HP-UX Host Intrusion Detection System Version 4.3 administrator guide

Table Of Contents
List of Examples
B-1 Response Program.......................................................................................................................171
B-2 Sending Alerts Through Email....................................................................................................172
B-3 Storing Alerts in Log Files...........................................................................................................172
B-4 Disabling a User Account............................................................................................................173
B-5 Disabling Remote Networking....................................................................................................174
B-6 Putting a Process to Sleep............................................................................................................175
B-7 Taking a Snapshot of Critical System State.................................................................................176
B-8 Restoring Safe Copies of Files......................................................................................................177
C-1 To tune schedules for two agents without any user interaction.................................................183
C-2 To tune schedules for two agents after a given date, with options to review and modify the
Tune Command Report and the schedule...................................................................................183
C-3 To tune schedules for all agents in the sentinal.hosts file, and to review and modify the
Tune Command Report and the schedule...................................................................................183
C-4 Suggested Exact Filters................................................................................................................184
C-5 Suggested Filters with Regular Expressions...............................................................................184
C-6 To generate a report for all the managed agents starting from a particular date.......................188
C-7 To generate a report for an agent showing only the date and time (local), severity, attacker,
target, and to email the report in text format to a specified email address................................189
C-8 To generate individual reports for all agents listed in the sentinal.hosts file, sorted by
severity starting from January 01 2007........................................................................................189
C-9 To generate a report listing only the critical alerts for all agents listed in the sentinal.hosts
file starting from January 01 2007, and to display the report in raw format using commas to
delimit alert fields........................................................................................................................189
C-10 5. To generate a report for all agents listing only alerts related to failed logins, logouts, and
failed su attempts. The report is emailed to the specified email address with a customized
message and subject line..............................................................................................................190
C-11 To generate a report for all agents listed in the sentinal.hosts file starting from January
01 2007, displaying only the specified fields. The report is in raw format and emailed to the
specified email address................................................................................................................190
E-1 A Sample Surveillance Schedule Text File...................................................................................201
13