SlideShare a Scribd company logo
HPE ArcSight Logger Brute Force
Attack Detection
Software Version: 1.0
Security Use Case Guide
January 20, 2016
Legal Notices
Warranty
The only warranties for Hewlett Packard Enterprise products and services are set forth in the express warranty statements
accompanying such products and services. Nothing herein should be construed as constituting an additional warranty.
Hewlett Packard Enterprise shall not be liable for technical or editorial errors or omissions contained herein.
The information contained herein is subject to change without notice.
The network information used in the examples in this document (including IP addresses and hostnames) is for illustration
purposes only.
HPE ArcSight products are highly flexible and function as you configure them. The accessibility, integrity, and confidentiality
of your data is your responsibility. Implement a comprehensive security strategy and follow good security practices.
This document is confidential.
Restricted Rights Legend
Confidential computer software. Valid license from Hewlett Packard Enterprise required for possession, use or copying.
Consistent with FAR 12.211 and 12.212, Commercial Computer Software, Computer Software Documentation, and Technical
Data for Commercial Items are licensed to the U.S. Government under vendor's standard commercial license.
Copyright Notice
© Copyright 2016 Hewlett Packard Enterprise Development, LP
Follow this link to see a complete statement of copyrights and acknowledgements:
http://www.hpenterprisesecurity.com/copyright
Support
Phone A list of phone numbers is available on the HPE ArcSight Technical Support
Page: https://softwaresupport.hp.com/documents/10180/14684/esp-support-
contact-list
Support Web Site https://softwaresupport.hp.com
Protect 724 Community https://protect724.hp.com
Contact Information
Security Use Case Guide
HPE Logger Brute Force Attack Detection (1.0) Page 2 of 13
Contents
Overview 4
Installation 6
Brute Force Attack Detection Dashboards 7
Modifying the Default Dashboard Settings 8
Brute Force Attack Detection Reports 9
Brute Force Attack Reports 9
Source Reports 9
Failed Login Counts Reports 10
Failed Login Statistics Reports 10
Additional Information 11
Queries 11
Filters 11
Fieldset 11
Send Documentation Feedback 13
HPE Logger Brute Force Attack Detection (1.0) Page 3 of 13
Overview
Brute force attacks apply trial-and-error methods to hack into a system and obtain encrypted
information such as passwords and personal identification numbers (PINs). A brute force program
generates a massive number of automated consecutive login attempts.
The HPE ArcSight Logger Brute Force Attack Detection Security Use Case helps you identify potential
brute force attempts using HPE ArcSight Logger. After identification of a threat, you can take action to
investigate the activity and protect your assets.
Parameters
The Brute Force Attack Detection Security Use Case tracks the following parameters related to brute
force attack detection.
l Count: The number of login attempts made during a given interval. A count includes both successful
and unsuccessful logins. A high count may indicate a possible brute force attack.
l Source: The system from which a possible brute force attack originated.
l Destination: The target system subject to a possible brute force attack.
l User Account: User account associated with the possible brute force attack, used by the source to
log in to the destination.
These parameters are tracked in two ways: through dashboards and reports.
Security Use Case Guide
Overview
HPE Logger Brute Force Attack Detection (1.0) Page 4 of 13
Dashboards
The Brute Force Attack Detection dashboards display a count of failed logins for each of the following
for the past 6 hours:
l Top sources of failed logins
l Top destinations of failed logins
l Top source destination pairs
l Top user account and destination pairs
For more information, see "Brute Force Attack Detection Dashboards" on page 7.
Reports
As part of the Logger Brute Force Attack Detection Security Use Case, these reports are available in
Logger. Reports enable you to track failed login trends over any period and are highly customizable to
meet your needs. The included reports track information on counts, sources, and trends. For more
information, see "Brute Force Attack Detection Reports" on page 9.
Security Use Case Guide
Overview
HPE Logger Brute Force Attack Detection (1.0) Page 5 of 13
Installation
Installation of the Logger Brute Force Detection Security Use Case is accomplished with the installer file
downloaded from the HPE ArcSight Marketplace. You must separately install the use case content (the
fieldset, dashboard, and filters).
The Logger Brute Force Detection Security Use Case is supported on Logger v6.0 and later versions.
To install the Logger Brute Force Detection Security Use Case package:
1. In Logger, on the main menu, click Reports.
2. Click Deploy Report Bundle.
3. Under Step 1: Upload and View Cab Information, browse to the *.cab file containing the
Logger Brute Force package, then click Upload.
4. Under Step 2: Deploy Objects on Report Server, review the objects that will be deployed to your
report server. Then click Deploy. The objects are added to your server.
To install the Logger Brute Force Detection Security Use Case content:
1. In Logger, on the main menu, click Configuration.
2. Under Advanced, click Import Content.
3. Click Choose File. Select the *.gz file containing the fieldset content. Click Import.
4. Repeat Step 3 for the file containing the dashboard content.
5. Repeat Step 3 for the file containing the filter content.
Security Use Case Guide
Installation
HPE Logger Brute Force Attack Detection (1.0) Page 6 of 13
Brute Force Attack Detection Dashboards
Four dashboards are available as part of the Logger Brute Force Attack Security Use Case. Dashboards
give a snapshot of current activity for the defined interval (by default, the interval is 6 hours).
To view the Brute Force Attack Detection dashboard:
1. In the Logger main menu, click Dashboards.
2. In the dashboard drop-down list, select Brute Force Attack Detection.
3. The dashboard displays with four panels displaying data on failed logins:
l Failed Logins - Top Sources: displays a bar graph of the 10 sources with the highest count of login
attempts for the last 6 hours.
l Failed Logins - Top Destinations: displays a bar graph of the 10 destinations with the highest
count of login attempts for the last 6 hours.
l Failed Logins - Top Source & Destination Pairs: displays a table of the 10 source-destination pairs
with the highest count of login attempts from the last 6 hours.
l Failed Logins - Top User Account and Destination Pairs: displays a table of the 10 user account-
destination pairs with the highest count of login attempts from the last 6 hours.
Hover your pointer over any colored portion of a graph to display the overall details, including the
count of login attempts.
Click View on Search Page to display the panel in its own page, including the Saved Search details.
Security Use Case Guide
Brute Force Attack Detection Dashboards
HPE Logger Brute Force Attack Detection (1.0) Page 7 of 13
Drilling Down
To drill down on the data in a dashboard graph and review details of the data displayed, click the
colored portion of any graph. While the graphs displays the 10 items with the highest count, the drill-
down page shows the 100 items with the highest count.
At the top of the page is a graph with local time as the x-axis, showing groups of events across time as
bars. Click any bar shown on the graph to view the details of all events that took place at the indicated
time.
The Saved Search used to filter data for the dashboard is displayed at the top of the page. The filter can
be used as-is, or may be customized by the filter tools. For details on how to modify a filter, consult the
Logger Administrator's Guide.
To export the dashboard data, click Export. Then, on the Export Options page, select the details of the
export.
Modifying the Default Dashboard Settings
You can modify the default dashboard settings by editing the panel display or by editing the Saved
Search used to compile the dashboard. For more information on modifying a dashboard layout, panels,
or a Saved Search, see the Logger Administrator's Guide.
Security Use Case Guide
Brute Force Attack Detection Dashboards
HPE Logger Brute Force Attack Detection (1.0) Page 8 of 13
Brute Force Attack Detection Reports
By running and reviewing the reports included in the Brute Force Attack Detection Security Use Case,
you can easily determine trends over time and that could be brute force attacks.
Before running a report, verify that the report's period (start and end date) is for the desired time
frame. Period can be retained from previously run reports.
To access a Brute Force Attack Detection report:
1. On the Logger main menu, click Reports.
2. In the navigation menu, click Report Explorer.
3. Select Brute Force Attack.
4. Select a report to run.
5. Under Actions, select an action to take with the report, such as Run with Default Options.
You can run reports, customize, copy or take other actions with any of these reports as you would with
other Logger reports. For detailed instructions on how to run, edit, and manage Logger reports, see the
Logger Administrator's Guide.
Brute Force Attack Reports
Brute force attacks show possible brute force attacks by source, user account, and destination. You
should run these reports as often as possible (preferably daily) to spot possible brute force attacks
early. Alternatively, you can schedule these reports to run automatically in Logger under Scheduled
Reports in the navigation menu.
Report Description
Attempted Brute Force Attack Shows source, user account, and destination involved in an attempted brute force attack. An
attempted brute force attack is defined as one where the number of failed login attempts
exceeds the report query's threshold (by default, 50 failed attempts per day).
Successful Brute Force Attack Shows source, user account, and destination involved in an attempted brute force attack,
which resulted in one or more successful logins.
Source Reports
Source reports display information on the sources of possible brute force attacks.
Security Use Case Guide
Brute Force Attack Detection Reports
HPE Logger Brute Force Attack Detection (1.0) Page 9 of 13
Report Description
A Source Targeting
Destinations
Shows a list, sorted by count, of the top 100 sources targeting multiple destinations with failed
logins.
You can customize the report to isolate one or more sources or destinations.
Exploit Attempts of User
Accounts by Sources
Shows a list, sorted by count, of the top 100 user accounts that failed to log in to any destination.
You can customize the report to isolate one or more user accounts, sources, or destinations.
Failed Login Counts Reports
Failed login counts reports show the trends of the count of failed logins, grouped by different
parameters. Using failed login counts reports will let you spot possible trends and other issues.
Report Description
Failed Login Counts
by Days
Groups failed login events by day of occurrence.
Failed Login Counts
by Destinations
Groups the top 100 (by count) destinations for failed login events.
Failed Login Counts by
Sources
Groups the top 100 (by count) sources for failed login events.
Failed Login Counts by
User Accounts
Groups the top 100 (by count)user accounts for failed login events.
Failed Login Counts by
Weeks
Groups failed login events by the week in which they occurred.
Failed Login Statistics Reports
Failed login statistics reports show the statistics of all failed logins, each by different parameters.
Report Description
Failed Login Statistics by
a Destination
Shows statistics of all failed login events associated with a destination.
Failed Login Statistics by
a Source
Shows statistics of all failed login events associated with a source.
Failed Login Statistics by
a User Account
Shows statistics of all failed login events associated with a user account.
Security Use Case Guide
Brute Force Attack Detection Reports
HPE Logger Brute Force Attack Detection (1.0) Page 10 of 13
Additional Information
The dashboard and reports included in the Brute Force Security Use Case make use of the following
queries, filters, and fieldset.
Queries
The Logger Brute Force Detection Attack Security Use Case includes queries for each report discussed
under "Brute Force Attack Detection Reports" on page 9 You can view or edit the query details as
needed.
To view or edit query details:
1. In the main menu, click Reports.
2. In the left navigation menu, click Query Explorer.
3. Select Brute Force Attack in the first column.
4. In the second column, double-click the query you wish to view or edit.
For complete details on editing or managing queries, see the Logger Administrator's Guide.
Filters
These filters are part of the Logger Brute Force Detection Attack Security Use Case.
l Brute Force Attack - Failed Login Events
l Brute Force Attack - Successful Login Events
To view or edit filter details:
1. On the main menu, click Configuration.
2. Under Search, click Filters.
3. The Brute Force filters are displayed in the list. Click any filter to display its details.
For complete details on editing or managing filters, see the Logger Administrator's Guide.
Fieldset
A single fieldset is part of the Security Use Case.
Security Use Case Guide
Additional Information
HPE Logger Brute Force Attack Detection (1.0) Page 11 of 13
l Brute Force Attack Detection
To view or edit fieldset details:
1. On the main menu, click Configuration.
2. Under Search, click Fieldsets.
3. The Brute Force fieldset is displayed in the list, with details.
For complete details on editing or managing fieldsets, see the Logger Administrator's Guide.
Security Use Case Guide
Additional Information
HPE Logger Brute Force Attack Detection (1.0) Page 12 of 13
Send Documentation Feedback
If you have comments about this document, you can contact the documentation team by email. If an
email client is configured on this system, click the link above and an email window opens with the
following information in the subject line:
Feedback on Security Use Case Guide (Logger Brute Force Attack Detection 1.0)
Just add your feedback to the email and click send.
If no email client is available, copy the information above to a new message in a web mail client, and send
your feedback to arc-doc@hpe.com.
We appreciate your feedback!
HPE Logger Brute Force Attack Detection (1.0) Page 13 of 13

More Related Content

PPTX
Getting started with Splunk
PDF
Brute Force Attack Security Use Case Guide
PDF
Antivirus Monitoring Security Use Case Guide
PDF
Reconnaissance Security Use Case
PPTX
First Responders Course - Session 4 - Forensic Readiness [2004]
PDF
Anomalous Traffic Detection Security Use Case Guide
DOCX
Security Hands-On - Splunklive! Houston
PDF
Carbanak apt eng
Getting started with Splunk
Brute Force Attack Security Use Case Guide
Antivirus Monitoring Security Use Case Guide
Reconnaissance Security Use Case
First Responders Course - Session 4 - Forensic Readiness [2004]
Anomalous Traffic Detection Security Use Case Guide
Security Hands-On - Splunklive! Houston
Carbanak apt eng

Similar to Logger Brute Force Attack Detection Security Use Case User's Guide (20)

PPTX
Cyberjutitsu101coleevertzfinal 1296250763392-phpapp02
PPTX
Cyber Threat Jujitsu 101: Acknowledge. Assess. Avoid. Address.
PDF
Logger HIPAA CIP 1.0 Solutions Guide
PPTX
DR FAT
PPTX
Big data security
PDF
Can_We_Really_Detect_These_So_Called_Sophisticated_Attacks?
PPTX
Ensuring Security and Compliance in a Data Deluge
PPT
RSA 2006 - Visual Security Event Analysis
PPTX
My Keynote from BSidesTampa 2015 (video in description)
PDF
PHDays 2018 Threat Hunting Hands-On Lab
PDF
Logging for hackers SAINTCON
PDF
The Heatmap
 - Why is Security Visualization so Hard?
PPTX
Operationalizing Security Intelligence [ InfoSec World 2014 ]
PDF
SplunkLive! Amsterdam 2015 - Analytics based security breakout
PPTX
SANSFIRE18: War Stories on Using Automated Threat Intelligence for Defense
PDF
Testing the OWASP Top 10
PDF
Luncheon 2016-07-16 - Topic 2 - Advanced Threat Hunting by Justin Falck
PPTX
Indianapolis Splunk User Group Dec 22
PDF
Layer one 2011-joe-mccray-you-spent-all-that-money-and-still-got-0wned
PPT
BSidesDC 2016 Beyond Automated Testing
Cyberjutitsu101coleevertzfinal 1296250763392-phpapp02
Cyber Threat Jujitsu 101: Acknowledge. Assess. Avoid. Address.
Logger HIPAA CIP 1.0 Solutions Guide
DR FAT
Big data security
Can_We_Really_Detect_These_So_Called_Sophisticated_Attacks?
Ensuring Security and Compliance in a Data Deluge
RSA 2006 - Visual Security Event Analysis
My Keynote from BSidesTampa 2015 (video in description)
PHDays 2018 Threat Hunting Hands-On Lab
Logging for hackers SAINTCON
The Heatmap
 - Why is Security Visualization so Hard?
Operationalizing Security Intelligence [ InfoSec World 2014 ]
SplunkLive! Amsterdam 2015 - Analytics based security breakout
SANSFIRE18: War Stories on Using Automated Threat Intelligence for Defense
Testing the OWASP Top 10
Luncheon 2016-07-16 - Topic 2 - Advanced Threat Hunting by Justin Falck
Indianapolis Splunk User Group Dec 22
Layer one 2011-joe-mccray-you-spent-all-that-money-and-still-got-0wned
BSidesDC 2016 Beyond Automated Testing
Ad

More from protect724rkeer (20)

PDF
Model Import Connector for RepSM Release Notes
PDF
Actor Model Import Connector for Microsoft Active Directory
PDF
Actor Model Import Connector for Microsoft Active Directory Release Notes
PDF
Actor Model Import FlexConnector for Database
PDF
Actor Model Import FlexConnector for Database Release Notes
PDF
CIP for PCI 4.0 Solution Guide for ArcSight Logger
PDF
CIP for PCI 4.0 Release Notes for ArcSight Logger
PDF
CIP IT Governance 5.0 Solution Guide for ArcSight Logger
PDF
CIP IT Governance 5.0 Release Notes for ArcSight Logger
PDF
ArcSight Model Import Connector for RepSM 7.1.7.7607.0 Configuration guide
PDF
ArcSight ArcSight Model Import Connector for RepSM 7.1.7.7607.0 Release Notes
PDF
Logger NERC CIP 1.0 Solutions Guide
PDF
Logger NERC CIP 1.0 Release Notes
PDF
Logger HIPAA CIP 1.0 Release Notes
PDF
HPE ArcSight RepSM Plus 1.6 Solution Guide
PDF
HPE ArcSight RepSM Plus 1.6 Release Notes
PDF
HPE ArcSight RepSM Plus Model Import Connector Config Guide
PDF
HPE ArcSight RepSM Plus Model Import Connector Release Notes
PDF
NERC v6.0 for ESM Release Notes
PDF
NERC v6.0 for ESM Solution Guide
Model Import Connector for RepSM Release Notes
Actor Model Import Connector for Microsoft Active Directory
Actor Model Import Connector for Microsoft Active Directory Release Notes
Actor Model Import FlexConnector for Database
Actor Model Import FlexConnector for Database Release Notes
CIP for PCI 4.0 Solution Guide for ArcSight Logger
CIP for PCI 4.0 Release Notes for ArcSight Logger
CIP IT Governance 5.0 Solution Guide for ArcSight Logger
CIP IT Governance 5.0 Release Notes for ArcSight Logger
ArcSight Model Import Connector for RepSM 7.1.7.7607.0 Configuration guide
ArcSight ArcSight Model Import Connector for RepSM 7.1.7.7607.0 Release Notes
Logger NERC CIP 1.0 Solutions Guide
Logger NERC CIP 1.0 Release Notes
Logger HIPAA CIP 1.0 Release Notes
HPE ArcSight RepSM Plus 1.6 Solution Guide
HPE ArcSight RepSM Plus 1.6 Release Notes
HPE ArcSight RepSM Plus Model Import Connector Config Guide
HPE ArcSight RepSM Plus Model Import Connector Release Notes
NERC v6.0 for ESM Release Notes
NERC v6.0 for ESM Solution Guide
Ad

Recently uploaded (20)

PDF
wealthsignaloriginal-com-DS-text-... (1).pdf
PDF
Understanding Forklifts - TECH EHS Solution
PDF
2025 Textile ERP Trends: SAP, Odoo & Oracle
PDF
Design an Analysis of Algorithms II-SECS-1021-03
PPTX
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
PDF
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
PDF
Audit Checklist Design Aligning with ISO, IATF, and Industry Standards — Omne...
PDF
Addressing The Cult of Project Management Tools-Why Disconnected Work is Hold...
PPTX
Operating system designcfffgfgggggggvggggggggg
PPTX
L1 - Introduction to python Backend.pptx
PDF
Raksha Bandhan Grocery Pricing Trends in India 2025.pdf
PPTX
history of c programming in notes for students .pptx
PDF
How to Choose the Right IT Partner for Your Business in Malaysia
PDF
Nekopoi APK 2025 free lastest update
PDF
Navsoft: AI-Powered Business Solutions & Custom Software Development
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 41
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
PDF
Softaken Excel to vCard Converter Software.pdf
PDF
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
PDF
Odoo Companies in India – Driving Business Transformation.pdf
wealthsignaloriginal-com-DS-text-... (1).pdf
Understanding Forklifts - TECH EHS Solution
2025 Textile ERP Trends: SAP, Odoo & Oracle
Design an Analysis of Algorithms II-SECS-1021-03
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
Audit Checklist Design Aligning with ISO, IATF, and Industry Standards — Omne...
Addressing The Cult of Project Management Tools-Why Disconnected Work is Hold...
Operating system designcfffgfgggggggvggggggggg
L1 - Introduction to python Backend.pptx
Raksha Bandhan Grocery Pricing Trends in India 2025.pdf
history of c programming in notes for students .pptx
How to Choose the Right IT Partner for Your Business in Malaysia
Nekopoi APK 2025 free lastest update
Navsoft: AI-Powered Business Solutions & Custom Software Development
Internet Downloader Manager (IDM) Crack 6.42 Build 41
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
Softaken Excel to vCard Converter Software.pdf
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
Odoo Companies in India – Driving Business Transformation.pdf

Logger Brute Force Attack Detection Security Use Case User's Guide

  • 1. HPE ArcSight Logger Brute Force Attack Detection Software Version: 1.0 Security Use Case Guide January 20, 2016
  • 2. Legal Notices Warranty The only warranties for Hewlett Packard Enterprise products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. Hewlett Packard Enterprise shall not be liable for technical or editorial errors or omissions contained herein. The information contained herein is subject to change without notice. The network information used in the examples in this document (including IP addresses and hostnames) is for illustration purposes only. HPE ArcSight products are highly flexible and function as you configure them. The accessibility, integrity, and confidentiality of your data is your responsibility. Implement a comprehensive security strategy and follow good security practices. This document is confidential. Restricted Rights Legend Confidential computer software. Valid license from Hewlett Packard Enterprise required for possession, use or copying. Consistent with FAR 12.211 and 12.212, Commercial Computer Software, Computer Software Documentation, and Technical Data for Commercial Items are licensed to the U.S. Government under vendor's standard commercial license. Copyright Notice © Copyright 2016 Hewlett Packard Enterprise Development, LP Follow this link to see a complete statement of copyrights and acknowledgements: http://www.hpenterprisesecurity.com/copyright Support Phone A list of phone numbers is available on the HPE ArcSight Technical Support Page: https://softwaresupport.hp.com/documents/10180/14684/esp-support- contact-list Support Web Site https://softwaresupport.hp.com Protect 724 Community https://protect724.hp.com Contact Information Security Use Case Guide HPE Logger Brute Force Attack Detection (1.0) Page 2 of 13
  • 3. Contents Overview 4 Installation 6 Brute Force Attack Detection Dashboards 7 Modifying the Default Dashboard Settings 8 Brute Force Attack Detection Reports 9 Brute Force Attack Reports 9 Source Reports 9 Failed Login Counts Reports 10 Failed Login Statistics Reports 10 Additional Information 11 Queries 11 Filters 11 Fieldset 11 Send Documentation Feedback 13 HPE Logger Brute Force Attack Detection (1.0) Page 3 of 13
  • 4. Overview Brute force attacks apply trial-and-error methods to hack into a system and obtain encrypted information such as passwords and personal identification numbers (PINs). A brute force program generates a massive number of automated consecutive login attempts. The HPE ArcSight Logger Brute Force Attack Detection Security Use Case helps you identify potential brute force attempts using HPE ArcSight Logger. After identification of a threat, you can take action to investigate the activity and protect your assets. Parameters The Brute Force Attack Detection Security Use Case tracks the following parameters related to brute force attack detection. l Count: The number of login attempts made during a given interval. A count includes both successful and unsuccessful logins. A high count may indicate a possible brute force attack. l Source: The system from which a possible brute force attack originated. l Destination: The target system subject to a possible brute force attack. l User Account: User account associated with the possible brute force attack, used by the source to log in to the destination. These parameters are tracked in two ways: through dashboards and reports. Security Use Case Guide Overview HPE Logger Brute Force Attack Detection (1.0) Page 4 of 13
  • 5. Dashboards The Brute Force Attack Detection dashboards display a count of failed logins for each of the following for the past 6 hours: l Top sources of failed logins l Top destinations of failed logins l Top source destination pairs l Top user account and destination pairs For more information, see "Brute Force Attack Detection Dashboards" on page 7. Reports As part of the Logger Brute Force Attack Detection Security Use Case, these reports are available in Logger. Reports enable you to track failed login trends over any period and are highly customizable to meet your needs. The included reports track information on counts, sources, and trends. For more information, see "Brute Force Attack Detection Reports" on page 9. Security Use Case Guide Overview HPE Logger Brute Force Attack Detection (1.0) Page 5 of 13
  • 6. Installation Installation of the Logger Brute Force Detection Security Use Case is accomplished with the installer file downloaded from the HPE ArcSight Marketplace. You must separately install the use case content (the fieldset, dashboard, and filters). The Logger Brute Force Detection Security Use Case is supported on Logger v6.0 and later versions. To install the Logger Brute Force Detection Security Use Case package: 1. In Logger, on the main menu, click Reports. 2. Click Deploy Report Bundle. 3. Under Step 1: Upload and View Cab Information, browse to the *.cab file containing the Logger Brute Force package, then click Upload. 4. Under Step 2: Deploy Objects on Report Server, review the objects that will be deployed to your report server. Then click Deploy. The objects are added to your server. To install the Logger Brute Force Detection Security Use Case content: 1. In Logger, on the main menu, click Configuration. 2. Under Advanced, click Import Content. 3. Click Choose File. Select the *.gz file containing the fieldset content. Click Import. 4. Repeat Step 3 for the file containing the dashboard content. 5. Repeat Step 3 for the file containing the filter content. Security Use Case Guide Installation HPE Logger Brute Force Attack Detection (1.0) Page 6 of 13
  • 7. Brute Force Attack Detection Dashboards Four dashboards are available as part of the Logger Brute Force Attack Security Use Case. Dashboards give a snapshot of current activity for the defined interval (by default, the interval is 6 hours). To view the Brute Force Attack Detection dashboard: 1. In the Logger main menu, click Dashboards. 2. In the dashboard drop-down list, select Brute Force Attack Detection. 3. The dashboard displays with four panels displaying data on failed logins: l Failed Logins - Top Sources: displays a bar graph of the 10 sources with the highest count of login attempts for the last 6 hours. l Failed Logins - Top Destinations: displays a bar graph of the 10 destinations with the highest count of login attempts for the last 6 hours. l Failed Logins - Top Source & Destination Pairs: displays a table of the 10 source-destination pairs with the highest count of login attempts from the last 6 hours. l Failed Logins - Top User Account and Destination Pairs: displays a table of the 10 user account- destination pairs with the highest count of login attempts from the last 6 hours. Hover your pointer over any colored portion of a graph to display the overall details, including the count of login attempts. Click View on Search Page to display the panel in its own page, including the Saved Search details. Security Use Case Guide Brute Force Attack Detection Dashboards HPE Logger Brute Force Attack Detection (1.0) Page 7 of 13
  • 8. Drilling Down To drill down on the data in a dashboard graph and review details of the data displayed, click the colored portion of any graph. While the graphs displays the 10 items with the highest count, the drill- down page shows the 100 items with the highest count. At the top of the page is a graph with local time as the x-axis, showing groups of events across time as bars. Click any bar shown on the graph to view the details of all events that took place at the indicated time. The Saved Search used to filter data for the dashboard is displayed at the top of the page. The filter can be used as-is, or may be customized by the filter tools. For details on how to modify a filter, consult the Logger Administrator's Guide. To export the dashboard data, click Export. Then, on the Export Options page, select the details of the export. Modifying the Default Dashboard Settings You can modify the default dashboard settings by editing the panel display or by editing the Saved Search used to compile the dashboard. For more information on modifying a dashboard layout, panels, or a Saved Search, see the Logger Administrator's Guide. Security Use Case Guide Brute Force Attack Detection Dashboards HPE Logger Brute Force Attack Detection (1.0) Page 8 of 13
  • 9. Brute Force Attack Detection Reports By running and reviewing the reports included in the Brute Force Attack Detection Security Use Case, you can easily determine trends over time and that could be brute force attacks. Before running a report, verify that the report's period (start and end date) is for the desired time frame. Period can be retained from previously run reports. To access a Brute Force Attack Detection report: 1. On the Logger main menu, click Reports. 2. In the navigation menu, click Report Explorer. 3. Select Brute Force Attack. 4. Select a report to run. 5. Under Actions, select an action to take with the report, such as Run with Default Options. You can run reports, customize, copy or take other actions with any of these reports as you would with other Logger reports. For detailed instructions on how to run, edit, and manage Logger reports, see the Logger Administrator's Guide. Brute Force Attack Reports Brute force attacks show possible brute force attacks by source, user account, and destination. You should run these reports as often as possible (preferably daily) to spot possible brute force attacks early. Alternatively, you can schedule these reports to run automatically in Logger under Scheduled Reports in the navigation menu. Report Description Attempted Brute Force Attack Shows source, user account, and destination involved in an attempted brute force attack. An attempted brute force attack is defined as one where the number of failed login attempts exceeds the report query's threshold (by default, 50 failed attempts per day). Successful Brute Force Attack Shows source, user account, and destination involved in an attempted brute force attack, which resulted in one or more successful logins. Source Reports Source reports display information on the sources of possible brute force attacks. Security Use Case Guide Brute Force Attack Detection Reports HPE Logger Brute Force Attack Detection (1.0) Page 9 of 13
  • 10. Report Description A Source Targeting Destinations Shows a list, sorted by count, of the top 100 sources targeting multiple destinations with failed logins. You can customize the report to isolate one or more sources or destinations. Exploit Attempts of User Accounts by Sources Shows a list, sorted by count, of the top 100 user accounts that failed to log in to any destination. You can customize the report to isolate one or more user accounts, sources, or destinations. Failed Login Counts Reports Failed login counts reports show the trends of the count of failed logins, grouped by different parameters. Using failed login counts reports will let you spot possible trends and other issues. Report Description Failed Login Counts by Days Groups failed login events by day of occurrence. Failed Login Counts by Destinations Groups the top 100 (by count) destinations for failed login events. Failed Login Counts by Sources Groups the top 100 (by count) sources for failed login events. Failed Login Counts by User Accounts Groups the top 100 (by count)user accounts for failed login events. Failed Login Counts by Weeks Groups failed login events by the week in which they occurred. Failed Login Statistics Reports Failed login statistics reports show the statistics of all failed logins, each by different parameters. Report Description Failed Login Statistics by a Destination Shows statistics of all failed login events associated with a destination. Failed Login Statistics by a Source Shows statistics of all failed login events associated with a source. Failed Login Statistics by a User Account Shows statistics of all failed login events associated with a user account. Security Use Case Guide Brute Force Attack Detection Reports HPE Logger Brute Force Attack Detection (1.0) Page 10 of 13
  • 11. Additional Information The dashboard and reports included in the Brute Force Security Use Case make use of the following queries, filters, and fieldset. Queries The Logger Brute Force Detection Attack Security Use Case includes queries for each report discussed under "Brute Force Attack Detection Reports" on page 9 You can view or edit the query details as needed. To view or edit query details: 1. In the main menu, click Reports. 2. In the left navigation menu, click Query Explorer. 3. Select Brute Force Attack in the first column. 4. In the second column, double-click the query you wish to view or edit. For complete details on editing or managing queries, see the Logger Administrator's Guide. Filters These filters are part of the Logger Brute Force Detection Attack Security Use Case. l Brute Force Attack - Failed Login Events l Brute Force Attack - Successful Login Events To view or edit filter details: 1. On the main menu, click Configuration. 2. Under Search, click Filters. 3. The Brute Force filters are displayed in the list. Click any filter to display its details. For complete details on editing or managing filters, see the Logger Administrator's Guide. Fieldset A single fieldset is part of the Security Use Case. Security Use Case Guide Additional Information HPE Logger Brute Force Attack Detection (1.0) Page 11 of 13
  • 12. l Brute Force Attack Detection To view or edit fieldset details: 1. On the main menu, click Configuration. 2. Under Search, click Fieldsets. 3. The Brute Force fieldset is displayed in the list, with details. For complete details on editing or managing fieldsets, see the Logger Administrator's Guide. Security Use Case Guide Additional Information HPE Logger Brute Force Attack Detection (1.0) Page 12 of 13
  • 13. Send Documentation Feedback If you have comments about this document, you can contact the documentation team by email. If an email client is configured on this system, click the link above and an email window opens with the following information in the subject line: Feedback on Security Use Case Guide (Logger Brute Force Attack Detection 1.0) Just add your feedback to the email and click send. If no email client is available, copy the information above to a new message in a web mail client, and send your feedback to arc-doc@hpe.com. We appreciate your feedback! HPE Logger Brute Force Attack Detection (1.0) Page 13 of 13