top of page

Automated ARST Content Replication

  • Writer: Pavan Raja
    Pavan Raja
  • Apr 8, 2025
  • 13 min read

Summary:

The provided text outlines several instances of resource removal from systems, focusing on specific types such as filters, stages, rule zones, active lists, session lists, assets, and various user-related resources. These removals are part of a broader effort to exclude certain resource types for further analysis or management. Here's a summary of the key points: 1. **Resource Removal**: Resources including field sets, active channels, dashboards, filters, and more were removed from different administrative sections (ArcSight Administration, Foundation, Solutions, System) in an unspecified system. The removal applies to resources not explicitly mentioned in the document except for Database Table Schema, Field, Filter, Instrument, and Viewer Configuration. 2. **Scope of Exclusion**: Specific types of data and settings such as field sets, active channels, dashboards, filters, and more are being excluded from the platform. The removal is comprehensive, affecting multiple resource types across different areas of the platform. 3. **Resource Types Affected**: Examples include field sets under various administrative categories, active channels, dashboards, and filters within the same sections. 4. **Copyright Information**: The document includes copyright information from Science Applications International Corporation (SAIC), indicating that this action or decision may have been made by SAIC. 5. **Purpose and Context**: While not explicitly stated in the provided text, these removals are likely part of a broader initiative to streamline, secure, or align with specific organizational goals, possibly related to data management, security, or compliance. These key points highlight the specificity of what is being removed and why it might be necessary for the organization to undertake such actions.

Details:

This document outlines a presentation given by Aaron Wilson, Assistant Vice President and Chief Technology Officer at SAIC Managed Security Services, at the ArcSight Protect ‘10 Conference in Washington D.C., September 2010. The focus of the presentation was on "Automated ArcSight ESM" or Enterprise Security Management, discussing its architecture, goals, benefits, operational details, and challenges faced during implementation. Key points include: 1. **ArcSight and SAIC Relationship**: Established in 2004 with a longstanding customer/provider relationship, SAIC has been involved since the twelfth ArcSight customer and has multiple professional services engagements. They are full complement of ArcSight products users and gold sponsors at ArcSight Protect ‘10 conference. 2. **Project Goals and Benefits**: The primary goal was to automate ArcSight ESM processes for better business continuity, ensuring high availability (HA) through redundancy, and minimizing false positives by enhancing the correlation engine and SIEM functionality. SAIC aimed to leverage its expertise in security operations to enhance capabilities of ArcSight ESM. 3. **Architecture Overview**: The presentation detailed the architecture setup including procurement, installation, configuration, and integration of multiple ArcSight products such as Logger, TAM, TRM/NCM, and other standalone solutions. It emphasized the use of SAIC's internal resources to construct a workflow from scratch and enhance existing capabilities through strategic partnerships and training. 4. **How it Works**: The presentation outlined high-level steps in automating ArcSight ESM processes, covering aspects like package preparation, creation, script walkthrough, and pitfalls to avoid during implementation. It highlighted the importance of ensuring business continuity by focusing on assumptions made throughout the process and addressing potential issues encountered during deployment. 5. **Ensuring Business Continuity**: The presentation emphasized the need for redundancy in systems and processes to ensure uninterrupted operations even under security threats or incidents. This includes strategies like data replication, high availability configurations, and effective monitoring tools. 6. **Assumptions and Pitfalls**: Assumptions made during implementation included trust in technology partners and internal resources for seamless integration of new technologies. Known pitfalls were avoiding over-reliance on single vendors, underestimating the complexity of integrating diverse security solutions, and insufficient training for staff to operate the new systems effectively. 7. **Summary and Q&A**: The presentation concluded with a summary of key points discussed, followed by a Q&A session where questions from attendees were addressed regarding specific features or challenges faced during implementation. Reference slides provided further details on technical aspects and outcomes achieved through this initiative. 8. **Scope of Application**: This solution was applicable across various sectors including energy, environment, national security, health, and critical infrastructure, reflecting the broad applicability of enterprise security management solutions to safeguard diverse critical systems from potential threats. This document serves as a comprehensive guide on how SAIC leveraged its expertise in cybersecurity to enhance ArcSight ESM capabilities for clients operating in high-stakes sectors, ensuring robust protection against cyber threats while aiming for operational efficiency and business continuity. This text discusses a set of procedures and their implications for advanced system administrators using ArcSight ESM architecture. The presentation is intended for those comfortable with command line operations, scripting, and other technical tasks typically beyond the scope of general users. It advises that these procedures are not supported by ArcSight Support, and should be thoroughly tested before being applied to production systems. The document highlights key points such as: 1. SAIC is not responsible for any damages or data loss resulting from implementation of this procedure. 2. The intended audience requires a high level of technical skill including command line use, scheduling, scripting, and working with XML. 3. If users feel uncomfortable with these procedures, they should consider using SAIC's Managed Security Services or ArcSight Professional Services for assistance. The content is focused on setting up a centralized network operations center (NOSC) equipped with capabilities like VPNs to manage distributed systems effectively. The primary goal is to ensure all sites receive the latest content updates including custom assets, networks, zones, and other related configurations. The presentation emphasizes that while it provides worked examples of what has been successful for others, individual outcomes may vary due to inherent differences in system setups and environments. This document outlines a method for transferring content from one ArcSight Event Log Manager (ELM) system to another efficiently. Key benefits include earlier access to investigation content in case of failure, increased savings through reduced administration efforts, and fewer human errors due to content not being subject to additional processing. The process involves removing all current content from the destination system, exporting necessary content from the source system while excluding certain ArcSight base files and user-specific data, backing up this content by copying packages to the destination, and then importing and installing these packages over the network. It is important to avoid using the destination manager during the transfer process as it could lead to resource contention issues. To summarize the provided text, it discusses setting up secure replication between source and destination managers using a script that involves sending package files. The method includes adding secure shell public key authentication with the scponly utility to the replication script, which is intended to be added directly into the script. Post-replication, the manager may need to be restarted, although this process might seem overwhelming due to its complexity even with modular package design. Assumptions made in the context are: 1. Content management is solely performed on the source manager. 2. The content to be replicated will reside within specific top-level folders for each resource type (e.g., "Corp" folder). 3. The destination manager starts fresh with no custom content, and it's assumed that any referenced resources are stable. 4. Communication between the source and destination managers is possible over ports 22 and 8443, supported by sufficient Wide Area Network bandwidth. System preparation involves developing a solution in a nonproduction environment before deploying to production for the first time. During deployment, it's advised to back up system tables and check the destination manager for any custom content before proceeding with replication. The summarized text discusses setting up replication between two managers, with a focus on creating user accounts and managing package imports to ensure smooth operation. Key points include: 1. **User Account Setup**: A user account named "arc_repl" under the "Administrators" group is created for replication purposes. This account should not be included in the "Users" package because it could lead to authentication issues if deleted on the destination manager. 2. **Package Creation**: On the source manager, create a folder "/All Packages/Replication" under the "Packages" tab. Consider raising limits for destination managers during package imports due to modular design, which helps keep sizes small. 3. **Resource Management**: Exclude resources not needed within each specific package to maintain modularity and manageability. This approach simplifies administration and troubleshooting while keeping packages relatively small. 4. **Designing Packages**: Create separate packages for different aspects (e.g., 01_Active_) focusing on modular, self-contained units that are easier to administer and troubleshoot. The provided text outlines a method for preparing content removal in a system, specifically addressing issues with locked items and conflicts that may arise during the process of removing or exporting content. Key points include setting default behaviors for package commands to skip on abort and to handle conflicts without user interaction, which is crucial for automation. Additionally, it provides instructions for adjusting configuration settings within the software environment to accommodate these changes. The provided text outlines a method for removing lingering folder structures after uninstalling content, using the ./arcsight archive tool to aid in this process. Here is a summary of the steps and key points: 1. **Identify Uninstalled Content**: Recognize that some folder structures might remain post-uninstall due to their persistence or other factors. 2. **Use Archive Tool**: Utilize the ./arcsight archive tool specifically for removing these lingering folders. This tool helps in capturing and managing content structure through XML files. 3. **Create an XML File**: Develop an XML file that represents your content structure, detailing all resources such as customers or other groups you wish to remove. 4. **Specify Destination Manager**: Ensure the correct IDs and URIs are obtained by specifying the destination manager responsible for handling these resources. 5. **Capture Folder Structure Example**: Demonstrated with an example where the "Customers" folder in the Networks tab is captured using the command: ```bash /home/arcuser/arcsight/Manager/bin/arcsight archive -uri "/All Networks/Customers/" -m site2-siem.company.com -u arc_repl -p password -f /home/arcuser/repl/networks.xml ``` 6. **Repeat for Other Resources**: Apply similar commands and processes to capture other relevant resource tabs as needed. 7. **Edit XML File**: Modify the XML file by removing subfolder entries and setting action tags to "remove" where applicable. 8. **Example XML Structure**: Here is a condensed example of what such an XML structure might look like: ```xml ``` This method ensures a systematic approach to removing all remnants of uninstalled content, maintaining system integrity and efficiency post-removal. The provided XML and shell script define parameters for removing a group from an archive in a management environment, specifically within the context of an ArcSight SIEM system. Here's a summary of each part: ### XML Summary:

  • **ArchiveCreationParameters**: Contains configuration settings to remove specific resources or groups.

  • **action (remove)**: Indicates that the action is to delete the specified items.

  • **format (default)**: Default format for removing elements, although more details on how this works are not provided in the snippet.

  • **include**: Contains a list of references to be removed:

  • A reference to a group with URI `/All Networks/Customers/` and ID `0Qkj4MWZTABD-GLI32UphcQ==`.

  • The corresponding group definition:

  • **Group**: Specifies the action (remove) for this group.

  • **childOf**: Lists a reference to another group at URI `/All Networks/` with ID `01000100010001040`.

  • **containedResourceType** is set to 40, possibly indicating some type of resource contained within this group.

  • **description** states it's a generated entry.

### Shell Script Summary: The shell script defines several variables for managing and configuring an ArcSight replication setup between two managers (`site1-siem.company.com` to `site2-siem.company.com`), including paths, usernames, passwords, and lists of packages or resources to handle during replication (or in this case, removal).

  • **Variable Definitions**:

  • **Environment Paths**: Defines the home directory for an ArcSight user (`ARCUSER_HOME`) and the main manager installation path (`ARCSIGHT_HOME`). Additional paths include a working directory for replication tasks (`WORKING_DIR`), which is set to `repl`.

  • **User Credentials**: Includes the administrative username (`ADMIN_USER`) and its password (`ADMIN_PASS`).

  • **Manager Hostnames**: Specifies the IP addresses or hostnames of the source (`SRC_MGR`) and destination (`DST_MGR`) managers.

  • **Package Path and Names**: Defines a path for packages to be replicated (`PACKAGE_TREE`), along with lists of package names (`PACKAGES` for normal order, `PACKAGES_REVERSE` for reverse order) that need to be handled during replication or removal tasks.

These scripts are crucial for automating the setup and maintenance of complex systems like ArcSight within a large organization, where multiple environments and configurations need to be managed consistently across different sites. The text provided outlines a series of tasks related to managing XML files and packages using a shell script, specifically for use with an ArcSight product. Here's a summary of each part described in the text: 1. **Define Variable for XML Files**:

  • A variable `XMLFILES` is defined containing a list of strings that represent different types of data (e.g., "packagetreenetworks locations datamonitors"). This setup implies that these strings are identifiers for specific XML files or directories related to the ArcSight system.

2. **Part 1: Content Removal**:

  • Uninstall packages in reverse order using a tool called `arcsight package`. The script iterates over the list of packages defined by `PACKAGES_REVERSE`, and for each, it executes an uninstall command with specific parameters like conflict handling and authentication details.

  • It also removes lingering folder structures by invoking the `arcsight archive` tool to delete specified files related to these packages. These files are identified from the previously defined list `XMLFILES`.

3. **Part 2: Content Removal (continued)**:

  • This section continues with more detailed steps for uninstalling and removing leftover content, as per the instructions provided in the previous part of the text. It involves interacting with the ArcSight environment to ensure all specified package removals are completed without conflicts.

4. **Part 3: Exporting and Importing Content**:

  • The script starts by exporting packages from the source manager. For each package listed under `PACKAGES`, it runs a command that exports the package into a specific format (`.arb`) which can be used as an archive or for transfer between different managers or systems. This involves specifying paths, authentication details, and other necessary parameters to complete this task.

  • After exporting, the script then imports these packages into the destination manager in a similar manner. Each exported package is imported back into its appropriate place within the management hierarchy using commands that closely mirror those used during export.

The text appears to be documentation for setting up and running scripts within an ArcSight environment, detailing how to manage and transfer data by exporting and importing XML files or related content from various locations identified as part of the `XMLFILES` list. This setup is crucial for maintaining and updating systems that rely on these specific types of information managed through ArcSight solutions. The text discusses a script used to install packages onto a destination manager using the ArcSight software by Science Applications International Corporation (SAIC). The script involves looping through each package in the PACKAGES variable and executing an "arcsight package -action install" command with specific parameters, including action type, conflict resolution, destination manager, admin user, password, and package path. The installation process includes a sleep command to allow the manager time to recompile and properly digest the installed packages. However, if the installation does not work as expected, troubleshooting steps should be followed: 1. Run the ./arcsight rescheck tool to identify and fix any resource reference issues. 2. Inspect package contents for personal or production content that may have been linked incorrectly. 3. Ensure there are no links from custom content to ArcSight default content. 4. Review logs and Java errors for further clues about what went wrong. Regular maintenance should include checking replication logs, running the ./arcsight rescheck tool regularly, and addressing issues caused by continually evolving content or automatic skipping of dependent resources during package export. C and SAIC logo are registered trademarks belonging to Science Applications International Corporation (SAIC). This text highlights some key points about proper package design, trial and error during initial attempts, maintenance requirements for dynamic content, and suggests potential improvements such as integrated/automated multisite capabilities in ArcSight ESM. The discussion also covers various sectors including Energy, Environment, National Security, Health, and Critical Infrastructure, mentioning that the provided slides show which resources were removed or excluded from each package to modularize them. The text provides information about a large data set that caused issues for the destination manager. It mentions several resource types and categories being excluded from this dataset, including active lists, asset categories, zones, assets, and filters. Specific exclusions listed include Data Monitor, Query, Rule, User; Open Port/TCP, Open Port/UDP, all site asset categories, system asset categories, ArcSight System Administration; Active Channel, Asset, Asset Range, Data Monitor, Field Set, Filter, Query, User, Zone; and Scanner Report, Vulnerability. This text outlines the removal of various resources and configurations from an ArcSight system. The removed items include filters, stages, rule zones, active lists, session lists, and specific asset types such as Asset, Asset Range, Case, Customer, User, and Zone. These removals are part of a broader effort to exclude certain resource types and focus on database table schema, field, filter, instrument, stage, and viewer configurations for further analysis or management. The document is associated with the fields of Energy, Environment, National Security, Health, and Critical Infrastructure, and it is copyrighted by Science Applications International Corporation (SAIC). The document outlines a removal and exclusion of various resources from an unspecified system or platform, focusing on specific categories such as field sets, active channels, dashboards, filters, and more. Key points include: 1. **Resource Removal**: Resources including field sets, active channels, dashboards, and filter configurations under different administrative sections (ArcSight Administration, Foundation, Solutions, System) have been removed or excluded from the platform. 2. **Scope of Exclusion**: The removal applies to resources not explicitly mentioned in the document except for Database Table Schema, Field, Field Set, Filter, Instrument, and Viewer Configuration. This suggests that only specific types of data and settings are affected by these removals. 3. **Resource Types Affected**: Examples include field sets under various administrative categories, active channels, dashboards, and filters within the same sections. The removal is comprehensive, affecting multiple resource types across different areas of the platform. 4. **Copyright Information**: The document includes copyright information from Science Applications International Corporation (SAIC), indicating that this action or decision may have been made by SAIC. 5. **Purpose and Context**: While not explicitly stated in the provided text, these removals are likely part of a broader initiative to streamline, secure, or align with specific organizational goals, possibly related to data management, security, or compliance. This summary highlights key aspects of the document regarding the removal and exclusion of resources from a platform, emphasizing the specificity of what is being removed and why it might be necessary for the organization. The document outlines a removal of various resources from an unspecified system, focusing on specific types such as report templates, queries, trends, reports, users, and destinations. Key points include: 1. **Report Templates**: All except for Database Table Schema, Field, Instrument, Report Template, and Viewer Configuration were removed. 2. **Queries**: Excluded everything except the specified resources from four main categories (ArcSight Administration, ArcSight Foundation, ArcSight Solutions, and ArcSight System) was removed. 3. **Trends**: Everything except for Database Table Schema, Field, Filter, Instrument, Query, Trend, and Viewer Configuration was excluded. 4. **Reports**: Similar to trends, all resources except those specified were removed. 5. **Users**: Specific users (admin, arc_repl) and connectors were removed, with everything else related to user management being excluded. 6. **Destinations**: Users/Administrators specific to admin and arc_repl were removed, while excluding other destinations as well. These removals are part of a broader effort to streamline or clean up the system, focusing on maintaining only the necessary resources for effective administration and functionality. The provided text does not contain a summary statement or any information to summarize. Please provide the text you would like summarized, and I will assist you in crafting an accurate and concise summary.

Disclaimer:
The content in this post is for informational and educational purposes only. It may reference technologies, configurations, or products that are outdated or no longer supported. If there are any comments or feedback, kindly leave a message and will be responded.

Recent Posts

See All
Zeus Bot Use Case

Summary: "Zeus Bot Version 5.0" is a document detailing ArcSight's enhancements to its Zeus botnet detection capabilities within the...

 
 
 
Windows Unified Connector

Summary: The document "iServe_Demo_System_Usage_for_HP_ESP_Canada_Solution_Architects_v1.1" outlines specific deployment guidelines for...

 
 
 

Comments


@2021 Copyrights reserved.

bottom of page