Akamai Guardicore Segmentation User Guide
Akamai Guardicore Segmentation User Guide
0
Release 39
User Manual
Contents
HOW CENTRA WORKS.................................................................................................................................... 11
AGENTS COLLECT INFORMATION ON YOUR IT INFRASTRUCTURE ..................................................................................... 11
AUTOMATED LABELING OF YOUR ASSETS ................................................................................................................... 11
A COMPREHENSIVE VISUAL MAP OF YOUR ENTIRE IT INFRASTRUCTURE........................................................................... 11
INCIDENT REPORTS AND LOGS.................................................................................................................................. 12
SEAMLESS INTEGRATION WITH ANY PLATFORM ........................................................................................................... 12
CORE CAPABILITIES ................................................................................................................................................ 12
ARCHITECTURE .............................................................................................................................................. 14
CENTRA COMPONENTS .................................................................................................................................. 15
MANAGEMENT SERVER .......................................................................................................................................... 15
AGGREGATORS ..................................................................................................................................................... 15
COLLECTORS......................................................................................................................................................... 15
AGENTS............................................................................................................................................................... 16
DECEPTION SERVER ............................................................................................................................................... 16
How it Works................................................................................................................................................ 16
SUPPORTED PLATFORMS ............................................................................................................................... 17
Supported Hypervisors for ESX Collectors .................................................................................................... 17
Supported Public Clouds............................................................................................................................... 17
Supported Systems ....................................................................................................................................... 17
Intelligence sharing export protocols ........................................................................................................... 17
Browsers for web console ............................................................................................................................ 17
SYSTEM AND MEMORY REQUIREMENTS ....................................................................................................... 17
Management Server .................................................................................................................................... 17
Deception Server .......................................................................................................................................... 17
Aggregator ................................................................................................................................................... 17
Collector ....................................................................................................................................................... 17
CENTRA UI HOME .......................................................................................................................................... 18
DASHBOARD .................................................................................................................................................. 20
ADMIN (USER) MENU .................................................................................................................................... 26
MENU OPTIONS.................................................................................................................................................... 26
Change Password ......................................................................................................................................... 26
Manage 2-Step Verification ......................................................................................................................... 26
End User License Agreement ........................................................................................................................ 27
Help .............................................................................................................................................................. 28
Release Notes............................................................................................................................................... 28
Log out ......................................................................................................................................................... 28
Version Info .................................................................................................................................................. 28
REVEAL .......................................................................................................................................................... 29
REVEAL ARCHITECTURE .......................................................................................................................................... 30
LABELS ............................................................................................................................................................... 30
What Kind of Labels Can You Create? ......................................................................................................... 31
SEGMENTATION RULES .......................................................................................................................................... 31
Override Rules .............................................................................................................................................. 32
Allow Rules ................................................................................................................................................... 32
Alert Rules .................................................................................................................................................... 32
Block Rules ................................................................................................................................................... 32
FLOW MATCHING ORDER ...................................................................................................................................... 33
2
EXPLORE.............................................................................................................................................................. 34
TOOLBAR ............................................................................................................................................................. 35
MAP ICONS AND FLOW TYPES ................................................................................................................................. 38
Icons Used in Reveal .................................................................................................................................... 38
LABELED ASSETS INFORMATION ............................................................................................................................... 38
CONNECTION INFORMATION ................................................................................................................................... 39
PROCESS INFORMATION ......................................................................................................................................... 39
ASSET INFORMATION ............................................................................................................................................ 40
SUBNET INFORMATION .......................................................................................................................................... 40
FLOW COLOR SCHEMES ......................................................................................................................................... 41
Reveal Map Color Scheme .......................................................................................................................... 41
Policy Overlay Map Color Scheme ............................................................................................................... 41
NATIVE DOCKER VISIBILITY IN REVEAL MAPS ............................................................................................................... 42
LABELS .................................................................................................................................................. 43
OVERVIEW ......................................................................................................................................................... 43
HOW LABELS ARE BUILT ........................................................................................................................................ 44
EXPLICIT LABELS AND DYNAMIC LABELS ................................................................................................................... 44
CREATING LABELS ................................................................................................................................................ 44
LABELING SCHEME EXAMPLE .................................................................................................................................. 46
HOW REVEAL DISPLAYS THE LABELING HIERARCHY ...................................................................................................... 47
LABEL DATA SOURCES ............................................................................................................................................ 48
COMPARE LABEL IMPORTING METHODS .................................................................................................................... 49
WORKING WITH REVEAL MAPS ..................................................................................................................... 50
WORKING WITH MAPS WITH UNLABELED ASSETS ....................................................................................................... 50
WORKING WITH MAPS WITH LABELED ASSETS ........................................................................................................... 51
Selecting Assets to Display More Information ............................................................................................ 51
DRILLING DOWN .................................................................................................................................................. 53
DISPLAYING CONNECTION INFORMATION .................................................................................................................. 55
FILTERING THE MAP .............................................................................................................................................. 56
Filtering the Map Using the Filter Button ................................................................................................... 56
Right-click a Connection to Filter by Source and Destination ..................................................................... 57
Filter Options for a Selected Item ............................................................................................................... 58
DISPLAYING FLOWS TABLE VIEW ............................................................................................................................. 58
DISPLAYING ASSET PROCESSES ................................................................................................................................ 59
CREATING FLOW POLICIES FROM REVEAL MAPS ......................................................................................................... 60
Creating an Allow rule for individual IPs/Assets and Subnets ...................................................................... 61
BUILDING A MICRO-SEGMENTATION POLICY .............................................................................................................. 62
SAVED MAPS ................................................................................................................................................. 64
OVERVIEW .......................................................................................................................................................... 64
SCHEDULED DAILY/HOURLY MAPS .......................................................................................................................... 64
DEFAULT MAP DISPLAY ......................................................................................................................................... 64
CREATE A NEW REVEAL MAP .................................................................................................................................. 66
POLICY RULES ................................................................................................................................................ 68
MATCHING ORDER................................................................................................................................................. 69
POLICY LEARNING MODE ............................................................................................................................... 70
POLICY SUGGESTIONS TAB IN THE REVEAL MAP POLICY EDITOR OVERLAY ........................................................................ 70
Creating or Dismissing Individual Rules ....................................................................................................... 72
Viewing More Information for a Suggested Rule ......................................................................................... 74
Policy Rules Tab............................................................................................................................................ 74
Dismissed Rules Tab ..................................................................................................................................... 75
3
POLICY ........................................................................................................................................................... 76
CREATE POLICY .............................................................................................................................................. 77
TEMPLATES .......................................................................................................................................................... 77
CREATING POLICIES WITH THE CREATE POLICY SCREEN ................................................................................................. 77
Step 1: Configure an Application Label Key (Recommended) ..................................................................... 77
Step 2: Select a Template to Achieve your Security Goal. ........................................................................... 78
Step 3: Select the Assets to be secured. ...................................................................................................... 81
Step 4: Refine the Policy .............................................................................................................................. 83
LABEL GROUPS............................................................................................................................................... 85
EXCLUDE ASSETS FROM A LABEL GROUP .................................................................................................................... 85
CREATE A LABEL GROUP ......................................................................................................................................... 85
USE LABEL GROUPS IN POLICY ................................................................................................................................. 86
LABEL GROUPS ARE PART OF POLICY REVISIONS .......................................................................................................... 86
POLICY RULES SCREEN ................................................................................................................................... 87
Creating Policy Rules ................................................................................................................................... 88
Filtering the List of Rules ............................................................................................................................. 91
Bulk Operations ........................................................................................................................................... 92
Using the Hit Counter to Reformulate Policy Rules ..................................................................................... 92
Role Based Access ........................................................................................................................................ 94
REVISIONS ..................................................................................................................................................... 96
USER GROUPS ................................................................................................................................................ 98
IMPORTANT RESTRICTIONS REGARDING USER GROUPS ................................................................................................. 98
USER GROUPS AND THE MICROSOFT ACTIVE DIRECTORY .............................................................................................. 98
CREATING USER GROUPS ........................................................................................................................................ 99
Step 1: Create Groups on an Active Directory Domain Controller................................................................ 99
Step 2: Configure AD Integration with Centra.............................................................................................. 99
Step 3: Add a New User Group to Centra ................................................................................................... 101
INCLUDING A USER GROUP IN AN ALLOW RULE ......................................................................................................... 102
FILTERING THE NETWORK LOG BY USER IDENTITY ...................................................................................................... 103
FILTERING THE REVEAL MAP BY USER...................................................................................................................... 104
SPECIAL BEHAVIOR FOR SMB RULES AND CONNECTIONS ............................................................................................ 105
How Windows Handles SMB Connections and its Effect on User Identity ................................................. 105
How Centra Handles SMB Connections and its Effect on Policy ................................................................. 106
PROJECTS SCREEN ........................................................................................................................................ 107
INCIDENTS ................................................................................................................................................... 109
TYPES OF SECURITY INCIDENTS AND PREDEFINED FILTERS ........................................................................................... 109
INCIDENT DETAILS .............................................................................................................................................. 109
Acknowledging an Incident ....................................................................................................................... 109
Acknowledging Multiple Incidents at Once ............................................................................................... 110
ALL INCIDENTS SCREEN ................................................................................................................................ 111
INTEGRITY VIOLATIONS INCIDENTS (FIM) .................................................................................................... 113
Integrity Violations Incident Screen Areas ................................................................................................. 113
LATERAL MOVEMENT (DECEPTION) ............................................................................................................. 114
INCIDENT REPORT ............................................................................................................................................... 114
Left Side of the Report .............................................................................................................................. 115
Report Tabs ............................................................................................................................................... 116
TABS DISPLAYED ONLY WHEN RELEVANT INFO EXISTS ............................................................................................... 118
ACKNOWLEDGE BUTTON ..................................................................................................................................... 118
4
IOC TYPES EXPORTED BY CENTRA .......................................................................................................................... 118
NETWORK SCANS INCIDENTS ....................................................................................................................... 119
POLICY VIOLATIONS INCIDENTS ................................................................................................................... 119
INCIDENT SCREEN ................................................................................................................................................ 120
Incident Screen Areas and Buttons ............................................................................................................ 121
ASSETS ......................................................................................................................................................... 125
ASSET DASHBOARD ............................................................................................................................................. 125
MULTI TENANT SUPPORT...................................................................................................................................... 127
Tenant configuration ................................................................................................................................. 127
NETWORK LOG AND POLICY CREATION ....................................................................................................... 130
Export to CSV.............................................................................................................................................. 136
Temporary Storage in Saved Maps ............................................................................................................ 136
INTEGRITY VIOLATIONS LOG ........................................................................................................................ 137
LABELS LOG.................................................................................................................................................. 138
REDIRECTIONS LOG ...................................................................................................................................... 138
REPUTATION LOG ........................................................................................................................................ 139
INSIGHT ....................................................................................................................................................... 140
OS SUPPORT ...................................................................................................................................................... 140
RUNNING A QUERY.............................................................................................................................................. 140
QUERY EXAMPLES ............................................................................................................................................... 143
Example 1: Get logged on users ................................................................................................................. 143
Example 2: Top 5 processes by resident memory size ................................................................................ 144
Example 3: List all the patches applied (Windows) .................................................................................... 144
INSIGHT SCHEDULED QUERIES ..................................................................................................................... 145
EXAMPLE 1: DETECT SECURITY VIOLATIONS.............................................................................................................. 145
EXAMPLE 2: ENSURE COMPLIANCE ......................................................................................................................... 145
CREATE OR EDIT A QUERY ..................................................................................................................................... 146
USING FILTERS FOR SCHEDULE QUERIES................................................................................................................... 148
INSPECTION POLICY ..................................................................................................................................... 149
INNOCENT FAILED CONNECTIONS ........................................................................................................................... 149
Rule Fields .................................................................................................................................................. 150
DETECTORS .................................................................................................................................................. 150
REPUTATION SERVICES ................................................................................................................................ 151
Reputation Services for Files, IP Addresses and Domain Names................................................................ 152
Sample Reputation Incidents ..................................................................................................................... 152
Configure Reputation Services ................................................................................................................... 153
Configure Trusted Indicators ...................................................................................................................... 153
Classify specific IPs as Internal IPs.............................................................................................................. 154
Classify Specific Domains as Legitimate ..................................................................................................... 155
Advanced ................................................................................................................................................... 156
Turning Off Reputation Services................................................................................................................. 156
Customer IoCs Integrated into Guardicore Reputation Services ................................................................ 157
FILE INTEGRITY MONITORING (FIM)............................................................................................................. 157
What is File Integrity Monitoring? ............................................................................................................. 157
FIM is a Mandatory Compliance Requirement........................................................................................... 157
FIM Capabilities in Centra .......................................................................................................................... 157
5
Supported Operating Systems.................................................................................................................... 157
ACTIVATING FIM ................................................................................................................................................ 157
Monitor File Changes ................................................................................................................................. 159
FILE INTEGRITY LOG ............................................................................................................................................. 159
INTEGRITY VIOLATIONS INCIDENTS .......................................................................................................................... 159
AGENT MODULE: DETECTION ................................................................................................................................ 160
STALE HASHES CLEANUP ....................................................................................................................................... 161
CUSTOMER THREAT FEEDS INTEGRATION .................................................................................................... 161
SUPPORTED INDICATORS OF COMPROMISE TYPES ...................................................................................................... 161
File IoCs ...................................................................................................................................................... 161
IP IoCs ......................................................................................................................................................... 162
GUARDICORE THREAT INTELLIGENCE FIREWALL .......................................................................................... 162
GUARDICORE THREAT INTELLIGENCE LABELS ............................................................................................................. 162
VERIFYING THAT THE THREAT INTELLIGENCE FIREWALL IS FUNCTIONING ......................................................................... 164
REVIEWING WHAT WAS BLOCKED/ALERTED BY THE THREAT INTELLIGENCE FIREWALL ....................................................... 164
DISABLING THE DAILY UPDATES ............................................................................................................................. 164
CHANGING THE RULES FROM BLOCK TO ALERT .......................................................................................................... 164
RECEIVING A BLOCKING ALERT CONCERNING A MALICIOUS IP...................................................................................... 165
REMOVING AN IP FROM THE LIST ........................................................................................................................... 165
PREVENTING THE BLOCKING OF INTERNAL IPS ........................................................................................................... 165
MITIGATION & IOCS ..................................................................................................................................... 165
AGGREGATORS ........................................................................................................................................... 168
AGGREGATORS AND AGENTS ................................................................................................................................ 168
AGGREGATORS SCREEN ....................................................................................................................................... 168
Configuration Options .............................................................................................................................. 170
OVERRIDE CONFIGURATION OPTION ...................................................................................................................... 171
AGGREGATOR CLI .............................................................................................................................................. 173
COLLECTORS ............................................................................................................................................... 175
TYPES OF COLLECTORS ......................................................................................................................................... 175
SPAN Collector .......................................................................................................................................... 177
VPC Flow Logs Collector ............................................................................................................................ 178
Additional Information About the AWS VPC Flow Logs Collector .............................................................. 178
DECEPTION SERVERS.................................................................................................................................... 180
How does Deception work?........................................................................................................................ 180
Deception Server features .......................................................................................................................... 180
DECEPTION: UPDATED LOGIC AND BEHAVIOR ........................................................................................................... 181
COMPONENT DIAGNOSTICS AND UI CONTROLS .......................................................................................... 181
DISPLAY A LIST OF RUNNING SERVICES FOR EACH COMPONENT .................................................................................... 181
CONTROL THE AGENT FROM THE UI ........................................................................................................................ 181
AGENTS ...................................................................................................................................................... 182
Agent Modules ........................................................................................................................................... 182
AGENT CONNECTIONS ......................................................................................................................................... 183
AGENTS SCREEN .......................................................................................................................................... 184
Agents Screen Columns ............................................................................................................................. 184
Note: Temporary Disappearance of Agents from the Agents Screen ........................................................ 186
Agents Flags .............................................................................................................................................. 186
MORE BUTTON ............................................................................................................................................ 193
6
GET AGENT DIAGNOSTICS ............................................................................................................................ 194
ENFORCEMENT MONITORING MODES ......................................................................................................... 195
MONITORING MODE ........................................................................................................................................... 195
REVEAL ONLY MODE ........................................................................................................................................... 195
ENFORCING MODE .............................................................................................................................................. 195
DISABLED .......................................................................................................................................................... 196
AGENT ROAMING: ENFORCEMENT MODE OUTSIDE OFFICE ......................................................................................... 197
DELETING AGENTS FROM THE SYSTEM ........................................................................................................ 199
Deleting Agent files after Uninstall ............................................................................................................ 199
REMOTE AGENT UPGRADE .......................................................................................................................... 200
Upgrading Agents from the Agents Screen ............................................................................................... 200
INSTALLATION PROFILES .............................................................................................................................. 202
Installation Profiles List ............................................................................................................................. 202
Default Installation Profile ........................................................................................................................ 203
Create a New Profile ................................................................................................................................. 203
Agent Installation ..................................................................................................................................... 204
Install Windows Agent with an Installation Profile ................................................................................... 205
Install a Linux Agent with an Installation profile ...................................................................................... 205
Edit an Installation Profile ......................................................................................................................... 205
Reset Configuration to Profile ................................................................................................................... 205
AGENTS LOG ................................................................................................................................................ 207
Free Text Search Tool ................................................................................................................................. 208
DATA CENTER .............................................................................................................................................. 209
DEPLOYMENT .............................................................................................................................................. 209
ORCHESTRATIONS ....................................................................................................................................... 210
SUPPORT FOR MULTIPLE ORCHESTRATIONS ............................................................................................................... 210
AWS ORCHESTRATION ................................................................................................................................ 211
MANAGING AWS ACCESS .................................................................................................................................... 211
EC2 IAM Role .............................................................................................................................................. 211
GUARDICORE DELEGATE ACCESS ............................................................................................................................ 211
CUSTOMER CREDENTIALS...................................................................................................................................... 211
AWS Policy definition ................................................................................................................................. 211
STARTING AWS ORCHESTRATION CONFIGURATION .................................................................................................. 212
CONFIGURING AWS AUTHENTICATION ................................................................................................................... 212
Configuring EC2 IAM Role Authentication ................................................................................................ 213
Configuring Guardicore Delegate Access Authentication ......................................................................... 213
Configuring Customer Credentials Authentication ................................................................................... 213
Creating an AWS IAM role ........................................................................................................................ 214
ORCHESTRATION INFORMATION APPEARS ON THE ASSETS PAGE ................................................................................ 214
AZURE ORCHESTRATION .............................................................................................................................. 215
HOW TO CONFIGURE AZURE ORCHESTRATION .......................................................................................................... 215
Configure a read-only user in the Azure account ....................................................................................... 215
Add permissions to application user .......................................................................................................... 215
Configure Azure orchestration in the Centra management ....................................................................... 215
Important notes ......................................................................................................................................... 215
F5 INTEGRATION .......................................................................................................................................... 217
CONFIGURATION AND SETUP ................................................................................................................................ 217
7
Stage 1: Guardicore IPFIX Collector Installation ....................................................................................... 217
Stage 2: Specify Orchestration Parameters in Centra ............................................................................... 217
Stage 3: IPFIX Reporting Setup in the F5 Device ....................................................................................... 220
F5 ASSETS ........................................................................................................................................................ 228
IPFIX COLLECTOR INSTALLATION ........................................................................................................................... 228
Advanced Setting Configuration ................................................................................................................ 229
GCP (GOOGLE CLOUD PLATFORM) ............................................................................................................... 231
INTRODUCTION ................................................................................................................................................... 231
CONFIGURING GCP ORCHESTRATION ...................................................................................................................... 231
Step 1: Set Up a Read Only Service Account in GCP ................................................................................... 231
Step 2: Add GCP Orchestration to Centra .................................................................................................. 232
INVENTORY API ........................................................................................................................................... 234
WHEN TO USE THE INVENTORY API? ...................................................................................................................... 234
WHY USE THE INVENTORY API? ............................................................................................................................ 234
HOW IT WORKS .................................................................................................................................................. 234
TO CONFIGURE THE INVENTORY API ....................................................................................................................... 234
REST API EXAMPLE ........................................................................................................................................... 237
LIMITATIONS ..................................................................................................................................................... 238
HOW TO GET BIOS UUID ................................................................................................................................... 238
KUBERNETES ................................................................................................................................................ 239
Configure Kubernetes Orchestration in Centra .......................................................................................... 239
Stage 1: Setting up a Kubernetes Service Account Authentication ............................................................ 239
Stage 2: Configure Kubernetes Orchestration in Centra. ........................................................................... 241
OCI (ORACLE CLOUD INFRASTRUCTURE) ...................................................................................................... 243
INTRODUCTION ................................................................................................................................................... 243
CONFIGURING OCI ORCHESTRATION....................................................................................................................... 243
STEP 1 - IN OCI, CREATE AN ORCHESTRATION USER FOR CENTRA .................................................................................. 243
STEP 2 - IN CENTRA, CONFIGURE THE OCI ORCHESTRATION ......................................................................................... 243
OPENSTACK ................................................................................................................................................. 246
SETTING UP OPENSTACK ORCHESTRATION .............................................................................................................. 246
Step 1: Configure a read-only user on the OpenStack platform................................................................. 246
Step 2: Configure OpenStack Orchestration in Centra ............................................................................... 246
Basic Configuration ................................................................................................................................... 248
Advanced Configuration ........................................................................................................................... 249
API COMMANDS ................................................................................................................................................ 251
VSPHERE ORCHESTRATION .......................................................................................................................... 253
FIREWALLS INTEGRATION ............................................................................................................................ 256
INTEGRATION WITH PALO ALTO NETWORKS FIREWALL ............................................................................................... 256
HOW IT WORKS .................................................................................................................................................. 256
BEFORE YOU BEGIN: REQUIREMENTS FOR SUCCESSFUL INTEGRATION ............................................................................ 257
CONFIGURATION ................................................................................................................................................. 257
Troubleshooting ......................................................................................................................................... 260
DATA EXPORT .............................................................................................................................................. 262
Incident Log................................................................................................................................................ 263
EMAIL .......................................................................................................................................................... 264
SAAS USERS ....................................................................................................................................................... 264
ON-PREMISES USERS ........................................................................................................................................... 265
8
SLACK .......................................................................................................................................................... 267
STIX ............................................................................................................................................................. 268
SYSLOG ........................................................................................................................................................ 270
CONFIGURING SYSLOG EXPORT .............................................................................................................................. 270
EVENTS SYSLOG EXPORTER.................................................................................................................................... 271
Network Log Syslog Exporter ..................................................................................................................... 276
COMMON EVENT FORMAT (CEF) SENT BY CENTRA .................................................................................................... 276
ENABLING THE NETWORK LOG REPORTER ................................................................................................................ 277
SYSTEM USERS ............................................................................................................................................. 278
TO ADD, MODIFY OR DELETE A USER: ....................................................................................................................... 278
PERMISSION SCHEMES ............................................................................................................................... 280
WHY CREATE PERMISSIONS? ................................................................................................................................ 280
CREATE A PERMISSION SCHEME ............................................................................................................................ 280
ROLES BASED PERMISSIONS TO CENTRA'S FEATURES ................................................................................................. 283
SCOPED APPLICATION OWNER ROLE ...................................................................................................................... 288
ASSIGN A PERMISSION SCHEME TO A USER .............................................................................................................. 289
USER DIRECTORIES....................................................................................................................................... 290
ADDING A NEW USER DIRECTORY .......................................................................................................................... 290
Configuring LDAP ...................................................................................................................................... 290
Configuring SAML 2.0 SSO ........................................................................................................................ 292
ASSIGN PERMISSIONS TO ACTIVE DIRECTORY GROUPS ............................................................................................... 292
EDIT USER DETAILS IN A USER DIRECTORY................................................................................................................ 292
CONFIGURING FORTIAUTHENTICATOR SAML 2.0 WITH GUARDICORE CENTRA ........................................... 293
OVERVIEW OF CONFIGURATION STAGES .................................................................................................................. 293
STAGE 1: CONFIGURE SSO AND IDP SETTINGS IN FORTIAUTHENTICATOR ....................................................................... 293
CONFIGURING SAML 2.0 SSO WITH OKTA .................................................................................................... 296
STEP 1: CONFIGURE THE OKTA GUARDICORE APP ..................................................................................................... 296
STEP 2: CONFIGURE THE USER DIRECTORY IN CENTRA ............................................................................................... 300
STEP 3: CONFIGURE THE OKTA GROUP IN CENTRA .................................................................................................... 302
CONFIGURING SAML 2.0 SSO WITH RED HAT ............................................................................................... 305
STAGE 1: CONFIGURE THE IDENTITY PROVIDER (IDP) ................................................................................................ 305
STAGE 2: CONFIGURE THE SERVICE PROVIDER .......................................................................................................... 309
SAML Directory Configuration ................................................................................................................... 309
STAGE 3: CONFIGURE THE ENCRYPTION KEY ............................................................................................................ 310
STAGE 4: CONFIGURE THE PERMISSION SCHEME IN CENTRA ....................................................................................... 310
CREATE KERBEROS AUTHENTICATION IN CENTRA ........................................................................................ 310
STEP 1: CREATE A KEYTAB FILE .............................................................................................................................. 311
A: Create the User ...................................................................................................................................... 311
B: Create the Keytab File ............................................................................................................................ 312
STEP 2: CONFIGURE CENTRA ................................................................................................................................ 313
STEP 3: TEST THE CONFIGURATION ........................................................................................................................ 314
MANAGEMENT CONFIGURATION ................................................................................................................ 315
GENERAL ........................................................................................................................................................... 315
AUTHENTICATION ................................................................................................................................................ 320
DASHBOARD....................................................................................................................................................... 324
DOMAIN CLASSIFICATION...................................................................................................................................... 326
SYSTEM INFO ............................................................................................................................................... 328
9
AUDITING .................................................................................................................................................... 328
EXPORTING TO A CSV FILE .................................................................................................................................... 328
SYSTEM LOG ................................................................................................................................................ 329
10
How Centra Works
The Guardicore Centra Security Platform is a comprehensive data center and cloud security
solution that provides a single console for managing segmentation, access control, and
security policies throughout your entire environment. Centra makes visualizing and securing
on-premises and cloud workloads fast and simple. It creates human-readable views of your
complete infrastructure – from the data center to the cloud – with fast and intuitive workflows
for segmentation policy creation.
11
Incident Reports and Logs
Through a highly versatile map of your assets and traffic, and a set of user friendly incidents,
logs and reports screens, Centra provides deep visibility into application dependencies and
flows, and facilitates enforcement of network and individual process-level policies to isolate
and segment critical applications and infrastructure, reducing the attack surface and
detecting and controlling breaches within east-west traffic. Centra’s segmentation
capabilities are also complemented by an innovative set of breach detection and response
capabilities.
Core Capabilities
Centra's core capabilities include flow visualization, application level segmentation and
micro-segmentation, breach detection, and automated analysis and response:
Flow visualization Centra's user friendly interface provides automatic discovery and a
dynamic, visual map into all applications and workloads, down to the process level with user
identity. This allows IT teams to easily view and monitor communication flows inside the data
center.
12
policies between applications, and monitor them for non-compliant flows and suspicious
activity that could indicate a breach.
Automatic analysis enables security teams to quickly prioritize security incidents requiring
immediate response that would otherwise involve hours of human analysis using traditional
tools and techniques.
Incident response allows for real-time attack isolation and remediation of infected systems,
stopping an attack early in the kill chain.
13
Architecture
Guardicore Centra is a distributed software platform designed to address the security
requirements of clouds and data centers. The Guardicore Centra Security Platform provides
a unique combination of process-level segmentation, threat deception, semantics-based
analysis, and automated response in modern data centers.
14
Centra Components
Management Server
Provides a single point of control for all data received by the solution components, provides
UI, alerting and automatic reporting, monitoring, configuration and patching of all
components.
Aggregators
Aggregators are points of communication and control for associated Agents. Aggregators
provide the following functionalities:
Aggregators can be deployed in clusters. This provides automatic load balancing capabilities
between Aggregators within the cluster, resulting in a uniform load distribution.
Depending on allocated compute resources, a single Aggregator can support between 200 to
2000 Agents with a micro-segmentation feature set (Reveal + Enforcement + Detection
modules active on agent, Deception module disabled) or an average of 100 Agents (all
modules, including Deception, are active on Agents). See Aggregators for more information.
Collectors
Collectors are virtual machines that gather information on flows in environments where
Agents cannot be deployed. Such environments include legacy systems incompatible with
Agent software, as well as environments outside of your system that interface with your
network. Collectors relay data to the Guardicore Management server for further analysis and
integration into Guardicore’s Reveal charts. Collectors are also able to detect suspicious
flows, redirect them to a SPAN port for further analysis, and, where warranted, divert them to
the Deception server (honeypot). Unlike Agents, Collectors cannot enforce policy, but they
can alert regarding policy violations.
There are three types of collectors: ESX, SPAN and AWS VPC Logs. For more information
see Collectors.
Both Aggregators and Collectors integrate with various orchestration layers including
VMWare, AWS, Kubernetes etc. This allows the automated pulling of asset information,
labels and more into Centra.
15
Agents
Agents are deployed on Windows and Linux based guest systems, including VMs, bare-metal
servers, cloud compute and container worker nodes. Agent software packages are served
directly from the Aggregator but can also be delivered via an offline installation package.
Agents have four modules: Reveal, Enforcement, Deception, and Detection.
Reveal Collects process-aware network flow events, including protocols, ports and
corresponding processes (path, user, command line, hash etc.), enabling
process-level visibility and file reputation.
Enforcement Enables control over network flows - allowing / alerting / blocking flows,
in accordance with the defined policy.
Deception Server
Deception Servers receive live, suspicious connections from across the data center and
generate matching deceptive environments to lure attackers. The matching is done against the
Server that manages a farm of multiple honeypot instances of different flavors (Windows and
Linux). The Deception Server can be deployed as a virtual machine or a physical appliance
and can operate as a single node or as part of an array of Deception Servers, depending on the
customer's deployment scale.
How it Works
Within the Deception Server there are virtualized machines that interact with the suspected
attacker. Each virtualized machine is referred to as a service provider. The Deception server
supports many flavors of Windows and Linux service providers. When a new attacker comes
in with a new source and Destination IP, the system allocates a new service provider based on
what the attacker expects to meet. This means that the allocation algorithm will try to keep
the network deception engine as consistent as possible (i.e a machine deceived as Linux Web
Server with hostname "server1" will look the same even after a period of time). In addition,
the allocation algorithm will try to maximize the neutrality of the OS distribution among
potential victims, so that an attacker scanning the network will come across a variety of fake
machines.
16
Supported Platforms
Centra is tightly integrated into different controllers and orchestration components for object
identification and reporting. It provides full coverage of all VMs and VM-to-VM traffic,
including on-the-same hypervisor. Designed to accommodate the most demanding
environments, a 3-tier architecture is scalable to meet the performance and security
requirements of data centers at any size, with very low impact on hypervisor performance.
Amazon Web Services, Microsoft Azure, Oracle OPC, Google Cloud Platform.
Supported Systems
VMware vSphere and VMware vCenter Server 5.5.x and later, VMware NSX Manager 6.1.x,
Nuage Networks, CloudStack, Mission Critical Cloud, Microsoft Hyper-V, Openstack
(Vanila/Mirantis), Kubernetes, OpenShift
Deception Server
32 GB RAM, 8 vCPUs, 100GB storage
Aggregator
4 GB RAM, 4 vCPUs, 30GB storage
Collector
2 GB RAM, 2 vCPUs, 30GB storage
17
Centra UI Home
Note: the default UI inactivity for a session is 12 hours. Changes to the default setting can
only be done via mgmtctl (not the UI itself).
Guardicore Centra's Home page provides you with a UI with access to both User and
Administration pages. The left side of the screen displays a panel with the following screens:
Dashboard Displays statistics about failed connections, assets at risk, incident analysis by
incident type, system health, top incident tags, top services and operating systems
used etc.
Policy Provides the ability to segment the network to applications and then to micro segment
application flows.
Assets Displays orchestration information and all incidents reported for the protected assets.
Activity Log pages that provide information on the following: Integrity, Network, Redirections
and Reputation.
At the right side of the ribbon at the top of the screen the following buttons are displayed:
18
Reload Data
19
Dashboard
The dashboard enables security administrators to easily keep track of information vital for
the security of your system:
The Dashboard displays information on applications, traffic flows, malicious domains, the
state of Agents, and the health of the system. Information can be displayed for the last hour,
day, or week by clicking the buttons at the right top of the screen:
First Row
20
The number of flows allowed by the policy
compared with the total number of flows for the
specified time period. Clicking the title displays
the Network log.
21
Displays the Health of the system. Hovering over
a button displays information for one of the
following: Resources, Components, Agents,
Integrations. For example:
Second Row
22
Applications covered by the policy. Each dot
represents an application. Green dots stand for
applications that are covered by a policy. The
size of the dot indicates the number of assets for
the application. Hovering over a dot displays the
name of the application and the number of assets
involved, for example:
23
Displays the activated Centra features for the
system. Features with a green icon indicate that
they are activated. Hovering over the feature's
icon displays more information and links to
screens that provide more details.
Third Row
24
Malicious IP addresses identified by Guardicore's
Reputation service. Hovering over the area
displays a list of malicious addresses.
25
Admin (User) Menu
The Admin Menu (also referred to as the User menu) is the menu that drops down when you
click admin or guest (name) (depending on your permissions) in the upper right corner of
your Centra page:
Menu Options
Options in this menu include the following:
Change Password
Type a new password with a minimum of 3 characters, including a number and a symbol.
26
User Preferences
Enables you to set the Reveal Map to Color blind mode so that the flows in the map can be
distinguished by those with color blindness:
27
Help
Link to the current version's installation guides and user guide.
Release Notes
Link to the release notes of the currently installed version.
Log out
Log out from Centra. For example, you may wish to log in as a different role (admin instead
of guest and vice versa).
Version Info
Includes version number, build number, current system time etc.
28
Reveal
Guardicore Reveal provides a visual map of all the applications running in the data center,
all the way down to the process level. Reveal allows you to build segmentation and micro-
segmentation policies around these applications with one-click enforcement. Below is a
Reveal map displaying ungrouped assets and flows:
(Subsequent articles explain how to clarify the map using labels that enable you to group
assets.)
Guardicore Reveal is designed to address the needs of large and complex customer
environments and deploy micro-segmentation across all types of environments, from bare
metal to virtualized machines, through public cloud instances and recently to containerized
environments.
Reveal is based on the concept of visualization. Visualizing the network, its assets,
processes, and traffic flows, is the first step to efficiently creating useful segmentation and
micro-segmentation policies. Reveal maps clearly display your network and enable you to
group network components in a way that enables high level views that can be drilled down,
greatly facilitating your understanding of the network.
But Reveal maps are more than a visual display; they also enable you to establish flow
policies as you inspect the map, making segmentation and micro-segmentation an efficient
process and a practical and effective strategy for establishing network security.
29
• They show the traffic flows occurring in your network, enabling you to spot problems,
security incidents, etc.
• They enable you to formulate and implement flow policies based on your expanded
knowledge of the network.
Reveal Architecture
Reveal maps consist of data from three main components: Management Server, Aggregator
and Guest Agents.
Reveal Agents: Agents collect traffic flow information that is used for building the process-
level Reveal maps. After installing Agents on assets, traffic should be collected for a
reasonable period of time to identify rare flows.
Aggregator Server: The Aggregator is a VM that receives information from Guardicore Guest
Agents. After aggregating the connection data it sends it to the Management Server.
Management Server: The Management Server receives, correlates, analyzes, and enriches
info collected by Reveal Agents and turns it into actionable, natural language incident
reports. For Agent-less environments, Reveal can leverage a Guardicore Collector, a VM
that connects to virtual and physical switches to provide Flow visibility (L4 only).
Labels
To help you manage assets and simplify the creation of policy rules, Guardicore uses labels
in Reveal maps. Labels allow you to assign your own metadata to each asset and enable
you to categorize your assets in different ways, for example, by role, application, or
environment. This is helpful when you have many assets of the same type - you can quickly
identify a specific asset based on the labels you've assigned to it.
30
What Kind of Labels Can You Create?
Centra's flexible Labeling mechanism enables you to create your own labeling scheme. You
can create whatever labels and labeling scheme best accords with the way you think of your
organization's assets and workloads.
The Reveal map would show these labels as three nested groups - role within application,
within environment. You can then open and close these groups as needed to get to the level
of detail - and the information - that you need. So you can go all the way from a high level
map of your data center to process-level data of each individual asset.
The nested representation of labels is automatically translated into AND rules that
dramatically reduce the number of micro-segmentation rules required for creating an
effective policy.
Segmentation Rules
Reveal maps enable you to easily formulate and implement flow policies straight from the
map. Policies are built of four types of segmentation rules: Override, Allow, Alert, and Block
rules.
31
Override Rules
Override rules include Override Allow, Override Alert, and Override Block rules. These rules
take precedence over any Allow/Alert/Block rules.
Example: Block all outgoing traffic from database servers to the Internet.
Allow Rules
These rules are used to build a whitelist of allowed flows. Traffic matched by these rules will
be explicitly allowed. Allow rules take precedence over Alert and Block rules.
Example: Allow Tomcat to MongoDB traffic between App Servers and Database Servers.
Alert Rules
These rules are used to for building a monitoring segmentation policy. Traffic matched by
these rules will be allowed, but will trigger a "Policy Violation" incident.
Example: Alert on any incoming traffic to DatabaseVMs (that did not match any Allow rule).
Block Rules
These rules are used to build an enforcement policy. Traffic matched by these rules will be
blocked; if action is "block and alert", a "Policy Violation" incident will also be triggered.
Example: Block any incoming traffic to PCI Servers (that did not match any Allow or Alert
rule).
32
Flow Matching Order
Traffic is matched against the rules in the following order:
Override Rules: If traffic is matched by an Override rule it takes precedence over any other
rule.
Alert rules: If traffic is matched by an Alert rule, a policy violation incident is created.
Alert and Block: If traffic is matched by an Alert and Block rule, a security incident is
recorded and the traffic is blocked.
33
Explore
The Explore window displays the most recent hourly or daily map along with detailed
information about any asset, process or subnet.
Last Map tab (blue, Last uploaded map. Click it to create a new map, view one of the
farthest to the left) three last uploaded, or search a map.
Time Range Indicates the start and end time of map creation.
34
Indicates the filter or filters selected for the map.
Filter
Rearrange button Centra allows you to choose between two modes of graph
arrangements: Hierarchy and Radial. The Rearrange button
positions the nodes in the most readable layout. Select an item on
the graph and click the Rearrange button.
To save the map layout, click the Save current map layout button .
Toolbar
The toolbar is displayed at the bottom right of the Reveal screen. Use the toolbar to navigate
Reveal using shortcuts, switch between modes, and get a quick view of the flows lined up in
a table. You can also get permanent links of a specified view that can be used for permanent
access.
35
Displays the following keyboard shortcuts:
Get a permanent link of the current view so you can use it for permanent access
Display the Flows Table that includes per every connection: Source, Destination,
Destination ports and the number of times the flow has been documented. Every
table can be exported as a CSV file.
36
Resets the Reveal graph to initial grouping
37
Map Icons and Flow Types
Clicking any asset, process, connection or subnet on the Reveal map displays important
metrics on the right-hand side bar including its IP address, related applications, information
from orchestration, and labels. This article covers the following:
38
Connection Information
Clicking any flow on the graph displays its Connection Type, Destination Port, Source IP,
Destination IP, Destination Domains, IP Protocol, Policy Rules, and Identity (i.e., the identity
of the one who initiated the flow). The number on the flow represents the destination port:
Process Information
Clicking any process on the graph displays its related application, process name, path,
process group, and hash (Hash information is displayed for all Linux based assets while for
Windows based assets only the hash for non system processes is displayed). Asset
information such as Asset Name and Asset IP addresses are also displayed:
39
Asset Information
Clicking an unlabeled asset displays the Asset Name, and some, or all, of the following:
Tenant Name, IP addresses, associated Applications, and Orchestration Information. A
Labels section at the bottom of the screen enables you to add a label to the Asset:
Subnet Information
Clicking a subnet displays the IP addresses assigned to the subnet:
40
Flow Color Schemes
Reveal maps use various color schemes to indicate the status of traffic flows. There are two
color schemes: a scheme for the Reveal map that shows flows that have occured during the
specified time period, and a scheme for the Policy Overlay Map that is displayed in the
Policy Editor.
Flow Meaning
Color
Solid red Problematic flow. This may be due to an incident such as bad reputation,
lateral movement, etc. In a historical map, this may indicate a policy violation.
Dotted red Blocked flow. The flow has been blocked by Guardicore due to a Block policy.
Dotted Failed connection (Not caused by Guardicore. This may be due to a third party
orange such as a firewall, closed port, etc.).
41
Orange The flow violates an Alert policy rule.
Red The flow violates a Block policy rule and is blocked by Guardicore.
Note: Policy Overlay mode assumes that DNS rules match any destination so the graph
might color some flows green even though they won't be allowed in the policy.
• Container to Container
The following map is an example of how containers are represented on the Reveal map:
42
Labels
Overview
To help you manage assets and simplify the creation of policy rules, Reveal maps use
labels. Labels enable you to group assets that share common attributes which greatly
simplifies the map. For example, you can categorize assets by role, application, or
environment. This is helpful when you have many assets of the same type - you can quickly
identify a specific asset based on the labels you've assigned to it. Using labels makes your
work easier and more efficient.
Labels Assist Policy Creation - Labels are the preferred method to use in creating policy
segmentation rules rather than assets. Due to the complexity of most data centers, using
labels to create policies is much more efficient. Formulating segmentation rules that use
labels as source/destination vastly reduces the complexity of creating a policy for a group of
assets. For example, clicking any flow on the map allows you to add an Allow rule that uses
the labeling info to automatically create comprehensive rules (AND policy) that use the entire
labeling path (environment-app-role).
Labels Help Manage Assets - in case of a breach, labels allow you to easily isolate the
breached asset without impairing data center performance:
43
How Labels Are Built
Each label consists of a key and value, both of which you define (e.g. key = database; value
= splunk). You can edit label keys and values and remove labels from an asset at any time.
There is no limitation on the number of labels, though it is recommended to use no more
than a few. Use the label key field to indicate the asset's environment, application, or role,
and the label value field to indicate the specific type within those keys. For example, if you
define a label's key as Application (App), the label's value might be Accounting, Billing,
CRM, etc.
Creating Labels
Creating a label involves specifying the following:
44
A Key such as Environment, Application, or Role.
A Value for the key, such as Production (for the Environment key).
Dynamic Criteria that enables Centra to automatically match assets with those criteria to
the label (optional). Providing dynamic criteria greatly speeds up the process of grouping
assets using labels.
3. Type a Key for the label: the default keys that were specified in
System/Configuration/Reveal are displayed. The recommended keys are
Environment, Application, and Role.
4. Type a Value for the label key that you just specified. For example, a value for the
label key Environment might be Production, a value for Application might be
Accounting, and a value for Role might be DB (database) or LB (load balancer).
Note: All characters except for the following are allowed: ', ", ?, /, //, ], [
Optionally, in the Dynamic Criteria field add criteria such as "Name starts with..." or
IP address and Subnet, etc. This criteria will be used by Centra to automatically
match assets to the label. Using Dynamic Criteria can greatly speed up the process
of labeling assets.
5. Type a Value for the label key that you just specified. For example, a value for the
label key Environment might be Production, a value for Application might be
Accounting, and a value for Role might be DB (database) or LB (load balancer).
Optionally, in the Dynamic Criteria field add criteria such as "Name starts with..." or
IP address and Subnet, etc. This criteria will be used by Centra to automatically
match assets to the label. Using Dynamic Criteria can greatly speed up the process
of labeling assets.
6. Click the Check symbol at the far right of the label line; the label is added to the
list of labels. Centra automatically matches assets conforming to the criteria that you
specified and indicates the number of matching assets in the Matching Assets field
(clicking on this field displays the first ten assets that match the label):
45
Note: Centra allows editing up to 500 Dynamic Criteria records per label. Labels with over 500
Dynamic Criteria can be modified via the API.
Create as many labels as necessary to adequately group assets in your system. The
Dynamic Criteria that you define for each label automatically groups assets. Moreover,
because the hierarchical relationship between the label keys is specified in Administration
System/Configuration/Reveal, Centra automatically nests the assets as well within the
hierarchical structure. The result is a layered map clearly showing the flows between groups
of assets and items such as processes, internet, subnets, etc.
Note: Although these default labels are recommended, Centra can adapt to any labeling
structure.
Once these labels are in place, Reveal will automatically group labels accordingly. The
following diagram shows a three-tier labeling scheme of Environment/Application/Role:
46
How Reveal Displays the Labeling Hierarchy
If a hierarchical labeling scheme is used, for example, the Environment/Application/Role
labeling scheme in the example above, the Reveal map displays labels as three nested
groups - role within application, within environment. You can open and close these groups
as needed to get to the level of detail - and the information - that you need. So you can go all
the way from a high level map of your data center to process-level data of each individual
asset:
This nested representation of labels is automatically translated into comprehensive rules that
dramatically reduce the number of micro-segmentation rules required for creating an
effective policy.
Note: flat grouping by a single key (e.g. Environment:Dev; Environment: Prod etc') is always
possible and provided for any new key in the system. Policy rules are automatically suggested
from these nested groups.
The Reveal map also lets you display the map with the assets ungrouped, without labels:
47
Additional labeling hierarchies can also be configured. Default and additional groupings are
configured in the Administration section of Centra under Configuration > Reveal:
CMDB - Fetch labels from Configuration Management Database (CMDB) using API. CMDBs
are usually used in static environments. Here's the flow:
48
Importing labels using Software Configuration Management (SCM) playbooks - SCM
solutions like Chef, Puppet and Ansible are used in many organizations to provision servers
and maintain software. Playbooks can be used to install GuardiCore agents and update the
asset’s labels using GuardiCore's API.
49
Working with Reveal Maps
Working with Maps with Unlabeled Assets
When you work with a map with unlabeled assets you can assign labels to selected assets in
the panel at the right of the map:
Normally, you will want to simplify the map by applying a labeling scheme to assets. See
labels for more information.
50
Working with Maps with Labeled Assets
If you view the Reveal map with the Group By: Default Grouping option, the initial view will
apply the default labeling scheme specified in the Administration screen in
System/Configuration/Reveal. For example, the map may look like this:
The map shows the flows occurring in the network for the period covered by the current
policy. In the above map, the yellow icons indicate asset labels, while the numbers
attached to them indicate the number of assets matching that label. Centra's coloring
scheme enables you to understand the flows occurring in the network:
A solid red arrow indicates a problematic flow: this indicates a security incident that may be
caused by bad reputation, lateral movement, policy violation, unauthorized flow, etc.
A dotted red arrow indicates a flow that has been blocked by Guardicore due to a Block
policy rule.
A dotted orange arrow indicates a failed connection that has been caused by a third party
such as a firewall.
51
Clicking an asset in the list at the right of the screen displays detailed information about the
Asset on the Assets screen like this:
Other icons on the map indicate cloud, internet connections, etc. See Map Icons and Flow
Types for a complete list.
This map displays assets/servers that have been labeled with a labeling hierarchy of
Environment → Application → Role. This means that every asset is labeled with these
three keys. For example: Environment: production; Application: Splunk; Role: Web
server.
52
You can change the default labeling scheme in Administration/System/Configuration/Reveal.
The Time range tab of the Hourly Map displays the last complete hour or day. Note that you
cannot change this and navigate in time - this option is available for user generated maps
only.
Drilling Down
Double-clicking a label on the map enables you to drill down and display the next tier of
labeling. Recall that in the above map we used a labeling scheme with a three-tiered
hierarchy of the following keys: environment, application, and role. In the following picture,
an Environment label has been double-clicked, displaying its application tier:
53
Note that the labels representing application groupings also have numbers attached to them,
indicating the number of assets matching that group. Clicking a label highlights the
connections to and from the label's assets and lists these assets at the right of the screen in
the same way as described above:
Similarly, double clicking the label icon App: Billing in the above figure, displays the
following:
54
Here, the Role tier is displayed. Clicking a Role label (such as Role: WebServer in the
above figure) lists the assets matching that role at the right of the screen. Note that all three
label tiers, Environment, Application, Role, are displayed as concentric circles.
From Release 36 and above, clicking a policy rule under Policy Rules displays the rule on
the Policy Rules screen:
55
Filtering the Map
There are many ways to filter a Reveal map to quickly access the information that you need.
The Filter button at the top of the map provides a comprehensive list of filter options:
Selecting multiple options enables you to filter the map according to more exact
specifications.
56
Filtering According to Policy
When you select Policy from the list of filter options, additional options are displayed at the
top right of the list:
You can then fine-tune the policy filter according to the type of policy that you are want to
filter: "Allowed By", "Alerted By", "Blocked By", or "No Matching Policy".
57
Clicking the Filter button at the top of the screen enables you to clear the filter and
display all assets and flows again.
Note: Filter Options are available for named items only. They are unavailable for Items that
are marked "unknown".
58
Displaying Asset Processes
For a quick way of displaying the processes of all the assets shown on the map, click the
Show processes for visible assets button on the toolbar at the bottom of the screen:
Selecting a process displays information on the process in the pane at the right:
Note: The user who initiated the process is also displayed under Username.
59
Creating Flow Policies from Reveal Maps
You can create flow policies directly from Reveal maps by clicking the Edit Policy button
at the lower left of the map. The map displays the Policy Editor overlay map and a
panel on the right like this:
The Policy map shows assets and flows similar to the Reveal map but with some changes to
the color scheme for flows:
Green arrows indicate allowed flows. These may include, for example, those initiated by
authorized users.
Red arrows indicate flows that violate the current Block policy. In historical maps, solid red
arrows indicate the flows that would have been blocked due to the current Block policy.
You can now right click any flow line on the map to whitelist the flow by selecting Add Allow
Rules:
60
The new rule now appears under the Allow section of the Policy Editor on the right:
To formulate other rules such as Alert, Block, etc. click the +Add Rule button of the type of
rule that you want to formulate and fill in the fields (Source, Destination and Ports):
61
For a full discussion of the fields and how to formulate policies see the Policy Guide.
1. Right click the application for which you want to create the micro-segmentation policy
and select Filter by this item.
2. Right click the application again and select Edit Policy. The Policy Editor wizard
opens.
3. Right click the application again and select Create Micro Segmentation Policy.
62
The Allow rule which previously allowed all intra-application traffic is automatically
moved to the Alert rules section, alerting on any traffic between the application's
workloads.
Any policy-violating flows appear red on the map, if they were not yet whitelisted.
4. The next step is to whitelist the flows that you want to allow between your application
tiers. To whitelist a flow from the Reveal map, right-click any (red) flow of your
choice. You should whitelist flows between the different tiers inside the application
node.
5. Finally, as in building the segmentation policy, after a period of monitoring the micro-
segmentation policy and revising it based on policy violation alerts, it is time to start
blocking violating intra-application traffic. To do this, move the intra-app Alert rule to
the blocking section and publish your policy.
63
Saved Maps
Overview
The Saved Maps page (Reveal/Saved Maps) allows users to create, save and revisit Reveal
maps of their choice, as well as view maps that are automatically generated by Centra at
predetermined intervals:
These may include maps of specific applications, entire data centers, a specific asset, or any
other combination of filters (ports, IP addresses and more). Users can save commonly used
maps and easily collaborate with other users by sharing named maps. Saving maps reduces
manual work and accelerates micro-segmentation policy creation, forensic analysis and
incident response activities. Performance is also significantly improved when exploring maps
on huge databases.
Centra's daily indices significantly accelerate map creation. To allow faster generation of
maps, Centra also rounds the map start/end times. This means that Centra provides the
requested time for the map plus some more time before and after. Users can choose to view
accurate times by clicking Accurate connection times in the Create New Map screen.
Note: Choosing Accurate connection times will result in longer build times.
In addition to the interval for map generation, the administrator can configure the time of map
generation, the number of maps to store, process inclusion, and the maximal size of the
map.
64
option displays assets by name. If there are many assets, this can result in a very
complicated map. To simplify the map, it is recommended to select the Default Grouping
option. When you select this option, the map displays assets/servers that have been labeled
with the default labeling hierarchy specified by the administrator in
System/Configuration/Reveal.
By using a labeling hierarchy, you can considerably simplify the map. For example, by
applying a labeling hierarchy such as Environment, Applicaion, and Role, you can create a
map that hides or reveals information with the click of a button. Successively double-clicking
an asset on the map opens its three tiers:
You can easily create such a hierarchy in Centra by simply creating three labels that have a
hierarchical relationship to each other and successively labeling each asset with these.
Default settings for hourly or daily maps such as time of map generation and number of
maps to store, can be configured by the Administrator in the Scheduled maps tab in the
System/Configuration screen accessible from the Administration panel.
65
All maps (both hourly/daily and user-generated) are stored on the Saved maps page where
you can search, share, and delete maps at any time.
In addition to recurring daily or hourly maps, you can always create custom maps with
customized time ranges, network level or process level maps, with specified exact
connection times, and other options you can choose from. See Saved Maps.
Note: Daily scheduled maps will always start and end at midnight UTC. Setting the map for a
specific start time just refers to when it will be created, not to the actual start and end times
that it will cover. Regardless of the time for which the map is scheduled, the actual map start
and end times will be midnight UTC (of the previous day).
• For incident response and forensic analysis, users can create maps of the affected
assets and share them with various teams in the organization.
• To address compliance and audit requirements, users can generate and share maps
of sensitive environments to whitelist their incoming and outgoing flows.
66
1. From Reveal, select Saved Maps and click +Create New Map. The Create new
map screen opens:
Time Range The date and time range that the map covers. In addition to a list
of standard ranges such as "last 24 hours" or "last 7 days", you
can also select "Custom" and specify exact start and stop times.
Maps with exact time ranges take longer to build and require
selecting the Exact Connection Times checkbox under Features.
Filter You can select Unfiltered to see all assets, or select a filter
based on applications, ports, IP, and other types of criteria.
View Specify who can view the map (public, or administrators only)
Permissions
67
3. Click Create. The map is added to the list of maps.
4. If you are satisfied with the map, click Save Current map layout .
Note: You can further filter the map at any time by clicking the button.
Policy Rules
Centra enables you to create new policies using the following six rules:
Rules Description
Override Allow These rules take precedence over any other rule - both override and all other
rules.
Override Alert These rules take precedence over any Override Block and other rules.
Override Block These rules that take precedence over any Allow/Alert/Block rules.
EXAMPLE: Block all outgoing traffic from database servers to the Internet
Allow Rules These rules are used to build a whitelist of allowed flows. Traffic matched by
these rules will be explicitly allowed. Allow rules take precedence over Alert and
Block rules.
Alert Rules These rules are used to build a monitoring segmentation policy. Traffic matched
by these rules will be allowed, but will trigger a "Policy Violation" incident. Alert
rules take precedence over Block rules.
EXAMPLE: Alert on any incoming traffic to Database VMs (that did not match
any Allow rule).
Block Rules These rules are used to build an enforcement policy. Traffic matched by these
rules will be blocked; if action is "block and alert", a "Policy Violation" incident
will also be triggered.
EXAMPLE: Block any incoming traffic to PCI Servers (that did not match any
Allow or Alert rule).
68
Matching order
Each flow is inspected and evaluated in the following order:
Instructions as to how to use Centra's Policy Rules screen are provided in the Policy Rules
screen and Rule Fields sections.
69
Policy Learning Mode
Centra's Policy Learning mode combines extraordinary visibility into your network's assets
and flows, together with machine learning to suggest rules for handling policy violations and
flows that were alerted or blocked by the current policy. Policy Learning mode makes dealing
with policy violations quick and efficient. The latest Learning Mode features in Centra V37
include the following:
This takes you to the Reveal map’s Policy Editing Overlay with the Policy Suggestions tab
displayed:
70
Alternatively, you can use filters such as Connection Types: Violated Segmentation
Policy directly from the Reveal map.
The Policy Editor Overlay on the Reveal map (Reveal/Explore) displays a pane with three
tabs: Policy Suggestions, Policy Rules, Dismissed Suggestions.
The Policy Suggestions tab displays a list of suggested Allow rules for connections that
violated the policy (i.e. were alerted or blocked) at the time the connection occurred. If no
Allow rules are applied to these flows today, these connections may continue to cause
violations in the policy.
The list of suggested Allow rules corresponds to flows that have violated Alert (orange) or
Block (red) policies on the Overlay map. Clicking a suggested rule displayed on the tab
highlights the flow on the Overlay map. There are no suggestions for flows that are implicitly
allowed (Gray flows), For rules for which there are no suggestions, a message is displayed:
71
Note: If a flow is Gray in the current draft policy, but violated a policy when it was created,
Centra may still suggest an Allow rule for the flow.
For each rule, the Source, Destination, and Port are displayed, as well as the Ruleset to
which the rule is assigned, and a Decision field. To accept or reject all of the suggested
rules, click the Allow All Pending or Dismiss All Pending buttons at the top of the display.
Note: a suggested rule becomes part of your draft policy if you select Allow in the rule’s
Decision column. The Allow rule is, however, just part of your draft policy and, like other rules
in your draft, will not be implemented until you choose to publish your policy in the Rules
screen, or in the Project Rules screen.
To create an Allow rule from the suggested rule, click Allow; the following is displayed:
To create an Allow rule with the same specifications as the suggested rule, click Allow.
To create an Allow rule with modified settings, click Custom Rule to display the Add Custom
Rule dialog box:
72
To modify the Source, Destination, Ports, or Ruleset parameters, click in the field to display
the Policy Rules tabs:
Click the desired tabs to modify the parameters. When you are satisfied with the parameters,
click the Add Rule button.
After creating an Allow rule, the rule will show up as a Green flow on the Reveal map and
will be added to the rules displayed on the Policy Rules tab.
To dismiss a suggested policy rule, click Dismiss; the rule will be displayed on the Dismissed
Suggestions tab.
73
Viewing More Information for a Suggested Rule
To display more detailed information for a suggested rule, hover over the rule and click the +
button next to the rule:
The Network Log screen is displayed where you can view more detailed information on your
Network’s traffic along with information about the matching rule:
You can also modify a rule by clicking in the field that you want to modify (for example
Source or Destination); the tabs of the Policy Rules screen appear enabling you to modify
the rule:
You can filter the Policy Rules tab using the Ruleset button at the top of the tab.
74
Dismissed Rules Tab
This tab displays the rules that you dismissed on the Policy Suggestion tab. You can also
select the Include Dismissed of all Maps checkbox to display a list of rules dismissed from
other maps.
75
Policy
The screens under the Policy section enable you to leverage Guardicore’s new AI Powered
Segmentation feature. The feature revolutionizes the process of segmenting your system
and greatly reduces the time and effort it requires to design and implement an effective
security policy. A new Projects screen automatically saves the policies that you create in the
Create Policy screens so that you can return and continue to refine, manage, and review
them.
Screen Description
Projects Enables you to access and continue work on projects that you saved in the
Create Policy screen.
Rules The Rules screen enables you to create, modify, and manage segmentation
rules.
Revisions Lists all of the Policy revisions and enables you to revert to a particular
revision.
Label Label Groups allow you to collect several labels under a common name and
Groups use it in a rule's Source and Destination fields, making your policy easier to
maintain and more efficient.
User Enables defining policy action based on a user’s identity, not just a process,
Groups label, or other asset information. Identity rules provide the ability to allow
connections based on the user creating the connection.
76
Create Policy
The Create Policy screen displays a page of templates that represent security goals that you
want to achieve. Clicking a template walks you through a wizard that enables you to choose
the configuration of items (assets, labels, processes, etc.) appropriate to achieving your
security goals. With just a few clicks, the wizard generates a complete list of rules required
for your policy and displays the result graphically on an accompanying Reveal map. You can
then further refine the policy in the Segmentation Rules screen or return later to the Projects
screen where your policy can be reopened for further revision.
Templates
Centra’s policy templates consist of two types:
This includes templates for securing applications such as the Active Directory. These
templates are based on Guardicore’s extensive research into the way these applications are
deployed and how to secure them. They appear with #template at the bottom of the icon.
These templates achieve a particular security goal for a specific application. For example,
templates include ring fencing an application, or whitelisting outbound flows for an
application. They appear with #diy at the bottom of the template icon.
Step 1 (optional but recommended): Specify an Application Label Key as explained below in
Step 1, so that the AI engine can identify and match applications to the required template.
Step 2: Select a Policy template that enables you to achieve your Security goal.
Step 3: Select the Assets to be secured. This involves continuing with the assets that
Guardicore’s AI recommends to secure, and/or selecting assets that you deem appropriate.
Step 4: Look over the rules that Centra’s AI powered segmentation engine has automatically
generated. Use the Reveal map to inspect the rules and make any changes.
In many cases it only takes a few clicks to go from step 1 to a full security policy in step 4.
The following sections provide detailed instructions for each step.
77
To configure an application label key:
2. In the Application Label Key field, type a key that will be used to identify applications.
78
This screen enables you to decide what security policy you want to produce. The Create
Policy screen displays a list of templates designed to provide the framework required to
create an effective security policy. Some templates may appear with a Recommended logo,
which means that Centra has analyzed your system and recommends that you use this
template so secure your system. Of course, you can decide to use another template that
suits your needs.
The top rows display templates designed to secure well known applications such as
Microsoft’s Active Directory or Sharepoint. Guardicore’s AI has analyzed applications such
as these and their traffic flows, and provides the best way of securing them on your system.
The rest of the screen displays templates for achieving specific security tasks such as ring
fencing or tier segmentation of specific applications. Guardicore’s AI analyzes the
organization’s traffic flows and provides policy recommendations based on the analyzed
traffic and selected use case.
NOTE: You can request additional templates customized to your security needs by
contacting Guardicore Customer Success.
79
4. Clicking a template displays a screen that enables you to choose the assets to which
you want to apply the policy. Clicking on the displayed asset type (for example DNS
server) displays two tabs: AI suggested labels, and Labels existing in your system:
Note that on the Labels Suggestion tab, in addition to selecting a label, you can
rename the auto suggested AI label to any naming convention of your choice by
typing in the Create the label boxes:
The screen varies depending on the policy template that you selected. For example,
if you selected Active Directory Segmentation Policies the following screen appears:
In the above template, the assets to be secured are Active Directory Servers.
Note: You can send the list of suggested assets (or IPs) to a CSV by clicking the
CSV button that appears near the list.
80
Step 3: Select the Assets to be secured.
5. Click the underlined link to display the required Assets to secure. For example, when
you click the Active Directory Servers, a screen like the following is displayed:
In the above example, the labels of the possible assets for achieving your security
goal are displayed. The screen above displays a tab that lists labels that you have
created. Depending on the template, several tabs are displayed consisting of the
following:
Tab Description
Use an auto- Guardicore’s AI can auto-suggest the next application to secure from
suggested label your existing application labels. Guardicore prioritizes the list of
from a prioritized application labels that you have already created for your system so
list of your existing that you see the most appropriate labels for your task at the top of
application labels. the list.
Use any of your This is a list of all the labels in the system as in the above example.
existing labels
Some templates first present a list of labels and then present further choices after
you select from the list. This is sometimes achieved through selecting Tweaks as in
the following:
For example, after selecting the within Environment tweak, the screen presents a
link that enables you to select labels that specify Environment:
81
6. If desired, click Advanced Options for controlling the way processes and flows are
included.
Ignore all existing allowed Click this option to exclude flows that are already allowed by the
flows policy from the auto-suggested policy rules.
Include rules by individual This option creates rules for unlabeled assets and IPs by individual
IP's and Assets IPs and Assets. Deselecting this option will result in rules generated
by subnets.
82
Set a custom time range Override the template default of the latest scheduled map. Clicking
this option enables you to set a time range:
7. When you are finished making your selections in the various tabs, click Next to
display the Project Rules screen:
Note: Templates for specific applications may require time to generate the resulting map.
Users may exit the Rules screen for the project and access the project (rules and map) from
the Project screen at a later time.
This screen auto-suggests rules required to effectively implement the policy based on your
choices of Policy template and labeled assets, and auto creates the relevant Reveal map to
show all relevant traffic related to the suggested policy. Rules are displayed on the Reveal
map in a policy overlay to visualize the effect they will have on your real traffic.
Note: If the generated rules and map do not match your expectations, you can click the
button at the bottom of the screen to return to the previous step, change
your selections, and regenerate the policy.
83
You can create additional rules by clicking the Add New Rule button and choosing
the type of rule to add.
A series of filters at the top of the screen enables you to locate particular rules by
Section (i.e. the type of rule), Source, Destination, and Any Side (whether source or
destination). Clicking More Filters displays Action (Allow or Alert), and State filters.
9. If you want to do more in depth revisions, click the Explore button at the right top
corner of the screen; this displays your policy in the Explore screen where you can
click the Edit Policy button to revise the policy rules in a graphic way on
the Reveal map overlay.
10. After revising the policy rules, click to publish your policy.
Note: If you do not publish your policy, it will still be saved to the Projects screen as a Draft
where you can open it later and continue to revise it.
84
Label Groups
Users can define and use Label Groups in their segmentation policy. Label Groups allow you
to collect several labels under a common name and use it in a rule's Source and Destination
fields, making your policy easier to maintain and more efficient. Defined separately from
Labels, Label Groups can be used in micro-segmentation rules as the rule’s source or
destination. Only a single label group can be used as a rule's source or destination.
85
3. Click in the Group Name field and enter a key and value, e.g. Zone:Development.
4. Click in the Label field and select labels to be included in the Label Group.
The Matching Assets field displays all the assets included in the selected Label Group.
Optionally, you can display the first ten assets.
5. Click and at the top of the screen, click the Publish Changes button .
86
Policy Rules Screen
The Policy Rules screen enables you to create and modify segmentation rules, as well as to
manage the rules:
The screen displays a list of segmentation rules and a series of columns with information
about each rule. The Section column indicates the type of rule (Allow, Alert, Block, Override);
the other columns such as source and destination, port, etc. are explained in Rule Fields.
Column Description
Section The rules section to which the rule belongs: Allow, Alert, Block, etc.
Source The entity that initiates the flow (asset, process, IP, etc.).
Hits Records the number of times the rule was activated. The column
displays “hits” in the following units: 0, 1-1K, 1k-10K, 10k-100K,
100K and more. Hovering over the number displays the exact
number of hits.
Changed/Unchanged This column indicates whether the rule has been changed.
87
Additional columns can be displayed by clicking the Extended info button at the right top
of the screen:
Created The time and date when the rule was created.
Modified The last time and date when the rule was modified.
1. From the Policy Rules page, click + Add new rule and select the type of rule that
you want to create from the rule section list (Override Allow, Override Alert, Override
Block, Allow, Alert, Block).
2. Start populating the Rule fields by clicking in each field and selecting options (details
on each field are provided in the Rule Fields page):
88
Note: Source, Destination, and Ports/Protocols are required fields.
Rule Operators
There are several operations that can be applied to a rule by clicking the small arrowhead
icon at the left of the rule:
For example, the following options are available (the ↪ Move to .. section option varies, as
explained below):
89
Delete Removes the rule from the Policy.
↪ Move to ... Moves the rule to another rule section. The available options depend
section on the current section in which the rule resides. The following are
available:
Allow → Alert
Alert → Allow
Alert → Block
Block → Alert
↺ Revert Click to revert to the pre-modified state, e.g., if you performed several
modifications such as moving an Allow rule to Alert and then disabling
it, the Revert option will both restore the rule to the Allow section and
enable it.
90
Filtering the List of Rules
The top of the Segmentation screen displays a wide range of filters that enable you to easily
locate rules. Filters are important for more than finding rules; they also enable you to filter a
subset of rules for performing Bulk Operations as explained in the next section.
Filter Explanation
Source The source of the rule according to Label Group, Label, Asset, Application,
Subnet, User Group, Internet IP, or Any.
Destination The destination of the rule according to Label Group, Label, Asset, Application,
Subnet, Domain, Internet IP, or Any.
Any Side The source and destination of the rule according to Label Group, Label, Asset,
Application, Subnet, User Group, Domain, Internet IP, or Any.
Ports/Protocols Has any of the following: TCP, UDP ports, ICMP type/code. Separate entries with
commas.
Hits Enables users to filter rules according to their usage. The filter uses the same
calibration units as the Hits column.
is enabled Lets you filter for rules that are enabled/disabled: True, False
After selecting the filter criteria, click Apply to activate the filters. You can select multiple
filters until you display a specific list of rules. To cancel the filters, click Clear.
91
Bulk Operations
You can perform bulk operations on multiple rules by first filtering the rules to obtain those
on which you want to perform the bulk operation, then selecting the Bulk operations button
at the top of the screen and choosing an option:
Bulk operations allow you to Enable, Disable, or Delete a list of rules, Reset Hit Counters for
multiple rules, as well as to either clone or move the rules to a Ruleset. Moving rules to a
Ruleset enables you to organize rules more efficiently as well as permitting you to later filter
the rules according their ruleset and perform further bulk operations on them. Two additional
options, Remove Processes, and Replace Label enables you to quickly revise a list of
rules.
The Policy screen displays a Hits column for every rule that records the number of times the
rule was activated. The column displays “hits” in the following units:
92
The bar appearing next to the number of hits provides a graphic description of the number:
Hovering over the hit number displays a notification of the exact number of hits as well as
when the hit counter was last reset:
A Hits filter is available enabling users to filter rules according to their usage. The filter uses
the same calibration units as the Hits column.
Users can reset the Hit counter for a particular rule by selecting the menu button at the left of
the rule and clicking the Reset Hit Counter option:
It is also possible to reset the Hit counter for all the rules listed on the Rules screen by
clicking the Bulk button and choosing Reset Hit Counter:
93
You can also reset the counter for particular sets of rules by using the filters to display a set
of rules according to the filter criteria and then using the Bulk operations button on the
displayed rules. Users can also reset the hit counter when back-porting to an older policy
revision.
Counters are global, i.e. if a user has permissions to reset the counter, it is reset for all
users.
NOTE: The Hit counter is updated according to Agent verdict, not according to the verdict of
Management. Therefore, if two Agents report the same hit, the rule Hit counter will increment
by +2.
94
Projects Screen
After you choose the labels/assets on the Create Policy screen, the Projects screen stores
your policy, enabling you to later revise it:
Policies are characterized in the State column by one of the following States:
Draft
Column Description
Project Goal The name of the project that was created in the Create Policy screen.
Violations The number of violations that occurred since the policy was implemented.
95
Clicking on an item in the Project Goal column (the name of the policy) displays the Project
Rules screen that lists all of the project’s rules like this:
The screen may also display a Reveal map to the right of the list.
Revisions
The Revisions screen displays every change that has been made to the policy to keep track
of the policy life cycle. Policy revisions are saved indefinitely; you can revert to a previous
revision at any time. For example, you may want to do this in case a newly deployed policy
contains a mistake.
96
Note: Publish a revision every time you publish changes.
97
User Groups
User Groups enable defining policy action based on a user’s identity, not just a process,
label, or other asset information. Identity rules provide the ability to allow connections based
on the user creating the connection. This enables creating more fine tuned rules that depend
on the users initiating a communication flow. For example, users that have been assigned to
a certain user group can be allowed to initiate communication to specified destinations while
users outside the group are blocked.
The feature enables you to whitelist groups whose users initiate communication flows to
specified destinations. Once you have created a User Group, you can use it directly from the
Policy Rules page when creating a policy.
• A User Group can only be used with a source for the rule.
• The rule using the User Group as a source must be an Allow rule.
• The feature works only with a setup in which the source is a Centra Agent installed
on a Windows server.
• Important Note for SMB Rules: For SMB rules (when Destination is TCP port 445),
Centra behaves differently. See SMB Rules for details.
Groups created in a Microsoft Active Directory Domain can be associated with User Groups
in Centra
98
Creating User Groups
Creating User Groups involves three steps:
1. Create groups on an Active Directory Domain Controller, or make sure that such
groups already exist. The members of each group should be users who have
particular security privileges (for example, the ability to initiate communication with
specified assets, servers, etc.).
For instructions on creating or configuring an AD group, see Create a Group in the Active
Directory.
1. In the Centra Administration menu, select Data Center/Orchestration, and click the
+ Add Orchestration button. The Add New Orchestration dialog box appears.
2. In the Add New Orchestration dialog box, for Type, select Active Directory:
99
3. Fill out the fields as described in the following table:
Field Description
Name The name that you want to use to identify the AD orchestration.
GC Cluster The Guardicore Cluster that you want to use for the AD orchestration.
Domain The domain name of the organization for which you are configuring the AD
Name orchestration. This is the root domain of the entire AD tree hierarchy. For a
detailed understanding of AD structure and domains see Active Directory
Structure and Storage Technologies.
Login The user logon name according to the userPrincipalName (UPN) format for
Username the Active Directory as explained in User Naming Attributes. A UPN
consists of a UPN prefix (the user account name) and a UPN suffix (a DNS
domain name).
100
Base DN The section of the directory where the application will commence searching
(optional) for Users and Groups. For users to be found in an application, they must be
located underneath the base DN. The Base DN speeds up the search for
users.
Use SSL Select to use SSL for the orchestration. To use this mode, make sure that
Active Directory Certificate Services are enabled or use Insecure mode.
5. In the Centra User menu, select Policy/User Groups and click the +Add User Group
button. The Add New User Group dialog box appears:
6. In the New User Group dialog box, type a title for the User Group and click the +Add
button to display a list of groups created on the AD DC.
The Active Directory user groups that are displayed depend on the AD permissions
of the user accessing the Active Directory. By default the pane displays only a
sample of active directory groups; more active directory groups can be found by
searching.
7. Select one or more groups and click Save. The new User Group now appears in the
list on the User Groups page like this:
101
Including a User Group in an Allow Rule
You can include a User Group as a source for an Allow or Override Allow rule. This restricts
the Allow rule to communication flows initiated from a specific group of users. Follow these
instructions:
2. From the list of rules, select Allow Rule, or Override Allow Rule.
3. In the Source field for the new rule, select Label, Asset, or Subnet and click Apply:
Your selection appears in the Source field together with an Any button:
102
4. After your selection appears in the Source field, select the Any button to
5. On the User Group tab displaying User Groups, select the User Group whose
members you want to specify as the Source for the flow covered by the rule, and
click Apply.
Note: Two User Groups appear in the list by default: Local Users and Local
Administrators. If these groups are selected for the rule, connections matching the
rule made by a local non-domain user or administrator are allowed.
6. Continue to specify other parameters for the Rule such as Destination, Port/Protocol,
etc. as you would any other rule.
103
Filtering the Reveal Map by User
You can filter the flows on a Reveal map by user (username) by using the Process Users
filter:
104
Special Behavior for SMB Rules and Connections
SMB rules and connections are handled differently and affect Centra’s behavior with regard
to user identity and policy.
How Windows Handles SMB Connections and its Effect on User Identity
When an SMB connection is made, Windows uses a system service to make the connection,
instead of the process that requested the connection. The connection shows up as having
been made by the System process and System user. As a result, Centra cannot know which
process made the connection or which user initiated it.
105
How Centra Handles SMB Connections and its Effect on Policy
When an SMB connection is made, the Enforcement module checks which users are
currently logged on (via Remote Desktop or a physical console). Any SMB Allow rule
matching one of these users is considered an Allow rule for this connection. If there is no
such matching rule, the connection is blocked.
106
Projects Screen
After you choose the labels/assets on the Create Policy screen, the Projects screen stores
your policy, enabling you to later revise it:
Policies are characterized in the State column by one of the following States:
Draft
Column Description
Project Goal The name of the project that was created in the Create Policy screen
Violations The number of violations that occurred since the policy was implemented.
107
Clicking on an item in the Project Goal column (the name of the policy) displays the Project
Rules screen that lists all of the project’s rules like this:
The screen may also display a Reveal map to the right of the list.
108
Incidents
Types of Security Incidents and Predefined Filters
Centra logs five types of security incidents and lists them under predefined filters:
Lateral Movement An attacker has attempted to access a non existent IP, a non existent
port, or when a malicious file has been detected on an asset.
Bad Reputation A domain, file hash, or IP address has been identified as malicious by
Guardicore's Reputation Service server.
The All Incident screen features the list of all incidents in an unfiltered manner.
Incident Details
When you click an incident's ID in the ID column, a page is displayed with detailed
information about the incident. The page format varies depending on the type of incident.
The page format and information for each type of incident is covered in the pages on their
respective filters, i.e. Lateral Movements, Policy Violations, etc.
Acknowledging an Incident
The top of each incident information page displays an Acknowledge button that enables
you to acknowledge the incident:
109
Acknowledging Multiple Incidents at Once
To acknowledge multiple incidents at once, Centra allows you to 'bulk acknowledge' a group
of incidents sharing similar attributes such as Tag, Source Destination, etc.
1. On the Incidents page (or any of the pre-defined incident filtered pages) filter the
incidents by any of the filters or combination of filters. In the example below, the
110
All Incidents Screen
The All Incidents screen features all the incidents that appear in the predefined filters:
111
Tags A tag is assigned to an attacker’s activity. There are two types of tags:
Service tags indicate which service has been used by the attacker including
SMB, RDP, NetBios, SSH, HTTP and MYSQL. These tags are denoted
by icons with a colored border, but with no background color, like this:
.
Behavior tags allow you to group attacker activities by patterns. Clicking a
behavior tab points to the Session Recordings page where all the activities
grouped under this tag are displayed. An incident can be assigned more than
one tag.
Group The Group to which the incident belongs under the Incident Groups.
Clicking on an incident displays a screen containing more in-depth information. See the
filtered Incidents screens for more information.
112
Integrity Violations Incidents (FIM)
Integrity Violations incidents are triggered when there is a template violation, a missing file, a
file too big to scan or a template conflict. You can review the FIM incident to understand
whether the incident is a result of misconfiguration or potential malicious activity. As a
response to the alert you can whitelist the hash in case of a misconfiguration or a legitimate
change. In case the change is not what you would expect, you can dive deeper into the
incident to detect its source.
• A template violation
• A missing file
• A template conflict.
Summary - The log verdict that has triggered the incident, e.g. Conflict verdict for 1 assets.
Graph View - Displays the the network behavior during the incident.
The right side of the screen displays Affected Assets, the time the incident started and
ended, associated incident groups, and tags. Note that you can manually add a custom Tag
113
by clicking the Add Custom Tag button, typing a Tag, and pressing Enter. The tag is
displayed in a distinct color. Custom tags can be useful for keeping track of incidents. To
remove a custom tag, simply click the Cancellation button in the corner of the tag:
Medium/High severity.
Internal tag to indicate that the source of the incident is from within the network (east-west).
Centra detects lateral movement using dynamic threat deception that automatically
investigates suspicious traffic and alerts once a connection was made to a non-existing IP or
a blocked port. Detailed forensics reports are also provided per each incident.
TCP redirections: An attacker has attempted to access an existing computer over a non-
existent port.
Incident Report
Clicking the ID of a lateral movement incident displays its incident report. The incident report
provides a walkthrough of the attacker's actions in a natural language grouped by tags,
along with screenshots, attacker credentials, and if existing, processes the attacker created:
114
The right side of the screen displays Affected Assets, the time the incident started and
ended, associated incident groups, and tags. Note that you can manually add a custom Tag
by clicking the Add Custom Tag button, typing a Tag, and pressing Enter. The tag is
displayed in a distinct color. Custom tags can be useful for keeping track of incidents. To
remove a custom tag, simply click the Cancellation button in the corner of the tag:
Tags There are two types of tags - service tags and behavior tags.
Service tags indicate which service has been used by the attacker, such as
SMB, RDP, NetBios, SSH, HTTP and MYSQL. These tags are denoted by a
color icon with no background.
115
Report Tabs
Tab Description
Summary
Drilldown of the attack by behavior tags explained in natural language. Example:
Centra exports a number of IoC types. See the list at the end of this article.
116
Session Raw recording of the attacker’s malicious activity Inside the Honeypot, delivering
Recording visibility into all attacker’s actions as well as forensic analysis for these actions. The
following sessions are recorded (if they are present during the incident):
117
Tabs Displayed Only When Relevant Info Exists
Tab Description
Screenshots The entire attack packet is saved in a PCAP format and can be shared with
forensics tools. Screenshots are available for Windows environments only.
Credentials Username and password used by the attacker, along with the service used in the
attack, for example RDP and the time the attack started.
Processes Process activity during the attacker session, including process creation and
deletion.
Acknowledge Button
Click the Acknowledge button to mark an incident as 'read and handled'. The Acknowledge
button adds an Acknowledged tag to the incident. Once you acknowledge an incident it will
no longer appear on the Security Summary Dashboard. However, it can still be found by
filtering by Acknowledge Tag on the All Incidents page.
118
Network Scans Incidents
This type of incident is triggered when a scan of multiple IP addresses has been detected by
Centra. In the incident report below, Centra displays Address Resolution Protocol (ARP)
requests sent to specified IP addresses. Note that there are two types of tags - internal and
external - to distinguish between internal and external network scans. Filtering for internal
scans displays only the flows that include internal addresses, as opposed to other scans
reserved for flows that cross the network perimeter.
The right side of the screen displays Affected Assets, the time the incident started and
ended, associated incident groups, and tags. Note that you can manually add a custom Tag
by clicking the Add Custom Tag button, typing a Tag, and pressing Enter. The tag is
displayed in a distinct color. Custom tags can be useful for keeping track of incidents. To
remove a custom tag, simply click the Cancellation button in the corner of the tag:
Acknowledge button
Click the Acknowledge button on the right (see image) to mark an incident as 'read and
handled'. The Acknowledge button adds an Acknowledged tag to the incident. Once you
acknowledge an incident it will no longer appear on the Security Summary Dashboard.
119
Column Description
ID The ID of the incident. Clicking an incident's ID displays the Incident screen with more
detailed information.
Ended Time the incident ended. If the attack is ongoing, the following symbol is displayed in the
Type column:
Tags An incident can be assigned several tags, for instance both policy violation and
suspicious process tags.
Incident Screen
Clicking the ID of a policy violation incident displays a graph that shows the related policy at
the time of incident and violating connections that triggered the incident. The violating flows
are marked red:
120
The right side of the screen displays Affected Assets, the time the incident started and
ended, associated incident groups, and tags. Note that you can manually add a custom Tag
by clicking the Add Custom Tag button, typing a Tag, and pressing Enter. The tag is
displayed in a distinct color. Custom tags can be useful for keeping track of incidents. To
remove a custom tag, simply click the Cancellation button in the corner of the tag:
Clicking the map may display more flow violations. When you select a violating flow (red
line), more detailed information concerning the policy violation is displayed at the right of the
screen.
Click the Acknowledge button to mark an incident as 'read and handled'. The Acknowledge
button adds an Acknowledged tag to the incident. Once you acknowledge an incident it will
no longer appear on the Security Summary Dashboard. However, the incident appears on
the All Incidents page and can be found by filtering by the Acknowledged tag.
Centra allows you to Whitelist a flow from the Policy Violation incident page. In the incident
page, click the Create Allow Rules button. Centra will suggest a new rule which allows the
incident-triggering flow. Once approved, the rule will be added to the policy and the incident
will be acknowledged. Don't forget to publish the policy with the new rule.
121
You can move an incident from Alert to Allow directly from the incident map by clicking the
Allow button. This will instantly allow the traffic and remove the incident from the list. Note
that the Allow rule is automatically suggested, you only need to save it. If the suggested rule
does not solve the policy violation, a warning message is displayed.
Reveal Graph
The graph displays the policy at the time of last violation. All connections related to the
incident will appear under the same incident. The assets related to the incident are
highlighted. Click the shield icon at the left-hand corner to show the policy at the time of
last violation. The shield turns green:
You can click any asset or process on the map for more info on the side bar including host
name, Ip addresses, tenant name, applications etc for asset; click any process to see
process name, path, hash etc.
Tabs
The Policy Violations screen displays a series of tabs with important information relating to
the incident. Specific tabs will only appear when they have information to display. Below are
the tabs that can appear:
Connections Tab
The Connections tab displays connections that violated the policy at the time of the incident:
122
Note: Last Occurence is limited to one month before the current incident.
This tab appears when there are relevant remediation steps that can be taken:
The effective policy including Custom Alerts, Allow, Alert, Block and Override rules -
deployed at the time of the incident:
123
Processes Tab
IP Addresses Tab
124
Assets
Assets are objects in GuardiCore Centra that represent workloads in a protected data
center. There are two types of assets:
Unmanaged assets are discovered when participating in traffic flows and shown as
an IP address on the Reveal map. Unmanaged assets are not listed on the Assets
screen.
Asset Dashboard
Clicking any asset on the Assets page displays a dedicated page that contains all the info
related to the asset. The left side of the screen displays key asset stats: operation system,
CPUs, agent version, labels assigned to the asset and more. A series of tabs to the right
displays pages that include segmentation policy applied to the asset, summary of security
incidents (scans, policy violations etc'), a list of all the incidents related to the asset, and a
list of DNS requests made on behalf of the asset:
125
Segmentation Policy Tab - Displays the current policy’s rules that apply to this asset,
meaning that the asset is a source or destination of the rule or included in a label or a subnet
of the rule. Displays all rules pertaining to the asset - Override, Allow, Alert and Block. See
the above figure.
Security Summary Tab - Summary of all incidents in which the asset is involved and
current risk level:
126
DNS Requests Tab - A list of DNS requests generated by the asset's processes:
Once configured, Centra will handle traffic from each tenant separately, correctly matching
traffic from Agents or Collectors to individual tenants. The tenant to which Assets belong
appears on the Assets screen in the Tenants column:
Note: while multi-tenant support accurately reflects the traffic to individual tenants, it does
not currently permit different policies for the same IP address space.
Tenant configuration
Note: Before you configure the feature, it must be enabled. For SaaS customers, as well as
for on-premises customers, Multi-tenant support can be enabled after the V37 upgrade by
Guardicore Support.
Once the Multi-tenant feature is enabled, an Administrator (global or system) can assign a
Tenant to an Aggregator by clicking the Assign a Tenant option on the Aggregator screen:
127
to display the following dialog box:
Centra assumes no traffic will pass between different tenants, except for traffic between
tenants and the specially allocated "Infra" tenant. For example, in an MSSP environment,
servers of different tenants may use some shared MSSP infrastructure. The infrastructure
servers should then be mapped to the special "Infra" tenant. This can be seen in the Source
and Destination fields of the following Network Log:
(In the second flow, the tenants are appear in Source: and Destination:
)
After configuring tenants, incoming connections' source and destination will be attributed to a
specific tenant according to the source and destination assets. The tenant association can
be viewed in the network log:
128
Users can use the tenant selector dropbox on the top right to filter connections with a source
or destination of a specific tenant:
Note: When building segmentation policy rules, rules for specific tenants may still affect other
tenants. For example, a "BLOCK ANY → AssetA" rule, with AssetA being part of TenantA, will
create a rule on all assets (even ones not belonging to AssetA) which block access to the IP
address of AssetA. We intend to provide segmentation rule tenant-awareness in the following
Centra versions.
129
Network Log and Policy Creation
Handling violations is an important part of building access policies. If a connection shows
frequent violations, the administrator should decide whether the connection’s block or alert
policy is too restrictive and therefore leads to unwarranted violations, or whether to continue
the policy.
Centra’s Network Log provides a tabular view of all connections in your network and enables
you to filter the list for policy violations along with information on the connections. To start
handling violations and remediating them, the Network Log has now been fully integrated
with Learning Mode. The two features work together seamlessly to identify traffic flows that
violate policies and present suggestions for remediating the situation.
1. In the Network log, click the Show Summary link at the right of the screen:
The Show Summary list presents the top 15 labels with the most violations:
130
2. In the Summary list select the label by which to group the flows displayed on the
Network log:
Note: the available Label key groupings by which to group the flows can be
configured in the System/Configuration screen under Reveal, Additional Grouping
Options:
131
For example, entering these Grouping Options:
After selecting a label, you can also select a Ruleset, if if exists, to narrow the map to
more specific flows if desired.
132
3. The list of connections on the Network log can be filtered if desired:
Note:
• The summary is limited up to 2M flows (alerted and blocked), and by the time
frame. The time frame is limited to the Last 24H or Last 48H only. The feature
will not work for violations older than that.
4. On the Network log, click the Create a Policy button . A message appears
indicating that a policy suggestion map is being generated:
133
5. Click Explore Map to display the policy map for the labels that you
selected before:
6. Use Learning Mode to review suggestions and remediate when necessary. For
example, clicking the suggestion in the Suggestions tab, highlights the violating flow
on the map:
134
If desired, you can then remediate the situation by clicking Allow in the Decision column on
the Suggestions tab:
The column now displays the new rule with a green checkmark and the map also displays
the green checkmark near the relevant labeled flow.
135
The new Allow rule is now displayed in the Rules screen:
Export to CSV
The administrator can export the aggregated view to a CSV. The flows on the display can be
filtered by label.
136
Env value/ app value - <ruleset name> -24h Violations Review
By default, even if opened from Saved Maps, the map will be displayed in the Policy Editor
Overlay along with the Policy Suggestion tab open.
The map will be kept for one week. The timeframe of the map is as chosen by the admin
when reviewing the violations (Last 24H, last 48 hours with T-1 hour presented ).
Log Verdicts
Template Match - For compliance regulations, a log entry is generated for every scan even
when there is a match.
File too big - Files over 100mb won’t be scanned and will throw a “file too big” error. The
default size is 100mb. This can be changed in the Agent Configuration page (System
Components > Agents):
File Missing - If the full path of the file does not exist we report that the path is missing.
137
Template conflict - Two templates for the same asset - one valid, one in violation. A tooltip
appears next to the verdict in the incident.
File located on NFS path - NFS or SMB Network drives are not scanned by default and will
throw a System Log warning.
File access error - Reported when the module doesn't have read access.
Labels Log
The Labels log displays a record of changes to labels for assets:
The log lists the label changes for assets (identified by name and IP) according to the date
and time when the change occurred. The log notes the component that made the change,
the name and IP of the asset whose label was changed, the type of change (whether a label
was added, removed, renamed, etc.), and the result of the change. Clicking an item in the
Changed by column displays the component's details on the appropriate component screen
(for example, if the component that made the change is an Agent, it is displayed on the
Agents screen). Clicking an item in the Asset column displays the asset's details on the
Asset screen.
Filter buttons enable the log to be filtered according to Asset, Label Changes, Resulting
Labels, Reason, Changed by Type (for example Agent), Changed By (i.e. the component
that made the change), Time of change, and Asset ID or IP. As with other logs, you can also
export the log to a CSV.
Redirections Log
This page logs bypassed connections and connections that were identified as suspicious
and redirected to the Honeypot for attacker engagement and further analysis.
138
Reputation Log
This log is triggered every time Management queries a domain, IP or a file hash against
Guardicore Reputation Services (GCRS). The log is returned with one of the following
verdict replies: Malicious, Clean or Unknown.
139
Insight
Guardicore Insight provides powerful endpoint visibility, better security value, and additional
segmentation use cases. Based on the well known OSQuery, Insight enables writing SQL
queries to explore running processes, loaded kernel modules, open network connections,
browser plugins, hardware events, file hashes, and more.
Users can use SQL queries to extract data from hundreds of tables. Using Insight, users
can perform SQL queries on a vast number of Agents and aggregate the results to
create labels, build policies, and obtain valuable network forensics.
Insight is baked into Guardicore’s Windows and Linux Agents and appears in the Centra
UI as Insight.
OS Support
The following Operating Systems are supported for Insight:
See the Agent OS Support table in Release Notes for V37 for an updated list of
OS support for Insight.
Running a Query
To run a query:
1. On the Centra UI, click the option to display the following screen:
2. Use the Target Agents section on the right to use Label and Operating System
criteria to target Agents that you want to query.
140
3. Write the query in the box provided on the left. Instructions for writing queries are
contained under Centra's Help menu. See the example queries at the end of this
article.
4. Optionally, you can select general queries from the Catalog at the top of the
screen and type in the values to execute as follows:
141
Note: Clicking the CSV button at the top of the list enables you to download the results
to a CSV file.
You can click an Agent's name in the results list and display the Agent's details like this:
You can also assign a label to all the returned Agents on the Insight screen by clicking the
Label all [number of Agents Returned] Agents button:
142
The Agents Labeling dialog box opens enabling you to enter a Label Key and Label Value to
apply to the returned Agents:
Query Examples
The following are examples of queries:
Results:
143
Example 2: Top 5 processes by resident memory size
Query: “SELECT pid, name, uid, resident_size FROM processes ORDER BY
percent_processor_time DESC LIMIT 5”
Results:
Results:
144
Insight Scheduled Queries
Insight V39 provides the ability to set scheduled queries that enable users to continually
monitor systems in their data center and cloud environments. Centra’s distributed agents
can perform specific queries about installed software, vulnerabilities, hardware state, and
user behavior on individual systems or groups of systems. IT and security administrators can
then harness the insights acquired to create more effective security policies.
For example, users can choose to automatically label Agents that match the query.
You access the Scheduled Queries screen under Insight from the Centra Navigation panel:
145
Title The name of the Query that was scheduled.
Scope The Agents that are target to be queried according to the labels that were
selected under Target Agents (see below).
Actions The actions that will be performed on the Agents that match or do not match
the query. You can specify a label to be applied to Agents that match the
query. You can also specify that the label be removed from Agents that do not
match the query.
146
A screen enabling you to write and schedule a query is displayed. Fill out or edit the fields as
follows:
Set Label/Remove label: These options enable you to automate the process of labeling
Agents.
• To label Agents returned by the Query, select Set Label and specify the Label that
you want to be applied.
• To remove a label from Agents that do not match the query, specify the label that you
want to be removed and select Remove label from unmatched agents.
Alert to Syslog: It is also possible to specify that after running a Query, if a certain number
of Agents match the Query, a syslog will be exported in CEF & RFC5425 formats.
147
Using Filters for Schedule Queries
The top of the Scheduled Queries screen displays the following filters:
Filter Description
Note that the number of queries conforming to the filter options appears.
Queries marked as Warning are those with no hits and appear with a Warning
icon in the list of queries: .
Search Type the name of an Author, Query, or Target Agent by which to filter the
queries.
You can apply operations to all the displayed queries either before filtering, or after filtering
the list. Click the Bulk Operations button:
You can Disable, Enable, or Delete all of the queries displayed in the list. Typically, you use
this feature after carefully filtering the queries to display the queries to which you want to
apply these operations.
148
Inspection Policy
A large amount of seemingly malicious traffic is generated by either repetitive attacks or as a
result of machine misconfigurations that ultimately prove to be harmless. Guardicore Centra
is able to filter the noise by using smart heuristics on the data center traffic, ensuring
uninterrupted traffic flow and minimum impact to the running system.
Centra samples these connections periodically for further inspection by the deception
engine. This leads to major resource savings and focus on 'bad' connections only.
In the Smart Inspection mode, only "new" connection attempts are sent to the Deception
server investigation during a predefined time period. During this time period, "repeated"
connection attempts are excluded from this investigation. This means that the system
investigates any new TCP tuple (src_ip, dst_ip, dst_port) and ARP tuple (src_ip, dst_ip) for a
time of redirect_period and does not redirect connections of the same tuple. This guarantees
that any new unique connection is investigated, while repeated connection attempts
generate a limited number of incidents.
Smart inspection is applied to all incoming and outgoing connections, unless the user has
selected Ignore, Bypass or Inspect rules:
Ignore Matching connection attempts will not be logged nor redirected to the
rules Deception server for inspection. These connections are completely ignored
by the system.
Bypass Matching connections will be logged but not redirected to the Deception
rules server for inspection.
Inspect Matching connections will always be redirected to the Deception server for
rules inspection. Inspect rules apply only if the Aggregator is set to Redirect mode.
149
Rule Fields
A rule is composed of the following fields:
Field Description
Source Can be one of the following: VM name, IP, e.g.10.1.2.3 Subnet, e.g.
10.1.2.3/24 ANY.
Destination Can be one of the following: VM name, IP, e.g.10.1.2.3, Subnet, e.g.
10.1.2.3/24 ANY or FQDN (domain name).
Destination An optional field that lets you enter a port or a subset of ports, for example
Ports "80" or "22, 445". If you leave this field empty, the default value is All.
Update Time The time the rule was pushed to the Aggregator.
Detectors
Detectors are used for semantic analysis of the attacker’s actions when an attacker is
redirected to a decoy machine and tries to perform the malicious actions on the decoy. Each
detector performs specialized logic and can be fully configured, including the severity level
that each detector assigns to an incident. The default detector settings provide excellent in-
depth analysis and do not require additional configuration.
To enable a detector, select it from the list of detectors on the left-hand column. Most of the
detectors generate tags as part of the analysis process. For example, the Call from Stack
detector generates the Stack Overflow tag. Some detectors generate several tags, such as
the Linux Service Operation that generates the Kill Process, Malicious Command and
Networking Operation tags. You can also enable/disable various detection algorithms for
each detector:
150
Reputation Services
Guardicore’s Reputation Services identify indicators of compromise (IoCs) based on
suspicious domain names, IP addresses and file hashes associated with known malicious
activity. Guardicore Reputation Services leverages Guardicore’s network of attack sensors
and deception engines, threat intelligence feeds and the insights of our security research
team. A list of IPs identified as malicious by Guardicore’s Reputation Service is visible in the
Incidents/Bad Reputation screen in Centra’s UI:
Reputation analysis identifies threats based on the presence of suspicious domain names,
IP addresses and file hashes - all associated with known malicious activity. Non-
conforming or unauthorized communications are an indicator of compromise, for example
malware installed on a server and attempting to communicate with a known bad IP address
or domain name. IP addresses are considered malicious if detected as part of an attack over
the last 48 hours; Domain names are considered malicious if detected over the last two
weeks or if it’s a newly registered domain (registered in the past 2 months); File hashes are
considered malicious if detected as part of an attack.
151
Reputation Services for Files, IP Addresses and Domain Names
File Reputation
• Only available when Guest Agents are installed (L7 visibility required). Generates
high severity incidents only.
IP Reputation
• Low severity incidents for incoming Internet connections from malicious IPs (targets
are open to internet connections).
DNS Reputation
152
Configure Reputation Services
Reputation is enabled by default. However, here is how to configure it manually:
This screen lets you choose what to send to the Reputation server - file hashes, IP
addresses, domain names - and configure a proxy if you are deployed on-premises.
2. In Configuration, mark Enable Reputation Analysis, along with any relevant file
hashes, IPs and DNS IoCs you want to send for analysis. Click Save Changes.
Note: For on-premises deployments, verify q.guardicore.com is open via the customer
firewall.
3. Verify that the Reputation types are selected in the Reputation Service Log as well. A
log entry is generated every time Management queries the Guardicore Reputation
Services (GCRS).
Centra allows you to create 'allowlist' of IPs, files and domain names you consider legitimate
on your site. Allowlist items are excluded from reputation inspection. A connection that
matches a allowlist is assigned the Clean verdict and will not be sent to Reputation for
analysis. You can either
153
• Add trusted indicators to the lists manually.
OR
To add trusted indicators manually, click the items link next to Trusted process file paths
and specify the file paths for the trusted indicators.
Choose > Configuration > IP Classification and manually update the public IP addresses
list. Once set, these addresses can be added to the Trusted Indicators list.
154
Classify Specific Domains as Legitimate
Similarly to excluding specific IPs from inspection, it is possible to exclude specific domains
and define them as clean. These domains will not be displayed on the Uncommon DNS
Activity widget on Centra's dashboard.
Choose > Configuration > Domain Classification and manually update the Trusted
Domains list. Once set, these domains can be added to the Trusted Indicators list.
These domains WILL NOT appear on the Uncommon DNS Activity dashboard widget.
155
Suspicions DNS Activity pane in Centra Dashboard
Advanced
In this section it is advised to use the default values provided by Guardicore. Consult
Support if you want to make any changes.
Configuration:
156
Customer IoCs Integrated into Guardicore Reputation Services
Starting from release 27, Guardicore enables customers to feed their IoCs into the
Guardicore Reputation Services and enjoy the same rich visual incident experience as with
all Guardicore incidents. The IoC types that are supported are file and IP. The IoCs are
uploaded in a JSON format to Centra REST API. Once uploaded, Centra will alert on the
presence of these IoCs across the entire customer’s data center.
Activating FIM
The way to protect a file from unexpected changes is to create a FIM policy. A policy is a set
of rules applied to a file/list of files hosted on one or multiple labels or assets. Fill in the
template with the files you want to monitor and their baseline hash values. Centra scans
these files periodically and alerts on any policy violation. You can add, remove and edit FIM
templates via the API or UI. Each host is scanned when it is first discovered by the system
157
and also on a predefined periodic interval.The scan is scheduled every 24 hours by default.
All scans are logged in the Integrity log. A log is recorded for every FIM activity including
hash match.
To setup FIM:
1. Identify the files you want to monitor for changes and the assets (or preferably asset
labels) that contain these files.
Field Explanation
Title The title of the template, such as System Files for PCI
Compliance
Affected Labels Type the labels for which you want the template to apply.
Affected Assets Type the assets to which you want the template to apply.
Files and Hashes Add the file/list to files that need to be monitored along with their
hashes.
158
Monitor File Changes
Once you create and activate the template, Guardicore’s Linux agents will monitor these files
for changes, checking their contents once every 24 hours (configurable). If a change is
detected, a “bad integrity” incident will be created:
As with other incident types, this incident can be sent to your email/SIEM.
159
Agent Module: Detection
The newly added Detection module appears next to the other modules in the Agents
screen.
Here you can filter by module versions, labels, flags and more. Any module configuration
can be overridden by selecting an entry and clicking More > Override Configuration. In this
screen you can configure the module's scan period, skip scanning of files that exceed a size
limit etc. When the Detection module is selected, Active denotes Linux systems while Not
Deployed denotes Windows systems.
160
Stale Hashes Cleanup
The system queries for hashes that haven’t been matched for X days against a specific
template. Hashes that are older than a week can be removed from the system.
• File IoCs are SHA256 file hashes of malicious processes that will trigger an incident
once they communicate from a server that has a Guardicore agent installed.
• IP IoCs are IPv4/IPv6 IP addresses of malicious servers that will trigger an incident
once Guardicore Centra recognizes traffic with these servers.
File IoCs
• File IoCs need to be uploaded in bulks of 200,000.
161
• To upload file IoCs create a POST request to /api/v3.0/blacklist?type=file with all the
file IoCs and tags listed in the request payload: "[{\"key\":
\"043A718774C572BD8A25ADBEB1BFCD5C0256AE11CECF9F9C3F925D0E52BE
AF89\", \"tags\": [\"tag1\", \"tag2\"]}, {\"key\":
\"043A718774C572BD8A25ADBEB1BFCD5C0256AE11CECF9F9C3F925D0E52BE
AF88\", \"tags\": [\"tag3\", \"tag4\"]}]"
• In order to overwrite or clean the list, pass an empty list to the API.
IP IoCs
• IP IoCs need to be uploaded in bulks of 300,000.
• This request will overwrite the previous IP IoC list and it supports listing up to
500,000 IP IoCs.
• Attacking IPs list: created based on IPs that attack our Threat Intelligence sensors.
The most prominent ones are blocked.
• Scanning IPs list: created based on the top scanners which scan our Threat
Intelligence sensors. The most prominent ones are blocked.
• CnC IP list: created based on resolving the IPs of connections to malicious domains.
Once an attacker infects a Guardicore Threat Intelligence sensor and connects back
to a CnC server, log server, etc. this indicator is added to the list.
• Top attackers
• Top scanners
• Top CnC
162
Labels Screen Showing the Label “Top Attackers” and the IP list that it Includes
Each label holds a list of malicious IPs, verified to the highest extent by Guardicore’s Threat
Intelligence Feed. The feed leverages a network of attack sensors, and the insights of the
Guardicore Security Research team.
For each label, two rules are created: to block (Override Block) or to Alert-on (Override Alert)
outgoing and incoming communication from these malicious IPs across the whole data
center. The three labels are updated daily with top detected malicious IPs so that the six
rules created provide an effective additional level of security. The Firewall rules can be found
on the Segmentation Rules screen along with any other rules that you may have created:
Segmentation Screen Showing Six Firewall Rules Created from the Three Labels
163
The CnC list results in Alert rules rather than Block rules since attackers may use legitimate
websites / hosting servers to deliver their malware or communicate with it. Known legitimate
sites such as Github, Bitbucket, AWS S3 buckets, etc. used by attackers are detected by the
Guardicore Threat Intelligence service but are not added to the CnC list. As an extra
precaution to prevent unnecessary blocking, even detected CnC sites not known to be
legitimate and that are added to the CnC list, result in the creation of Alert rules on outgoing
connections to such IPs, rather than Block rules.
• Access one of the IPs in the labels from an asset covered by a Guardicore Agent,
and check the Centra UI for the blocked/alerted incident.
Filter the Incidents screen for any threat intelligence rulesets. Any incidents that matched
these rulesets contain alerted/blocked flows by the threat intelligence firewall. In case a
SIEM integration is in place, the incidents will also be exported to your local SIEM and can
be viewed there.
Filter the Network log screen for any alerted/blocked connections from the threat intelligence
firewall policy rule id. Any matching connection was alerted/blocked by the threat intelligence
firewall.
• In the Segmentation Rules screen, disable the Guardicore Threat Intelligence rules
and let our Customer Success know you wish to opt-out of the daily update service.
• In the Segmentation Rules screen, move the rules to the Override Alert section.
Guardicore will continue to update the labels with the malicious IPs on a daily basis.
164
Receiving a Blocking Alert Concerning a Malicious IP
This section provides instructions on what to do when receiving a blocking alert concerning a
malicious IP detected by the Threat Intelligence Firewall.
This indicates that your environment has been compromised! We recommend verifying the
connection source, process, user and command line. We also recommend engaging with our
Cyber Security Analyst service to help with forensics and further incident response. Contact
[email protected] or Guardicore Customer Success.
Malicious traffic is something you can expect when exposing a service to the internet. Centra
blocked this connection attempt and reduced your service exposure to malicious actors over
the internet.
The Mitigation & IoCs page displays the mitigation actions the administrator can take against
attacks. Each action can be configured to automatically or manually be enabled, or disabled
altogether.
Database IoCs- Microsoft SQL (MSSQL) table, function and procedure creation operations:
165
File Mitigation & IoCs - Details of a suspicious file, and details of SSH Key IoCs for Linux
only.
Firewall Mitigation - Integration with Palo Alto firewall. Once an attack is detected, Centra
updates the Palo Alto firewall with the IP address of the compromised host. The Firewall
then blocks connection attempts to and from the compromised asset, blocking its ability to
propagate in the datacenter.
Centra mitigates ransomware in multiple ways, including pausing the infected machine,
creating a VM snapshot, disconnecting network cards, and executing a script that runs on
management.
What you select on this page appears on the Recommended Actions section of the
incident.
Scheduled Task IoCs - Operations related to the Scheduled Task mechanism (Windows &
Linux).
Group Operation IoC - Operations related to the machine's user groups (Windows only).
166
Potential Backdoor IoC - A suspicious process that has opened a listening socket.
167
Aggregators
An Aggregator is a VM that aggregates and de-duplicates data it receives from its
associated Agents and then sends it to the Management Server. To support scaling, a single
Aggregator can be deployed per hundreds of Agents. In addition to gathering and sending
the data to the
• Each Agent connects to a Guardicore Aggregator server over SSL, with a certain SNI
(Server Name Indication). The connection is always initiated by the Agent. The
Aggregator and the Management server differentiate between Agents by a unique ID
generated on the Agent.
• The Aggregator handles new incoming connections with HaProxy, which determines
the Agent type by the SNI and forwards the connection to the relevant service,
depending on the type of Agent (see the section on Agents for a description of the
types of Agents and their associated services).
• The Aggregator sends commands and requests to the Agents and gets responses.
For example, in the case of Reveal modules, the Aggregator sends a start-monitoring
command that starts a monitoring thread. Deception and Enforcement modules can
push messages to the Aggregator as well.
Aggregators Screen
The Aggregators screen is accessed from the Admin panel Components/Aggregators and
enables you to perform various operations with the Aggregators in the system:
168
The following columns are displayed on the Aggregator screen:
Column Description
Operation The current operation mode of the Aggregator: On, Off, or Monitor. The
operation modes refer to the functionality of the Aggregator.
On = the Aggregator’s functions are turned on.
Off = the Aggregator’s functions are turned off (i.e. it is not performing the
functions of communicating with Agents or relaying data to the Management
server).
Monitor = the Aggregator is gathering information, but is not rerouting
suspicious traffic to the Deception server and is not enforcing policies from
the Enforcement server.
169
Status This column displays information pertaining to the health of the Aggregator.
Guardicore periodically checks the status of Aggregators. The full list of the
status (health) of Aggregator services is displayed by hovering the mouse
cursor over the column. A plus sign next to an item in the list can be clicked to
display further items. The column also uses the following to indicate the
status of an Aggregator:
Error = Problem with some of the Aggregator’s services. Hovering over the
Error icon will display a list with the problematic services marked with an Error
icon.
Stopped = the Aggregator was intentionally stopped. None of the services are
functioning.
Cluster The cluster to which the Aggregator belongs. Aggregators belong to a cluster
where they form a Zookeeper leader and quorum. Unless you have more than
one cluster, the value in this column is Default.
Last Seen The time and date when the Aggregator was last visible.
First Seen The time and date when the Aggregator was first visible.
Configuration Options
The Aggregator screen’s More menu enables you to control the operation of Aggregators,
such as starting and stopping their services. It also enables you to change configuration
settings.
1. In the list of Aggregators, select the checkbox next to the Aggregator whose
operation mode you want to change, or that you want to configure.
170
Option Explanation
Stop: Stop the services for the Aggregator. The component is no longer
functioning and is not communicating with the Management server. You can
start the component again by selecting Start.
Reboot the Aggregator. This is an actual reboot which means that the
Restart component begins functioning anew.
Get debug logs This downloads a compressed tar.gz file that contains detailed debug
information in several files.
The option enables you to specify important settings for Aggregators. Make sure to check
Show Advanced Options for a full list. Some of the most important options are listed here:
171
Configuration Setting Explanation
Machine Details | Include Guardicore uses unique hardware IDs to identify the machine on
hardware UUID which an Aggregator is deployed. The Include hardware UUID
option can solve the following problem:
When servers are cloned in the environment they carry the same
UUID. Turning this option off will ensure that the machine ID
remains unique.
Aggregator | Cluster | cluster-id Occasionally there is a need to change the ID of the cluster of
which the Aggregator/Collector is a part. This usually
accompanies some network reorganization or segmentation.
Datapath | General | TCP Typically, these ports are left untouched. However, if there is a
Service Ports special need to define a port for redirection to the Deception
Server, it’s done here.
Aggregator | Aggregator Check If you want this Aggregator to serve Agents in a load
Features | Agents Load balanced arrangement together with other Aggregators in the
Balancer cluster.
172
Aggregator | Aggregator Check the modules that you want this Aggregator to serve.
Features | [Enforcement,
Reveal, Detection, Deception]
Agents Server
Aggregator CLI
Administrators can use CLI commands to access detailed information on Aggregators.
173
Display SSL Proxy Configuration and Traffic Aggregator/ gc-lower-hatop
Statistics. Collector CLI
(for communication pathways
downward in the direction of
Agents)
gc-upper-hatop
174
Collectors
Collectors are virtual machines that gather information on flows in environments where
Agents cannot be deployed. Such environments include legacy systems incompatible with
Agent software, as well as environments outside of your system that interface with your
network. Collectors relay data to the Guardicore Management server for further analysis and
integration into Guardicore’s Reveal charts. Collectors are also able to detect suspicious
flows, redirect them to a SPAN port for further analysis, and, where warranted, divert them to
the Deception server (honeypot).
Types of Collectors
You deploy Collectors during the installation of Guardicore Centra. During Installation you
can choose to deploy Collectors in two ways:
–OR–
During installation, Wizards guide you through the steps of deploying the various types of
Collectors. As of release 30, you can choose to deploy three types of Guardicore Collectors:
ESX Collector, SPAN Collector and AWS VPC Flow Logs Collector:
• Detection of suspicious traffic and redirecting it to the Deception Server for further
investigation.
• Collection of network level information (L4) about all traffic flows. The ESX Collector
also enables reputation on IPs and DNS. An ESX Collector should be deployed as a
VM on each protected hypervisor and fixed to the host (make sure vMotion is
disabled).
SPAN Collector: deployed as a VM for physical networks. It receives traffic for inspection
from SPAN ports, network taps or Network Packet Brokers (NPBs). it requires a return port
back to the network to be able to perform packet redirection.
VPC Flow Logs: provide a way to inspect all the flows between all the different cloud assets
within a given cloud network. Policy-wise this means that only alerts are supported without
enforcement. To allow VPC flow logs, install a dedicated collector during installation and
configure VPC flow logs in AWS orchestration.
175
ESX Collector
The ESX Collector is a VM that integrates with ESX hosts and should be deployed as a VM
on each protected hypervisor and fixed to the host (make sure vMotion is disabled). The
standard ESX Collector analyzes communication flows sent to a SPAN port by a VSS
(Virtual Standard Switch) or VDS (vSphere Distributed Switch) switch. You can also
configure an ESX Collector to work with the less common N1KV switch.
Multiple vSwitches on the same host can be monitored with a single ESX Collector:
The ESX Collector is installed on an ESX virtual machine and collects information between
the ESX and systems that interface with it. The datapath implementation uses the vSphere
176
port mirroring feature (new since 5.0) in order to allow Guardicore to analyze the traffic
inside the ESX Host and protect its virtual machines.
SPAN Collector
The SPAN Collector is deployed as a VM for physical networks and analyzes
communication flows sent by a switch to a SPAN port. More specifically, it receives traffic for
inspection from SPAN ports, network taps or Network Packet Brokers (NPBs). This Collector
requires a return port back to the network to be able to perform packet redirection.
Both the ESX and SPAN Collectors gather information from a SPAN port (virtual or
physical) and send that information to the Guardicore Management Server for analysis and
appropriate action.
For the SPAN Collector, an important setting is to make sure that protected_cidr is
configured. If this option is not set, the Collector will not report any flows and the following
message is displayed:
2. From the list of Collectors, select the Collector that you want to configure and click
the More button.
3. On the More button, select Configuration Overrides, then select the Show Advanced
Options checkbox.
177
VPC Flow Logs Collector
Guardicore’s AWS VPC Flow Logs Collector provides a way to inspect all the flows between
the different cloud assets within an Agentless cloud network such as AWS. The Collector
gathers logs from the AWS VPC Flow Logs feature (which publishes the information to
Amazon CloudWatch Logs and Amazon S3) and sends it to the Guardicore Management
server. The Management server then integrates the log information into Reveal,
Guardicore’s Visibility module, where it provides a clear view of the flows within the cloud
environment. The VPC Flow Logs Collector enables you to capture information about IP
traffic to and from network interfaces in your VPC:
The integration of the flow logs information into Guardicore’s Reveal module can help you
with a number of tasks:
• Troubleshoot why specific traffic is not reaching a destination, which in turn helps you
diagnose overly restrictive security group rules.
• Use flow logs as a security tool to monitor the traffic that is reaching your
environment.
To allow VPC flow logs, install a dedicated Collector during installation and configure VPC
flow logs in AWS orchestration.
2. One vpc flow log collector can cover multiple regions on multiple accounts. Currently
there is no way to control which collector takes care of which account.
3. Scale has been tested for a production multi region account with 500K flow per day.
• Flow logs do not capture real-time log streams for the network interfaces, there is an
approx. 10-15 minute delay.
178
• The Flow Logs will not include any of the following traffic:
- Traffic to Amazon DNS servers, including queries for private hosted zones.
179
Deception Servers
Deception Servers receive live redirected connections from across the data center and
generate matching deception environments to lure attackers. The Deception Server can be
deployed as a virtual machine or a physical appliance and operate as a single node or as
part of an array of Deception Servers, depending on the customer's deployment scale.
Within the Deception Server there are virtualized machines that interact with the suspect
attacker. Each virtualized machine is referred to as a service provider. The Deception server
supports many flavors of Windows and Linux service providers.
Services supported: Services include RDP, Netbios+RPC, SMB, NBT, SSH, FTP,
TELNET, MSRPC, SQL, HTTP, MSSQL12, MySQL, SMB and netsvc.
Ports redirected for deception to the honeypot: TCP - 21 (FTP), 22 (SSH), 80 (HTTP),
135 (MSRPC), 139 (NetBIOS), 445 (SMB), 1099 (Java RMI), 1433 (MSSQL), 3306
(MySQL), 3389 (RDP), 5985 (Win PowerShell), 5986 (Win PowerShell) + ARP. The ports
redirect are specifically whitelisted in system's configuration. To restrict redirection, configure
the Inspection Policy to bypass a specific port, IP etc.
180
Deception: Updated Logic and Behavior
The mechanism for redirecting traffic to the Deception server was redesigned in Centra
version 36 and moved from the Aggregator to the Agent. This has led to the following
changes:
181
Agents
The Guardicore Agent is designed to track all network connections of a protected server,
coupled with information on the processes involved in the connection. The Agent validates
each connection against a segmentation policy to allow / alert / block the connection. The
connection metadata and the applied action are reported to Guardicore Centra.
Visibility
Enforcement
Enforcing a segmentation policy by blocking and/or alerting violating traffic. AIX agent
supports L4 rules for Enforcement. The expected behavior of non L4 rules derived to AIX
agents is detailed in the Guardicore Admin Guide.
Analysis
Agent Modules
An Agent consists of four separate modules: Reveal, Deception, Detection, and Enforcement
modules:
Reveal module Provides process-level visibility and file reputation. It collects process-
level information on all connections including protocols, ports, and
corresponding processes (path, user, command line, hash, etc.).
Note: Deception Agents have several roles parallel to those of an ESX Collector, and must
not be installed on virtual servers that are hosted on ESXi hypervisors already protected by
ESX Collectors. When installing the system, Guardicore Solution Center decides which is
the optimal deployment for the client.
In addition, there is a Controller module, and two channels, Reveal and Enforcement, that
connect the Agent to an Aggregator.
182
Agents are deployed on Windows, Linux, Solaris, and AIX based virtual servers. Agent
software packages are served from an Aggregator during installation.
Agent Connections
Each Agent connects to a GuardiCore Aggregator server over SSL. The Aggregator and the
Management server differentiate between Agents by a unique ID generated on the Agent.
The Aggregator handles new incoming connections using HaProxy, which determines the
Agent type by the SNI and forwards the connection to the relevant service.
The interface to the Aggregator is implemented using two channels, gc-channel Reveal and
gc-channel Enforcement, which are responsible for communication with the Aggregator. The
Aggregator initiates all communication over the channels, polling Agents on new data and
updating them with configuration and policy changes. The Aggregator sends commands and
requests to the Agents and gets responses. Deception and Enforcement Agents are able to
push messages from the Agent to the Aggregator as well.
In case the Aggregator is disconnected from the Agents, the channels will try to reconnect,
and, if not successful, move to the next Aggregator in the list (if there is one).
For more in depth information concerning Agents and Agent OS Support, see the Admin
Guide.
183
Agents Screen
As an administrator, you use the Agents screen to monitor the health and functioning of
Agents and to perform any necessary operations. The screen displays a list of Agents with
icons at the left of the Agent’s name, indicating whether they are Linux or Windows
Agents:
184
Column Description
Deception
Enforcement
Detection
Labels The labels assigned to the asset on which the Agent is deployed.
Flags Flags indicate problems of which the administrator should be aware. Hovering
over the notice in this column provides more details. A complete list of flags
is provided in the following section and in the Admin guide.
Kernel The version of the kernel on which the Agent is deployed. This affects
particular Agent modules that work from the kernel.
185
Column Description
Last The most recent time that the Agent was detected by the Management server.
Seen
First The first time that the Agent was detected by the Management server.
Seen
Even though the Agent is temporarily removed from the Agents screen, the Asset generated
by the Agent is never removed and will always be displayed on the Assets screen.
Agents Flags
The Agents Flags column displays flags that provide information, warning, and error
notifications. Hovering over the flag displays further information. The following table lists the
various flags that can be displayed in the Flags column:
Polling Mode (INFO) The Agent collects network events in polling mode due to limited
support for this operating system. No action item required. Visibility
events will be reported.
Polling Mode The Agent collects network events in polling mode due to not
(ERROR) running the Enforcement module.
Suggested Action: Check if there are additional flags that describe
the root cause of the issue. If there is no additional info, collect the
Agent diagnostics package through the Centra UI, and report the
issue to Guardicore support.
186
Outdated Policy The flag reflects one of the following:
(ERROR) The Agent could not fetch the most up-to-date policy due to
compatibility issues with the policy. The policy contains elements
that are not supported by the Agent, or the policy is too large.
Hence, the Agent rejected the policy.
In this case, the flag will present the following: The revision ID that
is actually enforced by the Agent vs. the most recent revision ID,
the list of rules that caused the Agent to reject the policy, and the
missing capability to support this policy.
Suggested Action: Modify the policy to meet the Agent’s missing
capabilities, or upgrade the Agent to the most up-to-date version.
The policy was not adopted by the Agent due to unknown reasons.
The Agent enforces a policy with a revision ID older than the main
one.
Suggested Action: Check overall system health focused on the
Agent and its Aggregator. Contact Guardicore support for more
details.
Outdated The Agent configuration was not adopted by the Agent due to
Configuration unknown reasons.
(WARNING)
No Reveal Received The Aggregator didn’t report Reveal data to the Management in the
(WARNING) last hour. This notification is usually being reported by the
Management.
Agent Missing Agent was not seen in the last X minutes (configurable).
(ERROR) Suggested Action: Check if the machine exists and has network
connectivity. It usually happens when there is no connectivity to the
Agent, when the Agent is uninstalled, or when the machine is
turned off.
No Reveal Reported Agent didn’t report Reveal data in the last hour. This notification is
(WARNING) usually being reported by the Aggregator.
Reveal Offline The Reveal module cannot connect to Centra. The Agent
(ERROR) continues to monitor network events and stores them locally in a
rotated storage until the connection is restored. No network events
will be reported during the offline period.
187
Enforcement Offline The Enforcement module cannot connect to Centra. The Agent is
(ERROR) enforcing the latest policy it received, and cannot get policy
updates.
Reveal Module Error The Reveal module responsible for the visibility capabilities cannot
(ERROR) start. Visibility events won't be reported.
Enforcement Module The Enforcement module which is responsible for visibility and
Error (ERROR) enforcement capabilities cannot start. Visibility capabilities can be
missing or limited, and no policy enforcement will be done on this
server.
Detection Module The Detection module that is used for FIM (File Integrity
Error (ERROR) Monitoring) cannot start. FIM events won't be reported.
188
Controller Module
Error (ERROR)
Suggested Action: Check the load on the server, and increase the
resource limitation profile to a higher profile as described in the
"Resource Usage Management" section in the Administration
Guide.
Suggested Action: Check the load on the server, and increase the
resource limitation profile to a higher profile as described in the
"Resource Usage Management" section in the Administration
Guide.
Suggested Action: Check the load on the server, and increase the
resource limitation profile to a higher profile as described in the
"Resource Usage Management" section in the Administration
Guide.
189
Deception Memory Due to unusual behavior of the Agent, or misconfiguration of the
Limit Reached Agent resource limitation configuration, the memory usage of that
(WARNING) module reached 90% of the configured limit.
Suggested Action: Check the load on the server, and increase the
resource limitation profile to a higher profile as described in the
"Resource Usage Management" section in the Administration
Guide.
Suggested Action: Check the load on the server, and increase the
resource limitation profile to a higher profile as described in the
"Resource Usage Management" section in the Administration
Guide.
Limited Policy Some policy rules are not supported by that Agent, and those were
(INFO) modified or removed to meet Agent capabilities. The flag contains
the exact rules that were removed or modified, and the limited
capability that caused it.
Configuration Recent Agent configuration changes were not applied to the Agent.
Partially Applied
(WARNING) Suggested Action: Open Agent configuration (on the Agents
screen, select the Agent, click the More button and select Override
configuration), and verify that the configured attributes are
supported by the Agent. Unselecting problematic attributes will
clear this flag.
Deception Missing Deception capabilities are not available because the Agent could
KO (ERROR) not load or fetch a kernel module for this kernel version or
configuration.
190
Deprecated Agent The Agent was installed with environment variables that represent
Flag Used (INFO) an installation configuration that is no longer supported. This
configuration was ignored during Agent installation, and the
"Default" installation profile was applied instead.
Suggested Actions:
Create a new installation profile or edit the Default installation
profile according to your configuration requirements. Uninstall the
Agent and re-install it with the desired profile.
Ignore this flag or remove it by marking the "Ignore deprecated
configuration flag warning" configuration attribute in the Agent
configuration (Agents screen, More button/Override configuration)
under the "Agent Controller" settings.
Deception Deception doesn't work because the Agent could not create a
Redirection Channel redirection channel to the Deception server.
Error (WARNING)
Suggested Action: Verify the Deception server state in the Centra
UI, under the administration section. Contact Guardicore support
for further instructions.
Deception Limited The Deception module has limited functionality due to a missing
Capabilities (INFO) WinPCAP installation on the server. ARP redirections won't be
supported.
Security Software Agent detects another security software. If this causes compatibility
Detected problems, whitelisting the software is suggested.
Agents Filters
The Agents screen provides a large number of filters to enable you to quickly locate Agents
conforming to your specifications. Filters can be combined to narrow down your search.
Filters include the following:
Asset Status Status of the assets on which they are deployed: Offline or Online.
191
Filter Filters Agents by
Kernel The operating system kernel (version) of the asset on which the Agent
is deployed.
Upgrade Enables filtering Agents according to their upgrade (upgrade name and
time)
By combining filters, you can narrow the list of Agents to just those that have the
specifications that you selected. For example, the following screen has filtered Agents by OS
(Windows) and Module Status (Enforcement Module Error):
192
More button
The More button provides the following options for selected Agents:
Reset to Profile Resets the configuration of selected Agents to their profile defaults.
Defaults
Add/Remove Label
This option enables you to add or remove labels from multiple
Agents. Type the Key and Value of the label that you want to add
or remove:
193
Get Agent Diagnostics
The Get Agents Diagnostics button enables you to collect diagnostics information for any
Agent or a group of Agents and send it to Guardicore Support. You can do this remotely
from Guardicore Management and collect information for troubleshooting Agent issues. In
the Agents screen, select any Agent and click the Get Agent Diagnostics button .The
diagnostic collection takes a few minutes to generate a compressed archive. Information
collected and saved in the Linux package includes current date and time, kernel version,
system uptime, system load, memory usage, list of processes, list of installed packages and
more. Diagnostics collected from the Window Agent include running processes, installed
services and their status, ETW consumers, connectivity certificate validation, and more.
To run Diagnostics:
1. On the Agents screen, select any Agent for which you want to collect information and
click the Get Diagnostics button.
194
2. Under Advanced Options select/deselect the relevant diagnostic information.
3. Click Start to start collecting logs, network information, and system status. This may
take a few minutes.
Once the diagnostics collection is complete, you will receive a Zip file that includes the
requested information.
Monitoring Mode
Monitoring mode enables you to review policy rules and their results before you actually
implement them. Agents set to Monitoring mode will react to violating flows by sending an
Alert (whether the rule was set to Alert or Block) and the violating incident will also appear in
the following:
• As an incident in the All Incidents screen (and in any of the relevant screens under
Incidents).
Enforcing Mode
The Agent will enforce Alert and Block rules. Violations will appear in the Reveal map, in the
Incident screens, and in the Network log. The Network log will also show policy mismatches
between Agent and Management when these occur.
195
Disabled
If the Enforcement module is disabled, it cannot monitor or enforce policy rules. By default,
an Agent is installed with its Enforcement module enabled. Only an administrator can disable
an Agent’s Enforcement module. See Agent Administration Lock for details.
Disabled
196
Agent Roaming: Enforcement Mode Outside Office
Centra V39 enables Enforcement policies to be disabled on laptops that are taken out of the
company network. This enables end-users to use their laptops for online activities outside of
the company's home network. The feature is currently supported for Windows Desktop
Agents and configured on the Agents screen for the selected Agents.
1. On the Agents screen, select the Agents that you want to configure. To configure in
Bulk, you can use the filters at the top of the screen to specify the Agents that you
want to configure and select Apply to all.
3. On the Agents Configuration screen, make sure that Enforcement Module is selected
and scroll down to Disable Enforcement module outside the office network:
197
4. Select the Disable enforcement module outside of the office network checkbox.
5. In the Office domain name box, specify a domain name that the Enforcement feature
will use to identify the office network.
6. Click Save changes; the selected Agents are reconfigured to support the feature.
198
Deleting Agents from the System
The Agents screen enables you to delete Agents from the database:
1. On the Agents screen, select the Agent(s) that you want to delete.
2. Click the Delete icon ; the following message appears:
3. Click the Remove from database button. The Agent is removed from the database
but as long as its certificate is not revoked, it can still function and it will attempt to
reconnect to the system and re-register. After a successful connection, the Agent will
appear in the system with a default Agent configuration.
4. To fully remove an Agent and prevent it from reconnecting to the system, the
administrator must uninstall it and optionally revoke its certificate. When an external
Public Key Infrastructure (PKI) is being used, the Agent certificate will be marked as
“pending for revocation”. The system administrator can revoke the Agent’s certificate
which ensures that the Agent is fully removed and cannot reconnect.
In Windows:
199
Remote Agent Upgrade
Upgrading Agents from the Agents Screen
Administrators can upgrade Agents directly from Centra’s Agents screen. To upgrade, the
administrator simply selects the Agent or Agents to be upgraded and clicks the Remote
Agents Upgrade button:
A dialog box appears enabling the Administrator to type a name (description) for the upgrade
and start the upgrade process:
After the administrator clicks the Start button, the Agent upgrade starts and the upgrade
process is indicated by a revolving arrow icon that turns green when the Agent upgrade is
successful. The arrow is orange if the upgrade is skipped.
On the Agents screen, administrators can filter the list of Agents by Upgrade (according to
the Upgrade description).
Note: You can run one upgrade process on multiple Agents, but you cannot run multiple
upgrade processes (i.e. you cannot simultaneously run two different upgrade versions).
In addition, the Remote Upgrade History screen provides detailed information on each Agent
upgrade. The screen is accessed by clicking Upgrade History under the Centra Agents
menu:
200
After the upgrade, the Agent version is displayed in the Version column:
The Remote Upgrade History screen displays upgrades that have been performed in the
past and includes information on how many Agents were successfully upgraded (or Failed to
upgrade), how many were Skipped (because they were already upgraded to the upgrade
version), etc.
201
Installation Profiles
Agent installation profiles allow you to customize your initial Agent configuration and provide
the following benefits:
• Allow you to manage all Agent installation configurations from a single location.
• Eliminate the need for using configuration attributes as parameters for the local
installation of Agents on the server.
Installation profiles are relevant for install time only. Agent configuration can always be
changed after installation by selecting “override configuration” from the Agents screen. You
can also reset an Agent’s configuration to its profile as described in the Reset Configuration
to Profile section.
The Installation Profiles screen enables you to browse available profiles, create new ones,
edit existing profiles and delete those that are no longer needed. The screen also enables
you to modify the default installation profile.
Column Description
Profile Associates the Agent installation to a profile. See Agent Installation section
Name for detailed explanation.
202
Usage The number of Agents in the system that were installed and associated with
this profile. The number represents only Agents that are currently registered
in Centra.
The default profile is also used as a base profile for any customized installation profile. Each
attribute that was changed in some customized installation profile, overrides the default
profile attribute.
Note: Modifying the default profile will not affect installed Agents, but will affect any new
Agent installation, regardless of the defined profile. This is because the default profile is the
base of any custom installation profile. Attributes that were changed in the custom
installation profile won’t be affected by changes in the default profile.
203
Now you can define the installation profile name that will be used by any Agent installation
procedure. The installation profile name cannot be changed after being created
You can now select which attribute you want to set and override. Any override will override
the value which is defined by the default installation profile. Any unchanged attribute will get
a value which is defined by the default installation profile.
When installed, any new Agent associated with this profile will have attributes as follows:
• Attributes that were modified with override values will get the modified values of the
new customized profile.
Agent Installation
To install an Agent with an installation profile you need to specify it during installation.The
Agent will be installed with the Default installation profile in the following cases:
In each of these cases, a message indicating that an Agent was installed with the Default
profile will be logged in the Agent Log Screen in the Centra UI. Changing an installed
Agent’s attributes by changing its installation profile is not currently supported.
To change an Agent’s attributes, you need to override its configuration through the Override
Configuration option in the Agents screen.
To change an Agent’s installation profile, you’ll need to uninstall the Agent and reinstall it
with the new installation profile.
Note: After installation, it might take up to 5 minutes for the Agent to be initialized with its
installation profile.
204
Install Windows Agent with an Installation Profile
1. You can specify the installation profile through the Agent installer user interface:
2. You can specify the installation profile using the installer CLI interface:
windows_installer.exe /q /a 172.16.100.50 /p <password> /installation-profile
<installation_profile_name>
export GC_LOGGING_PROFILE=<profile>
Note: If you modify the default profile, remember that it also modifies other profiles, as other
profiles are considered as modifications of the default profile.
205
Selecting Reset to profile defaults will display a description of the operation. The listed
Agents will reset their configuration to the configuration of the profile listed in the Target
Profile column:
When an Agent is installed, its profile appears in the Installed Profile column. If the profile no
longer exists, the value in the Target Profile will be default.
206
Agents Log
The Agents Log screen (Administration/Agents/Agent Log) includes a Message column that
displays all the events related to the Agent such as unsuccessful installation attempts, Agent
flags, etc. When there are events that span multiple Agents, messages are aggregated. This
means that one message may apply to dozens of Agents.
The Reported Agents column displays the number of Agents for whom the message applies.
The number is a link that, when clicked, displays a list of Agents covered by the message:
Clicking an Agent in the list displays the Agent's information on the Agents screen:
207
Use the Agent Log in the following cases:
Failed Agent Your Agent installation has failed and you expect the Agent Log to tell
installation you what the reason was.
Agent flag raised A certain flag has been raised on several Agents. The Agent Log can
provide information on how many agents are involved.
208
Data Center
The Orchestration screens allow you to connect to the underlying data center and receive
information from the Orchestration (Azure, Kubernetes, etc.). The Deployment screen
displays the list of hypervisor agents installed across the data center along with their
assigned Aggregators.
Deployment
This screen displays the list of hypervisor agents installed across the data center along with
their assigned Aggregators.
209
Orchestrations
An orchestration provides metadata on the assets deployed in your data center environment.
This information complements the information provided by GuardiCore Agents which is
typically more limited in scope. For example, information coming from orchestration may
include the name of the VM host in which the asset resides (vSphere), tags assigned to the
asset, and more. Orchestration enables you to access more information about your assets.
Orchestration is optional; you can deploy GuardiCore Centra without orchestration and rely
on the information coming from the Agents alone.
Tip: In AWS, the Add key allows management of several regions. Make sure you have a
valid entry for each region. Fill in the info for each region separately even if the key and ID
are identical.
3. Fill in the fields and click Save. Instructions on how to fill in the fields for each
Orchestration are contained in the following sections.
210
AWS Orchestration
Importing orchestration data helps you label your assets and build policies around them.
Centra enables you to import orchestration data from AWS. Centra's Aggregator connects to
the AWS API to pull metadata on Elastic Compute Cloud (EC2) workloads, VPC flow logs,
and more. This article explains how to configure AWS orchestration.
The role must have a policy attached with all the authorizations required (See AWS Policy
definition)
Guardicore Delegate Access
This is the recommended implementation if you need to monitor multiple accounts. The
assumed role in these accounts must have a policy attached with all the authorizations
required (See AWS Policy definition)
Customer Credentials
Only available option if the Aggregator is running outside the AWS environment. The
Customer must create an IAM user with programmatic access only (Access/Secret Key). It
does not require console access. The user must have a policy attached with all the
authorizations required (See AWS Policy definition)
AWS Policy definition
In order to authorize the queries that the orchestrator makes you need to create a Custom
policy or use a predefined AWS Policy.
AWS provides a read only policy “AmazonEC2ReadOnlyAccess” that has a superset of the
required permissions.
If you want to create a customer policy with the minimal required authorization, you can use
the following JSON definition:
211
{
"Version": "2012-10-17",
"Statement": [
{
"Sid": "Orchestrator",
"Effect": "Allow",
"Action": [
"ec2:DescribeVpcs",
"ec2:DescribeSubnets",
"ec2:DescribeSecurityGroups",
"ec2:DescribeRegions",
"ec2:DescribeInstances",
"ec2:DescribeImages",
"ec2:DescribeAvailabilityZones"
],
"Resource": "*"
}
]
}
1. In the Administration panel, select Data Center/Orchestrations and click the Add
Orchestrations button . The Add New Orchestration dialog box
appears.
2. In the Type field, select AWS, and in the following fields, type a name for the
orchestration and select a GC cluster.
212
Configuring EC2 IAM Role Authentication
1. Verify that an AWS IAM role has been created. For instructions on how to create an
AWS IAM role, see the section at the end of this article, or refer to AWS
documentation.
2. In the authentication method field, select EC2 IAM Role. There is no need to fill out
any other Authentication fields and you can proceed to the region name field.
Note: If you want to assume a different role, use the role arn field to type a new Amazon
Resource Name (ARN) of the role to assume.
3. In the secret access key field, provide an AWS account secret access key id.
213
Creating an AWS IAM role
For an explanation of AWS IAM role see What is IAM?
Following are instructions for creating an AWS IAM role from the console:
3. In Account ID, type the AWS account id to which you want to grant access to your
resources.
4. Choose Next: Permissions, and select a permission policy from the list. To create a
new policy, choose Create Policy.
6. Choose Next: Review, and for Role Name type a unique name for the role (not case
sensitive). Type an optional Description for Role description.
8. Provide users in the trusted account with permissions to switch to the role in the
console. See Granting a User Permissions to Switch Roles.
214
Azure Orchestration
Azure Orchestration enables you to complement the information provided by GuardiCore
Agents. For example, information coming from Azure orchestration may include Azure tags
assigned to the asset, and more. Find more information about Azure Tags here.
3. Click on New application registration and fill in the fields. Note that the URL field is
not important; you only need to add the clients system URL.
2. Add the application user you created to the 'Reader' role. Note that you need to
add the reader role to each subscription that you want to cover in the
orchestration.
Configure Azure orchestration in the Centra management
1. From Administration, select Orchestrations.
• Full VM info is pulled every 30 minutes by default, configured by the new parameter
at the bottom 'Orchestration IP cache timeout'.
215
• The Azure API allows only 12k calls an hour, so for example if you want full data
fetch each minute you are limited to 200 assets before the API starts glitching.
• In release 29, In case of an API error the orchestration will crash and restart. Log
should be visible as any system log.
• Asset info update interval needs to be changed if there are more than 10K assets
within the account.
216
F5 Integration
For networks that use F5 Big-IP Local Traffic Manager (LTM), Centra provides visibility for
flows passing through the Big-IP on monitored virtual servers. After the Centra administrator
configures F5 Orchestration, the virtual servers appear as assets on the Assets screen and
are labeled as Role:F5 Big-IP. Centra then consumes connection events over IPFIX to
display the flows to and from the virtual servers as continuous flows on the Reveal map.
Note: F5 orchestration only pulls virtual servers under the /Common partition. Using other
partitions isn't currently supported.
1. Access Centra’s Administration screen and select Data Center > Orchestrations; the
Orchestrations screen is displayed:
217
2. Click the button to display the Add New Orchestration dialog box:
4. Type a Name for the Orchestration and select a Cluster. Up to 15 devices can be
added to the Orchestration cluster.
5. Click the button next to F5 Big IP Device List; the following section of the
dialog box is displayed:
218
6. To add a device, type an IP address, user name, password, and optional webhook
url.
7. Click to add another device or proceed to the next section of the dialog box:
8. To enable the creation of metadata into Centra as labels, select the Metadata Labels
checkbox.
219
NOTE: the following metadata is imported as labels when selecting the Metadata checkbox:
Service port, snat pool, source address pool, F5 version, description, profiles, destination
pool name, destination pool addresses.
If you do not check this, the metadata is still imported but will not show up as labels. The
metadata may be displayed in other places such as details on the Assets page.
9. For Orchestration Full Report Interval, type the number of seconds to elapse before
another orchestration report is generated.
10. To convert custom Tags into Centra Labels, in Labeling Strategy, select either
Enabled or Predefined. When Enabled is selected, all custom orchestration Tags will
be imported into Centra. When Predefined is selected, you can list the metadata to
import as labels in the Predefined Labels box.
11. If you selected Predefined for Labeling Strategy, click Predefined Labels and list the
Label keys to be imported from Orchestration.
12. If you selected Enabled for Labeling Strategy, click Label Key Translation and list the
label keys to translate on import. Each label key should also list the target label key
like this: F5 Version -> Version.
1. Download the iRule files supplied by Guardicore. The iRules create IPFIX logs to
record network events, and send them to the IPFIX devices via a publisher as
explained below. Instructions for importing the iRules to the Virtual Server are
provided in a later step.
3. Create a log destination to format the logs in IPFIX templates and forward them to
the IPFIX collectors.
5. Create a virtual server to process network traffic, or edit an existing virtual server.
Copy the contents of the iRule file and add the iRules to the virtual-server
configuration so that the iRule parses all of the virtual server's network traffic.
To create a pool of IPFIX collectors to receive the IPFIX logs, do the following:
220
1. Before starting the procedure, obtain a list of IP addresses for the F5 IPFIX collectors
that will compose the pool.
2. In the F5 IPFIX Configuration screen, select Local Traffic >Pools > Pool List:
4. Under Resources, under New Members, for each F5 IPFIX collector, specify:
• an IP address
For existing F5 IPFIX collectors, click Node List and select an IP address from the Address
list.
221
Create a Log Destination for the IPFIX Collectors
1. On the Main tab, select System > Logs > Configuration > Log Destinations:
222
2. Click the button at the right side of the screen. The General Properties
section is displayed.
3. In the General Properties section, specify a Name for the Log Destination and under
Type select IPFIX:
Field Value
Protocol IPFIX
Pool Name Select the name of the pool that you created above.
Transport udp
Profile
Template Number of seconds to wait before retransmitting the Log Destination template.
Retransmit The log destination periodically retransmits all of its IPFIX templates over a UDP
Interval connection. The retransmissions are helpful for UDP connections, which are
lossy.
Template Number of seconds that the BIG-IP device should pause between deleting an
Delete Delay obsolete template and re-using its template ID.
223
Server SSL Choose an SSL profile that is appropriate for the IPFIX collectors' SSL/TLS
Profile configuration. SSL or TLS requires extra processing and therefore slows the
connection, so this is only recommended for sites where the connections to the
IPFIX collectors have a potential security risk.
5. Click Finished.
The publisher specifies where the BIG-IP system sends log messages for IPFIX logs.
1. On the Main tab, select System > Logs > Configuration > Log Publisher:
224
2. Click the button at the right side of the screen. The General Properties and
Log Destinations sections are displayed.
3. Under General Properties, specify a unique name for the publisher and an optional
description.
5. Click Finished.
Create an iRule
You need to create two iRules to log TCP and UDP events. Follow this procedure twice to
create the iRules in the system:
1. Open the downloaded iRule files in a text editor and replace the text
<GC_Log_Publisher> with the name of the publisher you created.
• Note that the name must have the full path.i.e /common/guardicore_ipfix_pub
• Save the updated file.
225
2. On the Main tab, click Local Traffic > iRules .
The iRule List screen displays a list of existing iRules®.
5. In the Definition field, paste the content of one of the iRule files that was downloaded
from Guardicore.
6. Click Finished and return to step 1 to repeat this procedure for the other irule.
NOTE: It is important to note that the contents of each file should be pasted separately in
different iRules. So, you need to perform the above procedure for each irule.
After creating the IPFIX pool, and the log destination and publisher, you need to attach the
iRule to each virtual server that should be monitored:
226
1. On the Main tab, click Local Traffic > Virtual Servers.
The Virtual Server List screen opens.
2. Click on the name of the virtual server that should be monitored and go to the
“Resources” tab:
3. For the iRules setting, click the button and from the Available list, select
the name of the iRule that creates custom IPFIX logs. Click >> to move the name into
the Enabled list:
227
4. Click Finished.
The virtual server is now configured to use the iRule for IPFIX logging and sends customized
IPFIX logs for every connection it makes.
F5 Assets
After F5 Orchestration has been configured, F5 Assets appear on the Assets screen. Each
asset appears with a name that is a combination of the device name and the virtual server
name. The assets are labeled with Role:F5 Big-IP and F5-device:<device name>.
228
5. Configure the interface settings:
8. Click OK.
229
11. Click OK and continue to the Cluster Roles dialog box:
230
GCP (Google Cloud Platform)
Introduction
Importing orchestration data helps you label your assets and build policies around them.
Centra enables you to import orchestration data from GPC (Google Cloud Platform). When
GCP orchestration is configured, Centra's Aggregator connects to the GCP API to pull
metadata on GPC workloads.
2. In the top-left corner of the GCP console, click Menu and select IAM & Admin/Service
accounts. the Create Service Account dialog box is displayed.
3. Enter a name and description for the service account and click Create.
7. Make a note of the location and name of this file. You will need it later.
8. Assign the service account permissions to the additional projects that need to be
covered with Centra. No need to create a service account per project.
9. Click Close/Done.
10. In the list of service accounts, click the email address that relates to the service
account you created and click Edit.
12. In the Product name for the consent screen field, enter a product name.
13. In the Email address field, use the default email address or assign a new email
address.
231
Step 2: Add GCP Orchestration to Centra
1. In Centra’s Administration menu select Data Center/Orchestrations and click the +
Add Orchestration button. The Add New Orchestration dialog box appears:
Field Value
Type GCP
Service Account Service account email of the account created in the previous section
Project List This option allows you to configure more than one project per
orchestration. Add a comma delimited list of project IDs.
Private Key Paste the private key downloaded in the previous section.
232
Field Value
Label Key Enables you to control the way imported labels appear in Centra, So,
Translation for example, you can specify that a tag such as
OrchestrationAppName should be imported into Centra as App.
Labeling Strategy This refers to how you want to import custom Tags into Centra.
Three strategies are provided:
Predefined: List the custom Tags to import into Centra. This is done
by supplying a list of keys to import.
Note: Labeling Strategy only affects custom tags that users created for
F5 and does not affect the importation of metadata.
Predefined Labels List the keys to import as labels. This only applies to custom tags.
As with other Orchestrations, once you have configured the GCP orchestration you will be
able to see the information coming from the orchestration on your Assets page.
233
Inventory API
Inventory API is a dedicated Guardicore orchestration designed to create assets in agent-
less environments. To enable scenarios in which asset information is fed to Centra from a
decentralized system (such as Chef recipes running on individual machines), Guardicore
added an API to allow adding new assets or information about assets. "Inventory" refers to
assets, containers etc.
This API enables customers to easily add a large amount of asset information to Centra,
using REST API calls to Aggregators (unlike the REST API that calls Management). Once
enabled, customers' scripts and automations will be able to create and name new Centra
assets (even without Agents) and add labels to existing assets in a distributed fashion. By
replacing IP addresses of agentless workloads with real asset names, customers get more
context when browsing Reveal maps and building segmentation policies. An asset added
through this API will appear on the Assets page with Inventory API in the Orchestration
column.
• The user wants to report workload labels from the workloads themselves (for
example, using Chef recipes) and these labels might change. These workloads can
be with or without Agents.
• Customers have a centralized, continuously updated inventory of assets, which they
want to keep in sync with Centra. The inventory must have, for each server, all of its
IP addresses and a BIOS UUID (in case an Agent is, or will be, deployed on the
asset)..
• Users can replace "unknown IPs" with labeled assets, instead of using labels.
How it works
An automation tool, running on the customer premises, calls a REST API method on the
Aggregators. This call contains specific asset parameters: name, IP and more. The
Aggregator then reports these assets to Centra, where they'll appear as if they arrived from
a regular orchestration. As with other orchestrations, these reports are merged with asset
information from other sources (other orchestrations and agent information), so it's safe to
report asset information, regardless of its coverage by other orchestration engines.
234
• Type - Select InventoryAPI
• Name - Give it a name, preferably descriptive
• Cluster - Here there can be multiple Inventory API Orchestrations per cluster
• Authentication scheme options:
User+Password
User+Password+Token
Token only.
235
The created users are not related to Centra users in any way; Centra credentials can
not be used as REST API credentials nor vice versa.
• Report expiration: how long (in seconds) an asset is considered "on" after the user
has last reported it to orchestration. After the expiration time is over, if an asset
wasn't reported to the REST API orchestration, it will be marked as "deleted" as we
assume it no longer exists. To prevent an asset from moving to the "deleted" state,
the Inventory API Orchestration must get continuous reports about the asset.
2. To create a Centra asset, call the REST API method on any of the Aggregators in the
defined cluster. The REST API call can contain information about one or more assets. Each
asset should contain the following information:
Asset ID A unique ID for this asset. This unique ID must be created by the customer automation
and must be reused when reporting the same asset on subsequent calls.
Asset This name will appear in Centra's Reveal maps and asset views.
name
BIOS The asset's BIOS UUID. Necessary when the asset might have an Agent installed on it
UUID (during report time or in the future). See Appendix for ways to get this value.
Metadata Optional parameters which will be attached to the asset and reported to the
management console.
An asset added thorough Inventory API will be displayed on the Assets page with Inventory
API in the Orchestration column:
236
REST API Example
The Aggregator serves the REST API from the same server and certificate as the "Guest
Installer" HTTPS interface (which is used for Agent installation script download). If an FQDN
is used, it can be used for these REST API calls as well (with proper certificate usage).
5. In the request body, put the asset information as described above. For example:
"assets":[
"id":"422F81AE-781B-4823-F1FD-7E51093BF316",
"bios-uuid":"422F81AE-781B-4823-F1FD-7E51093BF312",
"name":"lin-lin-Agent20",
"addresses":[
"172.17.2.52",
"100.100.102.52",
"200.200.202.52"
],
"labels":[
"key":"Role",
"value":"Server"
},
"key":"Deployment",
"value":"API"
237
}
Limitations
• If you report an asset without a BIOS UUID, a subsequent report by an Agent will not
be matched to this asset. The management server does not match assets reported
through this orchestration with Agent information according to IP address. At the
moment there is no way to report AWS instance ID or other matching parameters -
you must use IP & BIOS UUID.
• Assets reported just once using the Inventory API will eventually expire; there is no
way to report assets which will stay 'indefinitely'; the REST API method must be
repeatedly called to keep the asset as "On".
238
Kubernetes
Kubernetes is an open-source system for automating the management of containerized
applications. It groups containers that comprise an application into logical units for easy
management. Guardicore Centra supports the Kubernetes open-source system for
containerized applications and can show Kubernetes pods on the Reveal map:
Users can edit Kubernetes labels and add new criteria to them.
239
2. Create new cluster role with cluster-wide read privileges:
Note: For GKE deployment an additional step is needed in order to create cluster roles:
3. Bind the cluster role cluster-reader to the newly created service account:
240
• For K8s you can find the CA certificate file by querying "kubectl config
view"
2. Select Kubernetes to display the Add New Orchestration dialog for Type:
Kubernetes
Field Value
Type Kubernetes
Validate Certificate Check this if you wish to validate an SSL certificate to the Server.
241
Field Value
Service Account Token Copy the token from step 4 of Stage 1 above.
CA Cert Data Click the not supplied link and copy and paste the CA certificate
from step 5 of Stage 1 above.
242
OCI (Oracle Cloud Infrastructure)
Introduction
Importing orchestration data helps you label your assets and build policies around them.
Centra enables you to import orchestration data from OCI (Oracle Cloud Infrastructure).
When OCI orchestration is configured, Centra's Aggregator connects to the OCI API to pull
metadata on OCI workloads.
1. Create a user in IAM for the Centra system who will be calling the API, and provide
the user read only access to the desired tenant\s.
1. RSA key pair in PEM format (minimum 2048 bits). See How to Generate an
API Signing Key.
2. Fingerprint of the public key. See How to Get the Key's Fingerprint.
3. Tenancy's OCID and user's OCID. See Where to Get the Tenancy's OCID
and User's OCID.
3. Upload the public key from the key pair in the Console. See How to Upload the
Public Key.
4. Make sure you take note of the user OCID, key pair fingerprint, private key and
tenancy OCID and region.You will need these for the next step.
243
2. In the Add New Orchestration dialog box specify the following:
Field Value
Type OCI
User OCID OCID of the user calling the API. See Step 1 above.
Key Pair See Step 1 above for how to obtain the key pair fingerprint.
Fingerprint
Private Key Content of the private key in PEM format. See Step 1 above for how to
obtain this.
244
Field Value
Tenancy OCID for the tenancy. See Step 1 above for how to obtain this.
OCID
Region OCI home region. See Regions and Availability Domains for more
information.
As with other Orchestrations, once you have configured the OCI orchestration you will be
able to see the information coming from the orchestration on your Assets page.
245
OpenStack
Importing orchestration data helps you label your assets and build policies around them.
Centra enables you to import orchestration data from the OpenStack cloud operating
system. When OpenStack orchestration is configured, Centra pulls metadata from
OpenStack and converts them to Centra Labels.
3. Add a reader role for the Guardicore user and specify the domain\projects to
be covered by the orchestration. A ‘reader’ role should be configured by
default as part of the OpenStack deployment. If it’s missing please contact the
OpenStack administrator to create one. The following CLI command applies
to the whole domain:
246
4. Fill out the fields as described in the following tables:
247
Basic Configuration
Field Description
Admin User The User Name for the Guardicore User created in Step 1 in OpenStack.
Admin The User Password for the Guardicore User created in Step 1 in
Password OpenStack.
Projects List The project list to be covered by the orchestration. The list can be
provided by ‘project ID’ or ‘project name@domain’ name format
delimited by a new line.
Example Project ID: 3e434d8b1aa94b12a21507f6f3577038
Example Project name: @domain example - projectA@default
Auth Url The API public authentication endpoint. The Endpoint can be discovered
by running the following from the console:
endpoint list --service identity --interface public
Predefined List of label keys to load from orchestration when labeling strategy is set
Labels to predefined
Label Key A list of label keys to translate on import; each origin label key should be
Translation followed by -> and the target label key. For example,
"OrchestrationAppName->App"
248
Advanced Configuration
This configuration is used to mitigate the performance impact on the Openstack controller:
Field Description
Full Port Pull Strategy for full port pull (occurring every Orchestration Full Report
Strategy Interval):
Ports Pull Bulk How many ports to pull in each bulk. Relevant only for
Size AllPulledServersInBulk and NewServersOnlyInBulk modes.
0: special value - fallback to default (50)
Interval Between Sleep interval between per-server ports pulls (in milliseconds)
Ports Pulls
Servers Pull Bulk How many servers to pull in each bulk. Relevant for all modes.
Size 0: pull all servers at once
Interval Between Sleep interval between server's bulk pull (in milliseconds)
Server Pulls
249
5. Click Test Connection to verify credentials. The test connects to the API endpoint
and tests connectivity to the nova-client:list-servers and neutron-clients list-networks.
250
API Commands
The following API commands are used by Guardicore:
251
Field Description
Admin User The User Name for the Guardicore User created in Step 1 in OpenStack.
Admin The User Password for the Guardicore User created in Step 1 in
Password OpenStack.
Projects List The project list to be covered by the orchestration. The list can be
provided by ‘project ID’ or ‘project name@domain’ name format
delimited by a new line.
Auth Url The API public authentication endpoint. The Endpoint can be discovered
by running the following from the console:
252
User Domain The domain ID of the Guardicore user created in Step 1.
ID (optional)
User domain can be discovered by running the following:
Predefined List of label keys to load from orchestration when labeling strategy is set
Labels to predefined
Label Key A list of label keys to translate on import; each origin label key should be
Translation followed by -> and the target label key. For example,
"OrchestrationAppName->App"
vSphere Orchestration
Vsphere orchestration complements the information provided by Guardicore Agents which is
typically more limited in scope. For example, information coming from orchestration may
include the name of the Vsphere host in which the asset resides, tags assigned to the asset,
and more. The Vsphere information (metadata) that is imported consists of the following:
• Host
• Power state
• Tools running status
• Tools version status
Orchestration is optional. However, after you configure orchestration, the above metadata is
imported into Centra. You can control which metadata, as well as custom tags, appear as
labels by following the configuration instructions provided below.
1. In the Administration panel, select Data Center/Orchestrations and click the + Add
Orchestrations button . The Add New Orchestration dialog box
appears.
253
2. In the Type field, select vSphere, and in the following fields, type a name for the
orchestration and select a GC cluster:
3. In the next section of the dialog box, fill out the following information:
254
Field Description
vSphere Type a list of vSphere clusters to which you want to limit the collection of
Clusters orchestration metadata. If you do not list anything, metadata will be collected
from all vSphere clusters.
Label Key Specify how imported metadata will appear as labels in Centra. For example,
Translation you can specify that a tag such as OrchestrationAppName should be imported
into Centra as App.
Labeling This refers to how you want to import custom orchestration tags into Centra:
Strategy
Enabled: all custom orchestration Tags will be imported into Centra.
Disabled: no custom orchestration Tags will be imported into Centra.
Predefined: the user can provide a list of custom Tags to import into Centra.
This is done by supplying a list of keys to import.
NOTE: Labeling Strategy only affects custom tags and does not affect how
metadata is imported.
Predefined Predefined was selected in Labeling Strategy, supply a list of custom tags to
Labels import into Centra as labels.
Metadata Labels Select this checkbox to enable importing some vSphere metadata as labels into
Centra. Only the following vSphere data will be imported as labels: vCenter
host, vCenter folder.
255
Firewalls Integration
Integration with Palo Alto Networks Firewall
The integration of Guardicore Centra with Palo Alto Networks leverages Centra unique
breach detection capabilities and Palo Alto Networks firewall access control capabilities. The
joint solution allows security administrators to proactively block IP addresses of
compromised assets to gain control of the attack. As part of the attack mitigation, the IP
address of the compromised asset is automatically forwarded to the Palo Alto firewall from
the Reveal map.
Guardicore Centra uses various techniques to detect zero day attacks in data centers,
including dynamic deception, reputation and policy based micro-segmentation. Once an
attack is detected, Guardicore Centra updates Palo Alto firewall with the IP address of the
compromised host. The Firewall then blocks connection attempts to and from the
compromised asset, blocking its ability to propagate in the datacenter.
How It Works
The process begins with Centra identifying a suspicious IP address that has generated a
High Severity incident. The IP can be either external, i.e. coming from the Internet, or part of
internal, east-west traffic. Once the IP is detected, it is relayed to Palo Alto Networks
Panorama which then blocks all connection attempts to and from the compromised asset
through the NGFW, blocking its ability to propagate in the data center. Centra can be
configured to send this information automatically or manually directly from its Reveal map.
IPs are collected from all Centra’s platforms including deception servers, Reveal maps and
reputation servers.
The joint solution allows security administrators to proactively block compromised assets
inside the data center from performing data exfiltration or carrying out lateral movement. As
part of the attack mitigation, the IP address of the compromised asset is reported to the Palo
Alto Networks firewall which can cut the attacker’s communication line with its C&C server or
prevent it from exfiltrating previously stolen data.
256
Before You Begin: Requirements for Successful Integration
1. Deploy Guardicore Agent on Endpoints and Ensure Connectivity to Centra Manager.
2. As a best practice, for API access to Palo Alto Networks Panorama, set up a
separate admin account for XML API access to Panorama by following these steps:
1. On the Administration menu, select Mitigation & IoCs and click Firewall Mitigation.
257
The Firewall Mitigation dialog box appears.
Note that Centra provides separate configuration options for external and internal IPs. The
default value for both External IPs Action Mode and Internal IPs Action Mode is Manual:
In Manual mode you send suspected IPs to the firewall by first selecting incidents in
the Lateral Movement, Policy Violations, or Bad reputation Incident screens (or in All
Incidents), displaying the incident's Report, and then clicking the
button in the report's Recommended Actions section (see Incidents).
Make sure that you use the same tag in Palo Alto Dynamic address group as used in
the Internal IPs Tag and External IPs Tag:
258
Palo Alto UI
4. On the Firewalls Integration page, configure the Palo Alto firewall fields and whether
to report to all firewalls or to specific ones.
259
5. After completing the configuration and clicking Save Changes, you should be able to
see the Report IP to Firewall button in the Recommended Actions section of an
incident's Report page (If you have set Action Mode to Manual in the Firewall
Mitigation page as described above; if you've set it to Automatic, the IP will be
automatically reported):
Similarly, if you have specified Manual mode in the Firewall Mitigation dialog, you can report
an IP of any asset on the Reveal map, even if this asset is not part of an ongoing incident. In
the asset's Asset information panel, click the Report IP to Firewall button as shown in the
following figure:
Troubleshooting
1. Verify connectivity between Centra and Panorama: perform “TEST CONNECTION”
to verify that Centra can access Panorama using REST API.
2. Verify that “show firewall integration” is enabled on Guardicore Centra.
3. Verify that the Dynamic address groups are defined on both systems.
260
261
Data Export
Centra can be configured to export audit records, system events, agent log events and
Reveal incidents. Centra provides several ways to export logs:
• Syslog
• Slack
• SMTP
• STIX
To specify how to export logs, in the Administration menu, select Data Export, then select
an export method:
Audit record - all admin actions that appear on the Auditing page (Admin > System >
Auditing).
Agent log event - all agent log events reported to the management system.
• Lateral movements
• Policy violations
• Network scans
• Bad reputation
• Integrity violations
262
Incident Log
To configure the incidents to export, on the System > Configuration page, choose
Exporters and select the minimum severity threshold to export:
263
Email
Centra allows you to subscribe to incidents and/or system alerts. This way you will receive
an email every time an incident or system alert has been logged. Configuration varies
between SaaS users and on-premises users.
SaaS Users
The SMTP configurations are done by GuardiCore so SaaS users don't need to configure
anything. You only need to select the type of alerts you wish to receive - Incident Alerts,
System Alerts or both - and fill out related fields.
1. To choose the alerts you wish to receive, from Email Integration select
Subscriptions > Alerts.
Note: if you check Enable Incident Alerts, go to System > Configuration > Exporters to
set the severity level for incident alerts.
3. In Alert minimum severity select the alert severity level. The severity levels -
Info/Warning/Error - correspond to the severity levels of the System Log
264
(Administration > System >Log). This configuration defines the minimum
severity that will trigger an email alert.
2. In Email addresses type the email address/addresses to send the incidents and
alerts email to.
On-Premises Users
On-premises users need to first set SMTP configurations and then subscribe to the alerts
service.
1. SSH to Management and type the following CLI command: gc-mgmtctl --import_all
set_conf --group email_smtp --option force_show_smtp_configurations --value True.
The SMTP Setup screens appears.
3. Next, choose the alerts you wish to receive, from Email Integration select Subscriptions
> Alerts.
265
4. Check Enable Incident Alerts and/or Enable System Alerts to subscribe to the service.
Note: if you check Enable Incident Alerts, go to System > Configuration > Exporters to
set the severity level for incident alerts.
5. In Alert minimum severity select the alert severity level. The severity levels -
Info/Warning/Error - correspond to the severity levels of the System Log (Administration >
System >Log). This configuration defines the minimum severity that will trigger an email
alert.
6. In Email addresses type the email address/addresses to send the incidents and alerts
email to.
266
Slack
Integrate with Slack to export Guardicore incident messages to your corporate Slack
platform.
This URL accepts notifications from Guardicore and passes it into Slack.
267
STIX
Guardicore uses STIX to export indicators of compromise (IoCs) to security vendors. The
Structured Threat Information eXpression (STIX™) is a language for communicating
standardized cyber threat information. To integrate with STIX, configure the vendor’s
security tool. Files are exported every 24 hours by default. Note that the old IoC file is
overwritten when a new file is uploaded.
Vendor
Name of vendor
Firewall Management IP
Username
Firewall username
Password
Firewall password
Remote Path
Specify the full path for the directory on the firewall where the IoC file will be copied.
Check this box if you want to run the IoC file immediately after uploading.
268
Post Upload Command
If you checked the box above, the command will automatically run 5 | Administration 56 Field
Description.
By default, the file is exported over STIX every 1440 min (24 hours), you can change it as
you see fit.
269
Syslog
Syslog is a common format for message logging. The administrator uses the Add New
Syslog integration dialog box to configure Syslog (as described below), and can configure
multiple hosts for Syslog by using the dialog box repeatedly. Each time a Syslog Integration
is configured, the configuration is added as a row in the Syslog Integration screen:
Events Syslog Exporter: enables you to export a wide range of data to Syslog including
incidents, system alerts, Agent and Audit logs, messages, etc.
Network Log Syslog Exporter: enables exporting the Network log which provides data on
connections including type of connection, how Centra handled the connection, time of
connection, as well as detailed source and destination information. To enable the Network
Log Syslog Exporter, your administrator must execute a few CLI commands.
Configuring Syslog Export
The administrator can configure the incidents to be exported to Syslog by performing the
following:
270
2. Click the + Add syslog Integration button to display the following
dialog box:
3. Select either Events Syslog Exporter or Network Log Syslog Exporter and complete
the fields as explained below:
271
272
4. Fill in the fields as specified in the following table:
Field Explanation
Type Events Syslog Exporter appears here if you selected it in the Add New Syslog
Integration dialog box in step 2 above.
Connection Options
Syslog Port Different servers might require different ports (syslog UDP is usually 514).
Export In some SaaS deployments, in order not to open extra ports, it is possible to
through configure the Aggregators to export the syslog to the syslog server. If this feature
Aggregators is enabled, you must also enable the Cluster Exporter in the Aggregator screen
(From Components/Aggregator select the Aggregator, then select the More
button, Override Configuration, Show Advanced Options. Under Advanced
Options, select Aggregator/Aggregator features, and the Cluster exporter
checkbox:
Use TLS
Encrypt Syslog Traffic with TLS (works only with the TCP protocol). Syslog records
can be sent over a secure channel, as indicated in RFC 5425. This is common
practice when the syslog channel is sent over the public internet or other unsafe
networks. The TLS protocol ensures the syslog messages are securely sent and
received over the network.
273
Field Explanation
After setting the general Syslog settings (host, port and export settings), do the
following to enable TLS encryption for the Syslog channel:
• Make sure your Syslog Protocol is set to TCP.
• Make sure the Use TLS box is checked.
Verify Host
This field should always be checked; it verifies that the host domain presents a
valid certificate. If this box is not checked, the TLS protocol will be used but there
is no guarantee that the data is not intercepted by a third party.
Client
certificate Required if the syslog server performs client authentication. In this case, a specific
client certificate should be given in order for Centra to successfully connect to the
syslog server.
This is usually not required for syslog servers on the public internet, such as Sumo
Logic or Logz.io.
Exporting Options
Export Choose whether to export incident information. Note that Exporting incidents is
Incidents subject to filters defined in System > Configuration > Exporters.
Alert The minimum alert severity to be exported: completed, info, warning, error
minimum
severity
Export full Export full changes of segmentation policies (may include sensitive information).
changes of
segmentation
policies.
274
Field Explanation
Log Choose whether to log all sent messages to a local file on the sending machine.
messages to
file
Agent labels Enables you to specify the Agent labels that will be reported in syslog.
list reported to
syslog
Message Format
CEF - Common Event Format (CEF) is a Logging and Auditing file format from
ArcSight. CEF is an extensible, text-based format designed to support multiple
device types by offering the most relevant information. The CEF format description
can be reviewed here: CommonEventFormatV25.pdf
RFC 5424
Syslog protocol (RFC-5424) compliant message format. This format can be
applied to all syslog records sent from Centra (including audit logs, system events,
incidents etc.) over Management or Aggregator.
RFC-5424 Structured data elements as specified in RFC 5424, without brackets. E.g. Sumo
Structured Logic cloud syslog source token.
Data
275
Network Log Syslog Exporter
When Network Log Syslog Exporter is selected in the Type field of the Add New Syslog
Integration dialog box, a dialog box with fields similar to the Events Syslog Exporter dialog
box above appears, with the exception of the Exporting options:
Fields Explanation
Exported Centra’s verdict on how to handle the connection (corresponds to the Action
verdicts filter in the Network log). Possible verdicts are Blocked, Will be Blocked,
Alerted, Could not Block, Allowed.
Filter by Enables filtering log entries whose source or destination belong to the
labels specified label key and value.
Export label Adds label info of specified keys to exported network logs.
keys
5. Click the Test Connection button to test the connection and then click Save; the
configuration is added as a row in the Syslog Integration screen.
Bad reputation
<10>Mar 7 13:45:13 host CEF:0|GuardiCore|Centra|unknown|Reveal Incident|Bad
Reputation|medium|src=172.17.0.22 shost=win-win-Agent2 dst=216.58.208.131 smac=N/A
start=2018-03-06 13:28:46 act=ALERTED_BY_MANAGEMENT msg=Suspicious activity
detected on 172.17.0.22 dhost=N/A
Lateral movement
<10>Mar 7 13:45:13 host CEF:0|GuardiCore|Centra|unknown|Deception Incident|Lateral
Movements|high|src=100.100.100.1 dpt=22 shost=lin-lin-Agent1 proto=TCP
dst=100.100.13.23 start=2018-03-06 16:55:19 act=ALERTED_BY_MANAGEMENT
276
msg=Suspicious network activity detected between 100.100.100.1 and 100.100.13.23
dhost=N/A
Network scan
<10>Mar 7 13:45:13 host CEF:0|GuardiCore|Centra|unknown|Network Scan
Incident|Network Scans|medium|msg=Network scan detected originated by 200.200.200.254
start=2017-08-01 12:25:10 src=200.200.200.254 shost=N/A
act=ALERTED_BY_MANAGEMENT
Integrity
<10>Mar 7 13:45:13 host CEF:0|GuardiCore|Centra|unknown|Integrity Incident|Integrity
Violations|low|msg=Suspicious activity detected on N/A start=2018-03-01 16:24:35 src=N/A
shost=lin-lin-Agent4 act=ALERTED_BY_MANAGEMENT
System Event
<10>Mar 7 13:45:13 host CEF:0|GuardiCore|Centra|unknown|System Event|Exception in
management service 'management'|ERROR|msg=Uncaught exception in service
management\\nTraceback (most recent call last):\\n File '/Applications/Py...<truncated>
id=fdba044b-dcd9-4629-96f2-647cec3df8ab
Audit log
<10>Mar 7 13:45:13 host CEF:0|GuardiCore|Centra|unknown|Audit Record|Audit Rec
277
System Users
This screen allows administrators to:
• Add new users - Local users or Active Directory users based on the selected filter.
• Edit a user name, password and access rights of both guest and administrator users.
• Delete users.
2. Set the filter to point to the requested group of users (User Directory users, Locally
defined users, etc).
4. Type the user information. In the Permission Scheme box, select a Permission
Scheme.
278
6. Clicking a user displays the user's information and Active Sessions on the right
pane:
279
Permission Schemes
Permission Schemes enables administrators to restrict a user's access to Reveal maps,
Incidents, and Neighboring Assets. Administrators can assign scoped permissions such as
View Reveal Maps or View Incidents. For example, some application owners might be
allowed to view all data pertaining to their application (with all other applications hidden)
while some site owners might be allowed to access only Reveal maps pertaining to their
environment.
• Limit users' view based on asset labels, e.g. service providers may want to provide
their customers access to the information related to their assets only.
• Allow each user to view a limited scope of Centra:
280
Field Description
Role A role is a set of permissions and related allowed actions. The following roles
are available:
System Custom
Administrator
281
Prevent override The checkbox is available for the Application Owner role only. Selecting the
rules creation or checkbox prevents anyone with the Application Owner role to create or edit
modification Override rules. Override rules appear as read only to the Application Owner.
checkbox
Default View The first Centra screen the user sees after login based on the defined
permission.
Linked Directory Attach custom permission schemes to Active Directory groups. Make sure
Groups you activate the User Directories feature before you activate the new AD
groups in the Linked Directory Groups field.
3. Click Save. The Permission Scheme is displayed in the list of Permission Schemes:
4. Clicking a Permission Scheme in the list displays the scheme's details in the right
pane and enables you to edit the scheme:
282
Roles Based Permissions to Centra's Features
The following table provides details on the default role permissions to Centra's features.
Title Action Glo Guest System Global Policy Application Reveal Incidents
bal Admin Administrator Owner Map Viewer
Ad Viewer
min
Dashboard View ✓ ✓ ✓ ✓
Network View ✓ ✓ ✓ ✓
Statistics
Reveal>Explore Explore ✓ ✓ ✓ ✓ ✓ ✓ ✓
and Saved Maps
Create ✓ ✓ ✓ ✓ ✓ ✓
Delete ✓ ✓ ✓ ✓ ✓
Label ✓ ✓
asset
Set map ✓ ✓ ✓ ✓ ✓ ✓
default
view
Explore ✓ ✓ ✓
Precomp
uted
Explore ✓ ✓
Private
Explore ✓ ✓ ✓ ✓
All
Scoped
Create ✓ ✓
Private
Reveal>Labels View ✓ ✓ ✓ ✓ ✓
labels
Add label ✓ ✓
283
Title Action Glo Guest System Global Policy Application Reveal Incidents
bal Admin Administrator Owner Map Viewer
Ad Viewer
min
Delete ✓ ✓
label
Edit label ✓ ✓
Policy>Projects View ✓ ✓ ✓ ✓
Edit ✓ ✓
Policy>Rules View ✓ ✓ ✓ ✓ ✓
Publish ✓ ✓
changes
Discard ✓ ✓ ✓
changes
Suggest ✓ ✓ ✓
changes
Policy>Revision View ✓ ✓ ✓ ✓ ✓
s
Revert ✓ ✓
policy
Policy>Label ✓ ✓
Groups
Policy>User View ✓ ✓ ✓ ✓
Groups
Edit ✓ ✓
284
Title Action Glo Guest System Global Policy Application Reveal Incidents
bal Admin Administrator Owner Map Viewer
Ad Viewer
min
Publish ✓ ✓
changes
Discard ✓ ✓
changes
Incidents + View ✓ ✓ ✓ ✓ ✓
Incident Groups ✓
Edit ✓ ✓ ✓
Assets View ✓ ✓ ✓ ✓ ✓
Edit ✓ ✓
Activity>Network View ✓ ✓ ✓ ✓ ✓
Log
Activity>Redirect View ✓ ✓ ✓ ✓ ✓
ion Log
Activity>Reputati View ✓ ✓ ✓ ✓ ✓
on Log
Edit ✓
Detection>Detec View ✓ ✓ ✓ ✓
tors
285
Title Action Glo Guest System Global Policy Application Reveal Incidents
bal Admin Administrator Owner Map Viewer
Ad Viewer
min
Edit ✓
Detection>Reput View ✓ ✓ ✓ ✓
ation
Edit ✓
Integrity View ✓ ✓ ✓ ✓
Monitoring>Tem
plates
Publish ✓
changes
Discard ✓
changes
Suggest ✓
changes
Cleanup ✓
stale
hashes
Edit ✓
Components>D View ✓ ✓ ✓
eception Servers
Edit ✓ ✓
Components>C View ✓ ✓ ✓
ollectors
Edit ✓ ✓
286
Title Action Glo Guest System Global Policy Application Reveal Incidents
bal Admin Administrator Owner Map Viewer
Ad Viewer
min
Components>Ag View ✓ ✓ ✓
gregators
Edit ✓ ✓
Agents>Agents View ✓ ✓ ✓ ✓
Edit ✓ ✓
Agents>Agent View ✓ ✓ ✓
Installation
Screen
Agents>Agents View ✓ ✓ ✓
Log
Agents>Agent View ✓ ✓ ✓ ✓
installation
profiles
Edit ✓ ✓
Data View ✓ ✓ ✓
Center>Orchestr
ations
Edit ✓ ✓
View ✓ ✓ ✓
Data View ✓ ✓ ✓
Center>Orchestr
ations
Integration View ✓ ✓ ✓
Edit ✓ ✓
User View ✓ ✓
Management>U
sers
287
Title Action Glo Guest System Global Policy Application Reveal Incidents
bal Admin Administrator Owner Map Viewer
Ad Viewer
min
User View ✓ ✓ ✓
Management>U
ser Directories
Edit ✓ ✓
User View ✓ ✓
Management>P
ermission
Schemes
Edit ✓ ✓
System>Log View ✓ ✓ ✓
System>Configu View ✓ ✓ ✓
ration
Edit ✓ ✓
System>Info View ✓ ✓
• Application owners can create new rules that include the scoped labels but cannot
publish the rules. The rules can be reviewed and published by the Administrator or
Global Policy Admin.
• Application owners cannot revert policy.
• Application owners can only discard the changes in the context of their own changes
and cannot affect changes in other user’s contexts.
288
• Application owners will see unpublished rules only in their scope but will not see
unpublished rules in other user’s scopes unless the unpublished rule directly affects
any of the scoped rules.
• All other aspects of scoping such as scoping for Reveal maps and the ability to view
incidents, assets, activity logs, FIM policy, etc. are as in previous versions.
1. From System, select Users and in the Add New User dialog box, fill in the Username,
Email Address and Description fields.
2. In the Permission Scheme field, scroll through the list of Permission Schemes and
select the scheme that you want to assign to the user.
289
User Directories
Centra's User Management features enable you to enroll new users, control authentication,
and create permission schemes that restrict users to particular areas or functions within
Centra. User Management options include the following:
Option Description
Users Displays the System Users screen that enables you to add or delete users, and
edit user name, password and access rights.
User Directories Displays the User Directories screen that enables you to configure LDAP or
SAML 2.0.
User Directories enables you to choose to configure a user directory using LDAP or SAML
2.0.
Configuring a user directory with LDAP enables you to connect Centra to a Microsoft Active
Directory (AD) for authentication, and user and group management. Integration with a user
directory is useful when your users and groups are stored in a corporate directory. User
permissions are assigned based on user roles (admin/guest). One or more Active Directory
groups can be assigned to system roles. The service is designed for on-premises
deployments and assumes your User Directory server is directly accessible from the
Guardicore Management Server. Currently only Active Directory users are supported, but
more LDAP - based directories will be added in upcoming versions.
Configuring a user directory for SAML 2.0 SSO is possible for RedHat and Okta -- see the
instructions below.
• From select User Management > User Directories. The screen displays
existing user directories.
Configuring LDAP
To configure LDAP (default):
1. Fill in the fields in the Add New User Directory dialog box:
290
Field Description
Login Username Type the username of the service account that will be used to connect to the
domain.
Base DN The root distinguished name (DN) to use when running queries against the
directory server.
LDAP Providers A list of servers (domain name or IP) through which the connection to the
domain will be made.
Use SSL Click this checkbox to secure the directory with SSL.
The user directory is added. Note that you can modify the lookup order with the
exception of Locally Defined Users which is always the first entry on the list.
291
Configuring SAML 2.0 SSO
Centra supports Single Sign On (SSO) with SAML 2.0. For configuration instructions, see
the next sections: Configuring SAML 2.0 SSO with Red Hat, and Configuring SAML 2.0 SSO
with Okta.
1. From the Administration menu , select User Management > Users and select a
User directory from the User Directory filter. A list of users belonging to the directory
is displayed.
2. Select a user from the list that is displayed and edit the user's details. Details include
the user's full name, username, password, email address and other personal
information. For more info, see Users.
292
Configuring FortiAuthenticator SAML 2.0 with
Guardicore Centra
FortiAuthenticator provides secure access and identity management for Fortinet enabled
enterprise networks. This article provides instructions on how to configure FortiAuthenticator
SAML 2.0 with Guardicore Centra.
Therefore, in the meantime, you must contact Guardicore Support to deactivate the
requirement for encrypted assertions. Please open a support ticket and be sure to
indicate that you are using FortiAuthenticator for SSO/SAML and that you require an
encrypt assertion override.
Overview of Configuration Stages
Configuring FortiAuthenticator requires the following stages:
2. For general IdP settings,enable the SAML identity provider portal and enter the
following:
293
1. From Authentication > SAML IdP > Service Providers create a name (for
example, Guardicore) for the service provider (Guardicore) that you will use
as a SAML client.
2. Enter the SP information from the client you will use as the SAML service
provider (enter the Centra URL that you are using).
4. Under SAML Attribute click Create New, and enter a SAML Attribute name
that your SAML SP is expecting to identify the user. Select a User Attribute
for this selection. If you're unsure of which attribute to pick, select SAML
Username.
2. Click + Add User Directory to display the Add New User Directory dialog box:
294
3. Fill out the fields as follows:
Name Enter a friendly name that will help you identify this for your SSO setup.
Idp SSO URL Paste the login URL that you entered from the previous stage.
Idp Open the certificate from the IdP metadata that you downloaded from
Certificate Stage 1 and paste the contents into this field.
4. Click Verify Configuration and then click Save. The User Directory is listed on the
User Directory screen.
295
Configuring SAML 2.0 SSO with Okta
Configuring SAML 2.0 with Okta comprises 3 steps:
Note: Step 1 is redundant once the Guardicore app is accepted into the Okta application
directory.
Step 1: Configure the Okta Guardicore App
1. In the Okta classic UI, select Applications and click the Add Application button:
2. Click Create New App and in the Create a New Integration dialog box, specify the
following:
Platform: Web
296
3. Click Create and under General Settings, for App Name, specify Guardicore:
297
Field Specify this:
Single Sign on This should be the URL to the Centra system as the client sees it
URL concatenated with the SAML authentication REST endpoint. For example, for
GC-MGMT it's
'https://cus-1801.cloud.guardicore.com/sso-authenticate'.
So the pattern is 'https://{Centra URL}/sso-authenticate'
• Select 'Use this for Recipient URL and Destination URL'
Audience URI (SP The Centra URL. For example for GC-MGMT:
Entity ID) 'https://cus-1801.cloud.guardicore.com'
Add one attribute named 'userEmail' with Name format set to 'Basic'. Value
should be 'user.email'. The attribute name 'userEmail' is case sensitive so make
sure you are writing it exactly as shown.
298
Note: If a user in the user@domain format has already been configured manually in
Centra, SAML authentication will fail for that user and will default to local authentication.
Add one attribute name 'memberOf' with name format set to 'Basic'. Filter should
be selected to 'Matches regex' and value '.*' (dot and asterisk). 'memberOf 'is
case sensitive:
299
10. Click on View Setup Instructions to open a new page with the SAML details. You will
need to copy some of these details for Step 2 that follows.
2. In Centra's Admin screen, select User Management, User Directories to display the
Add New User Directory dialog box:
300
Field Specify this:
• In the User Directories screen, click the provider (Okta) to display User Directory
Details and a Key button:
5. Return to the Okta UI and click the Edit for SAML settings under the Centra app.
301
6. Under Advanced Settings, in the Encryption Certificate box, click the Browse button
and upload the PEM file.
1. In the Okta UI, click Directory/Groups, and click the Add Group button to add a new
group (in this example, GC):
302
2. Click the group and associate users with it. In this example, a user named Test was
associated with the group.
303
Note: Make sure you type the name correctly, as there is no validation feedback on
this field.
304
Configuring SAML 2.0 SSO with Red Hat
This article provides instructions on how to configure SAML 2.0 for Guardicore Centra in the
Red Hat environment. The instructions comprise four stages:
2. Make sure you are in the relevant realm that contains the users for the Centra
integration.
3. In the Master menu, under Configure, choose Clients and click the Create button:
305
• Client ID - Enter the Centra URL – e.g. https://centra.acme.org.
• Client Protocol - Select SAML.
• In the Root URL (Client SAML Endpoint), enter the Centra URL + /sso-
authenticate – e.g. https://centra.acme.org/sso-authenticate.
• Click Save. A dialog box describing the new SAML client appears:
Field Value
Enabled On
Include AuthnStatement On
Sign Documents On
Sign Assertions On
306
Field Value
Encrypt Assertions On
5. Select the Roles tab and make sure no roles are assigned to this client.
6. Select the Client Scopes tab and make sure no roles are assigned to this client.
7. Select the Mappers tab and click Create to display the Create Protocol Mapper dialog
box:
8. In the Create Protocol Mapper dialog box, fill in the fields as follows:
307
Field Value
Name memberOf
9. Click Save to save the data and return to the Mappers tab.
10. On the Mappers tab, select the add builtin button to display the Add Builtin Protocol
Mapper dialog box:
11. In the Add Builtin Protocol Mapper dialog box, select x.500 email mapper and click
the Add selected button.
12. On the Mappers tab, edit the x.500 email mapper as follows:
Note: If a user in the user@domain format has already been configured manually in
Centra, SAML authentication will fail for that user and will default to local authentication.
308
13. Click Save.
14. On the Installation tab, in the Format Option list, select SAML Metadata
IDPSSODescriptor:
309
6. Idp Entity ID: copy the entityID url from the EntityDescriptor section in the xml from
the previous section.
7. Idp SSO URL: copy the SingleSignOnService Location URL from the
SingleSignOnService section in the xml from the previous section.
8. Idp Certificate: copy the certificate from the dsig:X509Certificate section in the xml
from the previous section.
9. Click Verify.
2. Click the Key icon to download the public key for assertion encryption configuration:
3. Open the RH SSO console and select the clients SAML Keys tab.
4. Click Import under the Encryption Key section and import the PEM file downloaded
from the Centra system.
5. Click Import under the Signing Key section and import the PEM file downloaded from
the Centra system.
2. Make sure the group name used for the user in the permission scheme is the same
as the one defined in the IdP for the desired roles.
310
Step 3: Test the Configuration.
2. Configure it to never expire and save the password for later, let's say the pass is "123456".
311
3. In User Settings, enable the following: `This account supports Kerberos AES 256 bit
encryption` and 'password never expires'.
312
3. Move the Centra Keytab file created in the 'C:\' drive to a secure location.
4. If you want to read more on keytab, here's all you need to know about Keytab files.
Note: In our demo, the values in the above figure are replaced with the following:
Centra FQDN is centra.testing.gc
Realm is testing.gc
Keytab is the file that we saved in the previous section; upload it here. Once the file
uploads, the box turns green.
3. After you configure all the Kerberos details, it should look like this:
313
Note that the test connection button only tests the LDAP connection and not the Kerberos
one.
Step 3: Test the Configuration
1. Make sure you have access to a user and an endpoint that are part of the domain.
The user should be part of a group in the AD that is allowed to access Centra.
2. While logged in with the domain user, open a Chrome browser and go to the Centra
address.
4. If you get signed in automatically but want to use a different built-in user, simply log
out and use the alternative credentials.
314
Management Configuration
Centra offers a series of configuration screens (System/Configuration) in which you can
configure all aspects of the system. Following is a brief description of each screen.
General
Option Description
Show policy rule hit count Enables the rule hit count feature.
calculation
315
Option Description
Show Labs Show the Labs section in the Centra Home page: Enable
Labs > DNS Queries.
Show Cloud Inventory Show Cloud Inventory in the Centra UI. This appears in the
UI under Inventory like this:
Mask passwords from Mask passwords from exported incident PDF or HTML.
exported incidents
Guardicore System Domain Enables manually configuring the Guardicore base URL.
Reveal
316
Option Description
Default Grouping The default label keys used for grouping in Explore view; for example,
Environment, Application, Role. Separate the keys by commas to
allow for nested grouping.
Additional In addition to the default grouping, any other grouping for maps is
Grouping Options supported.
Application Label The label key used for applications. For example, Application. It is
Key recommended to configure this before creating a Policy.
Environment The label key used for environment. For example, Environment. It is
Label Key recommended to configure this before creating a Policy.
317
Containers
Option Description
Default The default container fields used for grouping in the Explore view;
Grouping separate multiple fields with commas. Available fields are: image_name,
image_id, container_command, container_id, container_names.
Kubernetes The default container fields used for grouping Kubernetes containers in
Default the Explore view; separate multiple fields with commas. Available fields
Grouping are: pod_name, pod_namespace, pod_id, image_name, image_id,
container_command, container_id, container_names.
Allowed The prefix of docker labels that will be added to connection information.
Docker Label Docker labels that do not match any of these prefixes will be dropped.
Prefixes
The prefix of K8s labels that will NOT be ingested through automatic
K8s Label label creation. K8s labels that match any of these prefixes will be
Prefixes Deny ignored.
List
318
Scheduled Maps
Guardicore Centra provides scheduled Reveal maps generated automatically daily or hourly.
Clicking Explore on the Reveal menu displays the latest map by default. The last three maps
are stored in the quick map selector as well as the Saved Maps page. Guardicore Centra
provides scheduled Reveal maps generated automatically daily or hourly. Clicking Explore
on the Reveal menu displays the latest map by default. The last three maps are stored in the
quick map selector as well as the Saved Maps page. Scheduled maps are unfiltered, with no
special map features (no time resolution, no occurrences count, no incident highlights).
The map is configurable - settings such as time of map generation and the number of maps to
store can be configured in the Scheduled maps tab:
Option Description
Number of maps to save Number of scheduled maps to save. Older maps will be
automatically deleted.
Alerts
319
Option Description
Expire alarms after (days) Time elapsed before alarms are expired.
Create system alerts for flags raised whether of not to raised system alerts for missing
by agents components or agents
Component missing notification Seconds elapsed from last component update before
time marking it as missing.
Agent missing notification time Seconds to wait from last agent update before
marking it as missing.
Authentication
Here you can configure 2-step verification, login timeouts and more.
320
Option Description
Enforce 2-Step Verification When this option is enabled, all users are required to set
Policy up 2 step verification.
Expire audit log entries after Set the number of days before audit log entries expire.
(days)
Minimum interval for token The minimum number of seconds that must elapse from
usage update the last token usage info update to trigger a new update.
Passwords
The Passwords configuration enables determining the password requirements for accessing
Centra. Administrators can specify a wide range of password requirements including the
following:
321
• Number of minutes that a user is locked out after exceeding the number of wrong
password attempts.
The Password configuration screen looks like the following (continued on the next page):
322
323
Dashboard
Option Description
Show live Incidents first in Show live incidents before other incidents. If not checked,
the dashboard incidents are displayed according to their time.
Dashboard Tag Filter Click and type tags to restrict the incidents displayed in the
dashboard to only those related to these tags (case
sensitive).
Hide external attackers Hide widget that shows deception incidents from external
widget on dashboard. attackers.
Exclude IPs from DNS Click and type IPs whose traffic will be excluded when
statistics calculating the 'Uncommon Domain Usage' statistics.
324
Reveal "Active" threshold Percentage of asset to asset flows that will be displayed in
Reveal maps.
Week time frame Enables analysis based on data collected over the last seven
days.
Exporters
Option Description
Severity Threshold Type the minimal threshold for incident severity to export.
Filter incidents for Click and type tags to restrict incidents to export to only those
export by tags that include one or more tags from this list.
To include all tags, leave the list empty.
IP Classification
Option Description
325
Domain Classification
Option Description
Exclude trusted Exclude traffic from trusted domains when calculating the Uncommon
domains from Domain Usage statistics:
dashboard
Exclude trusted Exclude traffic to trusted domains when querying reputation services.
domains from
reputation
Include all trusted Include traffic to all trusted domains in the reputation log even without
domains in querying to reputation services.
reputation log
Agents Installation
Agents installation password: the password used for installing new Agents.
326
Plugins
Option Description
Enable Plugins Enables plugins. When disabled, all communication with the
plugins will be disallowed.
Enable Guardicore
Query (now called Enables Insight to query Agents and label them based on the
Insight) results. When this option is checked, Insight appears as an
option on the Centra UI like this:
327
System Info
This page enables you to generate debugging info about the system. This is particularly
useful when you need to get access to a system you can't otherwise access.
The system information consists of multiple files that are included in a single compressed file
that you can download.
Auditing
The Auditing page displays the administrator actions including time, action, username used
and originating IP address per each action. All records or a specific record on this page can
be exported to a CSV file.
328
A sample CSV file looks like this:
System Log
The System Log provides a list of system events for a specified time range. Events that are
more severe (errors) are indicated by a red dot next their id. A yellow dot indicates a
warning.
The list can be filtered according to severity: warning, error, info. The origin of the event is
also displayed. The events can be filtered by Severity, Origin, andTime period.
329