SlideShare a Scribd company logo
•




        What’s New in
    LogRhythm® Version 5.1
What’s New in LogRhythm ® Version 5.1




Dear LogRhythm Customers,

I am pleased to introduce LogRhythm 5.1, the latest version of our award winning software. I think you will be
very happy with the extensive list of new features, capabilities, and improvements introduced. As I think you‟ll
come to appreciate, LogRhythm 5.1 is far from a typical minor release.

I think this release provides a great balance between core “blocking and tackling” capabilities with leading edge
innovation. We have long felt our log data collection and management infrastructure is second-to-none. We
continue to invest in this area by adding significant new log collection capabilities including native support for
SNMP traps and the latest version of Netflow. We have invested in improving our reporting infrastructure by
providing you the ability to create your own templates for determining exactly how you want a report to look.
In addition, you can select to use your company logo instead of ours for presentation in a report. We have
introduced new meta-data fields and significantly enhanced how some derived meta-data values are determined.
We also introduced a variety of new capabilities and improvements for easing the administration of your
LogRhythm deployment.

On more of the leading-edge innovation front, we have introduced a number of new features that I am
personally very excited about. We‟ve added Geolocation, the ability to see where hosts contained in log
messages physically reside. While some of our competitors have capabilities in this area, what excites me is
that we introduce Geolocation at the log and event layer whereas others have only focused at the event layer.
This provides great forensic context for every log message, context that provides a wealth of capabilities today
and more in the future. One of those capabilities is leveraged in another new feature called Network
Visualization. This is a very powerful visual analysis tool that provides a visual depiction of host-to-host
relationships across boundaries such as location.

One thing I feel has always differentiated us is our focus on filling the “visibility gaps”. While logs do provide
tremendous visibility on their own, often they don‟t provide the complete story. A core capability of the
LogRhythm System Monitor is to fill in these gaps at the endpoint. Two new powerful forensic visibility
capabilities have been introduced in 5.1. Process Monitor provides independent monitoring of processes
running on a host, when they start, and when they stop. Network Monitor provides independent monitoring of
listening services, inbound connections, and outbound connections to/from a host. These capabilities, combined
with existing endpoint monitoring features (i.e., File Integrity Monitor, DataLoss Defender), provide powerful
and unequaled forensic awareness and visibility at the host.

I hope you find LogRhythm 5.1 as exciting as we do. The LogRhythm engineering team has worked hard to
bring you another quality software release we are very proud of.

Sincerely,

Chris Petersen
CTO, VP Engineering, Co-founder
What’s New in LogRhythm ® Version 5.1




Overview
This document provides a brief description of new features and the most significant improvements introduced in
LogRhythm 5.1. Please refer to the Release Notes for the complete list of new features, improvements, modifications, and
known issues found in LogRhythm 5.1.


System Monitor Features and Improvements
New Operating System Support
We have added support for the following operating systems and Linux distributions:
      HP-UX
      Linux Debian
      Linux Ubuntu

New Collection Interfaces, Capabilities, and Improvements
SNMP Trap Listener
The Windows System Monitor now includes an integrated SNMP Trap Listener. SNMP versions 1, 2 and 3 are
supported.

Netflow v9
The Windows System Monitor now supports Netflow v9 in addition to version 1 and 5. This provides support for the
latest version of Netflow shipping with Cisco products. Netflow v9 is also compatible with a variety of non-Cisco
products.

Recursive Flat File Collection
This capability allows for the collection of flat files matching a specific file name pattern that reside in root or child
directories. This is ideal for applications (i.e., web servers) that generate new directories containing log files on a daily or
weekly basis.

Integrated Syslog Server for UNIX and Linux System Monitor
The Windows System Monitor has always had an integrated Syslog Listener for receiving UDP and TCP based Syslog.
This same capability has been added in UNIX and Linux versions of the System Monitor. This is ideal for extending the
collection infrastructure in *NIX-centric environments where a single agent can collect and forward Syslog from the
entire environment.

Checkpoint Firewall/VPN Secure Configuration Verification (SCV) Support
The Windows System Monitor now supports collection of logs generated via Checkpoint‟s Secure Configuration
Verification module.

Windows Remote Event Log Connection Optimization
The number and frequency of new connections required to collect Event Logs remotely has been significantly reduced.
This results in overall performance improvements and reduces the number of logs written to the Windows Security Event
log as a result of remote collection activity.
What’s New in LogRhythm ® Version 5.1



Windows 1252 Codepage Extended ASCII support
Log messages containing Extended ASCII characters for languages included in the Windows 1252 codepage will be
collected and presented in native language. This includes the following languages:

                Afrikaans                    Finnish                        Malay
                Basque                       French                         Norwegian
                Catalan                      Galician                       Portuguese
                Danish                       German                         Spanish
                Dutch                        Icelandic                      Swahili
                English                      Indonesian                     Swedish
                Faroese                      Italian



New Forensic Visibility and Awareness Features
A tenet of LogRhythm‟s vision is to provide profound visibility into the operating environment. We do this to help our
customers better understand the environment as it affects or is impacted by security, operations, and compliance/audit
events. In LogRhythm 5.1, we have introduced two significant features that provide forensic awareness into the activity
of a host.

Network Connection Monitor
This feature provides an audit trail of connections to and from the host on which the System Monitor is installed. We also
detect and log listening services. This is an optional capability available in System Monitor Lite that can provide constant
or on-demand visibility into how a host is interacting on the LAN, WAN and Internet.

        Use Case
        Deploy System Monitors and enable Network Connection Monitor on servers in a DMZ and alert on unauthorized
        connections from DMZ hosts to hosts on the Internet or inside the trusted network.

        Use Case
        Deploy System Monitors and enable Network Connection Monitor on key servers and alert if observe network
        connection initiating directly from the Internet or other unauthorized networks.


Process Monitor
This feature provides an audit trail of processes running on a host. Logs are generated whenever a new process or
program starts or a previously running process or program stops. This is an optional capability available in System
Monitor Lite that can provide constant or on-demand visibility into what processes and applications a host is running.

        Use Case
        Deploy System Monitors and enable Process Monitor on key servers. Create a whitelist of authorized programs
        and alert if any program is observed not in the approved whitelist.

        Use Case
        Deploy System Monitors and enable Process Monitor on user desktops. Create a blacklist of high-risk
        unauthorized programs (i.e., BitTorrent) and alert if such programs are observed on monitored hosts.
What’s New in LogRhythm ® Version 5.1




System Monitor Feature Matrix

                                                                   System Monitor                  System Monitor
                                                                            Lite                            Pro
                                                                Windows             UNIX        Windows            UNIX
  Timestamp Normalization                                           X                 X             X                X
  Collection Scheduling                                             X                 X             X                X
  Compressed Data Transmission                                      X                 X             X                X
  Encrypted Data Transmission                                       X                 X             X                X
  Flat File Log Collection                                          X                 X             X                X
  Recursive Flat File Log Collection                             New! 5.1          New! 5.1      New! 5.1         New! 5.1
  Windows Event Log Collection                                      X                               X
  Remote Windows Event Log Collection                               X                               X
  Integrated UDP Syslog Server                                      X              New! 5.1         X             New! 5.1
  Integrated TCP Syslog Server                                      X              New! 5.1         X             New! 5.1
  Integrated Netflow Server v1 and v5                                                               X
  Integrated Netflow Server v9                                                                   New! 5.1
  Integrated SNMP Trap Receiver                                                                  New! 5.1
  Remote Checkpoint Firewall Log Collection (via LEA)                                               X
  Remote Cisco IDS Log Collection (via (SDEE)                                                       X
  Remote Database Log Collection (UDLA)                                                             X
  System Performance Monitoring                                     X                 X             X                X
  Data Loss Defender                                                X                               X
  File Integrity Monitoring                                                                         X                X
  Process Monitor                                                New! 5.1          New! 5.1      New! 5.1         New! 5.1
  Network Connection Monitor                                     New! 5.1          New! 5.1      New! 5.1         New! 5.1
  User Activity Monitoring                                          X                 X             X                X




New Meta-data Fields and Resolution Enhancements
In 5.1, new meta-data fields have been introduced. We also improve how some derived values are determined. These are
very significant changes in terms of what information is presented for every log message and event. These new fields and
enhancements provide immediate value from an analysis, reporting, and alerting standpoint. They have also been
implemented to prepare for additional automated and visual analysis capabilities planned in future releases.

        NOTE: It is very important the Administrator of LogRhythm understands how the configuration of your
        deployment affects how these fields are determined and as a result, their usefulness throughout the product.
        Please refer to online help to learn more or contact support for additional information.


New Meta-Data Fields
Origin & Impacted Entity
The Origin Entity is the Entity to which the Origin Host is associated. The Impacted Entity is the Entity to which the
Impacted Host is associated. Because Entities typically map to physical operating locations or classes of systems, these
two fields provide very useful context in terms of understanding the Entity from which the action (i.e., attack, logon)
originated and the Entity impacted by the action. The introduction of these fields enable analysis, reporting and alerting
based on the Entity in which the Origin or Impacted Host resides.
What’s New in LogRhythm ® Version 5.1



        Use Case
        Report and alert on authentication activity across Entity boundaries. For instance if each entity were a separate
        business unit, this report would be of authentications between business units.

Origin & Impacted Network
The Origin Network is the network to which the Origin Host is associated. The Impacted Network is the Network to
which the Impacted Host is associated. These two fields provide very useful context when analyzing Host-to-Network
and Network-to-Network relationships. The introduction of these fields enable analysis, reporting and alerting based on
the Network in which the Origin or Impacted Host resides.

        Use Case
        Report and alert on network traffic between untrusted and trusted networks. For instance, if you had created a
        DMZ Network and a Production Servers Network, you could alert on any activity originating from the DMZ
        Network targeting any host in the Production Servers network.

Origin & Impacted Zone
The Origin Zone is the Zone (Internal, External, DMZ) in which the Origin Host resides. The Impacted Zone is the Zone
in which the Impacted Host resides. The introduction of these fields enable analysis and reporting based on the Zone in
which the Origin or Impacted Host resides.

Origin & Impacted Location
The Origin Location is the location in which the Origin Host resides. The Impacted Location is the location in which the
Impacted Host resides. Location can be presented or considered for filtering at the Country, Region, or City level. These
fields are introduced as part of the new Geolocation feature described below and enable analysis, reporting, and alerting
based on geographic location


Meta-Data Field Resolution Enhancements
The approach for deriving the following fields has been modified and improved in LogRhythm 5.1. Although these
improvements should not negatively affect an existing deployment, it is important to understand how these fields are
determined based on your configuration.

                Known Origin Host                       Origin Zone*
                Known Impacted Host                     Impacted Zone*
                Known Origin Network*                   Direction
                Known Impacted Network*

    * NOTE: Although these fields are listed as new in 5.1, the fields did exist in previous versions. However, they were
    minimally exposed or completely hidden from the end-user. In 5.1 how these fields are determined has changed
    and the fields are visible and usable directly by the end-user.


Log Analysis Features and Improvements
Geolocation
Ever wonder where an attack originated from geographically or where data was sent to? With LogRhythm Geolocation
wonder no more. LogRhythm‟s Geolocation capability can provide city level location awareness for every Origin and
Impacted Host represented in a log message. This capability is implemented at the Log Manager layer meaning EVERY
log collected by LogRhythm can have Geolocation information assigned. Geolocation information is assigned to a log
based on static assignment and automatic resolution.

Static location assignment is available to all 5.1 users. This capability allows you to assign specific locations to Known
Hosts and Networks that will be used during log processing to assign location to Origin and Impacted Hosts.
What’s New in LogRhythm ® Version 5.1




Automatic location resolution requires a separate software license purchased on an annual subscription basis. Automatic
location resolves public IP addresses to the last known physical location. The list of last known locations is provided via
the LogRhythm knowledge base and updated periodically. Country-level resolution accuracy is 99.9% with city level
resolution accuracy around 95%. Annual license fees for this functionality are $1,000, $2,500 and $5,000 for
LR500/LRX1, LR1000/LRX2 and LR2000/LRX3 XM and LM models respectively. If you are interested in licensing this
capability, please contact your LogRhythm Customer Relationship Manager at (303) 413-8745.

Geolocation information is available in Personal Dashboard, Investigator, and Tail. It is also available in Reports
targeting the Event Manager or Log Managers. Geolocation information is not currently available in Log Miner or
LogMart. Geolocation criteria can be specified for searches and for reports. Criteria can also be specified for Alarm
Rules and Global Log Processing Rules.

        Use Case
        Report and alert on remote authentication activity originating from locations outside expected states and/or
        countries.

        Use Case
        Report and alert on data transfers from sensitive servers to locations outside known and authorized geographic
        operating locations.

Network Visualization
A new tool has been added to Investigator for visually describing the relationships between hosts as represented in log
data. This tool maps the relationships between hosts as contained within configurable containers such as Zone (i.e., DMZ,
Internal), Location, and Network. Failure and security conditions are depicted with red links. Line width represents the
relative amount of activity between related hosts or host containers. “Mousing” over hosts or host containers provides
summary statistics such as kilobytes of traffic, packet counts, and log counts. This tool provides a revolutionary new way
of looking at log data containing information on host-to-host interactions.

The following screenshot depicts Port 80 and 443 traffic.
What’s New in LogRhythm ® Version 5.1



New Investigator and Personal Dashboard Charts
Two new charts have been added to Investigator and Personal Dashboard:
      Logs by Day and Hour
      Logs by Day of Week and Hour of Day

       Use Case
       Analyze VPN activity by day and hour of day to visually see the frequency and pattern of VPN authentications.
       Identify anomalous trends in VPN activity based on daily averages and/or time-of-day.
What’s New in LogRhythm ® Version 5.1



New Investigator Meta-Data Charts
Three new charts have been added to the Meta-data Statistics tool within Investigator. These three charts provide a visual
display of every unique meta-data value compared to all other values across the number of logs, the amount of data
sent/received, and the number of packets sent/received. These charts are designed to provide visual trending and easy
identification of anomalous activity. Following is a screenshot of the three new charts for a meta-data statistics pain
configured to show Impacted Host.
         Impacted Hosts by Log Count
         Impacted Host by KBytes In/Out
         Impacted Host by Items In/Out




Time-based Drill-Down Improvements
An improved drill-down mechanism has been introduced for all charts that show activity by time. In previous versions of
LogRhythm, you were able to drill down on an individual point representing a time range. In 5.1, this capability remains
and added is the ability to select a range of time. In any time-based chart simply click and hold the left mouse button and
drag the mouse to the right until at the end of the range. Release the left mouse button and double click into the
highlighted area to drill-down.
What’s New in LogRhythm ® Version 5.1




Reporting New Features and Improvements
Custom Report Templates
You can now create your own report templates if the provided out-of-the box templates do not suit your organization‟s
needs. Both detail and summary templates can be created via a Wizard based tool. All log message properties can be used
with a variety of grouping and sorting options. The result is near infinite possibilities in terms of what you want included
in a report. This capability combined with LogRhythm‟s previous reporting capabilities provides near limitless reporting
options.
What’s New in LogRhythm ® Version 5.1



Custom Report Branding
You can now replace the LogRhythm logo that is printed on reports to an image of your choosing. This is done by
selecting File > Options from the Report Center and checking the „Use Custom Logo‟ checkbox.




Event Management New Features and Improvements
Batch Alarm Record management
You can now select multiple alarms in Alarm Viewer and edit their status/comments in batch.
What’s New in LogRhythm ® Version 5.1



Personal Dashboard Shared Filters
The filtering function within Personal Dashboard has been significantly improved. Filters are easier to create and manage
with more powerful filtering options. In addition, Personal Dashboard Filters can be shared across the LogRhythm user
base.

        Use Case
        Configure shared Personal Dashboard Filters for security analyst team and helpdesk operations. When these
        users access their Personal Dashboard, the events displayed are automatically filtered based on their job
        function.


Administration New Features and Improvements
Batch System Monitor Agent Editing
All properties of a System Monitor can now be edited in batch. This simplifies the administration of deployments where
large numbers of System Monitors are deployed.

Batch Host and Network Editing
Hosts and Networks can now be edited in batch. The following properties are available for batch editing:
        Zone
        Location
        Risk Level
        Threat Level

Right Click Add Host
Ever wished you could add a host from a log message you are analyzing to LogRhythm‟s list of Known Hosts? Wish no
more. A new context menu is available off Log/Event lists. Simply select the log or event containing the host you wish to
add and select to add Origin or Impacted Host as a Known Host.




•

    LogRhythm Headquarters                   LogRhythm EMEA                           LogRhythm Asia Pacific Ltd.
    3195 Sterling Circle                     Siena Court, The Broadway                8/F Exchange Square II
    Boulder, CO                              Maidenhead Berkshire SL6 1NJ             8 Connaught Place, Central,
    80301                                    United Kingdom                           Hong Kong
    303-413-8745                             +44 (0) 1628 509 070                     +852 2297 2812

More Related Content

PPSX
FD.io Vector Packet Processing (VPP)
PDF
Hackerworkshop exercises
PDF
TekSIP Datasheet
PDF
2008-09-09 IBM Interaction Conference, Red Hat Update for System z
PPTX
Txt Introduction
PDF
Emerging Persistent Memory Hardware and ZUFS - PM-based File Systems in User ...
PDF
Integrity Protection for Embedded Systems
PDF
2009-01-20 RHEL 5.3 for System z
FD.io Vector Packet Processing (VPP)
Hackerworkshop exercises
TekSIP Datasheet
2008-09-09 IBM Interaction Conference, Red Hat Update for System z
Txt Introduction
Emerging Persistent Memory Hardware and ZUFS - PM-based File Systems in User ...
Integrity Protection for Embedded Systems
2009-01-20 RHEL 5.3 for System z

What's hot (20)

PDF
DPDK In Depth
PDF
OpenZFS - AsiaBSDcon
PDF
Foss Gadgematics
PDF
EBPF and Linux Networking
PDF
Introduction to eBPF
PDF
OSMC 2009 | net-snmp: The forgotten classic by Dr. Michael Schwartzkopff
PDF
OpenZFS code repository
PPTX
Devicemgmt
PPTX
SC'18 BoF Presentation
PDF
DockerCon 2017 - Cilium - Network and Application Security with BPF and XDP
PDF
Ryu: network operating system
PDF
Enterprise ids-columbus securitysummit-02
PDF
OpenZFS Channel programs
PDF
Data Plane and VNF Acceleration Mini Summit
ODP
Firewalld : A New Interface to Your Netfilter Stack
PDF
LF_DPDK_Mellanox bifurcated driver model
PDF
Kernel Recipes 2016 - New hwmon device registration API - Jean Delvare
PPT
OpenFlow tutorial
PPTX
Vigor 3910 docker firmware quick start
PDF
OpenWrt From Top to Bottom
DPDK In Depth
OpenZFS - AsiaBSDcon
Foss Gadgematics
EBPF and Linux Networking
Introduction to eBPF
OSMC 2009 | net-snmp: The forgotten classic by Dr. Michael Schwartzkopff
OpenZFS code repository
Devicemgmt
SC'18 BoF Presentation
DockerCon 2017 - Cilium - Network and Application Security with BPF and XDP
Ryu: network operating system
Enterprise ids-columbus securitysummit-02
OpenZFS Channel programs
Data Plane and VNF Acceleration Mini Summit
Firewalld : A New Interface to Your Netfilter Stack
LF_DPDK_Mellanox bifurcated driver model
Kernel Recipes 2016 - New hwmon device registration API - Jean Delvare
OpenFlow tutorial
Vigor 3910 docker firmware quick start
OpenWrt From Top to Bottom
Ad

Viewers also liked (20)

PDF
LogRhythm Web Rhythm Data Sheet
PDF
LogRhythm Advanced Agent Data Sheet
PDF
Securityanalytics
PDF
LogRhythm Training Syllabus Data Sheet
PPTX
Demo how to detect ransomware with alien vault usm_gg
PDF
8 Reasons to Choose Logrhythm
PPTX
Detecting and Blocking Suspicious Internal Network Traffic
PPTX
Introducing Oracle Audit Vault and Database Firewall
PDF
Activated Charcoal - Making Sense of Endpoint Data
PPTX
SIEM 101: Get a Clue About IT Security Analysis
PPTX
Malware detection how to spot infections early with alien vault usm
PDF
SIEM evolution
PPTX
Security Monitoring using SIEM null bangalore meet april 2015
PDF
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
PPTX
Implementing and Running SIEM: Approaches and Lessons
PDF
How to Choose the Right Security Information and Event Management (SIEM) Solu...
PDF
SIEM Architecture
PPTX
Beginner's Guide to SIEM
PDF
SIEM vs Log Management - Data Security Solutions 2011
PDF
From SIEM to SA: The Path Forward
 
LogRhythm Web Rhythm Data Sheet
LogRhythm Advanced Agent Data Sheet
Securityanalytics
LogRhythm Training Syllabus Data Sheet
Demo how to detect ransomware with alien vault usm_gg
8 Reasons to Choose Logrhythm
Detecting and Blocking Suspicious Internal Network Traffic
Introducing Oracle Audit Vault and Database Firewall
Activated Charcoal - Making Sense of Endpoint Data
SIEM 101: Get a Clue About IT Security Analysis
Malware detection how to spot infections early with alien vault usm
SIEM evolution
Security Monitoring using SIEM null bangalore meet april 2015
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
Implementing and Running SIEM: Approaches and Lessons
How to Choose the Right Security Information and Event Management (SIEM) Solu...
SIEM Architecture
Beginner's Guide to SIEM
SIEM vs Log Management - Data Security Solutions 2011
From SIEM to SA: The Path Forward
 
Ad

Similar to What's New Logrhythm 5.1 Data Sheet (20)

PDF
LWdatasheet
PPT
Unix Web servers and FireWall
PDF
Linux on System z Update: Current & Future Linux on System z Technology
PDF
Linux firmware for iRMC controller on Fujitsu Primergy servers
PDF
Monitoring&Logging - Stanislav Kolenkin
PDF
Building complex and modular RIAs with OSGi and Flex
PDF
Rhel7 vs rhel6
PDF
What's New in RHEL 6 for Linux on System z?
DOCX
Linux Implementation ProposalRichard JohnsonWhy Linux .docx
PDF
#OSSPARIS19 - Tuto de première installation de VITAM, un système d'archivage ...
PDF
OSMC 2011 | Safed as an agent for supporting a central collection of events w...
ODP
Graphical libraries
PDF
HP ProLiant Value Add tools
PDF
OSDC 2011 | RedHat Satellite - Einsatzweise und Möglichkeiten by Dirk Hermann
PPT
comparing windows and linux ppt
PPTX
Kostas Tzoumas - Apache Flink®: State of the Union and What's Next
PDF
VMware ThinApp 4.5
ODP
Open Source Monitoring Tools Shootout
PPT
The X Window System Graphical User Interface
DOCX
Prizm Installation Guide
LWdatasheet
Unix Web servers and FireWall
Linux on System z Update: Current & Future Linux on System z Technology
Linux firmware for iRMC controller on Fujitsu Primergy servers
Monitoring&Logging - Stanislav Kolenkin
Building complex and modular RIAs with OSGi and Flex
Rhel7 vs rhel6
What's New in RHEL 6 for Linux on System z?
Linux Implementation ProposalRichard JohnsonWhy Linux .docx
#OSSPARIS19 - Tuto de première installation de VITAM, un système d'archivage ...
OSMC 2011 | Safed as an agent for supporting a central collection of events w...
Graphical libraries
HP ProLiant Value Add tools
OSDC 2011 | RedHat Satellite - Einsatzweise und Möglichkeiten by Dirk Hermann
comparing windows and linux ppt
Kostas Tzoumas - Apache Flink®: State of the Union and What's Next
VMware ThinApp 4.5
Open Source Monitoring Tools Shootout
The X Window System Graphical User Interface
Prizm Installation Guide

More from jordagro (19)

PDF
LogRhythm Alerting on the Absence of an Event Use Case UK
PDF
LogRhythm Zero Day Exploits Use Case
PDF
LogRhythm Visualization Use Case
PDF
LogRhythm Time-to-Value Use Case
PDF
LogRhythm Rapid Forensics Use Case
PDF
LogRhythm Privileged Use Monitoring Use Case
PDF
LogRhythm Operations Use Case
PDF
LogRhythm Geolocation Use Case
PDF
LogRhythm E Phi Use Case
PDF
LogRhythm Siem 2.0 Flyer
PDF
LogRhythm Professional Services Overview Data Sheet
PDF
LogRhythm PowerTech Interact Data Sheet
PDF
LogRhythm Advanced Intelligence Engine Data Sheet
PDF
LogRhythm Visualize This Data Sheet
PDF
LogRhythm Overview Data Sheet
PDF
LogRhythm FIPS Data Sheet
PDF
LogRhythm High Availability Solutions Data Sheet
PDF
File Integrity Monitoring Data Sheet
PDF
LogRhythm Appliance Data Sheet
LogRhythm Alerting on the Absence of an Event Use Case UK
LogRhythm Zero Day Exploits Use Case
LogRhythm Visualization Use Case
LogRhythm Time-to-Value Use Case
LogRhythm Rapid Forensics Use Case
LogRhythm Privileged Use Monitoring Use Case
LogRhythm Operations Use Case
LogRhythm Geolocation Use Case
LogRhythm E Phi Use Case
LogRhythm Siem 2.0 Flyer
LogRhythm Professional Services Overview Data Sheet
LogRhythm PowerTech Interact Data Sheet
LogRhythm Advanced Intelligence Engine Data Sheet
LogRhythm Visualize This Data Sheet
LogRhythm Overview Data Sheet
LogRhythm FIPS Data Sheet
LogRhythm High Availability Solutions Data Sheet
File Integrity Monitoring Data Sheet
LogRhythm Appliance Data Sheet

Recently uploaded (20)

DOC
Bishop's毕业证学历认证,维耶蒙特利尔学校毕业证毕业证文凭
PPTX
Sports Writing by SHS Teacher Roel A. Naza
DOCX
NFL Dublin Addison Returns Home To Haunt Pittsburgh.docx
PDF
Best All-Access Digital Pass me .... pdf
DOCX
NFL Dublin Who Will Rise as Super Bowl 60 Champs.docx
PDF
FIFA World Cup Scaloni Hopeful for Messi’s FIFA World Cup 2026 Participation.pdf
DOCX
FIFA World Cup Semi Final: Lionel Messi one win from crowning glory after Arg...
PPTX
Best All-Access Digital Pass me .pptxxxx
PDF
BOOK MUAYTHAI THAI FIGHT ALEXANDRE BRECK
DOCX
FIFA World Cup Semi Final The Battle for Global Supremacy.docx
DOCX
How FIFA 2026 Is Changing Vancouver Before Kickoff.docx
PPT
Aboriginals Achievements in Society and Community Development
DOCX
From Playgrounds to Pitches Empowering the Next Generation.docx
PDF
Download GTA 5 For PC (Windows 7, 10, 11)
PPTX
sports performance data analysics for sports
DOCX
North Texas announced as base camps for 2026 FIFA World Cup.docx
DOCX
NFL Dublin Will Howard’s Preseason Be Over After Hand Injury.docx
DOCX
NFL Dublin Vikings Turn to Speed with Tai Felton.docx
DOCX
NFL Dublin Injury Ends Season for Former Vikings Standout.docx
PPTX
Performance Analytics in the field of sports.pptx
Bishop's毕业证学历认证,维耶蒙特利尔学校毕业证毕业证文凭
Sports Writing by SHS Teacher Roel A. Naza
NFL Dublin Addison Returns Home To Haunt Pittsburgh.docx
Best All-Access Digital Pass me .... pdf
NFL Dublin Who Will Rise as Super Bowl 60 Champs.docx
FIFA World Cup Scaloni Hopeful for Messi’s FIFA World Cup 2026 Participation.pdf
FIFA World Cup Semi Final: Lionel Messi one win from crowning glory after Arg...
Best All-Access Digital Pass me .pptxxxx
BOOK MUAYTHAI THAI FIGHT ALEXANDRE BRECK
FIFA World Cup Semi Final The Battle for Global Supremacy.docx
How FIFA 2026 Is Changing Vancouver Before Kickoff.docx
Aboriginals Achievements in Society and Community Development
From Playgrounds to Pitches Empowering the Next Generation.docx
Download GTA 5 For PC (Windows 7, 10, 11)
sports performance data analysics for sports
North Texas announced as base camps for 2026 FIFA World Cup.docx
NFL Dublin Will Howard’s Preseason Be Over After Hand Injury.docx
NFL Dublin Vikings Turn to Speed with Tai Felton.docx
NFL Dublin Injury Ends Season for Former Vikings Standout.docx
Performance Analytics in the field of sports.pptx

What's New Logrhythm 5.1 Data Sheet

  • 1. What’s New in LogRhythm® Version 5.1
  • 2. What’s New in LogRhythm ® Version 5.1 Dear LogRhythm Customers, I am pleased to introduce LogRhythm 5.1, the latest version of our award winning software. I think you will be very happy with the extensive list of new features, capabilities, and improvements introduced. As I think you‟ll come to appreciate, LogRhythm 5.1 is far from a typical minor release. I think this release provides a great balance between core “blocking and tackling” capabilities with leading edge innovation. We have long felt our log data collection and management infrastructure is second-to-none. We continue to invest in this area by adding significant new log collection capabilities including native support for SNMP traps and the latest version of Netflow. We have invested in improving our reporting infrastructure by providing you the ability to create your own templates for determining exactly how you want a report to look. In addition, you can select to use your company logo instead of ours for presentation in a report. We have introduced new meta-data fields and significantly enhanced how some derived meta-data values are determined. We also introduced a variety of new capabilities and improvements for easing the administration of your LogRhythm deployment. On more of the leading-edge innovation front, we have introduced a number of new features that I am personally very excited about. We‟ve added Geolocation, the ability to see where hosts contained in log messages physically reside. While some of our competitors have capabilities in this area, what excites me is that we introduce Geolocation at the log and event layer whereas others have only focused at the event layer. This provides great forensic context for every log message, context that provides a wealth of capabilities today and more in the future. One of those capabilities is leveraged in another new feature called Network Visualization. This is a very powerful visual analysis tool that provides a visual depiction of host-to-host relationships across boundaries such as location. One thing I feel has always differentiated us is our focus on filling the “visibility gaps”. While logs do provide tremendous visibility on their own, often they don‟t provide the complete story. A core capability of the LogRhythm System Monitor is to fill in these gaps at the endpoint. Two new powerful forensic visibility capabilities have been introduced in 5.1. Process Monitor provides independent monitoring of processes running on a host, when they start, and when they stop. Network Monitor provides independent monitoring of listening services, inbound connections, and outbound connections to/from a host. These capabilities, combined with existing endpoint monitoring features (i.e., File Integrity Monitor, DataLoss Defender), provide powerful and unequaled forensic awareness and visibility at the host. I hope you find LogRhythm 5.1 as exciting as we do. The LogRhythm engineering team has worked hard to bring you another quality software release we are very proud of. Sincerely, Chris Petersen CTO, VP Engineering, Co-founder
  • 3. What’s New in LogRhythm ® Version 5.1 Overview This document provides a brief description of new features and the most significant improvements introduced in LogRhythm 5.1. Please refer to the Release Notes for the complete list of new features, improvements, modifications, and known issues found in LogRhythm 5.1. System Monitor Features and Improvements New Operating System Support We have added support for the following operating systems and Linux distributions: HP-UX Linux Debian Linux Ubuntu New Collection Interfaces, Capabilities, and Improvements SNMP Trap Listener The Windows System Monitor now includes an integrated SNMP Trap Listener. SNMP versions 1, 2 and 3 are supported. Netflow v9 The Windows System Monitor now supports Netflow v9 in addition to version 1 and 5. This provides support for the latest version of Netflow shipping with Cisco products. Netflow v9 is also compatible with a variety of non-Cisco products. Recursive Flat File Collection This capability allows for the collection of flat files matching a specific file name pattern that reside in root or child directories. This is ideal for applications (i.e., web servers) that generate new directories containing log files on a daily or weekly basis. Integrated Syslog Server for UNIX and Linux System Monitor The Windows System Monitor has always had an integrated Syslog Listener for receiving UDP and TCP based Syslog. This same capability has been added in UNIX and Linux versions of the System Monitor. This is ideal for extending the collection infrastructure in *NIX-centric environments where a single agent can collect and forward Syslog from the entire environment. Checkpoint Firewall/VPN Secure Configuration Verification (SCV) Support The Windows System Monitor now supports collection of logs generated via Checkpoint‟s Secure Configuration Verification module. Windows Remote Event Log Connection Optimization The number and frequency of new connections required to collect Event Logs remotely has been significantly reduced. This results in overall performance improvements and reduces the number of logs written to the Windows Security Event log as a result of remote collection activity.
  • 4. What’s New in LogRhythm ® Version 5.1 Windows 1252 Codepage Extended ASCII support Log messages containing Extended ASCII characters for languages included in the Windows 1252 codepage will be collected and presented in native language. This includes the following languages: Afrikaans Finnish Malay Basque French Norwegian Catalan Galician Portuguese Danish German Spanish Dutch Icelandic Swahili English Indonesian Swedish Faroese Italian New Forensic Visibility and Awareness Features A tenet of LogRhythm‟s vision is to provide profound visibility into the operating environment. We do this to help our customers better understand the environment as it affects or is impacted by security, operations, and compliance/audit events. In LogRhythm 5.1, we have introduced two significant features that provide forensic awareness into the activity of a host. Network Connection Monitor This feature provides an audit trail of connections to and from the host on which the System Monitor is installed. We also detect and log listening services. This is an optional capability available in System Monitor Lite that can provide constant or on-demand visibility into how a host is interacting on the LAN, WAN and Internet. Use Case Deploy System Monitors and enable Network Connection Monitor on servers in a DMZ and alert on unauthorized connections from DMZ hosts to hosts on the Internet or inside the trusted network. Use Case Deploy System Monitors and enable Network Connection Monitor on key servers and alert if observe network connection initiating directly from the Internet or other unauthorized networks. Process Monitor This feature provides an audit trail of processes running on a host. Logs are generated whenever a new process or program starts or a previously running process or program stops. This is an optional capability available in System Monitor Lite that can provide constant or on-demand visibility into what processes and applications a host is running. Use Case Deploy System Monitors and enable Process Monitor on key servers. Create a whitelist of authorized programs and alert if any program is observed not in the approved whitelist. Use Case Deploy System Monitors and enable Process Monitor on user desktops. Create a blacklist of high-risk unauthorized programs (i.e., BitTorrent) and alert if such programs are observed on monitored hosts.
  • 5. What’s New in LogRhythm ® Version 5.1 System Monitor Feature Matrix System Monitor System Monitor Lite Pro Windows UNIX Windows UNIX Timestamp Normalization X X X X Collection Scheduling X X X X Compressed Data Transmission X X X X Encrypted Data Transmission X X X X Flat File Log Collection X X X X Recursive Flat File Log Collection New! 5.1 New! 5.1 New! 5.1 New! 5.1 Windows Event Log Collection X X Remote Windows Event Log Collection X X Integrated UDP Syslog Server X New! 5.1 X New! 5.1 Integrated TCP Syslog Server X New! 5.1 X New! 5.1 Integrated Netflow Server v1 and v5 X Integrated Netflow Server v9 New! 5.1 Integrated SNMP Trap Receiver New! 5.1 Remote Checkpoint Firewall Log Collection (via LEA) X Remote Cisco IDS Log Collection (via (SDEE) X Remote Database Log Collection (UDLA) X System Performance Monitoring X X X X Data Loss Defender X X File Integrity Monitoring X X Process Monitor New! 5.1 New! 5.1 New! 5.1 New! 5.1 Network Connection Monitor New! 5.1 New! 5.1 New! 5.1 New! 5.1 User Activity Monitoring X X X X New Meta-data Fields and Resolution Enhancements In 5.1, new meta-data fields have been introduced. We also improve how some derived values are determined. These are very significant changes in terms of what information is presented for every log message and event. These new fields and enhancements provide immediate value from an analysis, reporting, and alerting standpoint. They have also been implemented to prepare for additional automated and visual analysis capabilities planned in future releases. NOTE: It is very important the Administrator of LogRhythm understands how the configuration of your deployment affects how these fields are determined and as a result, their usefulness throughout the product. Please refer to online help to learn more or contact support for additional information. New Meta-Data Fields Origin & Impacted Entity The Origin Entity is the Entity to which the Origin Host is associated. The Impacted Entity is the Entity to which the Impacted Host is associated. Because Entities typically map to physical operating locations or classes of systems, these two fields provide very useful context in terms of understanding the Entity from which the action (i.e., attack, logon) originated and the Entity impacted by the action. The introduction of these fields enable analysis, reporting and alerting based on the Entity in which the Origin or Impacted Host resides.
  • 6. What’s New in LogRhythm ® Version 5.1 Use Case Report and alert on authentication activity across Entity boundaries. For instance if each entity were a separate business unit, this report would be of authentications between business units. Origin & Impacted Network The Origin Network is the network to which the Origin Host is associated. The Impacted Network is the Network to which the Impacted Host is associated. These two fields provide very useful context when analyzing Host-to-Network and Network-to-Network relationships. The introduction of these fields enable analysis, reporting and alerting based on the Network in which the Origin or Impacted Host resides. Use Case Report and alert on network traffic between untrusted and trusted networks. For instance, if you had created a DMZ Network and a Production Servers Network, you could alert on any activity originating from the DMZ Network targeting any host in the Production Servers network. Origin & Impacted Zone The Origin Zone is the Zone (Internal, External, DMZ) in which the Origin Host resides. The Impacted Zone is the Zone in which the Impacted Host resides. The introduction of these fields enable analysis and reporting based on the Zone in which the Origin or Impacted Host resides. Origin & Impacted Location The Origin Location is the location in which the Origin Host resides. The Impacted Location is the location in which the Impacted Host resides. Location can be presented or considered for filtering at the Country, Region, or City level. These fields are introduced as part of the new Geolocation feature described below and enable analysis, reporting, and alerting based on geographic location Meta-Data Field Resolution Enhancements The approach for deriving the following fields has been modified and improved in LogRhythm 5.1. Although these improvements should not negatively affect an existing deployment, it is important to understand how these fields are determined based on your configuration. Known Origin Host Origin Zone* Known Impacted Host Impacted Zone* Known Origin Network* Direction Known Impacted Network* * NOTE: Although these fields are listed as new in 5.1, the fields did exist in previous versions. However, they were minimally exposed or completely hidden from the end-user. In 5.1 how these fields are determined has changed and the fields are visible and usable directly by the end-user. Log Analysis Features and Improvements Geolocation Ever wonder where an attack originated from geographically or where data was sent to? With LogRhythm Geolocation wonder no more. LogRhythm‟s Geolocation capability can provide city level location awareness for every Origin and Impacted Host represented in a log message. This capability is implemented at the Log Manager layer meaning EVERY log collected by LogRhythm can have Geolocation information assigned. Geolocation information is assigned to a log based on static assignment and automatic resolution. Static location assignment is available to all 5.1 users. This capability allows you to assign specific locations to Known Hosts and Networks that will be used during log processing to assign location to Origin and Impacted Hosts.
  • 7. What’s New in LogRhythm ® Version 5.1 Automatic location resolution requires a separate software license purchased on an annual subscription basis. Automatic location resolves public IP addresses to the last known physical location. The list of last known locations is provided via the LogRhythm knowledge base and updated periodically. Country-level resolution accuracy is 99.9% with city level resolution accuracy around 95%. Annual license fees for this functionality are $1,000, $2,500 and $5,000 for LR500/LRX1, LR1000/LRX2 and LR2000/LRX3 XM and LM models respectively. If you are interested in licensing this capability, please contact your LogRhythm Customer Relationship Manager at (303) 413-8745. Geolocation information is available in Personal Dashboard, Investigator, and Tail. It is also available in Reports targeting the Event Manager or Log Managers. Geolocation information is not currently available in Log Miner or LogMart. Geolocation criteria can be specified for searches and for reports. Criteria can also be specified for Alarm Rules and Global Log Processing Rules. Use Case Report and alert on remote authentication activity originating from locations outside expected states and/or countries. Use Case Report and alert on data transfers from sensitive servers to locations outside known and authorized geographic operating locations. Network Visualization A new tool has been added to Investigator for visually describing the relationships between hosts as represented in log data. This tool maps the relationships between hosts as contained within configurable containers such as Zone (i.e., DMZ, Internal), Location, and Network. Failure and security conditions are depicted with red links. Line width represents the relative amount of activity between related hosts or host containers. “Mousing” over hosts or host containers provides summary statistics such as kilobytes of traffic, packet counts, and log counts. This tool provides a revolutionary new way of looking at log data containing information on host-to-host interactions. The following screenshot depicts Port 80 and 443 traffic.
  • 8. What’s New in LogRhythm ® Version 5.1 New Investigator and Personal Dashboard Charts Two new charts have been added to Investigator and Personal Dashboard: Logs by Day and Hour Logs by Day of Week and Hour of Day Use Case Analyze VPN activity by day and hour of day to visually see the frequency and pattern of VPN authentications. Identify anomalous trends in VPN activity based on daily averages and/or time-of-day.
  • 9. What’s New in LogRhythm ® Version 5.1 New Investigator Meta-Data Charts Three new charts have been added to the Meta-data Statistics tool within Investigator. These three charts provide a visual display of every unique meta-data value compared to all other values across the number of logs, the amount of data sent/received, and the number of packets sent/received. These charts are designed to provide visual trending and easy identification of anomalous activity. Following is a screenshot of the three new charts for a meta-data statistics pain configured to show Impacted Host. Impacted Hosts by Log Count Impacted Host by KBytes In/Out Impacted Host by Items In/Out Time-based Drill-Down Improvements An improved drill-down mechanism has been introduced for all charts that show activity by time. In previous versions of LogRhythm, you were able to drill down on an individual point representing a time range. In 5.1, this capability remains and added is the ability to select a range of time. In any time-based chart simply click and hold the left mouse button and drag the mouse to the right until at the end of the range. Release the left mouse button and double click into the highlighted area to drill-down.
  • 10. What’s New in LogRhythm ® Version 5.1 Reporting New Features and Improvements Custom Report Templates You can now create your own report templates if the provided out-of-the box templates do not suit your organization‟s needs. Both detail and summary templates can be created via a Wizard based tool. All log message properties can be used with a variety of grouping and sorting options. The result is near infinite possibilities in terms of what you want included in a report. This capability combined with LogRhythm‟s previous reporting capabilities provides near limitless reporting options.
  • 11. What’s New in LogRhythm ® Version 5.1 Custom Report Branding You can now replace the LogRhythm logo that is printed on reports to an image of your choosing. This is done by selecting File > Options from the Report Center and checking the „Use Custom Logo‟ checkbox. Event Management New Features and Improvements Batch Alarm Record management You can now select multiple alarms in Alarm Viewer and edit their status/comments in batch.
  • 12. What’s New in LogRhythm ® Version 5.1 Personal Dashboard Shared Filters The filtering function within Personal Dashboard has been significantly improved. Filters are easier to create and manage with more powerful filtering options. In addition, Personal Dashboard Filters can be shared across the LogRhythm user base. Use Case Configure shared Personal Dashboard Filters for security analyst team and helpdesk operations. When these users access their Personal Dashboard, the events displayed are automatically filtered based on their job function. Administration New Features and Improvements Batch System Monitor Agent Editing All properties of a System Monitor can now be edited in batch. This simplifies the administration of deployments where large numbers of System Monitors are deployed. Batch Host and Network Editing Hosts and Networks can now be edited in batch. The following properties are available for batch editing: Zone Location Risk Level Threat Level Right Click Add Host Ever wished you could add a host from a log message you are analyzing to LogRhythm‟s list of Known Hosts? Wish no more. A new context menu is available off Log/Event lists. Simply select the log or event containing the host you wish to add and select to add Origin or Impacted Host as a Known Host. • LogRhythm Headquarters LogRhythm EMEA LogRhythm Asia Pacific Ltd. 3195 Sterling Circle Siena Court, The Broadway 8/F Exchange Square II Boulder, CO Maidenhead Berkshire SL6 1NJ 8 Connaught Place, Central, 80301 United Kingdom Hong Kong 303-413-8745 +44 (0) 1628 509 070 +852 2297 2812