HP-UX Host Intrusion Detection System Version 4.3 administrator guide

Table Of Contents
many alerts, which are not security relevant. The “Files Modified by Program List/Program
List” properties can be used to ignore changes to certain files when they are performed by
a known program. The pathnames_to_not_watch property can be used to ignore
directories and files where changes to files are not considered as security risks.
The template “Modification of Another Users File Template” (page 144) generates many
alerts if not tuned correctly.
The templates “Repeated Failed Logins Template” (page 151), “Repeated Failed su Commands
Template” (page 153) and “Login/Logout Template” (page 147) have low overhead on the
system and can be run in any schedule.
When tuning a template, consider the areas that impose great risk if the system is penetrated.
Obviously, replacing a program in /bin, /sbin or the kernel in /stand is a serious threat.
Consider the areas that does not impose great risk if the system is penetrated. For example,
many files change under /var/adm path, and ignoring that directory is usually safe. But if
a symbolic link attack is launched from /var/adm, the attack may not be detected. This is
a trade-off decision.
Start with a single template and then see how many alerts are generated. Determine if any
of these are security events, and if not, modify the template properties to filter the spurious
alerts.
You may find software that is behaving incorrectly, such as writing to /opt (considered a
read-only file system), creating world-writable lock files (a security issue), saving temporary
data in /etc (should only be for configuration data). Contact the software vendor about
these programs.
Setting Surveillance Schedule Timetables
Once you have defined a surveillance schedule with its complement of surveillance groups and
detection templates, you need to specify the days and times that the groups will be active when
the schedule is activated on an agent host. Use this procedure to establish and change the times
a schedule runs.
NOTE: You cannot reset the timetable of a surveillance group if it is in a surveillance schedule
that is currently scheduled or running on an agent host. For more information, see “Using the
System Manager Screen” (page 47).
IMPORTANT: If one or more groups end and one or more groups start in adjacent time slots,
there will be a several second interval between the end of the former groups and the start of the
latter groups in which none of the groups will be running. If a group is scheduled across adjacent
time slots, it is not interrupted.
IMPORTANT: While a schedule may contain more than 10 groups, it may have no more than
10 groups active in any one-hour time slot.
70 Using the Schedule Manager Screen