HP-UX Host Intrusion Detection System Version 4.3 administrator guide
Table Of Contents
- HP-UX Host Intrusion Detection System Version 4.3 administrator guide
- Table of Contents
- About This Document
- 1 Introduction
- 2 Configuring HP-UX HIDS
- 3 Getting Started with HP-UX HIDS
- 4 Using the System Manager Screen
- Starting the HP-UX HIDS System Manager
- Stopping the HP-UX HIDS System Manager
- System Manager Components
- Starting HP-UX HIDS Agents
- Getting the Status of Agent Hosts
- Resynchronizing Agent Hosts
- Activating Schedules on Agent Hosts
- Stopping Schedules on Agent Hosts
- Halting HP-UX HIDS Agents
- Accessing Other Screens
- 5 Using the Schedule Manager Screen
- The Schedule Manager
- Configuring Surveillance Schedules
- Configuring Surveillance Groups
- Configuring Detection Templates
- Setting Surveillance Schedule Timetables
- Configuring Alert Aggregation
- Configuring Monitor Failed Attempts
- Configuring Duplicate Alert Suppression
- Viewing Surveillance Schedule Details
- Predefined Surveillance Schedules and Groups
- 6 Using the Host Manager Screen
- 7 Using the Network Node Screen
- 8 Using the Preferences Screen
- A Templates and Alerts
- Alert Summary
- UNIX Regular Expressions
- Limitations
- Template Property Types
- Buffer Overflow Template
- Race Condition Template
- Modification of files/directories Template
- Changes to Log File Template
- Creation and Modification of setuid/setgid File Template
- Creation of World-Writable File Template
- Modification of Another User’s File Template
- Login/Logout Template
- Repeated Failed Logins Template
- Repeated Failed su Commands Template
- Log File Monitoring Template
- B Automated Response for Alerts
- C Tuning Schedules and Generating Alert Reports
- D The Agent Configuration File
- E The Surveillance Schedule Text File
- F Error Messages
- G Troubleshooting
- Troubleshooting
- Agent and System Manager cannot communicate with each other
- Agent complains that idds has not been enabled, yet lsdev shows /dev/idds is present
- Agent does not start on system boot
- Agent halts abnormally, leaving ids_* files and message queues
- Agent host appears to hang and/or you see message disk full
- Agent needs further troubleshooting
- Agent does not start after installation
- Agents appear to be stuck in polling status
- Agent displays error if hostname to IP mapping is not registered in name service
- Aggregated alerts targets or details field are truncated and the same aggregated alert has several entries logged in the IDS_ALERTFILE
- Alert date/time sort seems inconsistent
- Alerts are not being displayed in the alert browser
- Buffer overflow triggers false positives
- Duplicate alerts appear in System Manager
- Getting several aggregated alerts for the same process
- GUI runs out of memory after receiving around 19,000 alerts
- The idsadmin Command needs installed agent certificates
- The idsadmin Command notifies of bad certificate when pinging a remote agent
- IDS_checkInstall fails with a kmtune error
- IDS_genAdminKeys or IDS_genAgentCerts does not complete successfully
- IDS_genAdminKeys or idsgui quits early
- Large files in /var/opt/ids
- Log files are filling up
- No Agent Available
- Normal operation of an application generates heavy volume of alerts
- Reflection X rlogin produces multiple login and logout alerts
- Schedule Manager timetable screen appears to hang
- SSH does not perform a clean exit after idsagent is started
- System Manager appears to hang
- System Manager does not let you save files to specific directories
- System Manager does not start after idsgui is started
- System Manager starts with no borders or title bar in X client programs on Windows
- System Manager times out on agent functions such as Activate and Status Poll
- UNKNOWN program and arguments in certain alert messages
- Using HP-UX HIDS with IPFilter and SecureShell
- Unable to Generate Administrator Keys and Agent Certificates on PA–RISC 1.1 Systems
- Troubleshooting
- H HP Software License

4. Select the Real Time Alerts option box to enable the generation of real-time alerts when alert
aggregation is enabled.
NOTE: When the Alert Aggregation option box is not selected, the Real Time Alerts option
box is automatically selected to indicate that real-time alerts will be generated.
5. Enter the path name of a program under the Programs to Aggregate Alerts for table column
to aggregate alerts triggered by a process running that program, and by the process’
descendent processes. The executable path name can be specified using regular expressions
and extended regular expressions. For more information about UNIX regular expressions,
see “UNIX Regular Expressions ” (page 114).
In the corresponding Maximum Alert Delay table column entry, specify the maximum
number of seconds that must be spent aggregating alerts triggered by a process running the
program and by alerts triggered by the process’ dependent processes. An aggregated alert
will be generated when either the process running the specified program terminates or when
the specified time elapses, whichever comes first.
The actual number of seconds spent aggregating alerts can be up to 5 seconds greater than
specified, as the elapsed time is checked after every 5 seconds to minimize CPU consumption
by the agent.
A program entry and the corresponding maximum alert delay entry is called an alert
aggregation tuple.
NOTE: If a program is not specified in an alert aggregation tuple (with alert aggregation
enabled), only file-related alerts triggered by a process (and not its descendent processes)
executing the program are aggregated. Alerts triggered by a process whose executable path
name is not specified in an alert aggregation tuple are aggregated until an hour elapses or
the process terminates, whichever comes first.
For the case where an alert is triggered by a process that is a descendent of more than one
process whose program is specified in an alert aggregation tuple, the process’s alert will be
aggregated under the program being run by the closest ancestor in terms of process depth.
For example, take the case where p0, p1, and p2 are three processes where p0 is running
program0 and is the parent of p1, p1 is running program1 and is the parent of p2, and p2 is
running program2 and is a descendent of both p0 and p1. If both program0 and program1
are specified in their own alert aggregation tuple, then any alert triggered by the process p2
will be aggregated under program1, unless p1 also triggers an alert, in which case alerts
triggered by both p1 and p2 will be aggregated under program0.
6. Click Save. The entered values will be saved.
Guidelines for Configuring Alert Aggregation
• By specifying a regular expression in an aggregation tuple that exactly matches the program’s
full and resolved path name, there is no ambiguity of which program is specified for
aggregating alerts triggered by a process running the program, and by any process
descendents. However, you may need to specify a regular expression that matches both
relative path name and full path name in case one of the following conditions occur:
— The program is started before running a schedule
— The warning message "Dropping audit records due to heavy load" appears in the agent’s
error log, as defined by the IDS_ERRORFILE configuration variable described in “Global
Configuration” (page 192). The default path is /var/opt/ids/error.log.
Under these conditions, HIDS may only have access to the path name used to invoke the
program, and the path name used can either be a relative path name or not be fully resolved.
It can contain symbolic links.
74 Using the Schedule Manager Screen