Analytics & Use Cases

After Logpoint ingests your logs, you can:

  • Access and view events in real time through Dashboards.

  • Enable Alerts

  • Setup Reports

Unix Dashboards

Dashboards give you log source data visualization updated in real-time. Out-of-the-box dashboards included with the integration are termed Vendor Dashboards.

Unix has 4 Vendor Dashboards

chevron-rightLP_Unix Overviewhashtag

Widget Name

Description

Top 10 Process Running

The top ten Unix processes running in the Logpoint for the administrator to see what is running, the resources that processes are using, how the system is affected by the load and how memory is being used.

Events Timetrend

A time trend of the Unix events generated based on event severity or event type to analyze the performance of Logpoint over time.

Top 10 Commands Used

The top ten most used Unix commands, such as sudo allowing direct communication with the Logpoint via a terminal, hence being very interactive and giving the user direct control over the Logpoint resources.

Top 10 Sudo Commands

The top ten sudo commands allow you to run programs with the security privileges of another user (by default, as the superuser).

Top 10 Sources in Denied Connection

The top ten denied source addresses from accessing Unix networks to protect your system.

Top 10 Users in Successful Logins

The top ten users who successfully logged in allowing the administrator to view the user account name, date and login time.

Top 10 Users in Failed Logins

The top ten users who failed to log in indicated invalid login attempts, forgot their password or mistyped it.

Top 10 Sources in Successful User Logins

The top ten source addresses in successful user logins.

Top 10 Sources in Failed User Logins

The top ten source addresses in failed user logins.

User Login Status

The user login status may be a successful or failed login.

chevron-rightLP_Unix Privilege Escalationhashtag

Widget Name

Description

Session Duration

The session duration from when a user arrives, interacts and exits a Unix system.

Root Privilege Command Execution

The commands executed that require permissions not granted to a standard UNIX user account. These commands include root session start timestamp, root session end timestamp, user, command execute timestamp and command.

Top 10 Users in Privilege Escalation

The top ten users who gained unauthorized admin or root level privileges in a Unix system. It enables the administrator to discover opportunities to improve the Unix privilege management and security to reduce the risk of a cyber attack.

Top 10 Command Executed

The top ten executed Unix commands that administrators check for successful execution.

chevron-rightLP_Unix:Authenticationhashtag

Widget Name

Description

Top 10 Successful Administrative Logins

The top ten successful administrative logins with rights to control or restrict the activity of other users. You need a list of ADMINS to run this query.

Top 10 Users in Successful Login

The top ten users with valid credentials successfully logged in to gain access to the Unix system.

Users in Successful Login - List

The list of successful users logins using valid user credentials, action and source address.

Top 10 Users in Failed Login

The top ten users with invalid or expired credentials failed to login so administartor can trace the source of the login attempts and a sign of brute force attack.

Users in Failed Login - List

The list of failed user logins by a user, action and source address.

Top 10 Failed Administrative Logins

The top ten administrative users (ADMINS, root or administrator) failed login attempts as the Unix system didn’t recognize the authentication details. You need a list of ADMINS to run this query.

Top 10 User Login Activities

The top ten successful or failed login activities so the administrator better determines which user behavior is legitimate to prevent brute force attacks in the Unix system.

chevron-rightLP_Unix:User Account Managementhashtag

Widget Name

Description

Created Accounts - List

The list of created accounts to access the Unix system or any service running on the Unix system for an administrator to authenticate, trace, log and monitor its services.

User Accounts Created

The created user accounts with a user name and password and assigned permission levels.

User Accounts Deleted

The deleted user accounts barred from accessing data, services, systems and network resources.

Activities in User Account Management

The activities in the user account management, such as user adds or group adds. It allows administrators to group users and define flexible access policies.

Activities in User Account Management - List

The list of activities in user account management by user and action.

Top 10 Actions in User Account Management

The top ten actions performed in the user account management.

User Account Password Change

The changed user account password to ensure account security, prevent the default password problem and for the administrator to authenticate the user.

Locked User Account

The locked user account when the number of incorrect password entries exceeds the maximum number allowed by the account password policy.

User Account Unlocked

Accounts reset by an administrator.

User Account Locked/Unlocked - Status

The locked or unlocked user account’s status by user, action and object.

Newly Created Group - List

The list of a newly created group in Unix.

Deleted Group - List

The list of deleted groups from Unix.

Group User Deletion - List

The users deleted or removed from a group in Unix.

User Added in Group

The users added to a group in Unix.

Adding the Unix Dashboards

1

Add the Unix Dashboards — Step 1

Go to the navigation bar and click Dashboards.

2

Step 2

Select VENDOR DASHBOARD from the drop-down.

3

Step 3

Click the Use icon from Actions of the required dashboard.

4

Step 4

Click Choose Repos.

5

Step 5

Select the repo configured to store the Unix logs and click Done.

dashboard screenshot
6

Step 6

Select the dashboard and click Ok.

You can find the Unix dashboards under Dashboards.

dashboard selection
7

Step 7

Unix dashboard examples:

Unix dashboard
Unix dashboard 1

Fig. 10 Unix Dashboard

Unix Reports

The available report templates are:

  • LP_Unix: User Privilege Escalation

  • LP_Unix: User Account Management

  • LP_UNIX: AUTHENTICATION

Generating Unix Reports

1

Step 1

Go to Report >> Report Templates from the navigation bar.

2

Step 2

Under the Vendor Report Templates, click the Use icon.

3

Step 3

Click the Run this Report icon.

4

Step 4

Select Repos, Time Zone, Time Range and Export Type.

5

Step 5

Enter Email.

6

Step 6

Click Submit.

You can view the reports being generated under Report Jobs and download them. Click PDF under Download to get .pdf formatted reports.

For more information on scheduling, see: Report Documentationarrow-up-right

You can analyze the data using a report’s graphs, time trends, lists, and text. Report data summarizes incidents during a specific period, such as the past 24 hours or the past five minutes. While generating a report, you can also customize the calendar period.

Unix Alerts

Alerts available in Unix include the following examples.

LP_Unix Possible Bruteforce Attack

  • Trigger Condition: An account is not present but is used repeatedly to login. This may be a brute force attack by a bot, malware or threat agent.

  • ATT&CK Category: Credential Access

  • ATT&CK Tag: Brute Force

  • ATT&CK ID: T1110

  • Minimum Log Source Requirement: Unix

Query:

LP_Unix Kernel Logging Stopped

  • Trigger Condition: Unix Kernel stops logging that may violate the audit compliance of the organization.

  • ATT&CK Category: Defense Evasion

  • ATT&CK Tag: Impair Defenses, Indicator Blocking

  • ATT&CK ID: T1562, T1562.006

  • Minimum Log Source Requirement: Unix

Query:

LP_Unix User Deleted

  • Trigger Condition: A user account is deleted.

  • ATT&CK Category: Impact

  • ATT&CK Tag: Account Access Removal

  • ATT&CK ID: T1531

  • Minimum Log Source Requirement: Unix

Query:

LP_Unix Password Expiry Changed for User

  • Trigger condition: Information on password expiry information is changed for a user.

  • Minimum Log Source Requirement: Unix

Query:

LP_Unix User Account Unlocked

  • Trigger condition: Unlocked user account detected.

  • Minimum Log Source Requirement: Unix

Query:

LP_Unix Excessive Denied Connection

  • Trigger condition: An excessive denied connection from the same source is detected i.e., 100 denied connections within two minutes.

  • Minimum Log Source Requirement: Unix

Query:

LP_Unix Possible DNS Server Modified

  • Trigger condition: Unauthorized default Application Layer Protocol and DNS server modification is detected.

  • Minimum Log Source Requirement: Unix

Query:

LP_Unix Group Deleted

  • Trigger condition: A group is deleted.

  • Minimum Log Source Requirement: Unix

Query:

LP_Unix User Session Alert

  • Trigger condition: Authentication for a user is successful and session of a previous user is exited.

  • Minimum Log Source Requirement: Unix

Query:

LP_Unix User Removed from Privileged Group

  • Trigger condition: A user account is removed from the privileged group.

  • Minimum Log Source Requirement: Unix

Query:

Unix Report Templates

There are three Unix Report Templates:

  1. LP_Unix: User Privilege Escalation — incident summary report with statistics on session duration, commands executed, users in privilege escalation, and root privilege command execution in graphs and lists.

  2. LP_Unix: User Account Management — incident summary report with statistics on created/deleted accounts, activities, locked/unlocked accounts, group changes, and account status in graphs or lists.

  3. LP_Unix: Authentication — incident summary report with statistics on successful/unsuccessful administrative logins and user login activities in graphs or lists.

Using Unix Report Templates

1

Step 1

Go to Report >> ReportTemplate >> VendorReportTemplates.

2

Step 2

Click Add from the Actions column.

report templates screenshot
3

Step 3

Click Run this Report under the Actions column.

run this report screenshot
4

Step 4

Select Repos, Time Zone, Time Range, Export Type, and enter the Email address.

5

Step 5

Click Submit.

You can view the reports being generated under Report Jobs and download the generated reports from Inbox with PDF extension by clicking PDF under Download.

We do our best to ensure that the content we provide is complete, accurate and up to date. Logpoint makes no representations or warranties of any kind, express or implied about the documentation. We update it on a best-effort basis.

Last updated

Was this helpful?