This website uses cookies. By clicking Accept, you consent to the use of cookies. Click Here to learn more about how we use cookies.
Accept
Reject

NetWitness Community

  • Home
  • Products
    • NetWitness Platform
      • Advisories
      • Documentation
        • Platform Documentation
        • Known Issues
        • Security Fixes
        • Hardware Documentation
        • Threat Content
        • Unified Data Model
        • Videos
      • Downloads
      • Integrations
      • Knowledge Base
    • NetWitness Cloud SIEM
      • Advisories
      • Documentation
      • Knowledge Base
    • NetWitness Detect AI
      • Advisories
      • Documentation
      • Knowledge Base
    • NetWitness Investigator
    • NetWitness Orchestrator
      • Advisories
      • Documentation
      • Knowledge Base
      • Legacy NetWitness Orchestrator
        • Advisories
        • Documentation
  • Community
    • Blog
    • Discussions
    • Events
    • Idea Exchange
  • Support
    • Case Portal
      • Create New Case
      • View My Cases
      • View My Team's Cases
    • Community Support
      • Getting Started
      • News & Announcements
      • Community Support Forum
      • Community Support Articles
    • Product Life Cycle
    • Support Information
    • General Security Advisories
  • Training
    • Blog
    • Certification Program
    • Course Catalog
      • Netwitness XDR
      • EC-Council Training
    • New Product Readiness
    • On-Demand Subscriptions
    • Student Resources
    • Upcoming Events
    • Role-Based Training
  • Technology Partners
  • Trust Center
Sign InRegister Now
cancel
Turn on suggestions
Auto-suggest helps you quickly narrow down your search results by suggesting possible matches as you type.
Showing results for 
Search instead for 
Did you mean: 
NetWitness Platform Online Documentation
Browse the official NetWitness Platform Online documentation for helpful tutorials, step-by-step instructions, and other valuable resources.
cancel
Turn on suggestions
Auto-suggest helps you quickly narrow down your search results by suggesting possible matches as you type.
Showing results for 
Search instead for 
Did you mean: 
  • NetWitness Community
  • Products
  • NetWitness Platform
  • Documentation
  • Online Documentation
  • What's New in Previous Releases (11.x to 12.x)
  • Options
    • Subscribe to RSS Feed
    • Bookmark
    • Subscribe
    • Printer Friendly Page
    • Report Inappropriate Content
    • English
    • French (Français)
    • German (Deutsche)
    • Japanese (日本人)
    • Spanish (Español)
Versions
Collections
All Downloads

Table of Contents

  •   Release Notes
    •   Release Notes for 12.2.0.1
      •   What's New
      •   Fixed Issues
      •   Upgrade Instructions
      •   Build Numbers
    •   Release Notes for 12.2
      •   What's New
      •   Fixed Issues
      •   Build Numbers
    •   Release Notes for 12.1.1
      •   What's New
      •   Fixed Issues
      •   End of Life Functionality and Features in 12.1.1.0
      •   Build Numbers
    •   Release Notes for 12.1.0.1
      •   What's New
      •   Upgrade Instructions
      •   Build Numbers
    •   Release Notes for 12.1
      •   What's New
      •   Fixed Issues
      •   Build Numbers
    •   Release Notes for 12.0
      •   What's New
      •   Fixed Issues
      •   Build Numbers
    •   Release Notes for 11.7.3
      •   What's New
      •   Fixed Issues
      •   Build Numbers
      •   About Firmware and BIOS Updates
    •   Release Notes for 11.7.2
      •   What's New
      •   Fixed Issues
      •   Build Numbers
    •   Release Notes for 11.7.1.2
      •   What's New
      •   Fixed Issues
      •   Upgrade Instructions
      •   Build Numbers
    •   Release Notes for 11.7.1.1
      •   What's New
      •   Fixed Issues
      •   Build Numbers
    •   Release Notes for 11.7.1
      •   What's New
      •   Fixed Issues
      •   Build Numbers
    •   Release Notes for 11.7.0.2
      •   What's New
      •   Build Numbers
      •   Appendix
      •   Upgrade Instructions
    •   Release Notes for 11.7.0.1
      •   What's New
      •   Build Numbers
      •   Appendix
      •   Upgrade Instructions
    •   Release Notes for 11.7
      •   What's New
      •   Fixed Issues
      •   Build Numbers
    •   What's New in Previous Releases
    •   Known Issues
    •   Security Fixes
  •   Getting Started
    •   Getting Started With NetWitness
      •   Getting Started with NetWitness Platform XDR
      •   Log in to NetWitness Platform XDR
      •   Changing Your Password
      •   Identifying Your Role
      •   NetWitness Platform XDR Basic Navigation
      •   Setting Up Your Default View by SOC Role
      •   Managing the Springboard
      •   Managing Dashboards
      •   Setting User Preferences
      •   Managing Jobs
      •   Viewing and Deleting Notifications
      •   Viewing Help in the Application
      •   Finding Documents on NetWitness Community
      •   Troubleshooting for User Setup
      •   NetWitness Platform Getting Started References
        •   User Preferences
        •   Notifications Panel and Notifications Tray
        •   Jobs Panel and Jobs Tray
    •   Set up your Hosts and Services
      •   Hosts and Services Basics
      •   Hosts and Services Set Up Procedures
      •   Hosts and Services Maintenance Procedures
      •   References
        •   Hosts View
        •   Services View
          •   Edit Service Dialog
          •   Services Config View
          •   Services Config View - Appliance Service Configuration Tab
          •   Services Config View - Data Retention Scheduler Tab
          •   Services Config View - Files Tab
          •   Services Explore View
          •   Services Explore View - Properties Dialog
          •   Services Logs View
          •   Services Security View
          •   Services Security View - Users Tab
          •   Services Security View - Roles Tab
            •   Services Security View - Service User Roles and Permissions
            •   Services Security View - Aggregation Role
          •   Services Security View - Settings Tab
          •   Services Stats View
          •   Services Stats View - Chart Stats Tray
          •   Services Stats View - Gauges
          •   Services Stats View - Timeline Charts
          •   Services System View
          •   Services Topology View
          •   Services System View - Host Task List Dialog
        •   Service Configuration Parameters
          •   Aggregation Configuration Parameters
          •   Appliance Service Configuration Parameters
          •   Archiver Service Configuration Parameters
          •   Broker Service Configuration Parameters
          •   Concentrator Service Configuration Parameters
          •   Core Service Logging Configuration Parameters
          •   Core Service-to-Service Configuration Parameters
          •   Core Service System Configuration Parameters
          •   Decoder Configuration Parameters
          •   Network Decoder Service Configuration Parameters
          •   Log Decoder Service Configuration Parameters
          •   REST Interface Configuration Parameters
          •   NetWitness Platform Core Service system.roles Modes
        •   Centralized Service Configuration via Policy
          •   Centralized Service Configuration - Groups Tab
          •   Centralized Service Configuration - Policies Tab
      •   Troubleshooting Version Installations and Updates
    •   Service Configuration Properties Guide
      •   Introduction
      •   Admin-server Configuration
      •   Analysis-server Configuration
      •   Config-server Configuration
      •   Content-server Configuration
      •   Contexthub-server Configuration
      •   Correlation-server Configuration
      •   Endpoint-broker-server Configuration
      •   Endpoint-server Configuration
      •   Enrichment-server Configuration
      •   Integration-server Configuration
      •   Investigate-server Configuration
      •   Launch-framework Configuration
      •   License-server Configuration
      •   Metrics-server Configuration
      •   Node-infra-server Configuration
      •   No-op-server Configuration
      •   Orchestration-server Configuration
      •   Relay-server Configuration
      •   Respond-server Configuration
      •   Security-server Configuration
      •   Source-server Configuration
    •   Quick Start - Investigation
      •   What Is NetWitness Investigate
    •   Quick Start - Endpoints
      •   QuickStart
    •   Quick Start - UEBA
      •   QuickStart
  •   Install and Upgrade
    •   Deploy NetWitness
      •   The Basics
      •   Deployment Optional Setup Procedures
      •   Network Architecture and Ports
      •   Site Requirements and Safety
    •   Manage Licensing
      •   Entitlement Capability Implementation
      •   Initial Set Up
        •   Obtain License Server ID from NetWitness Platform UI
        •   Access Product Licenses from myRSA
        •   Synchronize NetWitness Server
        •   Synchronize Local Licensing Server Offline
      •   License Types
      •   Configure NetWitness Notifications
      •   About Out-of-Compliance Banners
      •   Troubleshoot Licensing
      •   Licensing Panel Reference
        •   Usage Trend
        •   Reassign Licenses
        •   Export Usage Stats
      •   Settings Tab
      •   Out-of-Compliance Reference
    •   Physical Host Installation
      •   Introduction
      •   Installation Tasks
      •   Update or Install Legacy Windows Collection
      •   Post Installation Tasks
      •   Appendix A. Troubleshooting
      •   Appendix B. Create External Repo
      •   Appendix C. Silent Installation Using CLI
      •   Appendix D. Third Party Server System Requirement
    •   Virtual Host Installation
      •   Basic Deployment
      •   Install NW Virtual Host in Virtual Environment
        •   Step 1a. Create Virtual Machine - VMware
        •   Step 1b. Deploy the Virtual Host in Hyper-V
        •   Step 1c. Create Virtual Machine in Nutanix AHV
        •   Step 2. Configure Block Storage to Accommodate NetWitness Platform
          •   Task 1. Add New Disk
          •   Task 2. Add New Volume and Extend Existing File Systems
          •   Task 3. Storage Configurations
        •   Step 3. Installation Tasks
        •   Step 4. Configure Host-Specific Parameters
        •   Step 5. Post Installation Tasks
      •   Appendix A. Troubleshooting
      •   Appendix B. Silent Installation Using CLI
      •   Appendix C. Virtual Host Recommended System Requirements
      •   Appendix D. Update the Virtual ESA Host Memory
    •   NetWitness Storage Configuration
      •   Storage Overview
      •   Storage Requirements
      •   Prepare Physical Storage
      •   Prepare Virtual or Cloud Storage
      •   Configure Storage Using the REST API
      •   Prepare Unity Storage
      •   Migrate Data to Another Storage Type
      •   Appendix A. How NetWitness Platform Hosts Store Data
      •   Appendix B. Encrypt a Series 6E Core or Hybrid Host (encryptSedVd.py)
      •   Appendix C. Troubleshooting
      •   Appendix D. Sample Storage Configuration Scenarios
      •   Appendix E: Sample Storage Configuration Scenarios for 8 or 12 Drive Powervault
      •   Appendix F: Sample Storage Configuration Scenarios Meta Disk Kits
      •   Appendix G: Sample Storage Configuration for Concentrator Index with One Meta Disk Kit
      •   Revision History
    •   AWS Deployment
      •   AWS Deployment Overview
      •   AWS Deployment
        •   Establish AWS Environment
        •   Find NetWitness AMIs
        •   Launch an Instance and Configure a Host
        •   Configure Hosts (Instances) in NetWitness Platform XDR
        •   Configure Packet Capture
      •   Instance Configuration Recommendations
      •   Appendix A Silent Installation Using CLI
    •   Azure Deployment
      •   Azure Installation Overview
      •   Azure Configuration Recommendations
      •   Azure Deployment
        •   Partition Recommendations
        •   Deploy NW Server Host in Azure
        •   Deploy Component Core Services in Azure
        •   Installation Tasks
        •   Configure Hosts (Instances) in NetWitness Platform XDR
        •   Configure Packet Capture for Azure Cloud Environment
      •   Appendix A. Silent Installation Using CLI
    •   Google Cloud Platform Deployment
      •   Google Cloud Platform Installation Overview
      •   GCP Deployment
        •   Prerequisites
        •   Find NetWitness Platform XDR GCP Images
        •   Establish gcloud Environment
        •   Create an Instance using Google Cloud SDK Shell
        •   Create a Firewall Rule
        •   Connect to VM Instance using SSH
        •   Installation Tasks
        •   Configure Hosts (Instances) in NetWitness Platform XDR
        •   Configure Packet Mirroring
      •   GCP Instance Configuration Recommendations
    •   Endpoint Agent Installation
      •   Introduction to Endpoint Agent Installation
      •   Prerequisites
      •   Generate an Agent Packager
      •   Generate Agent Installers
      •   Deploy and Verify Agents
      •   Uninstall Agents
      •   Upgrade Agents
      •   Recommendations for Installing Agents in Virtual Desktop Infrastructure Environment
      •   Troubleshooting
    •   Migration Guide for NetWtiness Endpoint to RSA NetWitness Platform
      •   Introduction
      •   Migrating NetWitness Endpoint 4.4.0.x to NetWitness Platform
      •   Importing NetWitness Endpoint 4.4.0.x Configurations to NetWitness Platform
    •   UEBA Standalone Installation
      •   Introduction
      •   NetWitness UEBA Standalone Installation
      •   System Requirement
      •   Installation Tasks
      •   Post Installation Tasks
    •   Upgrade to NetWitness Platform XDR 11.7.3
      •   Overview
      •   Pre upgrade checks
      •   Upgrade Preparation Tasks
      •   Upgrade Tasks
      •   Post Upgrade Tasks
      •   Endpoint Upgrade Tasks
      •   Troubleshooting Version Installations and Upgrades
    •   Upgrade to NetWitness Platform XDR 12.2
      •   Overview
      •   Pre upgrade checks
      •   Upgrade Preparation Tasks
      •   Upgrade Tasks
      •   Post Upgrade Tasks
      •   Endpoint Upgrade Tasks
      •   Troubleshooting Version Installations and Upgrades
    •   Upgrade to NetWitness Platform XDR 12.1.1
      •   Overview
      •   Pre upgrade checks
      •   Upgrade Preparation Tasks
      •   Upgrade Tasks
      •   Post Upgrade Tasks
      •   Endpoint Upgrade Tasks
      •   Start Using New Features
      •   Appendix A. Troubleshooting Version Installations and Upgrades
    •   Upgrade to NetWitness Platform XDR 12.1
      •   Overview
      •   Pre Upgrade Checks
      •   Upgrade Preparation Tasks
      •   Upgrade Tasks
      •   Post Upgrade Tasks
      •   Endpoint Upgrade Tasks
      •   Appendix A. Offline Upgrade Using CLI
      •   Appendix B. Set Up External Repo
      •   Appendix C. Troubleshooting Version Installations and Upgrades
    •   Upgrade to NetWitness Platform XDR 11.7.2
      •   Overview
      •   Upgrade Preparation Tasks
      •   Upgrade Tasks
      •   Post Upgrade Tasks
      •   Endpoint Upgrade Tasks
      •   Appendix A. Troubleshooting Version Installations and Upgrades
    •   Upgrade to NetWitness Platform XDR 12.0
      •   Overview
      •   Pre Upgrade Checks
      •   Upgrade Preparation Tasks
      •   Upgrade Tasks
      •   Post Upgrade Tasks
      •   Endpoint Upgrade Tasks
      •   Appendix A. Offline Upgrade Using CLI
      •   Appendix B. Set Up External Repo
      •   Appendix C. Troubleshooting Version Installations and Upgrades
    •   Upgrade to NetWitness Platform XDR 11.7.1
      •   Overview
      •   Upgrade Preparation Tasks
      •   Upgrade Tasks
      •   Post Upgrade Tasks
      •   Endpoint Upgrade Tasks
      •   Start Using New Features
      •   Appendix A. Offline Upgrade Using CLI
      •   Appendix B. Troubleshooting Version Installations and Upgrades
    •   Upgrade to NetWitness Platform XDR 11.7
      •   Overview
      •   Pre Upgrade Checks
      •   Upgrade Preparation Tasks
      •   Upgrade Tasks
      •   Post Upgrade Tasks
      •   Endpoint Upgrade Tasks
      •   Enable New Features
      •   Appendix A. Offline Upgrade Using CLI
      •   Appendix B. Set Up External Repo
      •   Appendix C. Troubleshooting Version Installations and Upgrades
    •   Windows Legacy Log Collection Configuration
      •   Windows Legacy Collection
    •   NetWitness Export Connector Deployment
      •   Overview
      •   Logstash Input Plugin - Configuration Process
      •   Install Logstash
      •   Install NetWitness Logstash Input Plugin
      •   Configure Logstash Input Plugin
        •   Configure SSL
        •   Health and Wellness
        •   Configure Custom Value Meta
      •   (Optional) Configure Logstash Filter Plugin
      •   Configure Logstash Output Plugin
      •   Known Issues
  •   Configure and Manage
    •   Policy-based Centralized Content Management
      •   About Policy-based Centralized Content Management
      •   Enable or Disable Policy-based Centralized Content Management for All or Individual Services
      •   Migrate Content from Core Services to Content Library
      •   Migrate ESA Deployments to Policies and Groups
      •   Manage Content Library
        •   Import Content to Content Library
        •   Create an Application Rule
        •   Clone Application Rule
        •   Edit Application Rule
        •   Delete Application Rule
        •   View Application Rule Details
        •   Create a Network Rule
        •   Clone Network Rule
        •   Edit Network Rule
        •   Delete Network Rule
        •   View Network Rule Details
        •   Create an ESA Rule
        •   Edit an ESA Rule
        •   Delete an ESA Rule
        •   Filter Content Rules
      •   Manage Groups
        •   Create a Group
        •   View a Group
        •   Delete a Group
        •   Edit a Group
        •   Filter Groups
      •   Manage Policies
        •   Create and Publish Policies
        •   Clone a Policy
        •   Delete a Policy
        •   Edit a Policy
        •   View a Policy
        •   Enable Content for a Policy
        •   Disable Content for a Policy
        •   Subscribe Content for a Policy
        •   Unsubscribe Content for a Policy
        •   Filter Policies
        •   Filter Policy Content Details
        •   Merge Policy with ESA Content
      •   Manage ESA Datasources
        •   View an ESA Datasource
        •   Add an ESA Datasource
        •   Edit an ESA Datasource
        •   Delete an ESA Datasource
      •   Manage Deployments
        •   View a Deployment
        •   Create a Deployment
        •   Edit a Deployment
        •   Start a Deployment
        •   Remove a Deployment
        •   Stop a Deployment
      •   References
        •   Content Library Tab
        •   Data Sources Tab
        •   Deployments Tab
        •   Groups Tab
        •   Policies Tab
      •   Appendix A: Endpoint Risk Scoring Rules
      •   Appendix B: Position Tracking Information
    •   Decoder and Log Decoder Configuration
      •   Decoder and Log Decoder Quick Setup
      •   Configure Common Settings on a Decoder
        •   Configure Capture Settings
          •   (Optional) Configure System-Level (BPF) Packet Filtering
          •   (Optional) Configure a Decoder to Capture Data Across All Types of Network Interfaces
          •   (Optional) Configure Meta-Only Decoders
          •   (Optional) Configure Selective Network Data Collection
          •   (Optional) Configure a Decoder to Write Standard pcap-formatted Files
          •   (Optional) Multiple Adapter Packet Capture
          •   (Optional) Internet Content Adaptation Protocol Capture
          •   (Optional) Data Plane Development Kit Packet Capture
          •   (Optional) Preserve VLAN Tags When Using the Packet MMAP Capture Interface
          •   (Optional) Process Raw Syslog Data without Priority Field
          •   (Optional) Configure Decoder to Support OpenAppID
        •   Enable and Disable Parsers and Log Parsers
        •   Start and Stop Data Capture
      •   Configure Decoder Rules
        •   Configure Application Rules
        •   Configure Correlation Rules
        •   Configure Network Rules
        •   Fix Rules with Invalid Syntax
        •   Decoder Commands for Managing Rules
      •   Configure Parsers and Feeds
        •   Configure Parsers
          •   Use Custom Parsers
          •   Enable and Configure the Entropy Parser
          •   Flex Parser
            •   Arithmetic Functions
            •   Common Parser Operations
            •   General Functions
            •   Logging Functions
            •   Nodes
            •   Payload Functions
            •   Regex
            •   String Functions
          •   GeoIP2 Parsers
          •   Lua Parsers
          •   HTTP Parsers
          •   Snort Parsers
          •   Search Parser
          •   Wireless LAN Configuration
          •   Troubleshooting Parsers | NetWitness
        •   Configure Feeds
          •   Custom Feed Definition File Structure
          •   Feed Definitions File
          •   Create a Custom Feed
          •   Create a STIX Custom Feed
          •   Create an Identity Feed
          •   Upload, Edit, or Remove a Feed
          •   Create Custom Meta Keys Using Custom Feed
      •   Decoder and Log Decoder Additional Procedures
        •   Configure 10G Capability | NetWitness
        •   Configure 10G Capability
        •   Configure a Log Decoder to Accept Protobuf
        •   Configure Session Split Timeouts
        •   Configure Syslog Forwarding to Destination
        •   Configure Transaction Handling on a Decoder
        •   Configure Data Export
        •   Decrypt Incoming Packets TLS 1.2
        •   Decrypt Incoming Packets TLS 1.3
        •   Edit Decoder System Configuration Settings
        •   Enable CPU Usage Stats for Installed Content
        •   Enable Parser Mappings
        •   Enable or Disable Lua and Flex Parsing Systems
        •   Map IP Address to Service Type
        •   Event Time Support
        •   Obtain Log Files from a Pre-11.0 Log Decoder
        •   Upload a Log File to a Log Decoder
        •   Upload a Packet Capture File
        •   F5 BIG IP - NetWitness Perfect Forward Secrecy Inspection Visibility
        •   Troubleshooting Packet Drops (11.x and above)
      •   Decoder and Log Decoder References
        •   Services Config View - Capture Policies Tab
        •   Services Config View - Edit Policies Wizard
        •   Services Config View - Data Privacy Tab
        •   Services Config View - Data Retention Scheduler
        •   Services Config View - Feeds Tab
        •   Services Config View - Upload Feeds Dialog
        •   Services Config View - Files Tab
        •   Services Config View - General Tab
        •   Services Config View - Parsers Tab
        •   Services Config View - Parser Mappings Tab
        •   Services Config View - Data Export Tab
        •   Services Config View - Rules Tab
        •   Services Config View - App Rules Tab
        •   Services Config View - Correlation Rules Tab
        •   Services Config View - Network Rules Tab
        •   Services System View - Decoders
    •   Broker and Concentrator Configuration
      •   Broker and Concentrator Basics
      •   Overview of Brokers and Concentrators
      •   Basic Setup Procedures
        •   Step 1. Verify Service System Configuration
        •   Step 2. Configure the Aggregation Process
        •   Step 3. Configure Aggregate Services
        •   Step 4. (Optional) Configure Group Aggregation
        •   Step 5. Start and Stop Aggregation
      •   Broker and Concentrator Configuration References
        •   Services Config View - Broker/Concentrator General Tab
        •   Services System View - Broker
    •   Core Database Tuning
      •   NetWitness Core Database Introduction
      •   Basic Database Configuration
        •   Tiered Database Storage
        •   Manifests
      •   Advanced Database Configuration
        •   Database Configuration Nodes
        •   Index Configuration Nodes
        •   SDK Configuration Nodes
        •   Per-User Configuration Nodes
        •   Scheduler
        •   Rollover
        •   Snort Rules and Configuration
      •   Queries
      •   Index Customization
      •   Rebuilding of the Index
      •   Optimization Techniques
      •   Rule Examples
      •   Appendix A: Statistics
      •   Appendix B: Index Inspect
    •   Live Services Management
      •   Live Content in NetWitness Suite
      •   Deploy Content
        •   Create Live Account
        •   Set Up Live Services in NetWitness Platform XDR
        •   Deploy Content using Live Content UI
          •   Required Procedures
            •   Find and Deploy Live Resources
            •   Manage Live Resources
            •   Search and Download Content from NetWitness XDR Cloud Services Live
          •   Additional Procedures
            •   Export Data to RSA
            •   Create a Resource Package
            •   Manage Custom Feeds
            •   Subscribing to Resources
            •   Miscellaneous Live Services Procedures
          •   References
            •   Live Configure View
            •   Live Feeds View
            •   Live Resource View
            •   Live Search View
            •   Live Search Content View
            •   Resource Package Deployment Wizard
            •   NetWitness Live Registration Portal
            •   Netwitness Feedback and Data Sharing
          •   Troubleshooting
    •   Log Collection Configuration
      •   About Log Collection
      •   Log Collection Architecture
      •   Basic Implementation
        •   Provision Local and Remote Collectors
        •   Configure LC/RC
        •   Configure Failover
        •   Configure Replication
        •   Configure Chain of Remote Collectors
        •   Throttle RC to LC Bandwidth
        •   Set up a Lockbox
        •   Start Collection Services
        •   Verify Log Collection is Working
        •   Configure Certificates
        •   Configure Custom Certificates
      •   Log Collection Basics
        •   Basic Procedure
        •   Search for Specific Event Sources
        •   Configure Event Filters for Log Collector
        •   Import, Export, Edit and Test Event Sources in Bulk
      •   Collection Protocols
        •   Configure AWS (CloudTrail) Event Sources
        •   Configure Azure Event Sources
        •   Configure Check Point Event Sources
        •   Configure File Event Sources
        •   Configure Logstash
        •   Configure Netflow Event Sources
        •   ODBC
          •   Configure ODBC Event Sources
          •   Configure DSNs
          •   Create Custom Typespec
          •   Troubleshoot ODBC Collection
        •   Configure SDEE Event Sources
        •   Configure SNMP Event Sources
        •   Configure Syslog Event Sources
        •   Configure VMware Event Sources
        •   Configure Windows Event Sources
        •   Windows Legacy Configuration
          •   Set Up Windows Legacy Collector
          •   Configure Windows Legacy and NetApp Event Sources in RSA NetWitness
          •   Troubleshoot Windows Legacy and NetApp Collection
      •   Reference
        •   AWS Parameters
        •   Azure Parameters
        •   Check Point Parameters
        •   File Parameters
        •   Service System View
        •   ODBC Parameters
        •   ODBC DSN Parameters
        •   Remote/Local Collectors Configuration Parameters
        •   Tabs
          •   General Tab
          •   Event Destinations Tab
          •   Event Sources Tab
          •   Settings Tab
      •   Log Collection: Troubleshoot
    •   Event Source Management
      •   NetWitness Event Sources
      •   Managing Event Sources
        •   Alarms and Notifications
        •   Automatic Alerting
        •   Common Scenarios for Monitoring Policies
      •   Manage Event Source Groups
        •   Create Event Source Groups
        •   Create Event Source Group Form
        •   Acknowledge and Map Event Sources
        •   Edit or Delete Event Source Groups
        •   Remove Idle Event Sources
        •   Create an Event Source and Edit its Attributes
        •   Bulk Edit Event Source Attributes
        •   Import Event Sources
        •   Export Event Sources
        •   Sort Event Sources
      •   Monitor Polices
        •   Configure Event Source Group Alerts
        •   Set Up Notifications
        •   Disable Notifications
      •   Configure Automatic Alerting
      •   View Event Source Alarms
      •   Event Source References
        •   Discovery Tab
        •   Manage Tab
        •   Manage Tab - Historical Graph View
        •   Manage Event Source Tab
        •   Event Sources View
        •   Create/Edit Group Form
        •   Details View
        •   Manage Parser Mappings
        •   Alarms Tab
        •   Monitoring Policies Tab
        •   Settings Tab
        •   Log Parser Rules Tab (version 11.1 only)
      •   Troubleshooting/Appendix
        •   Alarms and Notifications Issues
        •   Duplicate Log Messages
        •   Troubleshoot Feeds
        •   Import File Issues
        •   Negative Policy Numbering
        •   Viewing Logs from Pre-11.0 Log Decoder
    •   Log Parser Customization
      •   Log Parser Rules Customization
      •   Add or Delete Log Parser
      •   JSON Mappings
      •   Create Custom Log Parser Rules
      •   Log Parsers and the Default Log Parser
      •   Use Cases
      •   Extend a Log Parser Example
      •   Select the Reference Log Decoder
      •   Move Log Parser Rules to Production
      •   Troubleshooting and Limitations
      •   Log Parser Rules Tab
    •   Logstash Integration Configuration
      •   Overview
      •   Dataflow
      •   Install Logstash
      •   Install and Configure the NetWitness Codec
      •   Configure Logstash Output Plugins
      •   Configure Event Source
      •   Advanced NetWitness Configuration
      •   Coding Appendix: Linux event Source Example
      •   Coding Appendix: Build a Parser
    •   NetWitness Export Connector Configuration
      •   Overview
      •   Logstash Input Plugin - Configuration Process
      •   Install Logstash
      •   Install NetWitness Logstash Input Plugin
      •   Configure Logstash Input Plugin
        •   Configure SSL
        •   Health and Wellness
        •   Configure Custom Value Meta
      •   (Optional) Configure Logstash Filter Plugin
      •   Configure Logstash Output Plugin
      •   Known Issues
    •   Archiver Configuration For Logs
      •   Archiver Overview
      •   Basic Archiver Configuration
        •   Add the Archiver Service
        •   Add Log Decoder as a Data Source to Archiver
        •   Configure Archiver Storage and Log Retention
          •   Configure Hot, Warm, and Cold Storage
          •   Configure Log Storage Collections
          •   Define Retention Rules
        •   Add Archiver as a Data Source to Reporting Engine
        •   Configure Archiver Monitoring
      •   Additional Archiver Configuration
        •   Configure Data Backup and Restore
        •   Retrieve Hash Information
      •   Archiver References
        •   Archiver Collection Dialog
        •   Archiver Services Config View - General Tab
        •   Archiver Service Configuration
        •   Data Retention Tab - Archiver
        •   Services Config View - Archiver
    •   Workbench Configuration For Logs
      •   Overview
      •   Configuration Procedures
        •   Add Workbench Service as a Data Source to Broker
        •   Add Workbench as a Data Source to Reporting Engine
        •   Manage Collections
      •   Services Config View
      •   Services Config View - Collections Tab
      •   Services Config View - General Tab
      •   Troubleshooting
    •   Event Stream Analysis Configuration
      •   Event Stream Analysis Overview
      •   Configure ESA Correlation Rules
      •   Additional ESA Correlation Rules Procedures
        •   Update Your ESA Rules for the Required Multi-Value and Single-Value Meta Keys
        •   Configure Advanced Settings for ESA Correlation
        •   Configure Character Case for Advanced ESA Rules
        •   Deploy Endpoint Risk Scoring Rules on ESA
        •   Change Memory Threshold for ESA Rules
        •   Start, Stop, or Restart ESA Service
        •   View Audit Logs and Verify ESA Component Versions
    •   Alerting with ESA Correlation Rules
      •   Getting Started with ESA
        •   Best Practices
        •   Troubleshoot ESA
        •   View Memory Metrics for Rules
      •   How ESA Handles Sensitive Data
      •   ESA Rule Types
        •   ESA Permissions
        •   Practice with Sample Rules
      •   Working with Trial Rules
      •   Add Rules to the Rules Library
      •   Download Configurable RSA Live ESA Rules
        •   Customize an RSA Live ESA Rule
      •   Add a Rule Builder Rule
        •   Step 1. Name and Describe the Rule
        •   Step 2. Build a Rule Statement
        •   Step 3. Add Conditions to a Rule Statement
      •   Working With Rules
        •   Edit, Duplicate or Delete a Rule
        •   Filter or Search for Rules
        •   Import or Export Rules
      •   Choose How to Be Notified of Alerts
        •   Notification Methods
        •   Add Notification Method to a Rule
      •   Add a Data Enrichment Source
        •   Enrichment Sources
        •   Configure a Context Hub List as an Enrichment Source
        •   Configure an In-Memory Table as an Enrichment Source
        •   Add an Enrichment to a Rule
      •   Deploy Rules to Run on ESA
        •   ESA Rule Deployment Steps
        •   Additional ESA Rule Deployment Procedures
      •   View ESA Stats and Alerts
        •   View Stats for an ESA Service
        •   View a Summary of Alerts
      •   Add an Advanced EPL Rule
        •   Event Processing Language (EPL)
        •   ESA Annotations
        •   Example Advanced EPL Rules
      •   Configure an In-Memory Table Using an EPL Query
      •   ESA Alert References
        •   RulesTab
        •   Rule Library Panel
        •   Rule Builder Tab
        •   Build a Statement Dialog
        •   Advanced EPL Rule Tab
        •   Rule Syntax Dialog
        •   Services Tab
        •   Settings Tab
    •   Context Hub Configuration
      •   How Context Hub Works
      •   Configure Lists as a Data Source
      •   Configure Archer as a Data Source
      •   Configure Active Directory Data Source
      •   Configure RSA EndPoint Data Source
      •   Configure Respond Data Source
      •   Configure File Reputation Server Data Source
      •   Configure STIX as a Data Source
      •   Configure RESTAPI as a Data Source
      •   Configure Data Sources Settings
      •   Import or Export Lists for Context Hub
      •   Manage Meta Type and Meta Key Mapping
      •   Context Hub Data Sources Tab
      •   Context Hub Lists Tab
      •   Context Hub STIX Tab
      •   Troubleshooting
    •   Malware Analysis Configuration
      •   How Malware Analysis Works
      •   Basic Setup
        •   Configure Malware Analysis Operating Environment
        •   Configure General Malware Analysis Settings
        •   Configure Indicators of Compromise
        •   Configure Installed Antivirus Vendors
        •   Enable Community Scoring
        •   (Optional) Configure Auditing on Malware Analysis Host
        •   (Optional) Configure Hash Filter
        •   (Optional) Configure Malware Analysis Proxy Settings
        •   (Optional) Register for a ThreatGRID API Key
      •   Additional Procedures for Configuring Malware Analysis
        •   Create Custom Alert in CEF Format
        •   Enable Custom YARA Content
      •   Supported Antivirus Vendors
      •   Malware Analysis References
        •   Services Config View - General Tab
        •   Services Config View - Indicators of Compromise Tab
        •   Services Config View - IOC Summary Tab
        •   Services Config View - Auditing Tab
        •   Services Config View - Hash Tab
        •   Services Config View - AV Tab
        •   Services Config View - Proxy Tab
        •   Services Config View - ThreatGRID Tab
        •   Services Config View - Integration Tab
    •   NetWitness Endpoint Configuration
      •   NetWitness Endpoint Overview
      •   Agent Modes
      •   Endpoint Server Configuration
      •   Deploy Endpoint Application Rules and ESA Correlation Rules
      •   Setup Meta Forwarding to Log Decoder
      •   Endpoint Sources
      •   Create Groups and Policies
      •   Manage Groups
      •   Manage Policies
      •   Change Policy Ordering for Groups
      •   Configure Data Retention Policy
      •   Manage Role Permissions at Endpoint Server Level
      •   Manage Inactive Agents
      •   Configure Retention Policy for Memory Dumps and MFT
      •   (Optional) Installing and Configuring Relay Server
      •   Endpoint YARA Rules
      •   Configure OPSWAT
      •   Integrate NetWitness Endpoint 4.4.0.2 or Later with NetWitness Endpoint 11.3
      •   Endpoint References
        •   General Tab
        •   Data Retention Scheduler Tab
        •   Packager Tab
        •   Relay Server Tab
        •   Endpoint Sources - Groups
        •   Endpoint Sources - Policies
      •   Troubleshooting
      •   Appendices
        •   Reset File Collection Bookmarks
        •   Supported File Log Event Source Types
        •   Specify UNC Paths
    •   Respond Configuration for Incident Management
      •   About this Document
      •   NetWitness Respond Configuration Overview
      •   Configuring NetWitness Respond
        •   Step 1. Configure Alert Sources to Display Alerts in the Respond View
        •   Step 2. Assign Respond View Permissions
        •   Step 3. Enable and Create Incident Rules for Alerts
      •   Additional Procedures for Respond Configuration
        •   Set Up and Verify Default Incident Rules
        •   Configure Risk Scoring Settings for Automated Incident Creation
        •   Configure Custom Respond Server Alert Normalization
        •   Configure Analyst UI for Respond Server Alert Normalization
        •   Configure Incident Email Notification Settings
        •   Set a Retention Period for Alerts and Incidents
        •   Obfuscate Private Data
        •   Manage Incidents in Archer Cyber Incident & Breach Response
        •   Configure the Option to Send Incidents to RSA Archer
        •   Configure Threat Aware Authentication
        •   Set a Counter for Matched Alerts and Incidents
        •   Edit the Incident Rules Export ZIP File
        •   Configure a Database for the Respond Server Service
      •   NetWitness Respond Configuration Reference
        •   Configure View
        •   Incident Rules View
        •   Incident Rule Details View
        •   Incident Email Notification Settings View
        •   Aggregation Rules Tab (11.0 and earlier)
        •   New Rule tab (11.0 and earlier)
    •   Reporting Configuration
      •   How Reporting Engine Works
      •   Configure Reporting Engine
      •   Configure the Data Sources
        •   (Optional) Add Workbench as Data Source to Reporting Engine
        •   (Optional) Add Archiver as Data Source to Reporting Engine
        •   (Optional) Integrate EndPoint Information Into Reports
        •   (Optional) Add Collection as Data Source to Reporting Engine
      •   Configure Data Privacy for Reporting Engine
      •   Configure Data Source Permissions
      •   Configure Reporting Engine Settings
        •   Enable LDAP Authentication
        •   Add Additional Space for Large Reports
        •   Managing Log File Parameters
        •   Configure Task Scheduler for a Reporting Engine
      •   How to Define Reports, Charts, and Alerts
      •   Configure Reporting Engine General Settings
      •   Reporting Engine Reference
        •   Reporting Engine General Tab
        •   Reporting Engine Sources Tab
        •   Reporting Engine Output Actions Tab
        •   Reporting Engine Manage Logos Tab
    •   Warehouse Connector Configuration
      •   How Warehouse Connector Works
      •   Install Warehouse Connector Service on a Log Decoder or Decoder
      •   Configure a Warehouse Connector Service
      •   Configure the Data Source for Warehouse Connector
      •   Configure the Destination
        •   Configure the Destination Using NFS
        •   Configure the Destination Using SFTP
        •   Configure the Destination Using WebHDFS
      •   Configure a Stream
      •   Monitor a Warehouse Connector
      •   Add Warehouse as a Data Source to Reporting Engine
      •   Analyze a Warehouse Report
      •   View the Warehouse Connector Service
      •   Troubleshoot the Warehouse Connector
      •   Manage a Stream
      •   Manage a Lockbox
      •   Warehouse Connector Configuration References
        •   General Tab Settings
        •   Appliance Service Configuration Tab Settings
        •   Sources and Destinations Configuration
        •   Add Stream Dialog
        •   Streams Configuration
        •   Lockbox Settings
    •   UEBA Configuration
      •   UEBA Configuration Overview
      •   UEBA Configuration
      •   UEBA Configuration Troubleshooting
    •   Service Configuration
      •   Introduction
      •   Admin-server Configuration
      •   Analysis-server Configuration
      •   Config-server Configuration
      •   Content-server Configuration
      •   Contexthub-server Configuration
      •   Correlation-server Configuration
      •   Endpoint-broker-server Configuration
      •   Endpoint-server Configuration
      •   Enrichment-server Configuration
      •   Integration-server Configuration
      •   Investigate-server Configuration
      •   Launch-framework Configuration
      •   License-server Configuration
      •   Metrics-server Configuration
      •   Node-infra-server Configuration
      •   No-op-server Configuration
      •   Orchestration-server Configuration
      •   Relay-server Configuration
      •   Respond-server Configuration
      •   Security-server Configuration
      •   Source-server Configuration
    •   System Security and User Management
      •   Set Up System Security
        •   Configure Password Complexity
        •   Change the Default Admin Passwords
        •   Configure System-Level Security Settings
        •   (Optional) Configure External Authentication
          •   Configure Active Directory
          •   Configure PAM Login Capability
        •   (Optional) Configure PKI Authentication
        •   (Optional) Use a Custom Server Certificate
        •   (Optional) Create a Customized Login Banner
      •   How Role-Based Access Control Works
        •   Role Permissions
      •   Manage Users with Roles and Permissions
        •   Review the Preconfigured NetWitness Platform Roles
        •   (Optional) Add a Role and Assign Permissions
        •   Verify Query and Session Attributes per Role
        •   Set Up Users
        •   (Optional) Map User Roles to External Groups
        •   Search for External Groups
      •   Set Up Multi-Factor Authentication
      •   Set Up Single Sign-On Authentication
        •   Configure Single Sign-On
      •   (Optional) Set Up Public Key Infrastructure (PKI) Authentication
        •   Configure PKI Authentication
          •   Import Server Certificate and Trusted CA Certificate
          •   (Optional) Configure the CRL Manually
          •   Enable PKI Authentication
        •   Disable PKI
        •   Delete Server Certificate and Trusted CA Certificate
      •   Troubleshooting
      •   References
        •   Admin Security View
        •   Users Tab
          •   Add or Edit User Dialog
        •   Roles Tab
          •   Add or Edit Role Dialog
        •   External Group Mapping Tab
          •   Add Role Mapping Dialog
          •   Search External Groups Dialog
        •   Settings Tab
        •   PKI Settings Tab
        •   Login Banner Tab
        •   Single Sign-On Settings Tab
    •   Data Privacy Management
      •   Data Privacy Overview
      •   Recommended Configurations
      •   Quick Start Procedures
        •   Prepare to Configure Data Privacy
        •   Configure the Recommended Data Privacy Solution
      •   In-Depth Procedures
        •   Configure Data Obfuscation
        •   Configure Data Retention
        •   Configure User Accounts for Use in Data Privacy
      •   Data Privacy References
    •   System Configuration
      •   System Configuration Overview
      •   Standard Procedures
        •   Access System Settings
        •   Configure Notification Servers
          •   Notification Servers Overview
          •   Configure the Email Settings as Notification Server
          •   Configure Script as a Notification Server
          •   Configure the SNMP Settings as Notification Server
          •   Configure a Syslog Notification Server
        •   Configure Notification Outputs
          •   Notification Outputs Overview
          •   Configure Email as a Notification
          •   Configure Script as a Notification
          •   Configure SNMP as a Notification
          •   Configure Syslog as a Notification
        •   Configure Templates for Notifications
          •   Configure Global Notification Templates
          •   Define a Template for ESA Alert Notifications
          •   Import and Export a Global NotificationsTemplate
        •   Configure Email Server and Notification Account
        •   Configure Global Audit Logging
          •   Configure a Destination to Receive Global Audit Logs
          •   Define a Template for Global Audit Logging
          •   Define a Global Audit Logging Configuration
          •   Verify Global Audit Logs
        •   Configure Centralized Audit Logging
        •   Configure Investigation Settings
        •   Configure Live Services Settings
          •   Live Feedback Overview
          •   Upload Data to RSA
        •   Configure Log File Settings
        •   Configure Syslog and SNMP Settings
      •   AdditionalProcedures
        •   Add Custom Context Menu Actions
        •   Configure NTP Servers
        •   Configure Proxy for Security Analytics
      •   Troubleshooting System Configuration
      •   References
        •   Global Audit Logging Configurations Panel
          •   Add New Configuration Dialog
          •   Supported CEF Meta Keys
          •   Supported Global Audit Logging Meta Key Variables
          •   Global Audit Logging Operation Reference
          •   Local Audit Log Locations
        •   Global Notifications Panel
          •   Define Notification Server Dialogs
          •   Define Notification Output Dialogs
          •   Define Notification Template Dialog
          •   Output Tab
          •   Servers Tab
          •   Templates Tab
        •   HTTP Proxy Settings Panel
        •   Email Configuration Panel
        •   Investigation Configuration Panel
        •   Live Services Configuration Panel
        •   NTP Settings Panel
        •   Context Menu Actions Panel
        •   Legacy Notifications Configuration Panel
    •   System Maintenance
      •   Overview
      •   Review Best Practices
      •   Health and Wellness
        •   Monitor Health and Wellness using NetWitness Platform UI
          •   Manage Policies
            •   Include the Default Email Subject Line
          •   Monitor System Statistics
            •   Filter System Statistics
            •   Create Historical Graph of System Statistics
          •   Monitor Service Statistics
            •   Add Statistics to a Gauge or Chart
            •   Edit Properties of Statistics Gauges
            •   Edit Properties of Timeline Charts
          •   Monitor Hosts and Services
            •   Filter Hosts and Services in the Monitoring View
            •   Monitor Host Details
            •   Monitor Service Details
          •   Monitor Event Sources
            •   Configure Event Source Monitoring
            •   Filter Event Sources
            •   Create Historical Graph of Events Collected for an Event Source
          •   Monitor Alarms
          •   Monitor Health and Wellness Using SNMP Alerts
          •   Troubleshooting Health & Wellness
        •   Monitor using New Health and Wellness
          •   Configuring Alert Notifications
            •   Adding Alert Notifications
            •   Suppressing Notifications
          •   Monitoring through Dashboards
            •   Creating Custom dashboard
          •   Monitoring through Alerts
            •   Creating Custom Monitors
            •   Adding Custom Trigger to an Existing Monitor
          •   Managing Dashboards and Alerts
          •   Managing Alert Notifications
          •   Advanced Configurations
          •   Backup and Restore New Health and Wellness
          •   Troubleshooting Health and Wellness
          •   Appendices
            •   New Health and Wellness Dashboards
            •   New Health and Wellness Monitors
            •   Uninstall New Health and Wellness
      •   Manage NetWitness Platform Updates
      •   Reissue Certificates
      •   DisplaySystem and Service Logs
        •   Access Reporting Engine Log File
        •   Search and Export Historical Logs
      •   Maintain Queries Using URL Integration
      •   Manage the deploy_admin Account
      •   NW Server Host Secondary IP Configuration Management
      •   Change Host Network Configuration
      •   Manage Custom Host Entries
      •   Configure FIPS Support
      •   Configure DISA STIG Hardening
      •   Troubleshoot NetWitness Platform
        •   Debugging Information
        •   Error Notification
        •   Miscellaneous Tips
        •   Troubleshoot Feeds
      •   Troubleshooting Cert-Reissue Command
      •   References
        •   Health and Wellness
          •   Health and Wellness View - Alarms View
          •   Event Source Monitoring View
          •   Health and Wellness Historical Graphs
            •   Historical Graph View for Events Collected from an Event Source
            •   Historical Graph View for System Stats
          •   Health and Wellness Settings View - Archiver
          •   Health and Wellness Settings View - Event Sources
          •   Health and Wellness Settings View - Warehouse Connector
          •   Monitoring View
            •   Archiver Details View
            •   Broker Details View
            •   Concentrator Details View
            •   Decoder Details View
            •   ESA Correlation Details View
            •   ESA Analytics Details View
            •   Host Details View
            •   Log Collector Details View
            •   Log Decoder Details View
            •   Malware Details View
            •   Warehouse Connector Details View
          •   Policies View
            •   Health and Wellness Email Templates
            •   NetWitness Platform Out-of-the-Box Policies
          •   System Stats Browser View
        •   New Health and Wellness Settings
        •   System View - System Info Panel
        •   System Updates Panel - Settings View
        •   System Logging - Settings View
        •   System Logging - Realtime View
        •   System Logging - Historical View
    •   Disaster Recovery Tool
      •   Disaster Recovery
      •   Disaster Recovery Azure
      •   Disater Recovery AWS
      •   Appendix A. Modify fstab for Series 5 and 6 Hybrid Storage After Recovery
  •   Investigate and Respond
    •   NetWitness Investigation
      •   How NetWitness Investigate Works
      •   Configuring NetWitness Investigate Views and Preferences
        •   Configure the Navigate View and Legacy Events View
        •   Configure the Events View
      •   Beginning an Investigation
        •   Begin an Investigation in the Navigate or Legacy Events View
        •   Begin an Investigation in the Events View
      •   Refining the Results Set
        •   Use Meta Groups to Focus on Relevant Meta Keys
        •   Use Columns and Column Groups in the Events List
        •   Use Query Profiles to Encapsulate Common Areas for Investigation
        •   Drill into Metadata in the Events View (Beta)
        •   Filter Results in the Events View
        •   Filter Results in the Navigate View
        •   Filter Results in the Legacy Events View
        •   Create a Query in the Navigate and Legacy Events Views
        •   Search for Text Patterns in the Navigate and Legacy Events Views
        •   View and Modify Queries Using URL Integration
      •   Reconstructing and Analyzing Events
        •   Examine Event Details in the Events View
        •   Analyze Events in the Events View
        •   Reconstruct an Event in the Legacy Events View
        •   Look Up Additional Context for Results
        •   Launch a Lookup of a Meta Key
        •   Launch a Malware Analysis Scan from the Navigate View
        •   Group Events from Split and Related Sessions in the Events and Legacy Events Views
        •   Visualize Metadata as Parallel Coordinates
        •   Visualize the Current Drill Point in Informer
      •   Downloading and Acting Upon Results
        •   Download Data in the Events View
        •   Export or Print a Drill Point in the Navigate View
        •   Export Events in the Legacy Events View
        •   Add Events to an Incident in the Events View
        •   Add Events to an Incident in the Legacy Events View
      •   Troubleshooting Investigate
      •   Investigate Reference Materials
        •   Add Events to an Incident Dialog
        •   Add/Remove from List Dialog
        •   Column Groups Dialogs
        •   Context Lookup Panel
        •   Create an Incident Dialog
        •   Events View
        •   Events View - Email Tab
        •   Events View - File Tab
        •   Events View - Host Tab
        •   Events View - Packet Tab
        •   Events View - Text Tab
        •   Investigate Dialog
        •   Investigation Tab - User Preferences Panel
        •   Investigate View
        •   Legacy Event Reconstruction View
        •   Legacy Events View
        •   Manage Default Meta Keys Dialog
        •   Meta Groups Dialogs
        •   Navigate View
        •   Query Dialog
        •   Query Profiles Dialogs
        •   Generate Springboard Panel Dialog
        •   Settings Dialogs for Investigate Views
    •   Malware Analysis
      •   Malware Analysis Functions
      •   Malware Scoring Modules
      •   Conducting Malware Analysis
        •   Begin a Malware Analysis Investigation
        •   Implement Custom YARA Content
        •   Examine Scan Files and Events in List Form
        •   Configure the Malware Analysis Summary of Events View
        •   Filter Dashlet Data in the Summary of Events View
        •   Upload Files for Malware Analysis Scanning
        •   View Detailed Malware Analysis of an Event
      •   Malware Analysis Reference Materials
        •   Malware Analysis View
        •   Malware Analysis Events List and Files List
        •   Scan For Malware Dialog
        •   Select a Malware Analysis Service Dialog
    •   NetWitness Endpoint Investigation
      •   Introduction to Endpoint Investigation
      •   Workflow of an Investigation
      •   Investigate Files
      •   Investigate Hosts
      •   Investigate Process
      •   Change File Status and Remediate
      •   Analyze Downloaded Files
      •   Perform Forensic Investigation
      •   Analyze Events
      •   Network Isolation
      •   NetWitness Endpoint with Third-Party Antivirus Products
      •   Troubleshooting NetWitness Endpoint
      •   NetWitness Endpoint Reference Materials
        •   Files View
        •   Hosts View
        •   Hosts View - Details Tab
        •   Hosts View - Process Tab
        •   Hosts View - Autoruns Tab
        •   Hosts View - Files Tab
        •   Hosts View - Drivers Tab
        •   Hosts View - Libraries Tab
        •   Hosts View - Anomalies Tab
        •   Hosts View - Downloads Tab
        •   Hosts View - System Information
        •   Hosts View - Agent History Tab
        •   Hosts View - YARA Rules Tab
    •   User and Entity Based Analytics
      •   Introduction
      •   UEBA use Cases for Windows Logs
      •   How to Investigate High-Risk Entities
        •   Identify High-Risk Entities
        •   Begin an Investigation of High-Risk Entities
        •   Take Action on High-Risk Entities
        •   Manage High-Risk Entities
      •   Investigate Top Alerts
        •   Filter Alerts
        •   Investigate Indicators
        •   Manage Top Alerts
      •   Modeled Behaviors for Users
      •   View NetWitness UEBA Metrics in Health and Wellness
      •   Monitor Health and Wellness of UEBA
      •   Reference
        •   Overview View Tab
        •   Users Tab
        •   Alerts Tab
        •   User Profile View
      •   Appendix: UEBA Windows Audit Policy
    •   Respond to Incidents
      •   NetWitness Respond Process
      •   Responding to Incidents
      •   Determine which Incidents Require Action
      •   Investigate the Incident
      •   Escalate or Remediate the Incident
      •   Incident Response Use Case Examples
      •   Reviewing Alerts
      •   Review Endpoint Alerts using Process Tree
      •   NetWitness Respond Reference Information
        •   Incidents List View
        •   Incident Details View
        •   Alerts List View
        •   Alert Details View
        •   Tasks List View
        •   Add/Remove From List Dialog
        •   Context Lookup Panel - Respond View
    •   Generate Reports
      •   Reporting Overview
      •   Configure and Generate a Report
      •   Configure a Rule
      •   Create and Schedule a Report
      •   View a Report
      •   Investigate a Report
      •   Manage a List or Rule or Report
      •   Working with Charts
        •   Chart Overview
        •   Configure a Chart
        •   Schedule a Chart
        •   View a Chart
        •   Test a Chart
        •   Investigate a Chart
        •   Manage Chart Groups and Charts
      •   Working with Alerts
        •   Alert Overview
        •   Configure Reporting Engine
        •   Configure an Alert
        •   Schedule an Alert
        •   View an Alert
        •   Investigate an Alert
        •   Manage Alerts and Alert Templates
      •   Appendix
        •   Rule Syntax
        •   Warehouse DB Simple Rules
        •   Warehouse DB Advanced Rules
        •   Task Scheduler for Warehouse Reporting
        •   Query Aggregates
        •   Troubleshoot Reporting
      •   Reporting References
        •   Build Chart View
        •   Build List View
        •   Build Report View
        •   Build Rule View
        •   Chart Permissions Dialog
        •   Chart View
        •   Execution History Panel
        •   Generate List Dialog
        •   Import Chart Dialog
        •   Import Report Dialog
        •   Investigate a Chart View
        •   List Permissions Dialog
        •   List View
        •   Reports Permissions Dialog
        •   Report View
        •   Rule Permissions Dialog
        •   Rule View
        •   Select a Logo Dialog
        •   Schedule a Chart View
        •   Schedule Report Panel
        •   Scheduled Reports View
        •   Test a Chart View
        •   View a Chart Panel
        •   View All Charts Panel
        •   View a Report Panel
        •   View All Reports Panel
      •   Alerting References
        •   Alert List View
        •   Alert Permissions Dialog
        •   Alert Schedules View
        •   Create or Modify Alert Panel
        •   Investigate an Alert View
        •   Import Alert Dialog
        •   Template References
          •   Alert Template View
          •   Create or Modify Template View
        •   View Alerts Schedule View
        •   View Alerts View
  •   Develop and Integrate
    •   RSA Archer Integration
      •   RSA Archer Integration
      •   Configure NetWitness Suite to Work With Archer
      •   Manage Unified Collector Framework
      •   Troubleshoot RSA Archer Integration
    •   RSA Endpoint Integration
      •   RSA Endpoint Integration
      •   Configure Endpoint Alerts via Message Bus
      •   Configure Contextual Data from Endpoint via Recurring Feed
      •   Configure Endpoint Alerts via Syslog into a Log Decoder
    •   RESTful API Guide
      •   Intro
      •   Usage
      •   Enable
      •   Packets
      •   Parser/Feed Upload
      •   Statistics Graph
      •   SDK Commands
    •   NetWitness Core Services API Guide
    •   NetWitness API Guide
    •   NetWitness Shell User Guide
      •   shell
      •   tree
    •   NetWitness NwConsole Guide
      •   Access NwConsole and Help
      •   Basic Command Line Parameters and Editing
      •   Connecting to a Service
      •   Monitoring Stats
      •   Useful Commands
      •   SDK Content Command
      •   SDK Content Command Examples
      •   Commands Used for Troubleshooting
  •   Getting Help with NetWitness

Product Resources

  •   Advisories
    •   NetWitness Platform
      •   Product Advisories
      •   Security Advisories
      •   Service Notifications
      •   Technical Advisories
    •   NetWitness Orchestrator
      •   Product Advisories
      •   Security Advisories
      •   Service Notifications
      •   Technical Advisories
  •   Blog
  •   Discussions
  •   Documentation
    •   NetWitness Platform
    •   Cloud SIEM
    •   Detect AI
    •   Hardware Setup Guides
    •   Investigator
    •   Orchestrator
    •   Threat Intelligence
  •   Downloads
    •   RSA NetWitness Platform
    •   RSA NetWitness Investigator
    •   RSA NetWitness Endpoint
  •   Events
  •   Ideas
  •   Integrations
  •   Knowledge Base
    •   NetWitness Platform
    •   NetWitness Endpoint 4.x
  •   Training
  •   Videos
What's New in Previous Releases (11.x to 12.x)

What's New in Previous Releases (11.x to 12.x)

The section provides new features and enhancements for all supported previous releases.

 

  • 12.2.0.1 Version
  • 12.2.0.0 Version
  • 12.1.1.0 Version
  • 12.1.0.1 Version
  • 12.1.0.0 Version
  • 12.0.0.0 Version
  • 11.7.3.0 Version
  • 11.7.2.0 Version
  • 11.7.1.2 Version
  • 11.7.1.1 Version
  • 11.7.1.0 Version
  • 11.7.0.2 Version
  • 11.7.0.1 Version
  • 11.7.0.0 Version
  • 11.6.1.0 Version
  • 11.6.0.1 Version
  • 11.6.0.0 Version

 

What's New in 12.2.0.1What's New in 12.2.0.1

This release notes provides information about the changes in NetWitness Platform 12.2.0.1.

Security Fixes

This patch release of NetWitness addresses the following vulnerability:

  • CVE-2022-2132

  • CVE-2022-37434

  • CVE-2022-4378

  • CVE-2022-42703

  • CVE-2023-0286

  • CVE-2023-0767

  • CVE-2023-21930

  • CVE-2023-21939

  • CVE-2023-21954

  • CVE-2023-21967

  • CVE-2023-21937

  • CVE-2023-21938

  • CVE-2023-21968

For more information, refer the following security advisories:

  • https://community.netwitness.com/t5/netwitness-platform-security/nw-2023-05-multiple-components-within-netwitness-platform-xdr/ta-p/698474. 
  • https://community.netwitness.com/t5/netwitness-platform-security/nw-2023-03-multiple-components-within-netwitness-platform-xdr/ta-p/697207

Note: If you have the Export Connector plugin in your deployment, you must do the following:
• If you have Logstash installed separately, not as part of the NetWitness installation, you must uninstall the Export Connector plugin and install the updated Export Connector plugin after 12.2.0.1 patch upgrade. In this case, the old Export Connector plugin files are not automatically removed after upgrade. You must remove the old plugin files, so the scans do not list them as vulnerabilities. For more information on how to remove the old plugin files and install the updated plugins, see the Post-Upgrade Tasks section in https://community.netwitness.com/t5/netwitness-platform-online/upgrade-instructions-for-12-2-0-1/ta-p/698615.

• If you have Logstash installed as part of the NetWitness installation on the Log Collector service, the updated Export Connector plugin will be automatically installed during the 12.2.0.1 patch upgrade.

Upgrade Paths

The following upgrade paths are supported for NetWitness 12.2.0.1:

  • 12.2.0.0 to 12.2.0.1

  • 12.1.1.0 to 12.2.0.1

  • 12.1.0.1 to 12.2.0.1

  • 12.1.0.0 to 12.2.0.1

  • 12.0.0.0 to 12.2.0.1

  • 11.7.3.0 to 12.2.0.1

  • 11.7.2.0 to 12.2.0.1

  • 11.7.1.2 to 12.2.0.1

  • 11.7.1.1 to 12.2.0.1
  • 11.7.1.0 to 12.2.0.1
  • 11.7.0.2 to 12.2.0.1
  • 11.7.0.1 to 12.2.0.1
  • 11.7.0.0 to 12.2.0.1
  • 11.6.1.4 to 12.2.0.1
  • 11.6.1.3 to 12.2.0.1

Warning: Before upgrading the UEBA host to 12.2.0.1, you must perform the backup of your Elasticsearch data such as Users, Entities, Alerts, and Indicators to retain them post upgrade. For more information, see NetWitness UEBA Configuration Guide for 12.2.

What's New in 12.2.0.0What's New in 12.2.0.0

The NetWitness 12.2.0.0 Release Notes describe new features, enhancements, security fixes, upgrade paths, fixed issues, known issues, end-of-life functionality, build numbers, and self-help resources.

Enhancements

The following sections are a complete list and description of enhancements to specific capabilities:

  • Policy-based Centralized Content Management
  • Respond
  • Core Database Tuning
  • Endpoint Enhancements
  • Concentrator, Decoder, and Log Decoder Services
  • Integration

To locate the documents that are referred to in this section, see https://community.netwitness.com/t5/netwitness-platform-online/netwitness-platform-all-documents/ta-p/676246.

The Product Documentation section has links to the documentation for this release.

Policy-based Centralized Content Management

The following enhancements are made for Policy-based Centralized Content Management in 12.2.0.0 version:

  • In order to enable the administrator to choose when to enable CCM, a single CCM toggle is introduced in the UI to enable or disable CCM for all 12.0 and later versions of Decoder Services. The toggle is available on the Content page and the toggle can be used to enable or disable CCM for all eligible Core Services at once. The CCM toggle has three states:

    • State1: None of the Decoder Services are managed by CCM

      This is the default status. The default status is applicable only:
      - If customers are upgrading from 11.x to 12.2 version
      - If customers have turned off the feature in previous versions

    • State 2: All Decoder Services are managed by CCM

    • State 3: Some Decoder Services are managed by CCM

      State1: None of the Decoder Services are managed by CCM

      122_ManageContentNoDecoder_0223.png

      122_ManageContentNoDecoder2_0223.png

      State 2: All Decoder Services are managed by CCM

      122_ManageContentAllDecoder_0223.png

      122_ManageContentAllDecoder2_0223.png

      State 3: Some Decoder Services are managed by CCM

      122_ManageContentSomDecoder_0223.png

      122_ManageContentSomDecoder2_0223.png

  • The administrator can edit the rule value while editing or cloning the Application Rule or Network Rule.

    122_CloneApplicationRule_0223.png

  • During policy creation or modification, the administrator can create a new group and assign it to the policy if there are no unassigned groups available for the policy.

    122_CreateGroup_0223.png

  • For a policy, the administrator can subscribe to multiple content at once. This feature is available from 12.1.0.0 version or later.

    122_BulkSubscription_0223.png

  • During policy creation, the administrator can add all content to the policy based on the resource type.

    122_AddAllContent_0223.png

  • For a policy failed status, a caution icon Caution_Icon3.png message banner is displayed in the Policies view and Groups view, indicating that the policy status failed for multiple reasons. Administrator can now see the policy overview section in the UI to find the failure reason and the workaround.

    PolicyFailedBanner2.png

  • Added + Add New Datasource option to add data sources in Create Deployment view and Edit Deployment view. Administrator can now add new data sources from the Create Deployment view, and Edit Deployment view when the required data source is unavailable.

    122_addnewdatasource_0123.png

    For more information on the enhancements, see Policy-based Centralized Content Management Guide.

Respond

The following enhancements are made for Respond component in 12.2.0.0 version:

  • Introduced new pagination settings for the Incidents list view and Alerts list view. Administrator can now see all the available incidents with this feature and do the pagination settings for the following:

    • Navigate through required page numbers.

    • Set the incidents per page as per the options available.

    12.2_Incident_list_1122.png

For more information, see Incidents List View and Alerts List View topics in NetWitness Respond User Guide.

  • Introduced new Syslog Notification Settings.

    • Administrators can now configure syslog alerts for new incidents added to the incidents queue. In addition, a new template field is added with Default Respond SMTP Template. Administrators can now select the pre-configured custom syslog notification template to configure the respond OOTB template available under global notification settings or write a custom respond template.

      SysNtSet.png

  • Enhanced Email Notification Settings.

    • A new template field is added in the Email Notification Settings with Default Respond SMTP Template. Administrator can now select the pre-configured custom email notification template to configure the respond OOTB template available under global notification settings or write a custom respond template.

      RespNotifVw.png

For more information, see Configure Incident Notification Settings topic in the NetWitness Respond Configuration Guide.

Endpoint Enhancements

The following section describes the new enhancements for Endpoint component:

Hosts View Enhancements

The Hosts view is enhanced to help analysts get an accurate number of Hosts and the list of Windows, Mac, and Linux machines on which the suspicious Autoruns are configured.

To optimize the view for analysts, a few columns in the Hosts > Autoruns view such as Global Risk Score, Local Risk Score, Reputation, File Status, Downloaded, File Creation Time, and Signature are removed.

The columns such as Registry Path, Filename, File Path, On Hosts, Type, and Launch Arguments are re-arranged in the following order:

  1. Registry Path

  2. On Hosts

  3. Type

  4. Launch Arguments

  5. Filename

  6. File Path

autoruns_tab_col_rearranged.png

For more information, see the Hosts View - Autoruns Tab topic in the NetWitness Endpoint User Guide.

Advanced Linux Agent - Process Event Tracking Enhancement

  • Linux Agent - Process Event Tracking is introduced to help analysts view the createprocess activities. Analysts can view and monitor process events to detect threats on Linux machines.

    For more information, see Introduction to Endpoint Investigation topic in the NetWitness Endpoint User Guide.

REST API Enhancements

  • New REST API's such as Host Tag Management and Reset Risk Score are added to help you access them while plugging into your custom deployments.

    For more information, see NetWitness API Guide.

Supported Operating Systems Enhancements

  • Administrators have the option to deploy Endpoint agents on the following Operating Systems:

    • macOS Ventura (13)

    • Windows 11 (version 22H2)

    For more information, see Introduction to Endpoint Agent Installation topic in the NetWitness Endpoint Agent Installation Guide.

Core Database Tuning

Introduced a new index config threshold slice.memory.max. When the index slice memory usage exceeds the threshold, an index save will save the index to disk, keeping the index memory usage in control. With this new setting, administrators can freely enable indexing all unique meta values on the meta keys they choose.

For more information, see the Index All Values topic in the NetWitness Core Database Tuning Guide.

Concentrator, Decoder, and Log Decoder Services

  • HTTP2 parser now supports demultiplex interleaved streams and extracts the application payload for detections in other parsers looking at tokens in the payload. This also benefits analysts to reconstruct HTTP/2 sessions, download them as PCAPs, and extract data from the compressed payloads.

    For more information, see the Visibility into HTTP/2 Sessions topic in the NetWitness Decoder Configuration Guide.

  • Introduced the following Logstash event sources to collect logs from different event sources.

    • HTTP Receiver

    • IPFIX

    • Kubernetes

    For more information, see the Configure Logstash Event Sources topic in the NetWitness Log Collection Guide.

Integration

NetWitness Platform XDR supports the integration of the following parser services to collect logs. These services are supported on NetWitness Platform XDR 11.7.0.0 or later.

  • Zscaler ZIA

  • Zscaler ZPA

  • OPSWAT Meta Access Cloud

  • Symantec Endpoint Security Events

  • Symantec Endpoint Security Incidents

  • S3 Universal Connector support for access logs from Application Load Balancer (ALB).

For more information on integrating the parser services, see NetWitness Platform Integrations Guide.

Security Fixes

For more information on Security Fixes, see https://community.netwitness.com/t5/netwitness-platform-advisories/ct-p/netwitness-advisories#security.

Upgrade Paths

The following upgrade paths are supported for NetWitness 12.2.0.0

  • NetWitness 12.1.1.0 to 12.2.0.0

  • NetWitness 12.1.0.1 to 12.2.0.0
  • NetWitness 12.1.0.0 to 12.2.0.0
  • NetWitness 12.0.0.0 to 12.2.0.0
  • NetWitness 11.7.2.0 to 12.2.0.0
  • NetWitness 11.7.1.2 to 12.2.0.0
  • NetWitness 11.7.1.1 to 12.2.0.0
  • NetWitness 11.7.1.0 to 12.2.0.0
  • NetWitness 11.7.0.2 to 12.2.0.0
  • NetWitness 11.7.0.1 to 12.2.0.0
  • NetWitness 11.7.0.0 to 12.2.0.0
  • NetWitness 11.6.x.x to 12.2.0.0

For more information on upgrading to 12.2.0.0, see Upgrade Guide for NetWitness 12.2.0.0

Before upgrading the UEBA host to 12.2.0.0, you must perform the backup of your Elasticsearch data such as Users, Entities, Alerts, and Indicators to retain them post upgrade. For more information, see NetWitness UEBA Configuration Guide for 12.2.0.0.

Product Version Life Cycle for NetWitness Platform

See for Product Version Life Cycle for NetWitness Platform a list of versions that reach End of Primary Support (EOPS).

What's New in 12.1.1.0What's New in 12.1.1.0

Policy-based Centralized Content Management (CCM)

The following enhancements are made for Policy-based Centralized Content Management in 12.1.1.0 version.

  • Administrator can clone Application Rules and Network Rules with a unique rule name and same rule value.

    IMPORTANT:
    - The Rule Name is the unique title of the rule, which is used as a reference to the rule within the Content Library.
    - The Rule Value is a string or text which is registered to a meta key when the rule is triggered with an "alert" output. It may be the same as the rule name, but it is not unique within the Content Library.

    kvj_0-1675940596055.png

     

  • Single CCM toggle is introduced to enable or disable CCM for all 12.0+ Decoders and Log Decoders at once. The toggle button is available via backend of source-server.

  • In 12.1 and later versions, you can only manage the ESA deployments and Data Sources through Centralized Content Management.

    Go to (CONFIGURE) > Policies > Content > Event Stream Analysis page to manage the ESA deployments and Data Sources.

    Refer the following screenshot.

    kvj_2-1675940595942.png

     

  • A new unified deployment view (ESA DEPLOYMENTS) tab is created to manage deployments from a single view across all policies within CCM.

    kvj_3-1675940596092.png

     

  • Navigation is made simple to edit policy wizard from the Edit deployment view > View rules.

    • The edit deployment screen will save the current state and close. The user will be redirected to the edit policy wizard on the new tab.

  • A new search option is created from the listed ESA rules in the View ESA rules modal in the edit and create deployment views.

  • Caution banners are created to convey the customer about the requirement of a deployment while creating ESA related policies.

  • After upgrading to 12.1 and later versions, you can only manage the ESA Rules in the ESA Rules page. Refer the following screenshot.

    kvj_4-1675940596069.png

     

  • After upgrading to the 12.1.1.0 version, all the ESA deployments will be migrated to configure_icon.png (CONFIGURE) > Policies page. Each deployment will be converted into a policy and group and will be available to manage only after the upgrade of the Correlation servers to the 12.1.x.x version. Make sure that you plan the upgrade process so that Correlation servers are upgraded immediately after the Admin Server is done. The deployments will not be accessible until the corresponding Correlation servers are upgraded. However, the correlation servers will still continue to process the Alerts and Events.

  • You must upgrade the ESA hosts immediately after upgrading the Admin Server.

    For more information on Centralized Content Management and managing the deployments, see Centralized Management Guide for 12.1.1.

What's New in 12.1.0.1

What's New in 12.1.0.1

 

The NetWitness 12.1.0.1 release notes provides information about the changes in NetWitness Platform 12.1.

Security Fixes

This patch release of NetWitness addresses the following vulnerabilities:

  • CVE-2022-21123

  • CVE-2022-21125

  • CVE-2022-21166

  • CVE-2022-31676

  • CVE-2022-29154

  • CVE-2022-2526

For more information on the various vulnerabilities fixed in this patch release, see https://community.netwitness.com/t5/rsa-netwitness-platform-staged/nw-2022-03-multiple-components-within-netwitness-platform/ta-p/689171.

Note: If you have the Export Connector plugin in your deployment, you must do the following:
- If you have Logstash installed separately, not as part of the NetWitness installation, you must uninstall the Export Connector plugin and install the updated Export Connector plugin after 12.1.0.1 patch upgrade. In this case, the old Export Connector plugin files are not automatically removed after upgrade. You must remove the old plugin files, so the scans do not list them as vulnerabilities. For more information on how to remove the old plugin files and install the updated plugins, see Post-Upgrade Tasks.
- If you have Logstash installed as part of the NetWitness installation on the Log Collector service, the updated Export Connector plugin will be automatically installed during the 12.1.0.1 patch upgrade.

Upgrade Paths

The following upgrade paths are supported for NetWitness 12.1.0.1:

  • NetWitness 11.6.0.0 to 12.1.0.1
  • NetWitness 11.6.0.1 to 12.1.0.1
  • NetWitness 11.6.1.0 to 12.1.0.1
  • NetWitness 11.6.1.1 to 12.1.0.1
  • NetWitness 11.6.1.2 to 12.1.0.1
  • NetWitness 11.6.1.3 to 12.1.0.1
  • NetWitness 11.6.1.4 to 12.1.0.1
  • NetWitness 11.7.0.0 to 12.1.0.1
  • NetWitness 11.7.0.1 to 12.1.0.1
  • NetWitness 11.7.0.2 to 12.1.0.1
  • NetWitness 11.7.1.0 to 12.1.0.1

  • NetWitness 11.7.1.1 to 12.1.0.1
  • NetWitness 11.7.1.2 to 12.1.0.1

  • NetWitness 12.0.0.0 to 12.1.0.1

  • NetWitness 12.1.0.0 to 12.1.0.1

What's New in 12.1.0.0What's New in 12.1.0.0

Policy-based Centralized Content Management

The following enhancements are made for Policy-based Centralized Content Management in 12.1.0.0 version.

  • Administrators can create and upload content to the Content Library easily by:

    • Importing log parsers as a zip file instead of converting to ".envision" format.

    • Cloning existing Application Rules and Network Rules.

      kvj_6-1675940851791.png

       

  • Administrators can switch services between legacy Content Management UI and the new Centralized Content Management via Groups and Policies using the "toggle" feature. This can prevent content being mistakenly added or modified outside of a Policy, causing an out-of-sync issue.

    • Each service can be toggled to work either with individual "Service or Config" interface or with Content Policies.

    • Toggling on Content Policy for a service will restrict the legacy UI to "read only" mode.

  • Administrators can now force publish all the content of a policy in two ways:

    • Policy Listing > More Actions > Force Publish

      kvj_7-1675940851774.png

       

    • Policy Details > Force Publish

      kvj_8-1675940851753.png

       

  • Administrators can easily find content, policies or groups of interest by using the "Filtering" capability of the UI in Content Library, Policy Listing page, Policy Details page, and Group Listing page.

    kvj_9-1675940851768.png

     

    kvj_10-1675940851728.png

     

    kvj_11-1675940851755.png

     

  • Administrators can receive meta key and operator suggestions while creating application and network rule conditions. This eases the creation of error-free rules. Administrators can also opt for 'Advanced mode' to create complex queries.

  • Addressed an issue where the Content Policy UI was not usable without an active connection to Live.

    • Administrators can now create, modify and publish policies and manage custom content in the Content Library even without an internet connection.

    • An Internet connection is still required in order to synchronize Live content with the Content Library.

  • Administrators can now manage ESA contents from the configure_icon.png (Configure) > Policies page:

    • Manage ESA content and handle multiple deployments seamlessly using Policy.

      kvj_13-1675940851776.png

       

    • One-click management of subscriptions and automatic updates for ESA content.

      • Toggle the Subscribe button to enable automatic updates of ESA content.

        kvj_14-1675940851910.png

         

    • Seamlessly view ESA Live content along with your own custom content.

    • Add and manage ESA Correlation servers as part of groups.

    • Manage all the data sources for the ESA Correlation servers from the Settings > Event Stream Analysis > Data Sources page seamlessly.

      kvj_15-1675940851730.png

       

      For more information, see Policy-based Centralized Content Management topic in the Live Services Management Guide.

Respond

The Respond view is enhanced to help analysts export and store the Incidents with Alerts and Events in JSON format for offline investigation.

Incidents List View Enhancements

The new Export drop-down is added to allow analysts export and download the data such as fields or attributes associated with Alerts and Events of the selected Incidents.

kvj_16-1675940851736.png

 

You can export data of a maximum of ten incidents at a time. Once the data download is in progress, you can select a different set of ten incidents and export their data simultaneously. You can repeat this action until the condition max-user-tasks, which is the maximum limit set for exporting the incidents data in the Respond service under rsa.respond.incident.exports is met.

For more information, see Escalate or Remediate the Incident topic in the NetWitness Respond User Guide.

User Interface

The following section describes the new enhancements for the NetWitness user interface:

NetWitness User Interface Enhancements

  • The 12.1.0.0 release includes the new NetWitness corporate logo. You can view the new logo in NetWitness Platform XDR, which updates the identity of NetWitness as a trusted brand.

  • As part of the repositioning, we are renaming our product as NetWitness Platform XDR. This change aims to simplify communications and improve our customers' understanding of how each product secures and protects within the NetWitness portfolio.

    kvj_17-1675940851772.png

     

    kvj_18-1675940851764.png

     

Endpoint Investigation

Initiate YARA Scans at the Endpoint Agent Level

Analysts can initiate YARA scans at the endpoint agent level by selecting one or multiple endpoint agents.

For more information, see the NetWitness Endpoint User Guide.

Enhanced Process Tree View for Endpoint Alerts on Respond

The Process Tree view on the Respond > Alerts > Endpoint Alerts > Alert details page is enhanced with the new File Actions tab next to Investigate Timeline. With this enhancement, analysts can quickly save a local copy of the selected file, download it to the server, or block it.

kvj_19-1675940851761.png

 

For more information, see the NetWitness Endpoint User Guide.

Concentrator, Decoder, and Log Decoder Services

Log Parsing:

  • Several new Format Types are added to DataType and VARTYPE elements for log parsing.

    • Format type duration can parse duration values in seconds using dateTime format specifiers.

    • Format type convert can perform several common conversion tasks as follows:

      • Format type convert Domain can normalize web domains which appear in "(3)www(7)example(3)com" formats to produce "www.example.com".

      • Format type convert Bytes can convert integer values between Bytes, KB, MB and GB.

  • Static Value Mapping capability is added to DataType and VARTYPE to allow event categorization and similar use cases.

    For more information on VARTYPE, see https://community.netwitness.com/t5/netwitness-knowledge-base/netwitness-11-x-type-and-pattern-validation-for-variables/ta-p/684779.

    For more information on defining Log Parsing, see the Log Parser Customization Guide.

 

What's New in 12.0.0.0What's New in 12.0.0.0

Policy Based Centralized Content Management

Policy based Centralized Content Management is a unified approach to find, deploy, and manage content through the entire life cycle based on policies that can be assigned to groups of devices. It is a single location to view, modify and manage the content deployed across all services in the environment.

Benefits of Policy based Centralized Content Management:

    • Add content from RSA Live or add your own custom content.
    • Add or remove content without repeating the process on each individual service.
    • Add a new service to an existing group to automatically deploy all necessary content.

kvj_20-1675940929822_1.png

                  

  • Simply toggle the Subscribe button to enable automatic updates of content.One-click management of subscriptions and automatic updateskvj_23-1675940929818_2.png
  • Provide highly responsive and updated UI for browsing RSA Live content that can help you with the following:
      • View Live and custom content along with your content policies and click kvj_22-1675940929829.png  to add content
      • Seamlessly view Live content along with your own custom content.
      • Centrally import and deploy live and custom content.

     

    kvj_23-1675940929818.png

     

For more information, see Policy based Centralized Content Management topic in the Live Services Management Guide.

Springboard

The following section describes the new enhancements for the Springboard component:

Enhanced Springboard to Support New Built-in Panels

NetWitness Platform Springboard introduces five more out-of-the-box panels based on the events processed and presented on Springboard view. On the Springboard, Administrators and Analysts can now view the following panels of events data which helps in threat hunting and investigation:

  • MITRE ATT&CK tactics

  • MITRE ATT&CK techniques

  • Indicators of Compromise

  • Enablers of Compromise

  • Behaviors of Compromise

Administrators can customize these panels to display only the event-focused data for analysts to carry out further investigation.

For more information, see Managing the Springboard topic in NetWitness Platform Getting Started Guide.

 

kvj_24-1675940929967.png

Create Custom Springboard at the User Level

Administrators and Analysts can now add their own custom private board to the NetWitness Platform Springboard and add panels with important system indicators, which helps in threat hunting and investigation. The custom private board is visible only for users who created it. The board allows users to organize and manage information in an easy manner.

For more information, see Managing the Springboard topic in NetWitness Platform Getting Started Guide.

kvj_25-1675940929931.png

Automated Custom Springboard from Query

During investigation, Administrators and Analysts can add a Springboard panel from the Investigate > Events view. You can add any number of filters on the query search bar and convert them to Springboard panels for further detection and watch results. The newly added panels will be saved under a custom private board. The board will allow users to organize and manage information in an easy manner.

For more information, see Add Springboard Panels from Events view topic in NetWitness Platform Investigate User Guide.

 

kvj_26-1675940929945.png

 

Respond

The Respond view is enhanced to track and capture all the events performed by the users on an incident. The toolbar actions are enhanced to allow users select only the valid priority, status, and assignee for an incident.

Incident Workflow Enhancements

The following changes have been made to the Change Status drop-down list in the Respond > Incidents view:

  • Added the new Incident status Reopen to help users open the closed incidents.
  • Removed New and Assigned statuses but they are still displayed in the Status column in the Respond > Incidents > Incidents List view.

  • Streamlined the incident status change workflow. All the invalid statuses are grayed out, allowing the users to select only the valid status for any incident.

    For more information, see Escalate or Remediate the Incident topic in the NetWitness Respond User Guide.

Incident Details View Enhancements

The new History Panel is added to display every action performed by the user on an incident. The various actions performed on an incident are as shown below:

  • Incident Assignee Change

  • Incident Status Change

  • Incident Priority Change

  • Incident Creation

    For more information, see Incident Details View topic in the NetWitness Respond User Guide.

Incident Overview Panel Enhancements

The Incident Overview Panel is enhanced to include the following fields:

  • Time to Acknowledge(tta): Displays the time taken to assign an Incident after creating it.

  • Time to Detect(ttd): Displays the time taken for completing the task after the Incident is assigned.

  • Time to Resolve(ttr): Displays the time taken for closing the task after the Incident is created.

  • External ID: Allows storing the Incident ID referrals from a different platform.

    For more information, see Incident Overview Panel topic in the NetWitness Respond User Guide.

Investigation

The following section describes the new enhancements for the Investigation component:

Indicators for Searchable Meta

The meta key and meta value pairings now display a binocular icon while viewing a text reconstruction in the Event Meta panel, indicating the search option. This enhancement helps the analysts to visually see the indication rather than going through the list of all metadata to figure out which ones may be searched.

For more information, see the NetWitness Platform Investigate User Guide.

kvj_27-1675940929972.png

 

Unified Discovery and Interaction of Events Metadata

Hosts and Files Alerts Details View

 

Analysts have a unified way to interact with events metadata presented in the Alerts tab of Hosts and Files details view to perform actions or review contextual information. Analysts can use the right and left click options to view the unified panel data.

For more information on Hosts and Files, see Analyze Hosts Using the Risk Score and Analyze Files Using the Risk Score topics in NetWitness Platform Endpoint User Guide.

kvj_28-1675940929988.png

 

 

kvj_29-1675940929858.png

 

 

Respond View

Analysts have a unified way to interact with events metadata presented in the Respond view to perform actions or review contextual information.

On the Respond Indicators panel, Nodal Graph, and Events List view, analysts can use the left and right click options to view the unified panel data.

 

kvj_30-1675940929820.png

 

 

kvj_31-1675940929960.png

 

 

For more information, see NetWitness Platform Respond User Guide.

Enhanced Querying on Events View to Exclude any Specific Meta

Analysts can now exclude particular meta values while querying using the NOT(meta contains 'meta value') option available in the investigate unified panel. The specified meta value is removed from the query results when you use NOT(meta contains 'meta value') with Append or Refocus option on a specific meta value. This enhancement helps the analysts to view only the required data results in an optimized manner and conduct further investigation efficiently.

For more information, see the NetWitness Platform Investigate User Guide.

 

kvj_32-1675940930079.png

 

View Encrypted Data in Decrypted Format

Analysts can directly view encrypted data that has been decrypted by the decoder, thereby reducing time and effort in converting data into readable format. The analysts can enable using the Display Decrypted Payload toggle option in the Events > Text view.

For more information, see the Text Reconstruction topic in the NetWitness Platform Investigate User Guide.

 

kvj_33-1675940930110.png

 

Select Custom Date and Time Range in the Events View

Analysts can set a custom range in the Investigate > Events view to select a specific time, date, month, and year using the calendar view that is displayed on clicking the Custom Range option. This enhancement helps the analysts to select date and time quickly and avoid manual intervention therefore avoiding human errors (typos).

For more information, see Select a Time Range topic in the NetWitness Platform Investigate User Guide.

 

kvj_34-1675940930015.png

 

User Interface

The following section describes the new enhancements for the NetWitness user interface:

NetWitness User Interface Enhancements

  • The 12.0.0.0 release includes the new NetWitness corporate logo. You can view the new logo in NetWitness Platform, which updates the identity of NetWitness as a trusted brand.

  • As part of the repositioning, we are renaming our product as NetWitness Platform XDR. This change aims to simplify communications and improve our customers' understanding of how each product secures and protects within the NetWitness portfolio.

kvj_35-1675940930553.png

 

 

kvj_36-1675940929951.png

 

 

Endpoint Investigation

The following section describes the new enhancements for the Endpoint component:

Detection of removable Storage Devices

NetWitness Endpoint Agents are enhanced with the capabilities to detect and report removable storage devices. The Endpoint agents will detect and report when a removable storage device is plugged in or removed. This enhancement provides analysts with extended threat detection capabilities. For more information, see the NetWitness Endpoint User Guide.

Block Multiple File Hashes Using an Imported File

Administrators can import a file with a list of known file hashes that are not present in the environment and block them as soon as they are detected. This enhancement will help analysts to block multiple hashes without manual intervention.

Support for Arm-based Windows Machines

Administrators can install Endpoint agents on Arm-based Windows machines. This enhancement provides analysts with threat detection capabilities on more types of devices.

Download MFT from Multiple Hosts in One Step

Analysts can now download MFT(Master File Table) from multiple hosts on the Hosts list view in one step. This enhancement helps analysts download MFT without opening the Host details view of each host. For more information, See Download Master File Table topic on NetWitness Endpoint User Guide.

Customizable Maximum File Download Limits

The limit to the maximum number of file downloads on the Endpoint server is enhanced. On the explore page of an Endpoint server, Administrators can set the limit from 100 to 1000 files. For more information, see Download Files Using Full Path or Wildcard on NetWitness Endpoint User Guide.

Redesigned Alert Details View for Endpoint Alerts in Respond

In the Respond view, the alert details view for Endpoint alerts shows end-to-end details about an alert. The details are presented in the form of a process tree along with a right panel that provides detailed information about the alert categorized into the following sections:

  • Summary: A short summary of the alert.

  • Event Details: Shows the directory, user, hash, signature, risk score, etc.

  • Process Details: Shows the tactics, techniques, times and details about the targets.

  • Network Connections: Shows any network connection established ten minutes before and till ten minutes after the alert triggered time.

  • Origin: Shows how the selected file in the process tree is originated.

  • Exists on Hosts: The host in which the selected file in the process tree exists.

Besides the above sections, the Investigate Timeline takes to the investigate view that has more detailed information.

For more information, see Review Endpoint Alerts using Process Tree on the NetWitness Respond User Guide.

 

kvj_37-1675940929846.png

 

Concentrator, Decoder, and Log Decoder Services

The following section describes the new enhancements for the Concentrator, Decoder, and Log Decoder components:

Log Parsing Enhancements

The following log parsing enhancements are made in 12.0.0.0 version. These are new elements that you use in the creation of a log parser:

New Selector Parsing Element Added to Dynamically Map Captured Values to a Meta Key

This will allow the log parser to automatically choose from two or more optional meta keys to assign to a parsed value depending upon the value of another meta key. Consider the following sample log snippet:

 

kvj_38-1675940929805.png

 

In the above example, if the value of Direction is ”src”, then the preferred meta key to use for the value of Address would likely be ip.src. Conversely, if the value for Direction is ”dest”, then the meta key ip.dst might be preferred. This can now be achieved with the new SELECTOR log parsing element.

Support for Advanced Parsing Elements within CEF Parser and DataType

Support added to CEF parser for VARTYPE, SCANNED, DataType, and Selector parsing elements.

  • Allows the CEF parser to take advantage of the fine parsing capabilities found in other parsers.

Dynamic parsing support including PARSERULESCAN added to DataType parsing element.

  • Allows nesting of dynamic parsing elements (parse rules) from within an existing DataType.

Enhanced Network Decoder to Decrypt Incoming TLS 1.3 Packets

The enhanced network packet decryption capability helps inspect TLS 1.3 encrypted communications using ephemeral session keys. Administrators can configure Network Decoder to enable decryption of incoming TLS 1.3 network packets.

For more information, see the NetWitness Decoder Configuration Guide.

Event Stream Analysis (ESA)

The Event Stream Analysis is enhanced to reduce the time consumed for new rules deployment.

Improved ESA Rules Deployment

The ESA Rule Deployment has been enhanced with a new option to deploy the rules faster. If you want to push rule-related changes, you can quickly deploy the new rules by clicking the Fast Deploy option. For more information, see Alerting with ESA Correlation Rules User Guide.

Reports

The following section describes the new enhancements for the Reports component:

Build Rule View Enhancements

The Build Rule view is enhanced to help users view the following information in the report generated:

  • The average time taken to assign the incident.
  • The average time taken to complete the task.
  • The average time taken to close the incident.

The following changes have been made in the Build Rule view:

  1. Two new options are added in the From field:

    • incidentStats: The following metas are supported for incidentStats:

      1. created

      2. mtta.time: Displays the average time taken to acknowledge the incidents in a single day.

      3. mtta.count: Displays the number of incidents acknowledged in a single day.

      4. mttd.count: Displays the number of incidents detected in a single day.

      5. mttd.time: Displays the average time taken to detect the incidents in a single day.

      6. mttr.time: Displays the average time taken to resolve the incidents in a single day.

      7. mttr.count: Displays the number of incidents resolved in a single day.

      These metas are displayed in the report generated. Refer the following figure.

      kvj_39-1675940930416.png

       

    • incidentUserStats: The following metas are supported for incidentUserStats:

      1. userName: Displays the assignee's or the user's ID for the associated user stats.

      2. totalClosedCount: Displays the total number of Incidents closed by the assignee till date.

      3. meanTimeToDetect: Displays the average time taken by the user to detect the incidents in the time range selected.

      4. mttdCount: Displays the count of incidents contributing to the MTTD value computed.

      5. incidentIds: Displays the list of incident IDs closed by the user during the time range selected.

      These metas are displayed in the report generated. Refer the following figure.

      kvj_40-1675940929866.png

       

  2. New metas are added for incident. The newly added metas are as shown below:

    • assignee.id

    • tta(Time to Acknowledge): Displays the time taken to assign an Incident after creating it.

    • ttd(Time to Detect): Displays the time taken for completing the task after the Incident is assigned.

    • ttr(Time to Resolve): Displays the time taken for closing the task after the Incident is created.

      These metas are populated on the Test Rule view. Refer the following figure.

      kvj_41-1675940930137.png

       

      For more information, see the Create a Rule Using Respond Data Source topic in the NetWitness Reporting User Guide.

What's New in 11.7.3.0What's New in 11.7.3.0

The NetWitness 11.7.3.0 Release Notes describe new features, enhancements, security fixes, upgrade paths, fixed issues, known issues, end-of-life functionality, build numbers, and self-help resources.

Security Fixes

This service pack release of NetWitness Platform XDR addresses the following vulnerabilities:

  • CVE-2022-4378

  • CVE-2022-42703

  • CVE-2022-37434

  • CVE-2023-0494

  • CVE-2022-22934

  • CVE-2022-22935

  • CVE-2022-22936

  • CVE-2022-22941

  • CVE-2023-0767

  • CVE-2023-0286

For more information on the various vulnerabilities fixed in this service pack release, see https://community.netwitness.com/t5/netwitness-platform-advisories/ct-p/netwitness-advisories#security

Note: If you have the Export Connector plugin in your deployment, you must do the following:
- If you have Logstash installed separately, not as part of the NetWitness installation, you must uninstall the Export Connector plugin and install the updated Export Connector plugin after 11.7.3 patch upgrade. For more information to install the updated plugin, see Post-Upgrade Tasks on the Upgrade Guide for 11.7.3
- If you have Logstash installed as part of the NetWitness installation on the Log Collector service, the updated Export Connector plugin will be automatically installed during the 11.7.3 patch upgrade.
In both the above cases, the old Export Connector plugin files are not automatically removed after upgrade. You must remove the old plugin files, so the scans do not list them as vulnerabilities. For more information on how to remove the old plugin files, see see Post-Upgrade Tasks on the Upgrade Guide for 11.7.3

Endpoint Enhancements

  • The Hosts and Files view is enhanced to help Analysts view the actual risk score of the Blacklisted files. The risk score of the files increases once they are blacklisted.

  • File Name column is exported when you export the Files attributes to a CSV file.

  • The timeouts or delays in mongo.db due to the presence of huge bash history for a few agents are resolved.

Usability Enhancements

The Test Chart feature in Reports (Reports > Charts > Add new chart > Test Chart) is enhanced to load with different time ranges.

Upgrade Paths

The following upgrade paths are supported for NetWitness Platform XDR 11.7.3.0:

  • 11.7.2.0 to 11.7.3.0

  • 11.7.1.2 to 11.7.3.0

  • 11.7.1.1 to 11.7.3.0

  • 11.7.1.0 to 11.7.3.0

  • 11.7.0.2 to 11.7.3.0

  • 11.7.0.1 to 11.7.3.0
  • 11.7.0.0 to 11.7.3.0
  • 11.6.1.4 to 11.7.3.0
  • 11.6.1.3 to 11.7.3.0
  • 11.6.1.2 to 11.7.3.0
  • 11.6.1.1 to 11.7.3.0
  • 11.6.1.0 to 11.7.3.0
  • 11.6.0.0 to 11.7.3.0
  • 11.5.3.3 to 11.7.3.0
  • 11.5.3.2 to 11.7.3.0

For more information on upgrading to 11.7.3.0, see Upgrade Guide for NetWitness Platform XDR 11.7.3.0

What's New in 11.7.2.0What's New in 11.7.2.0

The NetWitness Platform XDR 11.7.2.0 release provides new features and enhancements for every role in the Security Operations Center.

 

Security Fixes 

This service pack release of NetWitness Platform XDR addresses the following vulnerabilities:

  • CVE-2022-2526

  • CVE-2022-21123

  • CVE-2022-21125

  • CVE-2022-21166

  • CVE-2022-21618

  • CVE-2022-21619

  • CVE-2022-21624

  • CVE-2022-21626

  • CVE-2022-21628

  • CVE-2022-29154

  • CVE-2022-38177

  • CVE-2022-38178

  • CVE-2022-39399

  • CVE-2022-40674

For more information on the various vulnerabilities fixed in this service pack release, see https://community.netwitness.com/t5/netwitness-platform-advisories/ct-p/netwitness-advisories#security

 

 
Note: If you have the Export Connector plugin in your deployment, you must do the following:
- If you have Logstash installed separately, not as part of the NetWitness installation, you must uninstall the Export Connector plugin and install the updated Export Connector plugin after 11.7.2 patch upgrade. For more information to install the updated plugin, see Post-Upgrade Tasks on the Upgrade Guide for 11.7.2
- If you have Logstash installed as part of the NetWitness installation on the Log Collector service, the updated Export Connector plugin will be automatically installed during the 11.7.2 patch upgrade.
In both the above cases, the old Export Connector plugin files are not automatically removed after upgrade. You must remove the old plugin files, so the scans do not list them as vulnerabilities. For more information on how to remove the old plugin files, see see Post-Upgrade Tasks on the Upgrade Guide for 11.7.2

 

 

Upgrade Paths

The following upgrade paths are supported for NetWitness Platform XDR 11.7.2.0:

  • NetWitness Platform XDR 11.5.3.2 to 11.7.2.0
  • NetWitness Platform XDR 11.5.3.3 to 11.7.2.0
  • NetWitness Platform XDR 11.6.0.0 to 11.7.2.0
  • NetWitness Platform XDR 11.6.1.0 to 11.7.2.0
  • NetWitness Platform XDR 11.6.1.1 to 11.7.2.0
  • NetWitness Platform XDR 11.6.1.2 to 11.7.2.0
  • NetWitness Platform XDR 11.6.1.3 to 11.7.2.0
  • NetWitness Platform XDR 11.6.1.4 to 11.7.2.0
  • NetWitness Platform XDR 11.7.0.0 to 11.7.2.0
  • NetWitness Platform XDR 11.7.0.1 to 11.7.2.0
  • NetWitness Platform XDR 11.7.0.2 to 11.7.2.0
  • NetWitness Platform XDR 11.7.1.0 to 11.7.2.0
  • NetWitness Platform XDR 11.7.1.1 to 11.7.2.0
  • NetWitness Platform XDR 11.7.1.2 to 11.7.2.0

For more information on upgrading to 11.7.2.0, see Upgrade Guide for NetWitness Platform XDR 11.7.2.0

 

What's New in 11.7.1.2

What's New 11.7.1.2

The NetWitness 11.7.1.2 release notes provides information about the changes in NetWitness Platform 11.7.

 

Fixed Issues

For more information on Fixed Issues, see Fixed Issues.

 

Security Fixes

The Log4j vulnerability recently discovered in the commonly used open source logging library has been addressed. This applies to CVE-2021-44228. For more information, see the Security Advisory for Log4j.

 

 
 Note: This patch release of NetWitness addresses log4j vulnerabilities reported till date. The following CVEs were validated and found to be not exploitable.
- CVE-2021-44228
- CVE-2021-44832
- CVE-2021-4104
- CVE-2021-45105
- CVE-2021-45046
NetWitness will continuously monitor this issue for new developments and provide periodic updates.
 

 

 

 
 Note: If you have the Export Connector plugin in your deployment, you must do the following:
- If you have Logstash installed separately, not as part of the NetWitness installation, you must uninstall the Export Connector plugin and install the updated Export Connector plugin after 11.7.1.2 patch upgrade. In this case, the old Export Connector plugin files are not automatically removed after upgrade. You must remove the old plugin files, so the scans do not list them as vulnerabilities. For more information on how to remove the old plugin files and install the updated plugins, see Post-Upgrade Tasks.
- If you have Logstash installed as part of the NetWitness installation on the Log Collector service, the updated Export Connector plugin will be automatically installed during the 11.7.1.2 patch upgrade.
 

 

 

 
Note: The traces of the old .jar files with the vulnerable versions of log4j in /tmp/jetty folder are found while upgrading from 11.5.x.x and 11.6.x.x versions to 11.7.x.x version. As a result, the scans reported the presence of older versions of log4j vulnerability. This issue has been addressed and the /tmp/jetty folder is cleaned up to remove the older versions of log4j vulnerability.

 

 For more information on the various vulnerabilities fixed in this patch release, see https://community.netwitness.com/t5/netwitness-platform-product/nw-2022-01-multiple-components-within-netwitness-platform/ta-p/684904.

 

 Upgrade Paths

The following upgrade paths are supported for NetWitness 11.7.1.2:

  • NetWitness 11.5.3.2 to 11.7.1.2
  • NetWitness 11.5.3.3 to 11.7.1.2
  • NetWitness 11.6.0.0 to 11.7.1.2
  • NetWitness 11.6.0.1 to 11.7.1.2
  • NetWitness 11.6.1.0 to 11.7.1.2
  • NetWitness 11.6.1.1 to 11.7.1.2
  • NetWitness 11.6.1.2 to 11.7.1.2
  • NetWitness 11.6.1.3 to 11.7.1.2
  • NetWitness 11.6.1.4 to 11.7.1.2
  • NetWitness 11.7.0.0 to 11.7.1.2
  • NetWitness 11.7.0.1 to 11.7.1.2
  • NetWitness 11.7.0.2 to 11.7.1.2
  • NetWitness 11.7.1.0 to 11.7.1.2

  • NetWitness 11.7.1.1 to 11.7.1.2

What's New in 11.7.1.1What's New in 11.7.1.1

 The NetWitness 11.7.1.1 release notes provides information about the changes in NetWitness Platform 11.7.

 

Fixed Issues

For more information on Fixed Issues, see Fixed Issues.

Security Fixes

The Log4j vulnerability recently discovered in the commonly used open source logging library has been addressed. This applies to CVE-2021-44228. For more information, see the Security Advisory for Log4j.

 

 
Note: This patch release of NetWitness addresses log4j vulnerabilities reported till date. The following CVEs were validated and found to be not exploitable.
- CVE-2021-44228
- CVE-2021-44832
- CVE-2021-4104
- CVE-2021-45105
- CVE-2021-45046
NetWitness will continuously monitor this issue for new developments and provide periodic updates.

 

 

 
Note: If you have the Export Connector plugin in your deployment, you must do the following:
- If you have Logstash installed separately, not as part of the NetWitness installation, you must uninstall the Export Connector plugin and install the updated Export Connector plugin after 11.7.1.1 patch upgrade. In this case, the old Export Connector plugin files are not automatically removed after upgrade. You must remove the old plugin files, so the scans do not list them as vulnerabilities. For more information on how to remove the old plugin files and install the updated plugins, see Post-Upgrade Tasks.
- If you have Logstash installed as part of the NetWitness installation on the Log Collector service, the updated Export Connector plugin will be automatically installed during the 11.7.1.1 patch upgrade.

 

Upgrade Paths

The following upgrade paths are supported for NetWitness 11.7.1.1:

  • NetWitness 11.5.3.2 to 11.7.1.1
  • NetWitness 11.5.3.3 to 11.7.1.1
  • NetWitness 11.6.0.0 to 11.7.1.1
  • NetWitness 11.6.0.1 to 11.7.1.1
  • NetWitness 11.6.1.0 to 11.7.1.1
  • NetWitness 11.6.1.1 to 11.7.1.1
  • NetWitness 11.6.1.2 to 11.7.1.1
  • NetWitness 11.6.1.3 to 11.7.1.1
  • NetWitness 11.6.1.4 to 11.7.1.1
  • NetWitness 11.7.0.0 to 11.7.1.1
  • NetWitness 11.7.0.1 to 11.7.1.1
  • NetWitness 11.7.0.2 to 11.7.1.1
  • NetWitness 11.7.1.0 to 11.7.1.1

 

Enhancements

The following section lists the enhancements to specific capabilities. To locate the document referred to in this section, go to the NetWitness Platform 11.x - All Documents. Product Documentation has links to the documentation for this release.

 

Reports

View Creator Information

The Created By column has been added to the Reports List page. This column enables you to view and analyze the ownership information of all the reports that exist in the system, which includes new, copied, and imported reports. When a report is exported, the owner details are retained. However, when a report is copied, the owner of the report changes to the user who created the copy. For more information, see the Reporting User Guide.

 

Log Collection

Administrators can now fetch the user information from the logs collected through MSExchange Management channel.

To view the user information:

  1. Navigate to Server Manager > Diagnostics > Event Viewer > Applications and Services Logs > MSExchange Management.

  2. In the MSExchange Management view, select the log file.

  3. Click the Details tab. Select the XML View.

  4. Select EventData. The third row in the <EventData> section displays the required user information.

 

 
Note:  Alternatively, you can select the Friendly View under the Details tab to view the user information in the EventData section.

 

What's New in 11.7.1.0What's New in 11.7.1.0

Upgrade

Pre-stage the upgrade repo to minimize downtime

Administrators can pre-stage the upgrade repository by downloading the required packages (.zip) without affecting the system. This minimizes the upgrade downtime and ensures the upgrade is completed within the planned time. The Pre-Stage Host option is available on the NetWitness UI and requires the NetWitness Server Host to be connected to Live Services. For more information, see Hosts and Services Maintenance Procedures topic in the Hosts and Services Getting Started Guide.

Note: You can use this feature only if you upgrade from 11.7.1.0 to a higher version.

Support for Additional Pre-Upgrade Check Utility

Additional health-check utility is introduced for Administrators to analyze the current NetWitness setup and identify conditions that may impact the upgrade. If any issues are detected, the issues can be resolved before proceeding with the upgrade.

The pre-upgrade check verifies the following:

  • (Component Hosts) Node X Service Status - Verifies the status of services (Active or In Active) on all the Node X.

  • (Component Hosts) Node X Certificates Check - Checks the certificate expiry, missing, corrupted, and issuer mismatch in all categories of Node X.

  • CPU-Memory Info - Provides CPU and Memory details along with the real-time available memory.

  • (Admin Server) Node 0 File System Utilization - Verifies the disk partition utilization of /var/netwitness/mongo, /var/netwitness and root on Node 0.

  • (Component Hosts) Node X File System Utilization - Verifies the disk partition utilization of /var/netwitness/mongo, /var/netwitness and root for ESA Primary, Endpoint Log Hybrid, and UEBA services on Node X.

  • Mongo File (ESAPrimary) - Checks the ESA Primary node in the system and verifies the permission mode of mongo file.

  • Orchestration Server Normal Mode - Checks if the orchestration service is running in normal or safe mode.

  • (Admin Server) Node 0 Init status - Checks if there are any issues that might fail init process.

  • (Admin Server) Node 0 closed ports - Checks if the service ports required for NetWitness services are open and listening on Node 0.

  • (Component Hosts) Node X closed ports - Checks if the service ports required for NetWitness services are open and listening on Node X.

    For more information, see Upgrade Guide for NetWitness 11.7.1.0.

Investigation - SIEM and Network Traffic Analysis

Investigation Enhancements

Unified Discovery and Interaction of Investigate Metadata - Analysts have a unified way to interact with metadata presented in the Events view to perform actions or review contextual information.

    • Analysts can perform actions and view the context data for a selected meta in the same window or a separate window that will enable the display of data in an optimized manner, and easily carry out further investigation.

kvj_42-1675941089687.png

 

For more information, see the Use Columns and Column Groups in the Events List topic in Investigate User Guide.

  • In the Overview and Event Meta panel, analysts can use the right and left click options to view the unified panel or run a query on a selected meta.

     

    kvj_43-1675941089563_3.png

For more information, see the Use Columns and Column Groups in the Events List topic in Investigate User Guide.

 

Free-form Query Preference - With the new preference, analysts can choose to split the free-form queries into multiple guided filters or a single free-form query. Analysts can switch the modes using the Free Form Split checkbox.

kvj_44-1675941090259.png

 

Light Theme Overhaul – The existing light theme primary and secondary colors on the UI has been enhanced to provide better contrast and shading for improved user experience.

For more information, see the Investigate User Guide.

Endpoint Investigation

Capabilities for Detecting Ransomware that Use the Registry

Endpoint agents can detect ransomware that uses the registry to perform actions such as forcing Windows machines to reboot in safe mode, encrypting files, and deleting volume shadow copies.

Endpoint Agent Support for macOS Monterey and Windows 11

Endpoint Agents are enhanced to support macOS Monterey (12.0.1) and Windows 11. To view the list of supported operation systems, see Introduction to Endpoint Agent Installation on the NetWitness Endpoint Agent Installation Guide.

Support for Offline or Standalone Scans on Air-gapped Windows Hosts

Administrators can execute offline or standalone scans on air-gapped Windows hosts to perform threat analysis on the Windows hosts disconnected from the network. Administrators can download the Offline Scan Configuration file from UI and execute it on multiple air-gapped hosts. Then, the Offline Scan File(scan results file) can be transferred to the UI and uploaded to the Endpoint server for processing. See Standalone Scan on Air-gapped Windows Hosts topic on NetWitness Endpoint User Guide for more information.

kvj_45-1675941089559.jpeg

 

Support for Full System Scan

Analysts can perform a full system scan on system drives and all fixed drives in addition to the quick scan of executable files in memory. For more information, see Scan Hosts topic on NetWitness Endpoint User Guide.

kvj_46-1675941089558.jpeg

 

Redesigned Alerts Tab for Optimized Navigation

Analyst can use the redesigned alerts tab to conveniently access all alert information and the associated events for optimized navigation on Host details view. For more information, see NetWitness Endpoint User Guide.

kvj_47-1675941089693.png

 

Concentrator, Decoder, and Log Decoder Services

Centralized Configuration Management Enhancements

The enhanced centralized configuration management allows administrators to:

  • Reconfigure 10G Network Decoders from the Policy UI. Administrators can quickly create 10G policies for each Decoder group based on the hardware profile.

  • Clone policy from an existing service to save policy transition time for existing users.

  • Restart only specific services within a service group that require changes. This minimizes potential downtime.

For more information, see Host and Services Getting Started Guide.

Enhanced Network Decoder to Support Load Balancing Deployments

When you shut down the Decoders, the network interfaces connected to the Decoders are automatically shut down. Then, the load balancers divert the traffic to other available Decoders. This enhancement will protect customers from data loss when they use load balancers to distribute traffic between several Decoders. For more information, see Configure the Decoder Capture Failover in Load Balance Deployments topic on Decoder and Log Decoder Configuration Guide.

Event Stream Analysis (ESA)

Enhanced Performance when Retaining Incident Network Data Artifacts

Respond analysts saving artifacts of an incident will notice improved feedback for the tasks running and swifter completion of those tasks.

Analyst can use the new Retention Usage tab to view the statistics of all configured services and the percentage used by the pinned cache directories.

With this information, the analyst can:

  • Determine if the disk is running out of space and if additional space needs to be added or the persistence needs to be suspended for the existing events in an incident.
  • Obtain insights on the space requirements for retention functions.

In Respond > Incidents tab, analyst can click the Retention Usage tab to fetch all the statistics of all the configured services and the percentage used by the pinned cache directories.

kvj_48-1675941089554.png

 

kvj_49-1675941089561.png

 

For more information, see Escalate or Remediate the Incident topic the Respond User Guide.

Configuration Updates

Feed Case Sensitivity

Administrators can configure to ignore the case sensitivity of values a feed uses as part of the feed wizard in the UI. This allows the administrator to avoid converting the feed into an XML format or perform additional steps during deployment. For more information, see Creating a Custom Feed in the Live Services Management Guide.

NetWitness Topology Feature

The following enhancements help administrators and analysts to:

  • Obtain quick insights using the Search Option – The search option helps locate a specific service, without having to look at the entire hierarchical layout.

  • View ESA hosts: ESA service and the connected services can be viewed in the hierarchical layout.

    kvj_50-1675941089697.png

     

For more information, see the Hosts and Services Getting Started Guide.

Platform

Backup and Restore CLI Improvements

Administrators can take advantage of the following improvements:

  • Back up Mongo databases for Endpoint and ESA instances.

  • Include Broker index for NetWitness node in which Broker service is running.

  • Back up custom files and folders provided by user.

For more information, see the Recovery Tool User Guide.

Better Error Handling for Core Services Messages

Improved error messaging to include the source string and target format when an unrecognized string format exception is generated to help users determine the root cause.

Support for new internal RAID controller (PERC H750) on Series 6 Appliances

The existing internal controller (PERC H740 Mini) on S6 RSA PowerEdge 640/740 based appliances are replaced with PERC H750. All S6 appliances will have the new ISO to support PERC H750. All future S6 appliances and RMA will have PERC H750. Before adding a new appliance with PERC H750 to your existing deployment (For example, 11.7.0.0 or 11.7.0.1), you must first upgrade the Admin Server and Standby Admin Server to version 11.7.0.2 or higher.

 

What's New in 11.7.0.2What's New in 11.7.0.2

The NetWitness 11.7.0.2 release notes provides information about the hardware changes in NetWitness Platform 11.7.

 

Security Fixes

The Log4j vulnerability in the commonly used open source logging library has been addressed. For more information, see the 11.7.0.1 Release Notes.

 

Support for new internal RAID controller (PERC H750) on Series 6 Appliances

The existing internal controller (PERC H740 Mini) on S6 RSA PowerEdge 640/740 based appliances is replaced with PERC H750. All S6 appliances from now on will have the new ISO to support PERC H750.

 

 
Note:  By default, all future S6 appliances and RMA will have PERC H750, so you must upgrade the Admin Server and Standby Admin Server to 11.7.0.2, before adding a new appliance with PERC H750 to your existing 11.7.0.0 or 11.7.0.1 deployment.

 

Upgrade Paths

The following upgrade paths are supported for NetWitness 11.7.0.2:

  • NetWitness 11.5.3.2 to 11.7.0.2
  • NetWitness 11.5.3.3 to 11.7.0.2
  • NetWitness 11.6.0.0 to 11.7.0.2
  • NetWitness 11.6.0.1 to 11.7.0.2
  • NetWitness 11.6.1.0 to 11.7.0.2
  • NetWitness 11.6.1.1 to 11.7.0.2
  • NetWitness 11.6.1.2 to 11.7.0.2
  • NetWitness 11.6.1.3 to 11.7.0.2
  • NetWitness 11.7.0.0 to 11.7.0.2
  • NetWitness 11.7.0.1 to 11.7.0.2

What's New in 11.7.0.1What's New in 11.7.0.1

The NetWitness 11.7.0.1 release notes provides information about the changes in NetWitness Platform 11.7.

Security Fixes

The Log4j vulnerability recently discovered in the commonly used open source logging library has been addressed. This applies to CVE-2021-44228. For more information, see the Security Advisory for Log4j.

 

 
Note: This patch release of NetWitness addresses log4j vulnerabilities reported till date. The following CVEs were validated and found to be not exploitable.
- CVE-2021-44228
- CVE-2021-44832
- CVE-2021-4104
- CVE-2021-45105
- CVE-2021-45046
NetWitness will continuously monitor this issue for new developments and provide periodic updates.

 

 
Note: If you have the Export Connector plugin in your deployment, you must do the following:
- If you have Logstash installed separately, not as part of the NetWitness installation, you must uninstall the Export Connector plugin and install the updated Export Connector plugin after 11.7.0.1 patch upgrade. For more information to install the updated plugin, see Post-Upgrade Tasks.
- If you have Logstash installed as part of the NetWitness installation on the Log Collector service, the updated Export Connector plugin will be automatically installed during the 11.7.0.1 patch upgrade.

In both the above cases, the old Export Connector plugin files are not automatically removed after upgrade. You must remove the old plugin files, so the scans do not list them as vulnerabilities. For more information on how to remove the old plugin files, see Post-Upgrade Tasks.

 

Upgrade Paths

The following upgrade paths are supported for NetWitness 11.7.0.1:

  • NetWitness 11.5.3.2 to 11.7.0.1
  • NetWitness 11.5.3.3 to 11.7.0.1
  • NetWitness 11.6.0.0 to 11.7.0.1
  • NetWitness 11.6.0.1 to 11.7.0.1
  • NetWitness 11.6.1.0 to 11.7.0.1
  • NetWitness 11.6.1.1 to 11.7.0.1
  • NetWitness 11.6.1.2 to 11.7.0.1
  • NetWitness 11.6.1.3 to 11.7.0.1
  • NetWitness 11.7.0.0 to 11.7.0.1

What's New in 11.7.0.0What's New in 11.7.0.0

Investigation

Meta Only Event Reconstruction

As analysts review events, the new compact and expanded metadata views provide an alternative workflow to only view the high-level details of the event and in use cases where no raw data is present.

kvj_51-1675941174824.png

 

Improved Broker Query Experience

Analyst queries at the top-level Broker now by default provide partial results when one of the sub-services loses connectivity or times out. In addition, a hierarchical view of what is attached to the Broker is available to analysts to exclude certain sub-services prior to query if necessary.

kvj_52-1675941174843.png

 

Email Reconstruction Improvement

Analyst can view the content of all the emails in a single session using the Expand All Emails option available on the Email view.

kvj_53-1675941174707.png

 

Direct Query Interaction with Meta Keys in Event Filter Panel

Analyst steps to create a query have been streamlined by clicking directly on the meta key name to generate a query with only the meta key. Alternatively, searches with combination of key value pairs are available inside the Event Filter panel without requiring direct interaction with the query bar.

kvj_54-1675941174841.png

 

Network Fragment Identification

Analysts can view the related sessions for an event for analysis and investigation by hovering over the icon for the event.

kvj_55-1675941174729.png

 

Saved Time Ranges

Analysts can take advantage of the last five recently used time ranges for future searches saving the investigation time. The saved time ranges are displayed under the Recent Time Ranges section.

kvj_56-1675941174830.png

 

For more information, see the Investigation User Guide.

Endpoint Investigation

Granular Role Based Access Control for Endpoint Server

With the enhanced RBAC (Role-Based Access Control), administrators can grant or revoke access to specific Endpoint servers rather than all. And the addition of new permissions called endpoint-server.file.analyze and endpoint-server.tag.manage, adds flexibility in managing user privileges. For more information on managing permissions for an individual Endpoint server, see NetWitness Endpoint Configuration Guide.

kvj_57-1675941174712.jpeg

 

Few Privileges Removed From endpoint-server.agent.manage And Added to endpoint-server.file.analyze

Analyze File, Save Local Copy and Scan with OPSWAT privileges are removed from endpoint-server.agent.manage and added to a new permission called endpoint-server.file.analyze. For more information see the System Security and User Management Guide.

Manage Hosts Using Tags

Analysts can create Tags to manage the hosts. Tags are custom texts (can combine alphanumeric and special characters) that you can create and assign to hosts. You can create host groups based on tags, and on the Hosts view, you can filter hosts by tags using the filters pane. Administrators can create and assign tags while generating the agent packager, and these are added to the hosts by default when the Endpoint agent is installed. For more information on managing tags, see NetWitness Endpoint User Guide.

kvj_58-1675941174706.jpeg

 

Enhanced Windows Agent to Support Detecting the Persistence Techniques Targeting the Registry

The enhanced Windows agents detects persistence techniques that use the Windows registry. The registry monitor is more reliable now as it detects suspicious activity in an enhanced manner. For more information, see the NetWitness Endpoint User Guide.

Enhanced Suspicious Thread Detection

This enhancement to the suspicious thread detection helps detect and report suspicious threads more effectively using different methods. This enhancement enables analysts to have access to all the details and capabilities related to the suspicious threads as before. For more information, refer NetWitness Endpoint User Guide.

Delete Blocked Files Through Elevated Command Prompt

You can delete the blocked files on the host using the delete command on the elevated command prompt on the host.

Concentrator, Decoder, and Log Decoder Services

Introduction of Centralized Configuration Management

The management of general NetWitness core services namely Concentrator, Decoder, and Log Decoder configurations can be administered centrally from a single policy-based interface and distributed to multiple services. With centralized configuration management, administrators can:

  • Create a group of the same service type based on similar hardware profiles or other criteria

  • Add configuration items to policies in order to customize settings. Any settings which are not in the policy will be left as default

  • Apply customized settings to any number of services in one step

  • Restart all services within a group to apply changes

  • View when an action is required, such as service restart, unpublished policies or out-of-compliance services indicated by the icon.

  • Revert changes to a policy or group quickly

    For more information, see Host and Services Getting Started Guide.

kvj_59-1675941174719.png

 

Enhanced Query Accuracy

An optional index configuration is available on a per meta key basis to extend the default key-value search into an N-gram layout. In addition to enabling query and reporting capabilities, this combination also provides complete and accurate search results, even if a maximum value threshold has been met.

For more information, see N-grams in the Core Database Tuning Guide.

Event Stream Analysis (ESA)

Enhancements for persisting Events and Incidents

Analysts can persist events encompassed in an incident, thus enabling to view the incident in the future, regardless of its age. Analysts can:

  • Pin or unpin multiple events at an incident and alert level

  • View details on when the events were persisted.

  • Check the status of the persisted events, whether it is Completed, Partial, or None.

  • Administrators can set up permissions for users to persist raw data associated with a particular incident.

For more information, see the Respond User Guide.

Platform

Backup and Restore Improvements

A new NetWitness Recovery Wrapper tool is introduced to centrally back up and restore individual or multiple hosts. This tool allows custom files to be incorporated in restorations and handles all supported deployment installations (Physical, Virtual, and Cloud).

With NetWitness Recovery Tool administrators can:

  • Back up (export) an individual, a specific, or all hosts at a time

  • Restore (import) an individual host at a time

  • Customize files or folders during backup and restore

  • Copy backup data to remote host location from NetWitness hosts and vice versa

For more information, see "Disaster Recovery (Back Up and Restore)" topic in the NetWitness Recovery Tool User Guide for NetWitness.

kvj_60-1675941174851.png

 

Upgrades

Introduction of Pre-Upgrade Check Utility

A new health-check utility is introduced for administrators to analyze the current NetWitness setup and identify conditions that may impact the upgrade. If any issues are detected, the issues can be resolved before proceeding with the upgrade.

The pre-upgrade check verifies the following:

  • Security Client File Check - Ensures security-client-amqp.yml file is not present

  • Node-0 NW Service-id Status - Ensures all the service-ids are intact with the services in Node 0

  • Broker Service Trustpeer Symlink - Ensures Broker symlink file (/etc/netwitness/ng/broker/trustpeers/) is not broken

  • Node-0 NW Services Status - Checks the status of all the services in Node 0

  • Yum External Repo Check - Ensures external repos are not available

  • RPM DB Index Check - Checks if the RPM DB is corrupted

  • Salt Master Communication - Verifies the salt communication from Node 0 to all the Nodes

  • Node-0 Certificates Check - Checks if any certificates are missing, expired, or invalid

  • Mongo Authentication - Validates the deploy_admin credentials fetched from security-cli-client using Mongo client

  • RabbitMQ Authentication - Validates the deploy_admin credentials fetched from security-cli-client using RabbitMQ

For more information, see Upgrade Guide for NetWitness 11.7.

kvj_61-1675941174836.png

 

NetWitness Services

Introduction of NetWitness Service Topology Map

A view of the hierarchical layout of all NetWitness core services depicting the collection and aggregation of services provides administrators and analysts quick insights into their deployment and the services that are online or offline. This topology displays only the Broker, Concentrator, Log Decoder, Packet Decoder, Hybrids, and Log Collector services.

Note: Reporting Engine, Malware Analysis, UEBA, Endpoint Server, Cloud Link service, and Warehouse Connectors are not supported.

 

What's New in 11.6.1.0What's New in 11.6.1.0

The RSA NetWitness Platform 11.6.1 release provides new features and enhancements for every role in the Security Operations Center.

GPG Key Changes

The GPG Signing for NetWitness has changed for releases beyond 11.6.0.0. For more information, see GPG Key Change in NetWitness Platform Beyond 11.6.0.0 GPG Key Change in NetWitness Platform Beyond 11.6.0.0.

Upgrade Paths

The following upgrade paths are supported for NetWitness Platform 11.6.1.0:

  • RSA NetWitness Platform 11.4.1.4 to 11.6.1.0

  • RSA NetWitness Platform 11.5.3.2 to 11.6.1.0
  • RSA NetWitness Platform 11.6.0.0 to 11.6.1.0
  • RSA NetWitness Platform 11.6.0.1 to 11.6.1.0

* If you are upgrading from 11.2.x.x, 11.3.x.x, you must upgrade to 11.4.1.4 or 11.5.3.2 before you can upgrade to 11.6.1.0

For more information on upgrading to 11.6.1.0, see Upgrade Guide for RSA NetWitness Platform 11.6.1.0

Enhancements

The following sections are a complete list and description of enhancements to specific capabilities:

  • Investigation - SIEM and Network Traffic Analysis
  • User Entity Behavior Analytics
  • Endpoint Investigation
  • Event Stream Analysis (ESA)
  • Log Collection
  • Reports

To locate the documents referred to in this section, go to the RSA NetWitness Platform 11.x Master Table of Contents. Product Documentation has links to the documentation for this release.

Investigation - SIEM and Network Traffic Analysis

Investigation Enhancements:

Compact View:

On the compact view, the Event Filter Panel and Event Meta Labels are optimized to display maximum information on a single page. With this view, analysts can easily perform the investigation. The label and icon size on the Event Filter Panel are optimized so that the meta keys and values are displayed on the same line.

CmVw_1082x508.png

Timeline Options

Analysts can now easily view the timeline for event by clicking on the icon. By default the timelines is enabled for all events.

TL3_1098x486.png

For more information, see the Investigate User Guide.

User Entity Behavior Analytics

Alert Feedback Enhancement

Analysts have the option to mark the status of mutliple alerts as Not a Risk or None. None is used when the events are Not a Risk. Multiple alerts grouped by date can be selected to perform this action. When the status is updated, the alert contribution score will change automatically, for example, if an alert is marked as Not a Risk, the alert score is reduced. If the status is updated as None, the score increases. For more information, see the UEBA User Guide.
AltFb_1027x507.png

Endpoint Investigation

Support for OPSWAT Scans

Analysts can simultaneously perform threat detection with multiple anti-malware engines with OPSWAT (MetaDefender Core). Executable files(PE, Macro, Script, ELF) will automatically be sent to the OPSWAT server for scanning. Analysts will get alerts if a file is found Infected or Suspicious (critical for Infected and High severity for Suspicious files). The risk score will also increase for the file and the corresponding host, thus helping to respond to threats quickly. For more information on how to use OPSWAT within the NetWitness Platform, see the NetWitness Endpoint User Guide. And, for more information on how to configure OPSWAT on endpoint servers, see NetWitness Endpoint Configuration Guide.

OPStatUg_979x479.png

Create groups with Machine OU as a filter

Analysts can use Machine Organizational Unit (Machine OU) as a filter while creating groups on the Admin > Endpoint Sources > Groups view. Using Machine OU to filter hosts can save much time and effort as it is more effective than using IPV4 or domain names in an environment with thousands of agents.

MachineOU_1026x585.png

Extended Agent Support for Mac BigSur (version 11) on M1

NetWitness Endpoint agents now support Mac BigSur on both M1 and Intel. For more information, see NetWitness Endpoint Agent Installation Guide.

Automatic download of memory DLL files

Analysts can now investigate the memory DLL files in detail. All memory DLL files that are detected during a scan, are automatically downloaded to the server irrespective of the file size.

MemDLLAuto_988x431.png

Added agent folder protection in the driver

Netwitness platform version 11.6.1 and higher, the files inside the agent folder are protected from delete, rename, or modification operations. This protection will prevent malware from locking files inside the agent folder to block sending the tracking data.

Event Stream Analysis (ESA)

Optionally Persist Incident Artifacts

You can persist events that are associated with particular incidents, thereby enabling you to view the incident in the future, regardless of its age. You can also add a new journal entry in the JOURNAL tab for the persisted events for future reference. The event data will always be available for viewing and reconstruction as long as the event is persisted, enabling you to easily refer back to details, even if the original event has rolled over from the NetWitness database.

Once you persist an event, the data is copied from the NetWitness database into a long term storage cache within the data source. The persisted events are saved in the directory /var/netwitness/pin- <servicetype>, by default. You can manually change the event storage location from the default directory to any other directory, as per the requirement. For more information, see the Respond User Guide.

Log Collection

Trusted Authentication for NetWitness Export Connector

Trusted authentication allows you to authenticate using the existing certificates for aggregation while configuring NetWitness Export Connector. This eliminates the need to manually enter the credentials (username and password) and avoid storing passwords locally.

Support for Logstash Keystore from UI

Logstash keystore management allows you to securely store and maintain (add, edit, or delete) secret values key and password through NetWitness Platform UI. The key set is used during the Logstash pipeline configuration.

This eliminates the need to manually create or update credentials on the Log Decoder or Virtual Log Collector using Logstash Keystore CLI commands. For more information, see the Log Collection Guide.

KeyStoreUI_841x368.png

Reports

View Creator Information

The Created By column has been added to the Reports List page. This column enables you to view and analyze the ownership information of all the reports that exist in the system, which includes new, copied, and imported reports. When a report is exported, the owner details are retained. However, when a report is copied, the owner of the report changes to the user who created the copy. For more information, see the Reporting User Guide.

Note: When you upgrade from a previous version to NetWitness Platform Release 11.6.1, the Created By column does not display the ownership information for the reports that exist prior to the upgrade.

 

110_ReportListPanel1_RN_833x293.png

 

What's New in 11.6.0.1What's New in 11.6.0.1

 

The RSA NetWitness Platform 11.6.0.1 release notes provides information about the changes in NetWitness Platform 11.6.

GPG Key Changes

The GPG Signing for NetWitness has changed for releases beyond 11.6.0.0. In order to upgrade to 11.6.0.1 release, you must first upgrade to a version that is signed by the old GPG key but contains the new GPG key. For more information, see GPG Key Change in NetWitness Platform Beyond 11.6.0.0.

Upgrade Paths

The following upgrade paths are supported for NetWitness Platform 11.6.0.1:

  • RSA NetWitness Platform 11.4.1.4 to 11.6.0.1
  • RSA NetWitness Platform 11.5.3.2 to 11.6.0.1
  • RSA NetWitness Platform 11.6.0.0 to 11.6.0.1

Security Fixes

For more information on Security Fixes, see Security Advisories.

 

 

 

 

 

What's New in 11.6.0.0What's New in 11.6.0.0

 

The RSA NetWitness Platform 11.6 release provides new features and enhancements for every role in the Security Operations Center.

Upgrade Paths

The following upgrade paths are supported for NetWitness Platform 11.6.0.0:

  • RSA NetWitness Platform 11.4.x.x to 11.6.0.0 *
  • RSA NetWitness Platform 11.5.x.x to 11.6.0.0

* If you are upgrading from 11.2.x.x, 11.3.x.x, you must upgrade to 11.4.x.x before you can upgrade to 11.6.

For more information on upgrading to 11.6.0.0, see Upgrade Guide for RSA NetWitness Platform 11.6

Enhancements

The following sections are a complete list and description of enhancements to specific capabilities:

  • Investigation - SIEM and Network Traffic Analysis
  • User Entity Behavior Analytics
  • Incident Response
  • Endpoint Investigation
  • Broker, Concentrator, Decoder, and Log Decoder Services
  • Event Stream Analysis (ESA)
  • Administration and Configuration
  • Context Hub
  • Log Collection
  • Licensing
  • Platform

To locate the documents referred to in this section, go to the RSA NetWitness Platform 11.x Master Table of Contents. Product Documentation has links to the documentation for this release.

Investigation - SIEM and Network Traffic Analysis

Investigation Enhancements

  • Faceted Search

    The new faceted search layout of the default Events view makes interacting with large amounts of data collected from the enterprise a more familiar experience and efficient workflow. By combining the functions of the Navigate and Event views, analysts can apply filters by interacting with any metadata generated by the platform which in turn creates the query and automatically executes a search to fetch the resulting events.

    MultiVls1_1091x532.png

    Organize Investigate Content (Column groups, Meta groups and Query Profiles)

    All Investigate content is displayed in a folder structure to help analysts organize their views depending on use cases. The RSA Groups (RSA Live content and RSA OOTB groups), and Shared group folders are available to all analysts. All Private groups, folders and sub-folders are displayed only to the analysts who created them. You can create, edit, copy, and delete Shared and Private folders and sub-folders.

    Deliver Investigate Content (Column groups, Meta groups and Query Profiles) using RSA Live

    Investigate content can be deployed using RSA Live providing updates outside the NetWitness release cycle. Analysts now have the ability to utilize the latest Investigate content to focus their view into the data based on use cases. All the RSA generated content is now contained in a RSA specific folder.

    Multiple values

    When investigating a list of events an analyst can see that an event has multiple values for a meta key in that specific session. A hover over indicator shows a list of multiple values that can be further investigated without requiring to drill into the reconstruction of the event.
    MultiVls_882x299.png

    Direct Free-form query or text search

    To immediately create a blank free-form filter, an advanced user can select the option “Click to start a free form query” from the Advanced Options panel. In the same manner an analyst can choose “Click to start a text search” to create a new text search. In both scenarios, the analysts can bypass the auto-completion input logic and save some time in generating a query format.

    Querysearch_915x453.png

    Query filter enhancements

    When a query is added in the Events, any filter that is selected will have a red highlighted border, so the analyst knows which filter is selected. When you edit a filter, the border will be in blue color to indicate that the analyst needs to provide some input in case they move their focus away from the query input.

    Custom Column group enhancements

    Metadata such as custom.logdata that are defined in Legacy Events or defined in OOTB Summary List column group can be used to combine the raw logs as a customized column of additional metadata. List of recommended metas that contain data are displayed. An analyst can create custom column groups using the summary and raw log (custom.logdata) meta keys.

    Column Group Meta Key Recommendations

    While reviewing query results in the Events table with a selected column group, analysts have the option to view recommended columns that may have data for those events but are not part of the current column group. These suggested meta keys help analysts to have the best column groups applied so that no relevant data is missed for the events displayed.
    RecomMetas_1007x465.png

    Investigate Screen Layout Options

    A new user preference allows analysts to choose between a Compact or Expanded format to determine how close the rows of data are to be displayed in the Event table on a single page. The following image is an example where Event Preference view is displayed with the Compact view selected.

    Meta Panel Enhancements

    The meta panel on the Events investigation page has been enhanced with a Hide Duplicate Entries radio button to limit the display of metadata only if they are a unique key value pair. A filter field is also introduced so analysts can search, and filter based on meta keys or values.

    IndexNone Meta keys

    As analysts create meta groups with multiple meta keys, the Open option is disabled for all non-indexed meta keys to avoid adverse effects on query performance.

    Reconstruction Enhancements (view content and copy option)

    The pagination of the Text tab has been enhanced to make it more obvious when there is further content available than can be displayed on a single page. Also, if required analysts can copy selected content to the clipboard using keyboard shortcut (in addition to menu option) for further investigation.

    Search Indicator

    When analysts do a free-text search a message is displayed on top of the Events page to make it clear that only indexed metadata is being searched. This message contains a link that helps in further search if the analysts requires to search more extensively beyond what is indexed. In case the maximum search limit has been reached, a message is displayed at the bottom to indicate there are no more results available.

    Investigate Timeout Setting

    The Extraction timeout setting helps an administrator to increase or decrease the time available to retrieve the required sessions or events or files from Investigate. This can be configured by navigating to Admin > System > Investigation > Common Settings.

    For more information on all the Investigation Enhancements, see NetWitness Investigate User Guide.

User Entity Behavior Analytics

New and Enhanced Chart

A new and enhanced dotted chart is introduced in version 11.6. The dotted chart, provides the analyst with the entities baseline values over time to better understand the context of the modeled behavior and the anomaly in case of an indicator. In version 11.6, the pie chart is replaced with a dotted chart to provide analysts with additional visibility to the entities activity over time. For more information, see NetWitness UEBA User Guide.

Vdetails.png

Incident Response

Respond Persist Data (BETA)

Analysts and Administrators can pin events that are associated with particular incidents, thereby enabling you to view the evidence related to an incident in the future. Once you pin an event, data is copied from the regular database into a long term storage cache within the data source. Event retention depends upon the available space in the directory (10 GB is offered by default). The roll over in the meta database does not impact the events that already saved in the pin directory. The BETA version comes with the limitation where you cannot download the pinned events, which will be enabled and notified in the subsequent releases.

For more information, see Respond Persist Data in the NetWitness Respond User Guide.

Endpoint Investigation

Support for YARA scans

YARA helps analysts with rule-based detection capabilities in identifying and classifying malware. You can easily create malware descriptions, called YARA rules, that are robust in detecting malware. YARA automatically scans downloaded files at regular intervals and increases the file's risk score if it matches any rule. Thus, helps analysts quickly respond to a threat. For more information, see NetWitness Endpoint User Guide. To learn how to enable and configure YARA, see NetWitness Endpoint Configuration Guide.

YARA feature.png

Centralized agent upgrade options using UI

Administrators can now upgrade and uninstall selected or all agents using the UI and thus helping you manage NetWitness agents with a lot of ease. For more information, see NetWitness Endpoint Agent Installation Guide.

Agent_Upgrade_UI.png

Centralized agent uninstall options using UI

Administrators can uninstall selected agents or all the agents easily using the UI. Bulk uninstall can be performed without even selecting any hosts. This enhancement will save time and help to focus more on responding to threats. To qualify for bulk uninstall, the agents must be on version 11.5.1 or later. For more information, seeNetWitness Endpoint Agent Installation Guide.

Agent_Uninstall_UI.png

Support for Saving Local Copies of Multiple Downloaded Files

Now analysts can perform detailed investigations and forensics quickly and easily by saving copies of downloaded system dump, process dump, MFT, etc.

Save_Local_Copy.png

Support to Download MFT From Any Windows Drive

Analysts can now download MFT for any drive and can also download it on the NTFS mount path. This can help analysts perform critical investigation, analysis, and forensics on files in addition to the system volume.

Download_MFT.png

Expanded Lateral Movement Visibility

Enhanced Windows agent to report executable write events on the target machine when copied to network shares. Analysts can now have deeper visibility into lateral movement activities on Windows around files that are being copied to network shares.

Lateral_Movement_visibility.png

Support for Forwarding Windows/File Logs to Custom Systems

Administrators can now collect the Windows and File logs on a non-VLC system by forwarding them to a custom system.

RN_CstFwd.jpg

New rules added to detect Persistence tactic

New rules have been added to the Endpoint rules bundle to detect threats that follow the Persistence tactic. When such a threat is detected, these rules will trigger alerts and increase the risk score.

Broker, Concentrator, Decoder, and Log Decoder Services

Assembler Threading Modes

To enhance the throughput at which a Decoder can analyze data, the assembler is enhanced to perform further parallel processing. The process that reassembles captured packets into streams is known as the assembler. You can now customize the assembler operation using its two modes. These modes can be configured by setting the value of assembler.threading.enabled to on or off. The default value is off. The on mode enables higher throughput as each assembler instance operates on a dedicated processor.

The assembler modes work only when Multi Adapter Packet Capture is enabled. For more information on Multi Adapter Packet Capture and Assembler Modes, see the (Optional) Multiple Adapter Packet Capture topic in the Decoder and Log Decoder Configuration Guide.

High Speed Packet Capture

You can now analyze network data (packets) from higher speed networks and optimize your Network Decoder to capture network traffic up to 40 Gbps. In order to understand what capabilities are supported at different network speeds, the Decoder now operates in the following three modes:

  1. Normal: For capture speeds less than 5 Gbps with large amounts of deep packet inspection while storing network sessions. This is the default mode.

  2. 10G: For capture speeds up to 10 Gbps with medium amounts of deep packet inspection while storing network sessions.

  3. NDR: For capture speeds greater than 10 Gbps but less than 40 Gbps with small amounts of deep packet inspection while only storing metadata.

For more information on high speed capture and how to configure it, see the Configure High Speed Packet Capture Capability (Version 11.6 and Later) topic in the Decoder and Log Decoder Configuration Guide.

Support for Brotli Decompression

Decoder now detects and decompresses the Brotli payload in the HTTP/HTTPS session parsing. Brotli is a data format specification that compresses data streams with a specific combination of the general-purpose LZ77 lossless compression algorithm, Huffman coding, and 2nd order context modelling. Brotli encoding is supported by most web browsers, major web servers, and some CDNs.

To enable Brotli decompression, perform the following steps:

  • For information on the HTTP decompression configuration, see the HTTP Parsers topic in the Decoder and Log Decoder Configuration Guide.
  • For information on the HTTP_lua decompression configuration, see the HTTP Parsers topic in the RSA NetWitness® Platform Threat Intelligence Guide.

Support for OpenApp ID

Decoder can identify applications using the OpenApp ID detectors generating new metadata (app.id). It helps analysts to identify applications in a session. OpenApp ID from Cisco is an application-layer network security plug-in for Snort (an open source network intrusion detection system). It is a set of open source Lua libraries (detectors) that identifies applications in the network traffic.

For more information on OpenApp ID and how to configure detectors, see the (Optional) Configure Decoder to Support OpenApp ID topic in the Decoder and Log Decoder Configuration Guide.

Support for Receive Side Scaling

To enhance the throughput at which a Decoder can analyze data, the pipeline to create sessions is enhanced to use Receive side scaling (RSS). RSS enables the efficient distribution of network receive processing across multiple CPUs in multiprocessor systems. RSS ensures that the processing that is associated with a given connection stays on the assigned CPU. RSS is supported on DPDK devices only using ixgbe or i40e device drivers.

For more information, see the (Optional) Data Plane Development Kit Packet Capture topic in the Decoder and Log Decoder Configuration Guide.

Simultaneous Ingestion of the Encrypted and Decrypted Traffic Streams to Decoder

Decoder with multi-adapter capture and multi-thread assembler features enabled, can receive encrypted and decrypted streams of the same traffic when on separate adapters. This supports the use case when both the encrypted and decrypted versions of the same traffic are traversing the same Decoder. The multi-thread assembler feature allows Decoder to assemble packets from its corresponding capture work thread. It keeps the packets from encrypted and decrypted sessions separate during assembly to avoid inaccuracies in session parsing and content extraction.

For more information, see the Decrypt Incoming Packets topic in the Decoder and Log Decoder Configuration Guide.

Trusted Authentication for Aggregation Hosts

When configuring aggregation connections, you can use trusted authentication to perform this task instead of using service account credentials. The trusted authentication reduces administrator overhead by eliminating the need to manage service account password changes.

Make a note that this authentication method change requires the device to be offline. Also, once you switch to Trusted Authentication, you cannot switch back to the login method using the user credentials.

Event Stream Analysis (ESA)

Support for Meta Entities

Meta Entities provide a way to link similar meta keys together. Once they are defined, an entity can be used the same way as a key, so that analysts can use them as regular keys to get to multiple, similar concepts. From 11.6 release, meta key entities are configured to be a part of the event schema and can enable the string [] meta keys entities. Analysts can create rules and configure alerts based on the meta key entities selected. You can also add meta entities to create rules. The meta entities retrieve data from the data sources to trigger alerts.

  • To view the list of meta entities, see Viewing the List of Meta Entities
  • To enable meta entities in the ESA Correlation server, see Enabling Meta Entity in the ESA Correlation Server
  • To build rules with custom meta entities, see Building Rules with Custom Meta Entities

For more information, see NetWitness ESA Alerting User guide.

Import and Edit Position Tracking Information

When you deploy a data source, by default, ESA starts processing information from the latest available session. Position tracking information enables the administrator to visualize the progress of the sessions that ESA has processed and provides information on the session IDs and the time or date when the events were processed.

  • The edit function enables you to visualize the number of sessions that a particular ESA data source analyzes after you edit the position tracking, review the number of processed sessions, and plan your work. To edit position tracking information, see Editing Position Tracking Information.
  • The import function enables you to migrate the settings of position tracking for one or more data sources at the same time from an existing deployment. To import position tracking information, see Importing Position Tracking Information.
  • To review a use case scenario, see Use Case Scenario.

Leverage Trusted Authentication

While working with data sources, you can use trusted authentication to perform tasks, instead of logging in with the admin credentials. You need not log in using your admin credentials, every time you want to access the data sources.

For more information, see Trusted Authentication in the NetWitness Getting Started Guide.

Support for Detect AI

Detect AI has been added as an alert source in the Respond view. It captures the alerts from the cloud based user behavior analytics to create incidents from alerts.

You can filter the alerts list to show the alerts of interest using filters such as, alert name, alert source, and specific time range.

For more information, see View a Summary of Alerts

Administration and Configuration

Remove Unwanted Dashboards

You can remove redundant dashboards (dashboards that are not owned, not shared, and duplicate default dashboards) by enabling the dashboard cleaning job.

For more information, see Removing Unwanted Dashboards

Context Hub

Support for REST API Data Source

NetWitness Platform 11.6 introduces the ability to add any RESTful API data source to Context Hub.

RESTAPI.png

REST API allows analysts to query third-party applications by providing a meta value as a query parameter and rendering results in the Context Hub Panel in real-time. The results can be rendered in JSON or HTML format depending on the preference and capabilities of the third-party application. An analyst can now gain additional context about IPs, users, hosts, or files faster during an investigation without requiring them to leave the NetWitness Platform.

Improvements to Context Highlighting

Some additional configurations are introduced to the Context Highlighting feature to make the capability more usable and efficient in specific environments. Administrators can now configure specific Context Hub sources (For example, specific lists, Respond, Endpoint, and so on) for context highlighting. If the context highlighting is disabled for a Context Hub source, analysts can view results from all sources while opening the Context Panel for a meta value, but the values are not highlighted in the Investigate > Navigate, Event, and Respond views. Administrators can also disable the context highlighting globally for all sources.

For more information, see Configure REST API as a Data Source topic in the Context Hub Configuration Guide.

Log Collection

Support for Managed Logstash

In 11.5, the NetWitness Output Codec for Logstash was introduced, making Logstash integrations possible with a customer-managed Logstash server. From 11.6 onwards, the Logstash server is packaged and supported along with the NetWitness Log Collector or Virtual Log Collector (VLC) service to provide easy access to Logstash. This is referred to as Managed Logstash and it eliminates the need for a separate Logstash server outside of the NetWitness Platform.

You can create Logstash pipelines (for example beats, export connector and so on) in the Event Sources tab within the Log Collector service. The custom category allows for a fully-custom Logstash pipeline configuration.

The following is an example of Logstash Event Source.

LogsEveSou.png

A new Data Export tab is added to the Decoder or Log Decoder configuration view. It lists the available Log Collector services in your environment. Once you select a Log Collector service, you can configure the Export Connector in the Event Sources tab.
DataExp.png

Also, New stats for both legacy and New Health and Wellness are introduced to monitor the health and throughput for each Logstash pipeline. Logstash Input Plugin Overview dashboard is added to showcase the new stats.

For more information, see Configure Logstash Event Sources in NetWitness Platform in the Log Collection Configuration Guide.

Parse Rules UI Improvements

  • JSON Mapping Usability Improvements - In the tree view of a JSON sample, the corresponding RAW node or Mapping entry is highlighted when either is selected if the match exists. The highlighting indicates whether a match is successful in the current sample; that is, the value should parse correctly, including the node path and any DataType or RegEx.
    JSONMap.png
  • Custom Regex for JSON mappings - For fine-parsing JSON values (for example, ip:port), the user can create a custom RegEx pattern for each mapping within the UI. Multiple values (captures) can be extracted and assigned to separate meta keys.
    CusRegJsonMap.png
  • Import or Export for custom UI Rules (Dynamic Rules or JSON mappings) - Custom Dynamic Rules and JSON mappings that are created in the UI can now be easily imported or exported right from the UI. This enables customers to develop parse rules in one environment (For example, Lab) and move them to another (For example, Production).

For more information see Log Parser Customization Guide.

Note: Import or Export for custom UI rules does not export or import any "parser.XML" or "parser_custom.XML" that correspond to the Parse Rules.

Licensing

Introducing License Usage Dashboard

A new license dashboard is introduced in New Health & Wellness to manage licenses efficiently. This dashboard provides insights on the license usage of all the Throughput licenses in your deployment. Administrators can do the following on this dashboard:

  • Track daily license usage for individual hosts

  • Track daily usage of Throughput licenses for all the hosts in your deployment

  • Download license usage reports

For more information, see License Usage Dashboard in the System Maintenance Guide.

licensing_dashboard_1964x681.png

Throughput License Calculation Changes

NetWitness Platform versions 11.5.1 to 11.6, includes fixes to the metrics used in reporting for Network (Packet) Throughput usage. License metrics includes the overall network traffic analyzed and the raw network data stored after the analysis. Your Network Throughput License usage may increase, which may cause license violation banners in some situations. The Out-of-Compliance notifications for Network Throughput licenses has been adjusted to delay the display of the license violation banner by 45-days. For more information, see theLicensing Management Guide.

Platform

Support for Third Party Server Hardware

This allows you to use any third party server hardware to run NetWitness Platform. The kickstart wizard provides a list of available block devices, and prompts you to select the device to install the OS and NetWitness Platform application. For more information, see Installation Tasks topic in the Physical host installation guide.

Labels (5)
Labels:
  • Documentation

  • Version 11.7

  • Version 12.0

  • Version 12.1

  • Version 12.1.1

0 Likes
Was this article helpful? Yes No
Share
No ratings

On this page

Powered by Khoros
  • Blog
  • Events
  • Discussions
  • Idea Exchange
  • Knowledge Base
  • Case Portal
  • Community Support
  • Product Life Cycle
  • Support Information
  • About the Community
  • Terms & Conditions
  • Privacy Statement
  • Acceptable Use Policy
  • Employee Login
© 2022 RSA Security LLC or its affiliates. All rights reserved.