If you want to change the default retention period, contact Logpoint Support.
Click Save.
Switch to the Main Logpoint.
6.1. Go to Settings >> System Settings from the navigation bar and click Open Door.
6.2. Enable Open Door.
6.3. Note the Private IP and the Password.
Enabling Open Door¶
Switch to the Collector Logpoint.
7.1. Go to Settings >> Configuration from the navigation bar and click Remote Logpoint.
7.2. Enter the IP Address of the Main Logpoint, the Password, and the Private IP.
Configuring Remote Logpoint¶
The Collector is automatically added under Settings >> Configuration from the navigation bar and click Distributed Collector in the Main Logpoint. Activate it from the Actions column.
Configured Collector setting in Main LP¶
You can use the Collector to collect logs by adding it as a device in the Main Logpoint.
In the Main Logpoint, go to Settings >> Configuration from the navigation bar and click Devices.
Click Add.
Specify the Collector as a Distributed Collector.
To verify the connection between the devices, switch to the Collector Logpoint.
Go to View Devices.
Device Setting - View Devices¶
To distinguish logs collected and normalized through the Collector, you can use the system defined field, collected_at in the search query.
Note
If you disable the Collector, make sure that you remove it from the list of devices on the Main Logpoint.
If you change the password on the Collector machine from Settings >> Remote Logpoint, all the services of the Collector restart. The logs are not collected until the Collectors and Fetchers are up and running.
Syslog Forwarder collects logs from different sources, normalizes them using the signatures applied, and forwards them to a configured Logpoints and a target storage. Unlike Logpoint Collectors, Syslog Forwarder can not act as a buffer.
Syslog Forwarder was implemented to introduce the concept of Air Gap. The Main Logpoints are usually located in high-security zones whereas Syslog Forwarders and other devices are in low-security zones.
Go to Settings >> System settings from the navigation bar and click System Settings.
Select Modes of Operation.
In Syslog Forwarder, select the Is this a Syslog Forwarder installation?.
Modes of Operation - Syslog Forwarder¶
Click Save.
Logs from Syslog Forwarder¶
To use a Syslog Forwarder after converting it, you need to:
Exporting a config file
Importing the config file
Adding target
Adding devices
Exporting a config file
Switch to the Main Logpoint and go to Settings >> Configuration from the navigation bar and click Distributed Logpoints.
Add a Syslog Forwarder. Refer to the Adding a Syslog Forwarder.
Click the Export configuration icon in the Actions column of the concerned Syslog Forwarder.
Export configuration¶
The config file is downloaded on your machine.
Save the config file.
Importing the config file
Switch to the Syslog Forwarder and go to Settings >> System Settings from the navigation bar and click Sync.
Sync config file¶
Click Import Data.
Import config file¶
Browse for the config file saved earlier.
Click Upload.
Adding a Target
Targets are Logpoints that receive logs from Syslog Forwarder.
On the Syslog Forwarder, go to Settings >> Configuration from the navigation bar and click Syslog Forwarder.
Click Targets.
Remote Target¶
Click Add IP.
Enter the Name and IP address of the target.
Specify the Pattern of the logs to be forwarded. If you do not specify a pattern, all the logs are forwarded.
Provide a Port number for the input port of the remote target machine.
Mark the Enable UDP checkbox to use the User Datagram Protocol (UDP). If you do not select the option, TCP is used.
If you Enable UDP, choose the UDP Size (In Bytes).
Add IP¶
Click Submit.
Adding a Target Storage
Target storage enables airgap in low-security zones.
On the Syslog Forwarder, go to Settings >> Configuration from the navigation bar and click Syslog Forwarder.
Click Targets. Click Add Storage.
Provide the Name of the storage.
Specify the Path to the remote storage. The format of the path should be:
//<IP Address>/<Path>/
For example: //192.168.2.247/storage/
Specify the Pattern of the logs to be forwarded. If you do not specify a pattern, all the logs are forwarded.
Provide the Username and the Password.
Add Storage¶
Click Submit.
Note
You can add multiple Remote Targets but only one Target Storage. The Add Storage option is disabled once the configuration for a target is complete.
For each IP added as the Remote Target, add Syslog Forwarder in the respective target Logpoint.
Adding a Device
On the Syslog Forwarder, go to Settings >> Configuration from the navigation bar and click Syslog Forwarder.
Click Add.
Note
The Device section lists all the devices configured as the Syslog Forwarder in the Main Logpoint.
Select devices by double-clicking on them.
Provide Remote Target(s). It can be a remote IP or a remote storage.
Click Submit.
Configure Devices¶
Go to Settings >> Configuration and click on Devices.
Find the Remote Target and click on the “+” icon in the Actions column.
Select Syslog Forwarder File Fetcher.
Adding Syslog Forwarder File Fetcher¶
Add Syslog Forwarder File Fetcher with following details:
Charset: <desired charset> (utf8 by default)
Remote Path: <add the path of the remote storgae>
Username: <username of remote machine>
Password: <system password of remote machine>
Click Submit.
Note
The logs stored in storage device contains the device_name=”<end device name>”. Use search query device_name=<end_device_name> to verify the logs from the remote target.
A Logpoint Administrator can generate SSH certificates for the li-admin.
Go to Settings >> System Settings from the navigation bar and click System Settings.
Select SSH Key Pair for li-admin.
Provide a Pass Phrase.
Click Regenerate Key Pair.
The Lockout Policy lets the admin users control user login and password security.
Lockout threshold: The number of failed login attempts that locks a user account. The default is five attempts. You can set the threshold anywhere from 0 to 999, where 0 means a user account is never locked.
After three consecutive failed login attempts, the use of CAPTCHA authentication in addition to the username and password is required. If there are additional unsuccessful login attempts, due to a wrong username, password, or CAPTCHA authentication, and the specified lockout threshold is reached, an account is locked for the specified lockout duration.
Lockout duration: The number of minutes an account remains locked. By default, the lockout duration is 30 minutes. When the lockout duration is over, there is one more login attempt. If this attempt fails, the account is locked for the additional specified lockout period. This process continues until a user logs in with valid credentials. The lockout duration can be between 1 to 99999.
Note
After a user is locked out, a User Locked icon appears in the Actions column of the respective user under Settings >> User Accounts from the navigation bar and Users. The Logpoint administrator can unlock the locked users by clicking the icon.
Go to Settings >> System Settings from the navigation bar and click System Settings.
Select Lockout Policy.
Configuring Lockout Policy¶
Select a Lockout threshold from the drop-down list. The default is 5.
Enter the Lockout duration. The default is 30 minutes.
Click Reset if you want to reset the values to default.
Click Submit.
Enrichment settings manage whether you use Standalone Mode and Enrichment Propagation Mode. To learn how to setup Enrichment, go to Enrichment Sources.
Before configuring Enrichment in either of the modes, it is necessary to configure some prerequisites in Logpoint. These essentials include Enrichment Sources, Enrichment Policies, Normalization Policies, and Processing Policies.
..Note
Integrations associated with the enrichment sources need to be installed before adding an enrichment source. For example, if you need to add an ODBC enrichment source, the ODBC Enrichment Source plugin must be present in the LogPoint.
Enrichment settings manage whether you use Standalone Mode and Enrichment Propagation. To learn how to setup Enrichment, go to `Enrichment Sources </docs/data-integration-guide/en/latest/Configuration/Enrichment%20Sources.html>`_.
In Standalone Mode, you need to add enrichment sources to Logpoint and perform the enrichment in the same Logpoint. To utilize enrichment from other Logpoints, see Enrichment Propagation.
For more information, go to Enrichment Sources for details on adding enrichment sources.
Enrichment Propagation uses multiple Logpoints to perform enrichment tasks. A Logpoint machine can be either an enrichment provider or an enrichment subscriber. You must set up a Distributed Logpoint connection to configure Logpoint in the Enrichment Propagation mode.
Enrichment Provider: Collects raw data and shares it with enrichment subscribers. It keeps a list of all the IP Addresses of enrichment subscribers.
Enrichment Subscriber: Receives enrichment data from an enrichment provider to create rules for the enrichment process. It also acts as a bridge between a Logpoint Collector and an enrichment provider. For Enrichment Subscribers, the Enrichment Sources option in Settings >> Configuration page is disabled. They have to use the sources of an enrichment provider.
You can have any number of enrichment subscribers but only one enrichment provider. One enrichment provider can be connected to:
A single enrichment subscriber
Multiple enrichment subscribers
A single enrichment subscriber connected to a Logpoint Collector
Multiple enrichment subscribers connected to multiple Logpoint Collectors
When setting up Enrichment Propagation, make sure to configure an Enrichment Provider first. After setting up an Enrichment Provider, then setup the Enrichment Subscribers. When setting up an existing Logpoint instance as an Enrichment Subscriber, you need to delete all existing enrichment policies and their dependencies before configuring it as an enrichment subscriber.
Note
While removing the UEBA_ENRICHMENT_POLICY and Threat_Intelligence enrichment policies, remove Threat Intelligence and UEBA PreConfiguration too. After successfully removing the enrichment policies, manually install both the applications in the new enrichment subscriber.
Go to Settings >> System Settings from the navigation bar and click System Settings.
Select Enrichment.
Select Enrichment Propagation.
Select Enrichment Provider or Enrichment Subscriber as needed. If you select Enrichment Subscriber, choose a Subscription Source, which is the IP address of an enrichment provider from the drop-down menu.
Selecting the Enrichment Propagation mode for Enrichment¶
Click Save.
The following scenario depicts an enrichment process in the Enrichment Propagation mode with a configuration of 2 machines: Machine 1 and Machine 2.
Select Enrichment Provider in Machine 1 and Enrichment Subscriber in Machine 2.
Configuring Machine 1 as an Enrichment Provider¶
Configuring Machine 2 as an Enrichment Subscriber¶
Next, add a CSV Enrichment Source to Machine 1 using the data from the following CSV file.
CSV File¶
After adding the source, add a normalization package containing log signatures to Machine 2. Refer to the Normalization Packages for details on adding normalization packages.
Furthermore, add a normalization policy, enrichment policy, and routing policy to Machine 2. Refer to the Normalization Policies, Enrichment Policies, and Routing Policies for details.
Adding an Enrichment Policy¶
Finally, add a processing policy to incorporate all the policies earlier created and add it to a device. Refer to the Processing Policies for details on adding processing policies.
Note
In the Standalone Mode, all the above tasks are performed in a single machine.
You can now see the enriched results in the search results of the enrichment subscriber.
Non-enriched log result¶
Enriched log result¶
Click the drop-down menu on the enriched fields to view the different actions.
Actions in enriched results¶
Enrichment Source: Displays the information of the source file the enriched field belongs to.
Participated Fields: Displays the field of a log specified in the enrichment rule to enrich the log.
Actions¶
In the above example, the Participated Field pid has been specified in the earlier created enrichment rule. The enrichment rule matches the value of the pid field in the log to the S.No. field in the source and enriches the log.
We are glad this guide helped.
Please don't include any personal information in your comment
Contact Support