Usm Anywhere User Guide
Usm Anywhere User Guide
User Guide
Copyright © 2023 AT&T Intellectual Property. All rights reserved.
AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T
Intellectual Property and/or affiliated companies. All other marks are the property of their
respective owners.
Introduction 9
Prerequisites and Requirements 12
USM Anywhere Network Security Concepts and Terminology 12
USM Anywhere Network Security Capabilities 13
USM Anywhere Data Security 15
USM Anywhere Log Data Enhancement 17
USM Anywhere Web UI 22
Using Multifactor Authentication 25
l Introduction
l Prerequisites and Requirements: Describes the target audience, recommended skills
and background, and supported browsers for using the USM Anywhere web user inter-
face to perform network security operations.
l USM Anywhere Network Security Concepts and Terminology: Describes key terms such
as assets, threats, and vulnerabilities, and how USM Anywhere uses correlation rules to
detect emerging threats.
l USM Anywhere Network Security Capabilities: Describes essential USM Anywhere secur-
ity capabilities including asset discovery, vulnerability assessment, intrusion detection,
behavioral monitoring and security information, and event management.
l USM Anywhere Web UI: Describes key elements and navigation of the USM Anywhere
web UI used to access and perform USM Anywhere network security monitoring and
analysis operations.
l Using Multifactor Authentication: Describes multi-factor authentication (MFA), which is
a method that grants access to the user. You need to configure MFA for your account.
l Getting Started with USM Anywhere: Describes typical security operations performed
after initial USM Anywhere installation and configuration, including security operation best
practices and workflow, verifying USM Anywhere operations, and establishing baseline net-
work behavior.
l USM Anywhere Dashboards: Provides an overview of USM Anywhere dashboards.
l Asset Management: Describes operations to manage assets and asset groups. Includes top-
ics such as asset creation and discovery, vulnerability scans, and asset monitoring and ana-
lysis.
l User Behavior Analytics: Provides information about how to identify malicious or com-
promised users, and enable you to better prioritize alarms with the addition of user data.
l Alarms Management: Provides information about alarms generated from events and OTX
pulses, viewing and reviewing alarm information and field details, and suppressing alarms
to remove noise in the system.
l Events Management: Provides information on viewing, filtering, and sorting events, event
and OTX field details, and analyzing events that generate alarms.
l System Events Management: Provides information on viewing, filtering, and sorting sys-
tem events, which are the events generated within your environment.
l Console User Events on USM Anywhere. Provides information about the events that USM
Anywhere generates when a user does a specific action in the user interface (UI).
l Configuration Issues Management: Provides information on viewing, filtering, and sorting
configuration issues, and how to suppress them from the main view.
l USM Anywhere Scheduler: Describes the Job Scheduler page. This page provides a list of all
jobs that are defined in your USM Anywhere environment.
l Rules Management: Describes how to create suppression and orchestration rules, and how
USM Anywhere correlation rules work. This chapter also describes how Amazon Simple
Notification Service (SNS) is integrated into USM Anywhere and how to manage Ali-
enApps™.
l Vulnerability Assessment Describes how to perform vulnerability scans, view and under-
stand scan results, and generate reports based on vulnerability scans.
l Open Threat Exchange® and USM Anywhere: Describes the open information-sharing and
analysis network. OTX provides access to real-time information about issues and threats
that may impact your organization, enabling you to learn from and work with others who
have already experienced such attacks.
l USM Anywhere Sensor Management: Describes how to manage sensors within USM Any-
where.
l The AWS Cloud Connector in USM Anywhere: Describes how to manage Amazon Web Ser-
vices (AWS) Cloud Connectors within USM Anywhere.
l Subscription Management: Describes license information, event data, and raw log data.
l USM Anywhere Reports: Describes reports displayed in USM Anywhere. You can find
reports generated from your report creation feature; compliance templates based on
alarms, vulnerabilities, and events collected in the system; and Event Type Templates
based on event categorization by type of data source and by the most used data sources.
l USM Anywhere User Management: Describes USM Anywhere user authentication and role-
based authorization, configuration of authorization for specific assets, and monitoring
user activity.
l Using USM Anywhere for PCI Compliance: Describes USM Anywhere capabilities to manage
PCI DSS requirements through assets, asset groups, and reports.
l USM Anywhere Investigations: Describes how to organize the information from your envir-
onment. You can link alarms, events, notes, and other files to their responses to have a
complete view set of actions you have taken to address a particular threat.
l System Status within USM Anywhere: Describes the status of your environment. You have
a system monitor page, if your role is Manager, a network settings page, and the log col-
lection page.
The information in this guide is primarily targeted for security engineers, security analysts,
and operators, IT managers and professionals, and system administrators, using the USM
Anywhere product to provide network security within their own organization’s environment.
We recommend you have knowledge of your organization's network infrastructure and the
networking technologies you use.
l Basic TCP/IP networking knowledge and skills including IP addressing, DNS, switching, and
routing.
l Basic familiarity with IT security concepts and associated skills, including threats, vul-
nerabilities, risk management, and security devices/applications.
Information provided in this guide assumes a customer has completed installation and
configuration of USM Anywhere as described in the USM Anywhere Deployment Guide. In
addition, users of this guide need the appropriate credentials to access USM Anywhere, and a
web browser to access the USM Anywhere web UI through HTTPS.
l Google Chrome
l Mozilla Firefox
When working with USM Anywhere and using the USM Anywhere web UI to perform network
security operations, it is important to understand a few basic USM network security concepts.
First, a key principle of the USM system is that it monitors assets. Assets are all devices in an
enterprise that have some value to the enterprise and, generally, that it is possible to monitor
or gather information about, such as their status, health or availability, configuration, activity,
or events. The value comprises either the cost of the device itself, or the value of the data
that is stored on the device or travels through the device.
Typically, at least one USM Anywhere Sensor is used to monitor one geographically self-
contained location. If several locations are used by an enterprise, each location is monitored
with at least one USM Anywhere Sensor, which sends information to USM Anywhere about
assets that are in the same location. AlienApps are used in the USM Anywhere Sensor to
extract and normalize data from different data sources into standard-format events. USM
Anywhere provides a wide assortment of integrations that can be used to collect events for
most commonly encountered data sources.
USM Anywhere includes correlation rules for identifying important events or patterns of
events within large volumes of data. Alarms are generated by an explicit call within the rules,
either orchestration or correlation rules. Correlation rules detect threats and are continuously
provided as part of the AT&T Alien Labs™ Security Research Team. Information about specific
threats is obtained from sources such as those reported by AT&T Alien Labs™ Threat
Intelligence Subscription and AT&T Alien Labs™ Open Threat Exchange® (OTX™). For
example, OTX provides indicators of compromise and notifications of malicious hosts, which
can link assets by their vulnerabilities to specific threats and notification about events that
involve known or suspect malicious hosts. USM Anywhere can also perform scans which
identify assets' vulnerabilities to specific and identified threats.
AlienVault USM Anywhere provides five essential security capabilities in a single SaaS
platform, giving you everything you need to detect and respond to threats and manage
compliance. As a cloud-based security solution, you can scale your threat detection and
response capabilities as your hybrid environment changes.
The USM Anywhere cloud security management platform receives continuous updates from
the AT&T Alien Labs™ Security Research Team. This team analyzes the different types of
attacks, emerging threats, suspicious behavior, vulnerabilities, and exploits that they uncover
across the entire threat landscape.
USM Anywhere supplements the Security Research Team with data from AT&T Alien Labs™
Open Threat Exchange® (OTX™). OTX is the largest and most authoritative crowd-sourced
threat intelligence exchange in the world.
Here is a brief description of the essential functions that USM Anywhere provides:
HIDS can be used to spot problems on host endpoints, and can include file integrity
monitoring, rootkit and registry checks. NIDS passive sniffing interfaces can analyze
network payload data to monitor for potentially malicious activity.
All of USM Anywhere's various security operation features and functionality are accessible
from the USM Anywhere web UI.
As a security-first organization, AT&T Cybersecurity makes your data protection and privacy
a top priority. USM Anywhere architecture and processes are designed to protect your data in
transit and at rest.
Data Collection
All data sent from the USM Anywhere Sensor deployed in your on-premises or cloud
environment to the USM Anywhere service in the AT&T Cybersecurity Secure Cloud is
encrypted and transferred over a secure TLS 1.2 connection. Each sensor generates a
certificate to communicate with the USM Anywhere service. This means that all
communication is uniquely encrypted between each sensor and USM Anywhere.
All forensic data (raw logs) is backed up on an hourly basis. The data collected in USM
Anywhere is secured using AES-256 encryption for both hot (online) storage and cold (offline)
storage.
Data Access
Your data in USM Anywhere is treated as highly confidential, and only a select few AT&T
Cybersecurity staff members have access. This group of employees uses multi-factor
authentication (MFA) to access the AT&T Cybersecurity Secure Cloud. Strict internal controls
and automation enable support for the service while minimizing administrative access.
AT&T Cybersecurity also has a formal information security program that implements various
security controls to the National Institute of Standards Technology (NIST) Cyber Security
Framework. Key controls include: Inventory of Devices, Inventory of Software, Secure
Configurations, Vulnerability Assessment, and Controlled Use of Administrative Privileges.
Additionally, AT&T Cybersecurity conducts security self-assessments on a regular basis.
Important: The retention period set on the license (30-days standard or 90-days
standard) only applies to regular events. The retention policy for system events is 30
days and for user activities is 180 days, while the user activities related to investigations
never expire.
USM Anywhere uses a write once, read many (WORM) approach in log storage to prevent log
data from being modified or otherwise tampered with. You can download your raw logs at
any time. If you do not renew your subscription, AT&T Cybersecurity will keep the raw logs for
14 days after your subscription expires, giving you a grace period to restart your service.
Within the 14 days, no data is collected until your license is reactivated. Therefore, data is lost
between license expiration and reactivation. After 14 days, your data will be destroyed.
Password Policy
USM Anywhere stores and encrypts user credentials using the latest industry standards for
securing passwords.
l The login credentials that you set will apply to any USM Anywhere™ and USM Central™ you
have access to.
l USM Anywhere requires all passwords to have a minimum length of 8 characters and a
maximum length of 128 characters.
l The password must contain numerical digits (0-9).
l The password must contain uppercase letters (A-Z).
l The password must contain lowercase letters (a-z).
l The password must contain special characters, such as hyphen (-) and underscore ( _ ).
Note: USM Anywhere passwords expire after 90 days. When your password expires, USM
Anywhere enforces a password change when you next log in. A new password must be
different from the previous four passwords.
After 45 days of inactivity, your user account will be locked. Manager users can unlock
inactive accounts.
A user account is locked for 30 minutes after 5 consecutive failed login attempts (GovCloud
users are locked out after 3 consecutive failed login attempts).
When evaluating threats to your systems, the more complete and clear the context of an
incident is, the more accurate and efficient USM Anywhere can be in identifying and
responding to those threats. Log data is one of the key sources of this threat data context,
providing a tremendous amount of information about network events. Every network
connection, authentication request, file transfer, and privilege escalation generates a log
message.
However, many of these log messages were not originally designed to be used for security
purposes. There are no official standards for log contents (although there are best practices);
therefore, log message content is often inconsistent and incomplete.
{
"outcome" : "Allow",
"type" : "Authentication",
"source" : "13.107.4.50",
"destination" : "10.60.5.94",
“time” : “2018-10-17T19:03:26+00:00”
}
This message is brief and doesn't provide enough context for incident analysis. USM
Anywhere can improve that context by normalizing and enriching the data provided in the log
message.
Data Normalization
The first step USM Anywhere takes when it analyzes your system logs is to normalize them so
that all incoming data uses the same terminology. In this context, normalization means
mapping it to a standard terminology. For example, a vendor may use the terms "outcome" or
“result” to describe the success or failure of the authentication attempt. USM Anywhere
normalizes these two different attributes, replacing them with a single, standard term.
Likewise, things like source, source_ip, client, and client_ip all need to be mapped to the same
set of terminology so events from different vendors can be used for correlation and alarm
generation.
The following is an example of how normalization works. Note that USM Anywhere preserves
the original log message as a best practice in case you need to share it with a vendor or need
to refer to the original alert. This means that the normalization phase of message processing
likely increases the size of the log message by around 100%.
{
"log" : "{ \"outcome\" : \"Allow\",
\"type\" : \"Authentication\",
\"source\" : \"13.107.4.50\",
\"destination\" : \"10.60.5.94\" }",
"source_address" : "13.107.4.50",
"destination_address" : "10.60.5.94",
“event_outcome” : “ALLOW”,
"event_name" : "Authentication",
"timestamp_occured" : “2018-10-17T19:03:26+00:00”
}
Data Enrichment
Normalization enables you to analyze all the log messages USM Anywhere receives. Given the
incomplete nature of so many log messages, it also makes sense to use this same process to
add valuable information to the log messages, which helps USM Anywhere perform better
incident detection.
Data enrichment is the process by which valuable information is added to log messages. The
USM Anywhere infrastructure has a large amount of contextual data about the network and
systems that it can attach to the log messages to fill in the gaps and enhance threat
detection. It also has access to many databases of things like the location of specific IP
addresses, device types, and threats it can also leverage.
These are examples of information that can be added through data enrichment:
l Device identity
l Geolocation
l Collection details and flags
Device Identity
Most servers rely on Dynamic Host Configuration Protocol (DHCP) for dynamic IP address
allocation. From a security point of view, this means that identifying and containing threats is
much more difficult. By the time a system is identified as compromised, it may be on the
network in a completely different place with a completely different IP address. To address
that problem, USM Anywhere uses the network context it has to collect and includes the
media access control (MAC) address, fully qualified domain name (FQDN), and a unique
identifier for the system, depending on which are known:
"source_asset_id" : "f8ebb373-b551-43d0-a628-a00771b5d0c1",
"source_mac" : "98:01:A7:B4:D8:47",
"destination_fqdn": "ip-10-6-255-129.ec2.internal",
"source_fqdn": "ip-10-6-2-102.ec2.internal",
Geolocation
Knowing where your network connections are terminating is important when deciding if
traffic should be permitted, blocked, or more carefully monitored. Geolocation can play a role
in deciding if a given incident is worthy of more attention. USM Anywhere augments logs with
geolocation information of source and destination. In the following example, this data enables
an operator to quickly determine that this particular destination is probably not an issue:
"destination_address" : "10.60.5.94",
"destination_name" : "AD Server",
"destination_asset_id" : "8cdf98a1-533d-9ec2-b5bc-3424caecef15",
"destination_organisation : "Microsoft Azure",
"destination_city" : "Redmond",
"destination_fqdn" : "ad.alienvault.com",
"destination_hostname" : "ad",
"destination_organisation : "Microsoft Azure",
"destination_latitude" : "47.6801",
"destination_longitude" : "-122.1206",
"destination_region" : "WA",
"destination_country" : "US",
"destination_country_registered" : "US",
These are some syslog- and AWS-heavy data points for planning purposes.
Syslog-heavy deployment
AWS-heavy deployment
Important: Tier options do not have unlimited processing power, memory allotment, or
disk input/output (I/O) speeds. In addition to storage per month, your deployment size's
impact on any of these factors will influence which tier option is right for your
environment. AT&T Cybersecurity recommends pre-deployment sizing discussions with
your sales representative to help select the right tier for you.
AT&T Cybersecurity strives to guarantee that no data is lost, even when you're facing
inadequate storage space or processing power. Because of this, USM Anywhere always makes
data storage a top priority. When you exceed your data tier, or are projected to far exceed
your tier, your system tries to store as much data as possible, even if functionality must be
reduced to preserve the data. For instance, if you find that you are over your data tier, you
may find that your USM Anywhere has transitioned into one of four possible data
consumption tiers. In these tiers, your USM Anywhere may experience some small limitations
to its functionality, such as paused correlation, asset counters, and more. All functionality is
restored once your USM Anywhere is no longer experiencing resource limitations.
See Understanding Your Data Consumption Status in the USM Anywhere User Guide for more
information.
Event Filtering
If you want to be proactive with your data consumption, consider reducing the amount of
data stored by using filters. Event filtering enables packets to be dropped before they enter
correlation and persistence and consume any of the monthly storage allotment. Filtering
enables you to define a set of rules for fields, which, when matched, are dropped. This enables
you to easily pick certain types of packets that you don't want to enter the system. When
filtering, it's important to realize the impact:
When using filters, it's important to make sure that you're precisely defining the criteria for
events to be dropped. If the filter rule is too broad, there is a chance you may drop packets
that you are interested in keeping.
The USM Anywhere web user interface (UI) provides access to all the tools and capabilities
that USM Anywhere makes available for managing the security of your organization’s
network and the devices in it. From the USM Anywhere web UI, you can view all essential
information about network devices, applications, user activity, and network traffic in your
environment. You can begin monitoring information coming from devices and then go about
defining orchestration rules to fine tune the behavior of your system. USM Anywhere includes
by default correlation rules to alert you of potential security issues and vulnerabilities.
The USM Anywhere web UI runs in a standard web browser. Your system administrator can
provide the web address and credentials to log in and access the features and functions
appropriate to your role in your organization’s security operation.
Note: The recommended screen resolution for viewing the USM Anywhere web UI is
1440 pixels wide.
When you first log in, the USM Anywhere web UI displays the main window.
By default, the web UI displays a collection of high-level graphs and charts summarizing
activity in your organization’s network. From this main window, you can select different menu
options or click other links and buttons.
Important: You can also load the configured default landing page by clicking the logo of
USM Anywhere located in the upper-left corner of the page.
The main navigable elements and expand selections are provided consistently through the
web UI. Use the and icons to expand or collapse the left navigation pane.
Primary menu
The primary menu provides access to the main functions or operations of USM Anywhere.
These include:
l Dashboards. Provides charts, tables, and graphs. There are dashboards that will be dis-
played depending on the sensor you have installed; there are also dashboards related to
the AlienApp you have configured and that will be visible if you have data for them. See
USM Anywhere Dashboards for more information.
l Activity. Provides search, sorting, filtered selection, and visualization of Alarms and Events.
See Alarms Management and Events Management for more information.
l Environment. Provides display and management of Assets, Asset Groups, Vulnerabilities,
and Configuration Issues. See Asset Management, Vulnerability Assessment, and Con-
figuration Issues Management for more information.
l Reports. Provides display and management of reports which are the result of export data
that you can find in assets, asset groups, alarms, events, vulnerabilities, and configuration
issues. You can also choose the format of the report (PDF and CSV). There are also Com-
pliance and Event Type Templates. See USM Anywhere Reports for more information.
l Data Sources. Provides options to view and manage deployed USM Anywhere Sensors,
the AlienVault Agent, AlienApps, and Sensor Apps. See USM Anywhere Sensor Man-
agement, The AlienVault Agent, AlienApps OverviewUSM Anywhere AlienApps Guide, The
Graylog (GELF) Sensor App, The Syslog Server Sensor App, and Windows Event Collector
Sensor App for more information.
l Investigations. Provides options to organize the information from your environment. See
USM Anywhere Investigations for more information.
l Settings. Provides options to view and manage credentials and system events. There are
administration options which let you manage users and asset fields, display the system
status, schedule jobs, validate your OTX key, and manage orchestration rules. You can also
display the data about your subscription and connect your USM Anywhere to USM Central
environments.
Secondary Menu
The secondary menu provides access to the system configuration, the user profile
information, the help link, and the bookmarked items:
l Bookmarks. The icon enables you to see and access alarms, events, or assets that you
(or another user) bookmarked for easy access. The number on the icon indicates the num-
ber of items bookmarked.
l
Help. The icon includes the these options:
l
Feedback. The icon provides a direct communication with the USM Anywhere team.
l
Profile Settings. The icon shows your profile settings. You can change your email, full
name, update your password, enable multi-factor authentication (MFA) for the account,
select your default landing page after you have logged in, configure an interval for auto-
refreshing the dashboards and alarms pages, and the configuration of receiving alarm noti-
fications. See Managing Your Profile Settings for more information.
The remainder of this guide describes best practices in performing common network security
operations and provides step-by-step instructions for performing specific tasks. Following
sections also describe the USM Anywhere web UI from which you can monitor network
security and access all of USM Anywhere’s security operation features and functionality.
To protect your USM Anywhere account, enable multifactor authentication (MFA). MFA adds
extra security because it requires multiple factors to authenticate a user, making it more
difficult for an unauthorized person to gain access to the account. In USM Anywhere, MFA
provides a layered defense of two independent credentials: what you know (your username
and password) and what you have (security token on your personal device).
To use multifactor authentication in USM Anywhere, you must have a mobile device that
supports an Authenticator app. AT&T Cybersecurity recommends the Google Authenticator
app, which is available for iOS and Android devices. Google Authenticator implements two-
step verification services using the Time-Based One-Time Password (TOTP) algorithm and
HMAC-Based One-Time Password (HOTP) algorithm for authentication.
Before you set up MFA for your account, you must install the Authenticator app on your
device.
1. In the lower-left corner of the USM Anywhere web user interface (UI), click the icon,
4. Click Login.
5. On the login page, enter your username and password, and then click Login.
USM Anywhere displays the Multi-factor authentication page to prompt you to complete
your MFA configuration. The displayed page provides a unique QR code that is used by the
Authenticator app to retrieve a verification code.
Users in a manager role can require non-admin users to log in using MFA. If a manager user
enables this setting and you do not already have MFA configured, you will be prompted to set
up MFA upon your next log in.
Before you set up MFA for your account, you must install the Authenticator app on your
device.
1. On the login page, enter your username and password, and then click Login.
USM Anywhere displays the Multi-factor authentication page to prompt you to activate
MFA for your account. The displayed page provides a unique QR code that is used by the
Authenticator app to retrieve a verification code.
4. Enter the one-time passcode in the text box of the USM Anywhere, and then click Verify
Code and Login.
In the event that you lose or change your mobile device, there is a function to reset the MFA
for your user account. Another user in your USM Anywhere environment can edit your user
account to reset the QR code used to pair the device with your account.
must be Manager.
3. Click Reset Multi-Factor Authentication.
A message displays at the top of the page to inform you about the success of the MFA
reset request.
4. Click Cancel.
After the reset, USM Anywhere displays the Multi-factor authentication page at your next
login. Follow the same steps to set up the authentication with the new device.
Manager users can configure USM Anywhere to require users to log in using multifactor
authentication (MFA).
Users will be prompted to enroll in MFA on their next login if they do not already have
MFA configured.
The section includes several chapters for explaining these security operations. There is a
chapter which describes how essential is the review of some of the overall best practices that
many organizations follow in implementing and then maintaining network security
operations in their environments.
Another chapter is about the significance of having a good network security monitoring
system which can discover things every day that provide value to security efforts.
You can also find in this section, a chapter which describes a best practice workflow for using
USM Anywhere to perform operations during the entire Security Monitoring and
Management lifecycle.
You can also find information about how you can use the USM Anywhere web UI to verify that
it is operating properly after the basic installation and configuration of your USM Anywhere
system.
Finally, in this section, there is a chapter on which you will find how you could establish a
Baseline Network Behavior for what constitutes normal behavior in your network. Through
this baseline, you could evaluate results and filter out the noise to identify and filter out right
away some false positives.
Providing strong and effective security for an organization's network, IT infrastructure, and
environment requires some forethought and planning. If you are now tasked with monitoring,
managing, or maintaining network security operations within your organization, after USM
Anywhere has already been deployed, many of the planning steps and decisions may have
already been made. In any case, it is worth reviewing some of the overall best practices that
many organizations follow in implementing and then maintaining network security
operations in their environments. This is the general process:
l Determine the scope of your network security operation, the range of networks and sub-
networks to be covered, and the network devices or assets (host servers, applications, fire-
walls, routers, and switches) to be protected.
l Assess risk, determine what is most important to protect, and determine the type of net-
work security you need to provide. Identify specific threats and vulnerabilities you need to
address. Also determine specific regulatory compliance and other business standard
requirements you need to meet.
l Define and determine security team roles, permissions, tasks and responsibilities, and
implement authentication and authorization to support USM Anywhere security oper-
ations. Also determine notification and escalation strategy for emails, ticket handling, incid-
ent response, and compliance documentation requirements.
l Develop a plan for initial implementation and rollout of network security operations, plus
planned updates and enhancements, based on priorities. Take into account the time and
resources required for monitoring, incident analysis and response, compliance reporting,
and record-keeping, plus subsequent updates to address additions or changes in the envir-
onment, as well as new threats and vulnerabilities.
l Deploy and run USM Anywhere to monitor and analyze the behavior of the environment.
Use dashboards, reports, and other features of the USM Anywhere web UI to examine
events, network traffic, alarms, and notifications. Establish baseline behavior, identify
threats and vulnerabilities, and eliminate or reduce false positives and other noise from
normal, benign behavior. After establishing a baseline, you can use various tools provided
within the USM Anywhere web UI to investigate alarms and suspicious events, identify
threats and vulnerabilities, and continue monitoring your network for attacks, intrusions,
or any other type of malicious and potentially damaging behavior.
l Make continuous security lifecycle improvements and perform regular maintenance: new
asset discovery and risk assessments, new vulnerability and thread detection, compliance
reporting, backup and archival record-keeping.
l Incident Response. Develop and implement processes and procedures for Incident
Response (IR) to provide special event and incident handling. Detect anomalies and sus-
pect behavior; investigate, identify, and isolate threats, intrusions, or attacks; eradicate,
remediate, or mitigate threats; conduct post-incident, post-mortem reviews to identify
improvements to security processes and practices.
Security monitoring is often about monitoring often-overlooked things such as host, device,
and application vulnerabilities, because those are typically the same things that attackers will
leverage against you later in carrying out attacks or attempting unauthorized access to data
or resources. A good network security monitoring system discovers things every day that
provide value to security efforts. USM Anywhere can help to locate or identify:
l Misconfigured systems.
l Hosts that have fallen off the radar of asset management.
l Systems compromised by opportunistic malware or other attacks by malicious software.
l Inappropriate or unauthorized access of sensitive data or resources from both internal and
external parties; for example, detecting websites that should be blocked at the proxy
server, but were not.
USM Anywhere priorities for network security operations are determined primarily by
correlation rules. The rules link events together into meaningful bundles and turn data into
useful information. Correlation is a function of USM Anywhere, which configures automated
analysis of correlated events for identifying potential security threats and produces alerts to
notify recipients of immediate issues. You can also create orchestration and suppression rules
to secure your network security operations.
After USM Anywhere is installed in your environment, events start flowing through the
system, so you can start gaining visibility into the type of events that are occurring, what
natural or non-threatening activity is taking place, and what activity can be a possible attack.
USM Anywhere also begins collecting other informan tion about your network and various
network devices such as firewalls, routers and switches, servers, and applications. In addition,
it is discovering and determining possible vulnerabilities and threats to your environment.
The following illustration details a high level view of events and other information from your
network environment as it is collected or generated by the USM Anywhere Sensors and
Agents, and then delivered to the USM Anywhere for processing and storage.
USM Anywhere Sensor combines asset discovery, vulnerability assessment, threat detection,
and behavioral monitoring to provide full situational awareness. USM Anywhere Sensor is the
front-line security module of the USM Anywhere platform and provides detailed visibility into
your environment, vulnerabilities, attack targets and vectors, and services.
USM Anywhere Sensor receives data and other activity or status information from devices
and normalizes the information into a standardized event format. USM Anywhere Sensor
then sends the normalized event to USM Anywhere, which tries to match every event with an
asset or a user, enrich the event with environmental data where possible, and saves it.
Note: To protect the health of your system, USM Anywhere monitors the rate of events
being sent to your sensor. If that rate, measured in events per second (EPS), threatens
to impact your sensor's capacity your EPS will be throttled. Throttling allows your
system to take more time to process events coming in, without risking event loss. USM
Anywhere will generate an event when EPS throttling is engaged. See Protecting Your
Sensor's Performance with EPS Throttling for more details about when EPS is engaged
and how it works.
USM Anywhere provides a unified management interface through the web UI that combines
security automation, and AT&T Alien Labs™ Open Threat Exchange® (OTX™) and threat
intelligence from the AT&T Alien Labs™ Security Research Team to correlate data, spot
anomalies, reduce risk, and improve operational efficiency.
Correlation can be done logically, where events can be compared to patterns and multiple
conditions can be connected by using logical operators such as OR and AND. After events are
processed and correlated, USM Anywhere performs risk analyses and triggers an alarm if the
risk of the event is high enough.
After the basic installation and configuration of your USM Anywhere system is completed,
you can use the USM Anywhere web UI to verify that it is operating properly.
The following process describes tasks you can perform to verify basic operations, also
walking you through information available from the primary menu options.
1. When you first launch the USM Anywhere web UI, it displays the main dashboards page.
This high-level view of summary information shows the overall state of your network, so
you can get an immediate indication of the levels of events and alarms occurring in your
environment.
2. Confirm that security events are being collected, and populating the USM Anywhere cor-
rectly. To see events, go to Activity > Events.
On this page, any normalized log event, or any other event received or generated by any
USM Anywhere Sensor at the application, system, or network level, will show in the
display, unless a suppression event has filtered it out.
You can also search for and filter out specific events using time ranges and other search
criteria. Click a specific event row to display additional information for the selected event,
in a dialog box. You can view and examine full details about an event, in a full browser
window, by clicking the event, and then clicking Full Detail. Use this link to see all the
information about the event such as the details of the events, the related assets, the
source and destination IP addresses, and the log of the event.
3. Confirm that USM Anywhere is creating alarms and the alarms are displaying correctly.
The USM Anywhere generates alarms from correlation rules. To see alarms in your
system, go to Activity > Alarms.
By default, the middle portion of the page provides a graphical representation of current
alarms being generated in your environment. Blue circles indicate the number of alarms in
a category that are displaying at a particular time. A bigger circle indicates a higher
number of alarms. Alarms are prioritized by categories that reflect typical methods used
by attackers. See Viewing Alarm Details for more information on alarm categorization.
You can also search for and filter out specific alarms using time ranges and other search
criteria. Click a specific alarm row to display additional information for the selected alarm,
in a dialog box. You can view and examine full details about an alarm, in a full browser
window, by clicking the alarm, and then clicking Full Detail. Use this link to see all the
information about the alarm such as the events that triggered the alarms, source and
destination IP addresses, and the recommended actions to be done.
When you first start using USM Anywhere, it is a good idea to let it run for a few days to
determine which events and alarms you can consider "noise" and which ones to investigate
further. By noise, we mean false positives that obscure true positives.
Because no system is perfect, you must ensure that you have actionable alarms and useful
reports, not hundreds of things to review. What you learn from the baseline collection and the
evaluation of those events helps you create orchestration and suppression rules that tell USM
Anywhere what is important or not. Alarms are also created from correlation rules, which are
created by the AT&T Alien Labs™ Security Research Team.
Baselining
To be able to tune the system, you need to create a baseline for what constitutes normal
behavior in your network. This is called baselining. The alarms and events generated during
this initial period represent currently normal behavior, in other words, a snapshot in time. Of
course, there may be things you want to filter out right away. But in general, you should resist
the temptation and wait until you have had a chance to observe any patterns in your network.
Evaluating Results
After you collect these data points, you need to start making decisions about them, based on
these criteria:
Answering these questions for the first time is best done in a group setting with the relevant
stakeholders. In subsequent iterations of this process, usually only the analysts participate,
because the fundamental questions for each event can be applied through taxonomy.
Because AT&T Cybersecurity releases new signatures frequently, this decision making
process will be a recurring event.
If you examine an alarm and you determine that the event that triggered it was noise, not a
real threat, consider taking these steps:
1. Create an orchestration rule that prevents USM Anywhere from processing new events
from the source. For example, let's say that USM Anywhere properly detected vul-
nerability scanning coming from an internal scanner but such events do not interest you,
because the internal vulnerability scanner is controlled by your environment. See Orches-
tration Rules for more information.
2. If not interested in specific alarms, you can do:
After you have initialized your new USM Anywhere Sensor and you have configured it in the
Setup Wizard, you can start using it. See these links for more information:
Once you click the Start Using USM Anywhere button, the page for entering your username
and password displays:
AT&T Cybersecurity employs a single user account and single set of credentials to access all
of your USM Anywhere and USM Central instances. Your role, and the actions available to you,
will change from instance to instance depending on your user account's settings in that
instance.
l The login credentials that you set will apply to any USM Anywhere™ and USM Central™ you
have access to.
l USM Anywhere requires all passwords to have a minimum length of 8 characters and a
maximum length of 128 characters.
l The password must contain numerical digits (0-9).
Note: USM Anywhere passwords expire after 90 days. When your password expires, USM
Anywhere enforces a password change when you next log in. A new password must be
different from the previous four passwords.
After 45 days of inactivity, your user account will be locked. Manager users can unlock
inactive accounts.
Important: Five failed sign-in attempts are allowed for USM Anywhere before the user
account is locked. For Threat Detection and Response for Government, three failed
sign-in attempts are allowed before the user account is locked. The lockout time for
both USM Anywhere and AT&T TDR for Gov is 30 minutes.
l Read-Only: You can access views and search the system, but you cannot make system
changes that impact other users.
l Investigator: You can access views, search the system, and generate reports, but you can-
not make system changes that impact other users.
l Analyst: You can view and search the system, schedule jobs, launch actions, configure
rules, and configure asset credentials. But you cannot add or modify sensor configurations;
configure credentials for AlienApp, notification apps, and threat intelligence integrations;
or add users.
l Manager: This role enables analyst permissions and enables you to add or modify sensor
configurations; configure credentials for AlienApps, notification apps, and threat intel-
ligence integrations; and add users.
See USM Anywhere User Management for all the information related to users.
The first view of the USM Anywhere web UI is a set of dashboards. These dashboards provide
overall visibility into the activity on your network and display various network security
metrics.
Note: USM Anywhere also makes available several reports that you can display. These
reports provide detail on various aspects of USM Anywhere network security. For more
information on reports, see USM Anywhere Reports.
Executive Dashboard 45
USM Anywhere gives you the option of refreshing dashboards automatically in a period of
time that you can configure.
You can also filter your search in the upper left corner of the dashboards page. When you
select one or more filters, the dashboard restricts the views to the selected filters. If you
export the dashboard as an HTML report, it preserves the selected filters. See Exporting Data
from the USM Anywhere Dashboards for more information.
Refreshing Dashboards
You can configure a period of time for refreshing the data on your dashboards. See Managing
Your Profile Settings for more information.
Following the name of the dashboard, you can click the icon to stop the auto-refresh
There is an auto-refresh countdown that refreshes the page at a regular interval. The number
inside the blue circle indicates the remaining time until the next refresh. See Managing Your
Profile Settings to configure this interval.
General Filters
All dashboards include two filters:
Last 24 Hours
Use this filter for identifying data created during the last hour, last 24 hours, last 7 days, or last
30 days. You can also configure your own period of time by clicking the Custom Range
option. This option enables you to customize a range. When you click Custom Range, a
calendar opens. You can choose the first and last day to delimit your search by clicking the
days on the calendar or entering the days directly. Then select the hours, minutes, and
seconds by clicking the specific box. Finally, select AM or PM.
All Assets
Use this filter for searching data according to assets. You can search by all assets or by asset
groups.
Widgets Filters
There are some widgets that include the icon to filter data on that widget. Use this filter
for identifying data created during the last hour, last 24 hours, last 7 days, or last 30 days.
USM Anywhere enables you to export data from the dashboards as an HTML report.
5. Click Print.
A dialog box opens to configure the options of the report that you are going to print.
6. Click Save in case you want to print your report or save it as PDF.
Executive Dashboard
The executive dashboard provides a visual display of important security metrics with the goal
of giving an at-a-glance view into performance across your security program.
This dashboard offers widgets that detail all aspects of your environment. You can click these
widgets, taking you to the detailed information page, and enabling you to drill down into the
data even more. Use the executive dashboard to check the information included in your
environment, detect possible problems, and decide the solutions that are better at every
moment.
You can filter data included in the widgets by clicking the icon. See Refreshing and
Filtering Data from the USM Anywhere Dashboards for more information.
You can clone and customize your executive dashboard to meet your specific needs. See
Clone the Executive Dashboard for more information.
You can also export data from the dashboard as an HTML report. See Exporting Data from
the USM Anywhere Dashboards for more information.
l Executive Summary: Provides several widgets with general information. These widgets
are platform updates, threat metrics, security funnel, number of AT&T Alien Labs™
Open Threat Exchange® (OTX™) pulse hits, data source usage, alarms cycle time, and
vulnerabilities remediation time by severity. See Executive Summary Section inside the
Executive Dashboard for more information.
l Investigations: Provides several widgets related to investigations. These widgets are the
number of investigations, average time to close an investigation, and top severity closed
investigations. See Investigations Section inside the Executive Dashboard for more
information.
l Alarms: Provides several widgets related to alarms. These widgets are alarms summary,
opened investigations by intent, alarms by severity, alarms method by strategy, and
alarms method by intent. See Alarms Section inside the Executive Dashboard for more
information.
l Events: Provides several widgets related to events. These widgets are events trend and
top 10 generating data sources. See Events Section inside the Executive Dashboard for
more information.
This section shows the related actions that occur in your environment.
Widgets Description
Platform Updates Total number of updates that a logged-in user has made on orchestration
rules, dashboard, views, plugin updates, and assets.
Threat Metrics Total number of updates that a logged-in user has made on alarms,
investigations, vulnerabilities, configuration issues, and users.
Security Funnel Total number of events tied to alarms and the alarms tied to investigations.
Number of OTX Sankey diagram that displays the top AT&T Alien Labs™ Open Threat
Pulse Hits Exchange® (OTX™) indicators or pulses found on alarms.
Widgets Description
Data Source Graph that displays the number of events ingested in USM Anywhere per
Usage individual data source.
Alarm Cycle Time Graph that displays the alarm remediation and response. It shows how long
it took to respond to a threat and how long it took to resolve the alarm.
Vulnerabilities Graph that displays the number of open vulnerabilities by severity over
Remediation Time time.
by Severity
This section displays information about the investigations you have created. The
investigations organize the information from your environment and enables you to manage
and coordinate incident response activities. See USM Anywhere Investigations for more
information.
Widgets Description
Number of Number of all investigations in your environment. The options are open, in
Investigations review, and closed.
Average Time to Graph that displays, in days, the average time to close an investigation, from
Close an the moment is opened to the moment is closed.
Investigation
This section displays information related to the detected alarms in your environment. These
widgets include the results of the USM Anywhere correlation engine and the value of
mapping those into actionable groups based on the risk factor. See Alarms Management for
more information.
Widgets Description
Alarm Summary Graph that displays the number of alarms that you have in your
environment on a monthly basis and their current status. The options are
open, suppressed, closed, and total.
Widgets Description
Alarms by Severity Alarms correlated by severity (critical, high, medium, and low) and related to
a range of dates. The size of the bubbles depends on the number of issues.
Alarms Method by Method name with count of number of alarms under that method. The data
Strategy are in tabular format.
Alarms Method by Method name with count of number of alarms under that method. The data
Intent are in tabular format.
This section provides you with a way to understand your assets' exposure and measure the
remediation cycle. See Vulnerability Assessment for more information.
Widgets Description
Scan Jobs History Graph that displays the total number of asset scans on each day in the
current month to identify vulnerabilities.
Top 5 Vulnerable List of the top five vulnerable assets ordered by score.
Assets by Score
This section displays the security refinement you get when using USM Anywhere, and how it
relates to different data sources on your network. See Events Management for more
information.
Widgets Description
Events Trend Graph that displays the number of events ingested in USM Anywhere on
hourly basis.
Top 10 List of the top 10 generating data sources based on the number of events
Generating Data ingested.
Sources
When you open the executive dashboard, there is an Action button in the upper right side of
the page.
l Create New Dashboard: Creates a new dashboard. You can customize your own
dashboard with the widgets and content you need. See USM Anywhere Custom
Dashboards for more information.
l Clone Dashboard: Clones the executive dashboard and you can edit it and customize your
own dashboard with the widgets and content you need. See Clone the Executive
Dashboard for more information.
USM Anywhere enables you to clone the executive dashboard and customize the cloned
dashboard with the widgets and content you need.
The new dashboard displays in the navigation menu, below Custom Dashboards.
3. Click the icon next to the group name you want to change.
6. Click Save.
3. Click the Remove Group link next to the group name you want to remove.
4. Click Save.
3. Click the icon and drag the widget to the desired place.
4. Click Save.
3. Click one of these icons and change the widget row height.
4. Click Save.
4. Click Save.
3. Click the Add Widget link in the group where you want to add the widget.
4. Select the data you want to add to that widget.
5. Click Save.
USM Anywhere includes a set of dashboards that display data collected from your network.
Dashboards are visible if you have data for them. Sometimes it takes a few minutes for the
dashboards to display.
Note: There are dashboards related to the AlienApp you have configured, which are
visible if you have data for them. See USM Anywhere AlienApps™ for more information.
Important: If there are events from the last seven days, then you can see the related
dashboard. When there are no events from the previous seven days, that dashboard
doesn't display.
Dashboards include widgets with important information about your environment. You can
find different types of widgets. There are lists, graphs, pie charts, total numbers of a feature
or element, and some other ways of presenting the data to have a valuable and quick view of
your environment.
Some of the widgets include a filter that you can use to select a predefined range between
Last Hour, Last 24 Hours, Last 7 Days, or Last 30 Days. Click the icon to use this filter.
This dashboard will have data when your environment has deployed agents on the assets. See
The AlienVault Agent for more information.
Widgets Description
Agent Platform Total number of assets with a deployed agent by platform, Windows, macOS,
and Linux.
Agent Version Total number of agents with the current version installed, and the total
number of agents that can be updated to a new version using the Update and
Troubleshoot AlienVault Agents.
Agent Status Total number of agents that are online and offline.
Alarms By Intent Alarms correlated by intent and related to a range of dates. The size of the
bubbles depends on the number of issues.
Count/Time Graph that shows the number of events over a period of time.
Widgets Description
File integrity Pie chart displaying, in percentages, the top actions based on integrity
Monitoring — changes on those systems.
Top Action
File Integrity List of the top file path based on integrity changes on those systems.
Monitoring —
Top File Path
Depending on the USM Anywhere Sensor you have installed, the widgets might be visible in
the Amazon DynamoDB dashboard. This dashboard displays data when the Amazon Web
Services (AWS) CloudTraildata source has been configured and includes Amazon DynamoDB
events.
Widgets Description
Access Control Pie chart displaying, in percentages, the authentication and access control
for DynamoDB.
Widgets Description
User Activity Users related to their implied activity, which can be create, read, update
and delete (CRUD). The size of the bubbles depends on the number of
issues.
Amazon S3 Dashboard
Depending on the USM Anywhere Sensor you have installed, the widgets might be visible in
the Amazon Simple Storage Service (S3) dashboard. This dashboard displays data when the
Amazon Web Services (AWS) CloudTraildata source has been configured and receives
s3.amazonaws.com events.
Widgets Description
Top Buckets Top of Amazon S3 resources that can store objects from different S3
storage tiers.
Access Control Pie chart displaying, in percentages, the authentication and access control
for Amazon S3.
Authentication Pie chart displaying, in percentages, the authentication mode for Amazon
Mode S3.
Authentication Pie chart displaying, in percentages, the authentication type for Amazon
Type S3.
User Activity Users related to their implied activity, which can be create, read, update
and delete. The size of the bubbles depends on the number of issues.
The Amazon Virtual Private Cloud (VPC) Flow Logs dashboard only displays events from
Amazon VPC Flow Logs when the Amazon VPC Flow Logs data source is used. See Collect
Amazon CloudWatch Logs and Example: Creating a Suppression Rule for VPC Flow Logs for
more information.
Widgets Description
Events by Pie chart displaying, in percentages, the top AWS VPC Flow Logs events
outcome ordered by outcome.
Rejects by Pie chart displaying, in percentages, the top AWS VPC Flow Logs events
Protocol rejected by protocol.
Top Blocked List of the 10 top blocked sources from further access in order to prevent
Sources intrusions.
Top Blocked List of the 10 top blocked destinations by AWS VPC Flow Logs.
Destinations
Widgets Description
Top Sources with List of the 10 top sources with bad reputation.
Bad Reputation
Flows Per Hour Graph that displays the number of events accepted or rejected per hour
during the last 24 hours.
AWS Dashboard
Depending on the USM Anywhere Sensor you have installed, the widgets might be visible in
the Amazon Web Services dashboard. This dashboard displays data when the Amazon Web
Services (AWS) CloudTraildata source has been configured.
Widgets Description
Event Action: Total number of assets created for the current day and for the current
Create week.
Event Action: Total number of assets updated for the current day and for the current
Update week.
Event Action: Total number of assets deleted for the current day and for the current
Delete week.
Event Action: Total number of assets read for the current day and for the current week.
Read
Unauthorized List of the unauthorized activity that has been made on events.
Activity
Messages by Pie chart displaying, in percentages, the outcome for access control, which
Outcome can be Allow or Deny.
Asset States List of the state of the assets and the total number at each state.
Asset Information Total number of assets having vulnerabilities, configuration issues, and
alarms.
Account Vendors Pie chart displaying, in percentages, the known vendor services in AWS.
User Actions Users related to the implied action of the event, which can be create, read,
update, and delete. The size of the bubbles depends on the number of
issues
Denied Activity Sankey diagram which displays the source username, the event name, and
the data in which the events were received.
Depending on the USM Anywhere Sensor you have installed, the widgets might be visible in
the Amazon Web Services (AWS) Load Balancer dashboard. This dashboard displays data
when the ELBAccess data source has been configured or your environment has the AWS
Application Load Balancer installed. See Collect ELB Access Logs for more information.
Widgets Description
Events by Pie chart displaying, in percentages, the top AWS Load Balancer events
Outcome ordered by outcome.
Events by Pie chart displaying, in percentages, the main events by response code.
Response Code
Events by TLS Pie chart displaying, in percentages, the main events by Transport Layer
Version Security (TLS) Version.
Widgets Description
HTTP 4xx Error Graph that displays the HTTP4xx error codes by periods of time.
Codes
HTTP 5xx Error Graph that displays the HTTP 5xx error codes by periods of time.
Codes
Azure Dashboard
Depending on the USM Anywhere Sensor you have installed, the widgets might be visible in
the Microsoft Azure dashboard. This dashboard displays data when the Azure Cloud data
source has been configured.
Widgets Description
Activity by User List of the top five usernames with the most activity.
VMs by OS Total number of virtual machines (VMs) installed by operating system (OS).
Box Dashboard
The Box dashboard displays a summary of the events originating from Box logs. This option is
visible if there are Box events. See The AlienApp for Box for more information.
Widgets Description
Box Activity Graph that displays the activity in Box by periods of time
User Activity List of the five users that have more activity in Box
The widgets might be visible in the Cisco AMP dashboard if there are Cisco AMP events. See
AlienApp for Cisco Secure Endpoint for more information.
Widgets Description
Events by Name Pie chart displaying, in percentages, the top events by name.
Threat Detected Total of Cisco events with the name 'Thread Detected'.
The widgets might be visible in the Cisco Meraki dashboard if there are Cisco Meraki events.
Widgets Description
Count/Time Graph that shows the number of issues over a period of time.
HTTP Hostname Pie chart displaying, in percentages, the specific host names and IP addresses
that are visited by clients on your network.
Widgets Description
Events By Action Pie chart displaying, in percentages, the events detected by action.
Top Blocked Pie chart displaying, in percentages, the top blocked categories.
Categories
Widgets Description
Blocked Activity Sankey diagram which displays the blocked activity detected by Cisco
Umbrella.
Cloudflare Dashboard
The widgets might be visible in the Cloudflare dashboard if there are Cloudflare events. See
The AlienApp™ for Cloudflare for more information.
Widgets Description
TLS Version Pie chart displaying, in percentages, the main events by Transport Layer
Security (TLS) Version
TLS Cipher Pie chart displaying, in percentages, the main events by Transport Layer
Security (TLS) Cipher
Cylance Dashboard
Depending on the USM Anywhere Sensor you have installed, the widgets might be visible in
the BlackBerry Cylance dashboard. This dashboard displays data when the CylancePROTECT
data source has been configured.
Widgets Description
Stats Total number of connected devices, threats, and devices with threats.
Top Exploits Pie chart displaying, in percentages, the top exploit attempts by category.
Attempts by
Category
Widgets Description
FireEye Dashboard
Depending on the USM Anywhere Sensor you have installed, the widgets might be visible in
the FireEye dashboard. This dashboard displays data when the Reporting Device Vendor
field has the FireEye value .
Widgets Description
Widgets Description
Daily Activity Per Graph that displays the daily activity per hour.
Hour
FortiGate Dashboard
Depending on the USM Anywhere Sensor you have installed, the widgets might be visible in
the Fortinet FortiGate dashboard. This dashboard displays data when the FortiGate data
source has been configured.
Widgets Description
Inbound Traffic Graph that displays the inbound traffic per hour and by interface.
Per Hour by
Interface
Outbound traffic Graph that displays the outbound traffic per hour and by interface.
Per Hour by
Interface
Depending on the USM Anywhere Sensor you have installed, the widgets might be visible in
the Google Cloud Platform dashboard. This dashboard displays data when the Google Cloud
Audit data source has been configured.
Widgets Description
Activity by Project Pie chart displaying, in percentages, the top projects with the most activity.
Top Actions Pie chart displaying the top actions in Google Cloud Platform.
Messages by Pie chart displaying, in percentages, the outcome for access control, which
Outcome can be Allow or Deny.
Asset States List of the state of the assets and the total number at each asset.
Widgets Description
Asset Information Total number of assets having vulnerabilities, configuration issues, and
alarms.
Depending on the USM Anywhere Sensor you have installed, the widgets might be visible in
the Google G Suite audit dashboard. This dashboard displays data when the G Suite audit
data source has been configured.
Widgets Description
Login Attempts Pie chart displaying, in percentages, the successful and unsuccessful login
attempts to G Suite Audit.
Login Failed Pie chart displaying, in percentages, the reasons of the failed login.
Reasons
Login Activity Graph that displays the successful and unsuccessful login attempts to G
Suite Audit.
Authorized Sankey diagram which displays the authorized applications by G Suite Audit.
Applications
Depending on the USM Anywhere Sensor you have installed, the widgets might be visible in
the Google G Suite Drive dashboard. This dashboard displays data when the G Suite Drive
data source has been configured.
Widgets Description
Resource Type Pie chart displaying, in percentages the type of resource in Google G Suite
Audit.
User Activity List of the 5 users that have more activity in Google G Suite Audit.
Top File Names List of the top 5 file names in Google G Suite Audit.
Activity Graph that displays the activity in Google G Suite Audit by periods of time.
Depending on the USM Anywhere Sensor you have installed, the widgets might be visible in
the McAfee ePO dashboard. This dashboard displays data when the McAfee ePO data source
has been configured. See The AlienApp™ for McAfee ePO for more information.
Widgets Description
Top Events Pie chart displaying, in percentages, the top events detected by McAfee ePO.
Events by Action Pie chart displaying, in percentages, the events detected by action.
Top Malware List of the top malware families expressed in total numbers.
Families
Top Users Pie chart containing percentage of McAfee ePO logs per user.
Daily Activity Per Graph that displays the daily activity of McAfee ePO per hour.
Hour
The widgets might be visible in the Microsoft Advanced Threat Analytics (ATA) dashboard if
there are Microsoft Advanced Threat Analytics events.
Widgets Description
Top Activity Graph that shows the number of events over a period of time.
Alarms Over Graph that shows the number of alarms over a period of time.
Time
Top Active Users List of the Microsoft ATA top active users.
Top Applications List of the ten top applications detected in the events.
Widgets Description
Top Events by Pie chart containing percentage of Microsoft ATA events by severity.
Severity
Note: You can watch the How to improve threat detection and response with the MITRE
ATT&CK framework customer training webcast on-demand to learn how to use MITRE
ATT&CK within USM Anywhere.
Widgets Description
MITRE ATT&CK Table with Tactics and Techniques, see Alarms List View for more information.
Command and The command and control tactic represents how adversaries communicate
Control Top with systems under their control within a target network.
Assets
Widgets Description
Exfiltration Top Exfiltration refers to techniques and attributes that result or aid in the
Assets adversary stealing files and information from a target network.
Privilege Privilege escalation is the result of actions that allows an adversary to obtain
Escalation Top a higher level of permissions on a system or network.
Assets
Discovery Top Discovery consists of techniques that allow the adversary to gain knowledge
Assets about the system and internal network.
Defense Evasion Defense evasion consists of techniques an adversary may use to evade
Top Assets detection or avoid other defenses.
Persistence Top Persistence is any access, action, or configuration change to a system that
Assets gives an adversary a persistent presence on that system.
Execution Top The execution tactic represents techniques that result in execution of
Assets adversary-controlled code on a local or remote system
Collection Top Collection consists of techniques used to identify and gather information,
Assets such as sensitive files, from a target network prior to exfiltration.
Initial Access The initial access tactic represents the vectors adversaries use to gain an
Top Assets initial foothold within a network.
The MobileIron Threat Defense dashboard displays data when the MobileIron Threat Defense
(MTD) source has been configured and includes MobileIron events. See AlienApp for
MobileIron Threat Defense for more information.
Widgets Description
Top Activity Graph that shows the number of events over a period of time.
Top Alerts Graph that shows the number of alarms over a period of time.
Top Event Types Pie chart displaying, in percentages, the top events types related to the MTD.
Top Event Pie chart displaying, in percentages, the top events severities related to the
Severities MTD.
Events by Pie chart displaying, in percentages, the top events by platform related to the
Platform MTD.
Asset Total number of assets having not upgraded Apple iOS, not upgraded
Information Android, not upgradable iOS, and not upgradable Android.
NIDS Dashboard
Depending on the USM Anywhere Sensor you have installed, the widgets might be visible in
the network-based intrusion detection system (NIDS) dashboard. This dashboard displays
data when the AlienVault NIDS data source has been configured.
Widgets Description
Assets with Malware Activity Total number of assets with malware activity for the current day
and for the current week.
Top Signatures List of the top NIDS signatures having more events.
Top Malware Families List of the top malware families expressed in total numbers.
Top Malware Destination List of the top malware ordered by destination country.
Widgets Description
Top Exploit Activity List of the top exploit activity in your environment.
Depending on the USM Anywhere Sensor you have installed, the widgets might be visible in
the Microsoft Azure Active Directory (AD) dashboard. This dashboard displays a summary of
the events originating from the Azure AD logs, so your environment must have configured
the Azure AD data source.
Widgets Description
Login Attempts Pie chart displaying, in percentages, the successful and unsuccessful login
attempts to Office 365 Azure Active Directory.
Login Failed Pie chart displaying, in percentages, the reasons of the failed login.
Reasons
Top Events List of top events detected by Office 365 Azure Active Directory.
Failed Login By List of the 5 failed login in Office 365 Azure Active Directory.
Address
Login Activity Graph that displays the successful and unsuccessful login attempts to Office
365 Azure Active Directory.
Depending on the USM Anywhere Sensor you have installed, the widgets might be visible in
the Microsoft OneDrive dashboard. This dashboard displays a summary of the events
originating from the OneDrive logs, so your environment must have configured the Microsoft
SharePoint data source and the OneDrive application.
Widgets Description
Resource Type Pie chart displaying, in percentages the type of resource in Office 365
OneDrive.
File Types Pie chart displaying, in percentages the type of files in Office 365 OneDrive.
Activity Graph that displays the activity in Office 365 OneDrive by periods of time.
Top User Agents List of the top 5 user agents used by Office 365 OneDrive.
User Activity List of the 5 users that have more activity in Office 365 OneDrive.
Depending on the USM Anywhere Sensor you have installed, the widgets might be visible in
the Microsoft SharePoint dashboard. This dashboard displays a summary of the events
originating from the SharePoint logs, so your environment must have configured the
Microsoft SharePoint data source and the SharePoint application.
Widgets Description
Resource Type Pie chart displaying, in percentages the type of resource in Office 365
SharePoint.
File Types Pie chart displaying, in percentages the type of files in Office 365 SharePoint.
Activity Graph that displays the activity in Office 365 SharePoint by periods of time.
Top User Agents List of the top 5 user agents used by Office 365 SharePoint.
User Activity List of the 5 users that have more activity in Office 365 SharePoint.
Okta Dashboard
Depending on the USM Anywhere Sensor you have installed, the widgets might be visible in
the Okta dashboard. This dashboard displays data when the Okta data source has been
configured. See The AlienApp™ for Okta for more information.
Widgets Description
Failed Actions List of the ten top failed actions related with Okta.
Event Outcome Pie chart displaying, in percentages, the successful and failed event
outcomes.
Top Users with List of the top users with failed actions.
Failed Actions
Top Applications List of the ten top applications detected in the events.
User Activity Sankey diagram that displays the Okta user activity.
The AT&T Alien Labs™ Open Threat Exchange® (OTX™) dashboard displays if raw pulse data
points are received. See Open Threat Exchange® and USM Anywhere for more information.
Sometimes you may see the IP Reputation widgets contain data but the OTX Pulse widgets
do not. This is because IP Reputation widgets include all suspicious IP addresses, but OTX
Pulse widgets only contain data when the suspicious IP is reported as an IOC for a pulse. See
About OTX for the difference between pulses and IP Reputation.
Widgets Description
IP Reputation Activity By Data Pie chart displaying, in percentages, the IP Reputation by data
Source source.
OTX Activity By Data Source Pie chart displaying, in percentages, the OTX activity by data source.
Top OTX Pulse Indicators of List of the top indicators of compromise that identify a specific
Compromise threat.
Widgets Description
Top Sources with OTX Pulse List of the top 5 source IPs, which are identified by OTX as potential
Activity malicious activity.
Top Destinations with OTX List of the top 5 destinations IPs, which are identified by OTX as
Pulse Activity potential malicious activity.
Overview Dashboard
SIEM Section
SIEM security intelligence combines and correlates collected logs and other data to find
malicious patterns in network traffic and within host activity.
Widgets Description
Alarms Total number of alarms for the current day and for the current week.
Alarms by Intent Alarms correlated by intent and related to a range of dates. The size of the
bubbles depends on the number of issues.
Top Alarms by List of the top 5 alarms ordered by the method of attack or infiltration and
Method including the total number of alarms.
1Some widgets include a filter. You can hover over the filter to see the details.
Widgets Description
Asset Software Inventory refers to the total number of assets having software
Information installed
Assets Discovered refers to the total number of assets discovered by the user.
Top Assets List of the top 5 assets having the most alarms.
with Alarms
Widgets Description
Assets with Total number of assets having vulnerabilities for the current day and for the
Vulnerabilities current week.
Depending on the USM Anywhere Sensor you have installed, the widgets might be visible in
the Palo Alto Networks dashboard. This dashboard displays data when the Palo Alto PAN-OS
data source has been configured. See The AlienApp™ for Palo Alto Networks for more
information.
Widgets Description
Categories Pie chart displaying, in percentages, the Palo Alto Networks categories.
Applications Pie chart displaying, in percentages, the Palo Alto Networks applications.
Threats Pie chart displaying, in percentages, the threats detected by Palo Alto
Networks.
Top Thread List of the top thread users expressed in total numbers.
Users
Outcomes List of the top Palo Alto Networks outcomes expressed in total numbers.
Widgets Description
Depending on the USM Anywhere Sensor you have installed, the widgets might be visible in
the SonicWall dashboard. This dashboard displays data when the SonicWall data source has
been configured.
Widgets Description
Top 10 Policies Pie chart displaying, in percentages the top ten SonicWall policies.
User Activity Pie chart displaying, in percentages the top users by activity.
Top Events List of the top SonicWall events expressed in total numbers.
Top Web List of the top web categories expressed in total numbers.
Categories
Top Source List of the top source countries expressed in total numbers.
Countries
Top Destination List of the top destination countries expressed in total numbers.
Countries
Depending on the USM Anywhere Sensor you have installed, the widgets might be visible in
the Sophos Unified Threat Management (UTM) dashboard. This dashboard displays data when
the Sophos UTM data source has been configured.
Widgets Description
Actions Pie chart displaying, in percentages, the actions supported by Sophos UTM.
Protocols Pie chart displaying, in percentages, the protocols used by Sophos UTM.
Top Blocked Pie chart displaying, in percentages, the top blocked categories.
Categories
Traffic Per Hour Graph that displays the traffic detected by Sophos UTM per hour during the
last 24 hours.
VMware Dashboard
Depending on the USM Anywhere Sensor you have installed, the widgets might be visible in
the VMware dashboard. This dashboard displays data when the VMware application
programming interface (API) data source has been configured.
Widgets Description
Events by Data Pie chart displaying, in percentages, the VMware events by data center.
Center
Widgets Description
User Activity Pie chart displaying, in percentages, the VMware user by activity.
VMware Assets Total number of VMware assets with alarms and total number of VMware
assets.
VMware Assets List of VMware assets with the number of detected alarms.
with Alarms
Vulnerabilities Dashboard
If the dashboard does not contain information and there are not detected vulnerabilities, click
Run Authenticated Vulnerability Scan to run a scan to detect asset vulnerabilities. See
Running Authenticated Asset Scans.
Widgets Description
Vulnerabilities by Pie chart displaying, in percentages, the severity of vulnerabilities, which can
Severity be Low, High, and Medium. See About Vulnerability Severity.
Top Active List of the top active vulnerabilities by severity. You can see the CVE
Vulnerabilities by Identifier, its severity, and the affected assets. See About Vulnerability
Severity Severity.
Latest Scan Jobs List of the 5 latest scans run in your environment. It includes the scan date
and the number of vulnerabilities found.
Scan Jobs History Graph that displays the total number vulnerability scans on each day in the
current month.
WatchGuard Dashboard
Depending on the USM Anywhere Sensor you have installed, the widgets might be visible in
the WatchGuard dashboard. This dashboard displays data when the WatchGuard XTM data
source has been configured.
Widgets Description
Access Control Pie chart displaying, in percentages, the access detected by WatchGuard.
Outcomes
Widgets Description
Traffic Per Hour Graph that displays the traffic detected by WatchGuard per hour during the
last 24 hours.
This Windows Authentication dashboard displays data when your environment includes
Microsoft Windows security auditing events.
Widgets Description
Logon Session Displays the logon session events like successful logon, user initiated
Events logoff, logon failure, remote desktop session reconnected/disconnected,
workstation locked/unlocked, and screen saver invoked/dismissed.
Logon types Displays the logon types like interactive, network, batch, service, unlock,
network cleartext, remote desktop, and logon with cached credentials.
Domain Controller Top authentication events received by the Domain Controller. For example:
Authentication Kerberos tickets of any type (authentication, services).
Events
Logon Failure Top logon failure reasons in the Active Directory. For example: incorrect
Reasons usernames or bad passwords.
Kerberos Failure Top error codes generated by Kerberos service. For example: errors
Codes received during authentication and service requests.
Ticket Encryption Pie chart containing the different encryption types used in Kerberos. For
Type example: DES, RC4, AES, etc.
Ticket Pre- Pie chart containing the different Pre-Authentication types used in
Authentication Kerberos. For example: timestamp, salt, etc.
Type
Authentication Top Active Directory authentication packet types. For example: Kerberos
Package or NTLM.
User Account Displays the user account changes like created, enabled, disabled, deleted,
Changes etc.
Group Changes Displays the group changes like created, changed, deleted. It also displays if
a member has been added or removed.
Remote Desktop Sankey diagram containing remote connections between the different
Sessions users and destination hosts.
Windows Dashboard
The Microsoft Windows dashboard will have data when your environment includes NXLog
Windows events, Microsoft Azure Windows events, Elastic Winlogbeat Windows events, or
AlienVault Agent - Windows EventLog events.
Widgets Description
Events by Pie chart containing the different channels populating the Windows Event
Channel Log. For example: System, Security or Application.
Top Users Pie chart containing percentage of Windows Event Logs per user.
Events by Pie chart containing percentage of Windows Event Log per severity.
Severity
Top Hosts Top Windows hosts based on Windows Event Logs generated.
Widgets Description
USM Anywhere enables you to create and customize your own dashboards with the widgets
and content you need.
Edition: This feature is available in the Standard and Premium editions of USM
Anywhere.
See the Affordable pricing to fit every budget page for more information about the
features and support provided by each of the USM Anywhere editions.
1. Go to any dashboard.
2. Click Create Custom Dashboard.
Your custom dashboard is created and displayed. The page appears empty because you
have not selected any widget yet.
3. Choose a widget type between Alarms, Events, Assets, Vulnerabilities, and Configuration
Issues. Every widget has his own widget data.
4. You can change the title of the widget.
5. (Optional.) You can select a saved view filter if you have custom views for the selected
type of widget.
6. Click Save.
Note: You can move the widgets inside your dashboard. Click the widget that you
want to move and drag it to the space you want to move it to. If it is an empty space,
the widget will display in it. If it is in a space occupied by another widget, the widgets
will replace each other.
4. Click Save.
Note: If you clone a shared custom dashboard, the cloned dashboard will have the
shared option disabled by default. See Sharing your Custom Dashboard for more
information.
3. Click Confirm.
Keep in mind you can not edit or delete a shared dashboard. Shared custom dashboards are
read-only dashboards. If you want to edit a shared custom dashboard, you have to clone it
beforehand. See To clone your custom dashboard for more information.
1. Go to any dashboard.
2. Click Create Custom Dashboard.
3. Enter a title for your dashboard.
4. Select the Share Dashboard box for sharing your custom dashboard. This option is dis-
abled by default.
5. Add the number of rows you need and select the number of columns you want for each
row, between 1 and 4. You can select the row height (small, medium, or large) for each
column.
6. Click Save.
1. Go to Dashboards > Custom Dashboards and open the custom dashboard you want to
share.
2. Select Actions > Edit Dashboard.
3. Select the Share Dashboard box for sharing your custom dashboard.
4. Click Save.
1. Go to Dashboards > Custom Dashboards and open the custom dashboard you want to
stop sharing.
2. Select Actions > Edit Dashboard.
USM Anywhere enables you to create and customize your own dashboards with the widgets
and content you need. In this example, you will create a dashboard with a widget that displays
events from a specific sensor.
USM Anywhere provides some widgets for events out of the box (for example, Events by
Application, Events by Severity, or Events by Source, to name a few). However, there is no
widget for events from a specific sensor. If you want to show events from a specific sensor on
your dashboard, you can create a custom widget by using a saved event view.
To create a widget for events from a specific sensor, you first need to filter the events and
save them in a view.
2. Locate the Sensor filter on the left and click the sensor you want to view the events.
The page reloads showing the events originated from this sensor.
Edition: Creating custom dashboard isavailable in the Standard and Premium editions
of USM Anywhere.
See the Affordable pricing to fit every budget page for more information about the
features and support provided by each of the USM Anywhere editions.
You can now use the saved view in a widget on a custom dashboard.
1. Go to any dashboard.
2. Click Create Custom Dashboard.
3. Enter a title for your dashboard.
4. Use the Share Dashboard box for sharing your custom dashboard. This option is disabled
by default. See Sharing your Custom Dashboard for more information.
5. Add the number of rows you need and select the number of columns you want for each
row, between 1 and 4. You can select the row height (small, medium, or large) for each
column.
6. Click Save.
Your custom dashboard is created and displayed. The page appears empty because you
have not selected any widget yet.
8. From the Widget Type list, select Events to display more options.
9. In the Widget Data search field, enter events over time and click the Events over Time
widget.
The title field is automatically populated with the name of the widget. You can change the
title if you want.
10. From the Saved View Filter (Optional) list, select the view you have saved in the previous
procedure.
l USM Anywhere Scheduler Best Practices explains essential points and performance issues
associated with scheduled jobs that you must keep in mind when scheduling your jobs.
l USM Anywhere Scans Best Practices provides information about scans, types of scans, the
specific ways of doing a scan, the right order for doing scans and avoid asset duplicity, and
so on.
l Orchestration Rules Best Practices is where you can find useful recommendations when
creating an orchestration rule.
Once the assets have been identified, there are several tasks that you must carry on. This
chapter describes these necessary tasks to manage assets and asset groups. This chapter
covers topics such as asset creation and discovery, asset scans, vulnerability scans, scheduling
scans, asset monitoring, and analysis.
Through USM Anywhere, you can configure asset management according to your needs.
Proper asset management is necessary to make the most of the entire USM Anywhere
functionality.
In USM Anywhere, an asset is a piece of equipment on the company's network that bears a
unique IP address. An asset can be a server, a router, a firewall, a printer, a PC, or any other
network-enabled device.
Note: You can watch the How to Use Asset Management in USM to Improve Network
Visibility customer training webcast on-demand to learn how to collect an accurate
asset inventory.
l Adding Assets
l Importing Assets from a CSV File
l Asset List View
l Selecting Assets in Asset List View
l Searching Assets
l Running Asset Scans
l Running Authenticated Asset Scans
l Scheduling Asset Scans from Assets
l Scheduling Authenticated Asset Scans from Assets
l Adding AlienApps to an Asset
l Viewing Assets Details
l Events Created When an Asset Stops Sending Data
l Managing Asset Fields
l Deleting the Assets
l Editing Assets
l Create an Assets Report
Adding Assets
l Asset Discovery
l Adding Assets by Using the Setup Wizard
l Adding Assets in the UI
l Adding Assets Through a CSV File
Asset Discovery
USM Anywhere discovers assets automatically if you have a cloud provider (for example,
Amazon Web Services [AWS] or Microsoft Azure) or a hypervisor management API (for
example, VMware ESX). After deploying the sensor and applying the API credentials, USM
Anywhere discovers assets in these environments. See Running an Asset Discovery for more
information.
Note: Assets discovered automatically may occasionally be labeled "inactive". This label
reflects the asset's state in your environment according to your provider. Please see
your provider's documentation for an explanation of how they define and detect asset
inactivity.
Note: Asset discovery scans can generate assets for hosts that do not exist when
traversing certain network devices. See the Asset Discovery creates an Asset for each IP
address in a network range article for more information.
Important: Make sure when you use a virtual private network (VPN) using a Cisco
Firewall, that arp-proxy is enabled in the firewall. Otherwise, all the assets will be
reported using the same media access control (MAC) address, and USM Anywhere will
consider all of them to be different interfaces for the same asset.
There are two ways to add assets to scan when using the Setup Wizard: by adding individual
assets, or by using network ranges to add multiple assets.
The asset discovery option in the Setup Wizard enables you to add individual assets to scans.
2. Enter an asset name and either an IP address, or a fully qualified domain name (FQDN).
3. Click Save.
The asset discovery option in the Setup Wizard enables you to add multiple assets in a
network range to scans.
3. Enter a network name and a Classless Inter-Domain Routing (CIDR) block to specify the
subnet's IP address block that you want to scan.
4. If you have more than one sensor configured in your environment, you need to select a
sensor.
By default, the Scan this network daily to discover new assets and services checkbox is
selected. This option configures daily network discovery assets when scanning a network
from the wizard.
5. Click Scan.
The length of this process depends on the length of the network range (for example,
longer network ranges have longer processes).
After the process finishes and the scan is completed, the number of assets found is
displayed. These assets are automatically added to USM Anywhere. In addition, a dynamic
asset group is automatically created with these assets.
6. Click Scan Another to start a new scan, or click Next to continue with the following
screen.
This step may be different depending on the sensor you have installed.
Note: This option is not available for AWS Sensors because the instances are
automatically set.
After the process finishes and the scan completes, you can see the number of assets
found. These assets are automatically added to USM Anywhere. In addition, a dynamic
asset group is automatically created with these assets.
5. Click Scan Another to start a new scan or click Next to continue with the following
screen.
There are two methods of manually adding assets through the UI:
l The quick method, by adding the asset name and either an IP Address or FQDN, and then
selecting a USM Anywhere Sensor.
l The advanced method, which requires more data related to the asset that you are adding.
2. In the upper right side of the page, select Actions > Quick to display the following fields
above the asset list:
3. Enter the asset name and either the IP address or FQDN in the text boxes displayed above
the asset list.
Use the icon to display the rules that must satisfy a valid FQDN.
4. If you have more than one USM Anywhere Sensor connected, select the sensor from the
drop-down menu.
By default ,the Scan the newly added asset for asset details checkbox is selected. This
option scans the newly added asset and displays depending on your sensor. See Running
Asset Scans When Creating a New Asset for more information.
5. Click Save.
Add the data of the fields that need to be added, as described in the following table.
Field Meaning
Sensor Select the sensor you want to associate with the asset.
Asset Type (Optional.) Device type that identifies the asset. Select an option
from the list. See USM Accepted Asset Types for more information.
Time Zone Time zone configured for your USM Anywhere instance (default is
Coordinated Universal Time [UTC]).
Prevent Remote Select this field to avoid remote scanning. This option displays
Scanning depending on your deployed sensor.
Scan the newly added By default, this field is selected. Use it to scan the new added asset.
asset for asset details See Running Asset Scans When Creating a New Asset for more
information. This option displays depending on your deployed
sensor.
Compliance Scope To include the asset in the Payment Card Industry Data Security
Standards (PCI DSS) asset group, the Health Insurance Portability
and Accountability Act (HIPAA) asset group, or both, select the
corresponding checkboxes. See Using USM Anywhere for PCI
Compliance and USM Anywhere Compliance Templates for more
information.
Important: You must enter at least one of the three fields in Network Interfaces.
These fields are highlighted when the values are not valid.
Note: Every hour, USM Anywhere refreshes information about the PCI DSS or HIPAA
asset groups. If you select the Compliance Scope field, you can see the asset inside
the asset group after the following update.
4. Click Save.
3. Drop your CSV file or select the file from your desktop.
4. Select a sensor if you have more than one sensor configured in your environment.
5. Click Import.
USM Anywhere enables you to import several assets from a comma-separated values (CSV)
file. Use this option to add assets in large quantities to your environment from a single file.
This file needs to follow a specific format.
Warning: If the file does not follow the specific format, the assets will not be imported.
See About the CSV File for more information.
Note: If there is an asset inside the CSV file that has the same IP address or fully
qualified domain name (FQDN) of an asset that already exists in your environment,
or if there are any fields that are not valid, the new asset is not added.
Once you select a file, the name of the file displays, and the Import button is active.
If you have more than one sensor configured in your environment, you need to select a
sensor.
Warning: Due to some browser limitations, your CSV file may only successfully import if
it is in a .txt file format. If you click Import and no process begins, you may need to save
your .csv as a .txt file for it to successfully import. This is a known issue for users
operating in Firefox but may impact any browser.
Note: When an import process starts and finishes, USM Anywhere generates system
events. See Searching for System Events Related to an Asset Import Process for more
information.
l The [...] indicates that you can repeat "IP Address,FQDN" as many times as needed.
l If you need to skip a field, leave that field blank (with no value or space). This will result in
two semicolons next to each other.
For example, if you need to skip the PCI value your CSV file will look like the following:
Important: Do not include a header line in the CSV file because it will result in an error of
invalid format.
1.1.1.1 Valid
,my.domain.com Valid
my.domain.com Invalid
USM Anywhere provides a centralized view of your assets. Go to Environment > Assets to
see this centralized view.
The Assets page displays asset inventory and information on those assets. These are the
different parts of the Assets page:
l On the left side of the page are the search and filters options. Use filters to delimit your
search.
l At the top of the page, you can see any filters you have applied, and you have the option to
create and select different views of the assets.
l The main part of the page is the list of assets, where each row describes an individual
asset. Click an asset to open its details. See Viewing Assets Details for more information.
Each asset includes a check box that you can use to select it. You can select all assets in
the same page by clicking the check box in the first column of the header row. You can
also select all the assets in the system. See Selecting Assets in Asset List View for more
information.
If you want to analyze the data and see the additional columns without having to scroll left
and right, you can maximize the screen and hide the filter pane. Click the icon to hide the
For each asset in the asset columns list, USM Anywhere displays useful information to help
you manage that asset.
The following table lists the fields you see on the page.
Column Field
Description
Name
Agent Type Platform of the agent. This column displays when you open the Asset List View
page from the Agents page.
Agent Version Version of the agent. This column displays when you open the Asset List View page
from the Agents page.
Sensor USM Anywhere Sensor name associated with the asset. The type of sensor is also
displayed below the sensor name.
Jobs Number of scheduled jobs. This column is not displayed when you open the Asset
List View page from the Agents page.
Asset Type Device type that identifies the asset. Select an option from the list (see USM
Accepted Asset Types for more information). This column is not displayed when
you open the Asset List View page from the Agents page.
Column Field
Description
Name
Config Issues Number of configuration issues related to the asset. This option is only available
for Amazon Web Services (AWS) and Microsoft Azure sensors.
Updated Date on which the asset was updated. The displayed date depends on your
computer's time zone.
Important: The alarm and event counts are not updated in real time, but are calculated
every hour. If the counts are not updated, it can happen because new events or alarms
are in your environment after the last count.
Important: The vulnerability and configuration issues counts are updated after every
scan.
From the list of assets, you can click any individual asset row to display more information on
the selected asset, including how many alarms, events, vulnerabilities, or configuration issues
are related to that asset. See Viewing Assets Details for more information.
Each asset includes a check box that you can use to select it. You can select all assets in the
same page by clicking the check box in the first column of the header row. You can also select
all the assets in the system. See Selecting Assets in Asset List View for more information.
The padlock you can see next to the asset indicates whether the asset has a credential
assigned ( ) or not ( ). See Managing Credentials in USM Anywhere for more information.
You can choose the number of items to display by selecting 20, 50, or 100 below the table.
You can classify some columns by clicking the icons to the right side of the heading. You can
sort the item information in ascending or descending order.
Note: You can view your bookmarked items by going to the secondary menu and click-
ing the icon. This will display all of your bookmarked items and provide direct links to
each of them.
Choose the view you want in the Layout page. You can see the assets in a list view or in a grid
view.
Click Generate Report to open the Configure Report dialog box. See Create an Assets Report
for more information.
l Find in Events: Use this option to execute a search of the asset name in the Events page.
See Searching Events for more information.
l Look up in OTX: This option searches the IP address of the asset in the OTX page. See
Using OTX in USM Anywhere for more information.
l Full Details: See Viewing Assets Details for more information.
l Configure Asset: See Editing Assets for more information.
l Delete Asset: See Deleting the Assets for more information.
l Assign Credentials: See Managing Credentials in USM Anywhere for more information.
l Authenticated Scan: This option displays depending on the USM Anywhere Sensor asso-
ciated with the asset. See Running Authenticated Asset Scans for more information.
l Scan with AlienApp: This option enables you to run an asset scan through an AlienApp.
See Running Asset Scans Using an AlienApp for more information.
l Run Scan: This option displays depending on the USM Anywhere Sensor associated with
the asset. See Running Asset Scans for more information.
l Configuration Issues: This option opens the Assets Details page. The Configuration Issues
tab is selected in the page. See Viewing Assets Details for more information.
l Vulnerabilities: This option opens the Assets Details page. The Vulnerabilities tab is selec-
ted in the page. See Viewing Assets Details for more information.
l Alarms: This option opens the Assets Details page. The Alarms tab is selected in the page.
See Viewing Assets Details for more information.
l Events: This option opens the Assets Details page. The Events tab is selected in the page.
See Viewing Assets Details for more information.
Important: You need to select one or more assets if you want to activate the options of
the Actions button. Some options can be gray if there isn't any asset selected. See
Selecting Assets in Asset List View for more information.
l Quick: Use this option to add the asset name and either an IP address or FQDN, and then
select a USM Anywhere Sensor. See Adding Assets in the UI for more information.
l Advanced: Use this option to add an asset. This method requires more data related to the
asset that you are adding. See Adding Assets in the UI for more information.
l Import Assets: Use this option to add several assets through a CSV file. See Importing
Assets from a CSV File for more information.
Within the page, you can configure the columns and fields that display in the List view. You
can also save your columns configuration to return to it whenever you need it.
1. From the assets list view, select Actions > Manage Columns.
2. Search the columns you want to have in the list view. You can enter your search in the
search field.
Click the icon of an available column to modify the name of the column.
3. Use the and icons to pass the items from one column to the other and select the
4. You can order the columns by clicking one of them and dragging the column to the
desired place.
5. Click Apply.
Note: If you generate a report when you have set custom columns, your report keeps
the columns you have configured.
Important: If you want to keep your configuration, you need to save it by selecting
Save View > Save as. Otherwise, your custom view is not kept when you move to
another feature. See Assets Views for more information.
Assets Views
You can configure the view you want for the list of items in the page.
2. Click Saved Views and then select the view you want to see.
3. Click Apply.
1. From the Assets list view, click View above the filters.
2. Click Saved Views and then click the icon next to the saved view you want to delete.
3. Click Accept.
USM Anywhere includes a wide range of report templates classified according to the
compliance templates for alarms, vulnerabilities, and events collected in the system. The
templates are combined into these two groups:
l NIST CSF: The National Institute of Standards Technology (NIST) Cybersecurity Frame-
work provides a policy framework of computer security guidance for how private sector
organizations can assess and improve their ability to prevent, detect, and respond to cyber
attacks.
l ISO 27001: ISO/IEC 27001 provides guidance for implementing information security con-
trols to achieve a consistent and reliable security program. The ISO and the International
Electrotechnical Commission (IEC) developed 27001 to provide requirements for an inform-
ation security management system (ISMS).
3. Select a report.
You can use the search field or scroll down the list.
4. Click Apply.
USM Anywhere enables you to select an asset or multiple assets for export (see Create an
Assets Report), and you can use the options you find under the Actions button (see Asset List
View).
To select all the assets returned from a search or all the assets in your environment
Text similar to the following example displays above the asset table:
All 20 assets on this page are selected. Select all 904 related to this
filter
where
2. To select all the assets, click Select all 904 related to this filter.
Searching Assets
USM Anywhere includes the option of searching items of interest on the page. There are
several filters displayed by default. You can either filter your search or enter what you are
looking for in the search field.
You can configure more filters and change which filters to display by clicking the Configure
Filters link located in the upper-left side of the page. See Managing Filters for more
information.
The following table lists the filters you see on the page.
Advanced Search Use this filter for searching a specific value of a field. See Advanced Search
Filter for more information.
Asset Origin Type Filter assets by who added the asset to the system.
Instance Type (Only for the Amazon Web Services [AWS] Sensor). Filter assets by AWS
instance type.
Region (Only for the AWS Sensor). Filter assets by AWS region.
Asset Type Filter assets by asset type. See USM Accepted Asset Types for more
information.
The number between brackets displayed by each filter indicates the number of items that
matches the filter. You can also use the filter controls to provide a method of organizing your
search and filtered results.
The following table shows the icons displayed with each filter box.
Icon Meaning
In the upper-left side of the page, you can see any filters you have applied. Remove filters by
clicking the icon next to the filter. Or clear all filters by clicking Reset.
Note: When applying filters, the search uses the logical AND operator if the used filters
are different. However, when the filter is of the same type, the search uses the logical
OR operator.
Those filters that have more than 10 options include a Filter Values search field for writing
text and making the search easier. If there are more than 50 search results, a icon appears
to the right of the Filter Values search field. Click this icon to download a CSV containing up
to 1024 results.
Managing Filters
There are many more filters available beyond those that are shown on the Assets page by
default. You can configure the filters you want to display by clicking the Configure filters link,
which is located in the upper-left corner of the page.
2. In the upper-left side of the page, click the Configure Filters link.
3. Search the filters you want to have in the list view. You can enter your search in the
search field.
4. Use the and icons to pass the items from one column to the other and select the fil-
1. From the Asset List view, select the filters you want to see.
5. Click Save.
Note: If you have changed the configuration of the assets columns, this
configuration will also be saved together with the filter configuration. See Assets
Views for more information.
The Advanced Search filter enables you to enter a search value on a selected field.
The following table shows the filter fields that you can find in the first drop-down list.
PCI Asset Filter assets by Payment Card Industry (PCI) Asset, if the asset is included
or not in the PCI Data Security Standards (DSS) Asset Group. See Asset
Group List View and Working with Assets and PCI DSS for more
information.
HIPAA Asset Filter assets by Health Insurance Portability and Accountability Act (HIPAA)
Asset, whether the asset is included in the HIPAA Asset Group. See Asset
Group List View for more information.
Custom User Fields Filter assets by the fields you have created. If you have not created fields,
this filter does not display.
Note: The result of a search when you use the Alarm Counter filter or the Event Counter
filter depends on if an alarm or an event can identify the source or destination as an
asset in the inventory. Your environment can have alarms or events associated with
assets both included in the inventory and those not included in the inventory. Assets
included in the inventory display their names in blue, and assets not included in the
inventory display their names in gray. The alarm and event counter filters only count the
identified (blue) assets.
Important: The alarm and event counts are not updated in real time but are calculated
every hour. If the counts are not updated, it can happen because new events or alarms
are in your environment after the last count.
The following table shows the operators that you can find in the second drop-down list.
Operator Meaning
Is Empty Include assets with no IP addresses. This operator is available only for
IP/CIDR.
Is Not Empty Include assets with IP addresses. This operator is available only for IP/CIDR.
Operator Meaning
The following table shows the operators that you can include in your query string.
Use the search field to enter queries and refine your search. You can enter free text, use
wildcards, and use advanced search syntax. When searching, keep in mind the accepted query
string syntax list in this table.
Literal, using Matches fields that contain the full term. "Event from asset not received"
double quotes Literal searches are case-sensitive.
Boolean Including AND or OR between two search (http OR tcp) AND ftp
operators or terms will search for results that match
using parentheses both of those terms.
Any characters may be used in a query, but certain characters are reserved and must be
escaped. The reserved characters are these:
+-=&|><!{}[]^"~:\/
Use a backslash (for example, "\>") to escape any reserved character (including a backslash).
See Advanced Search Fields (First Drop-Down List) for more information.
Important: Depending on the field you have chosen in the first drop-down list, the
operators vary.
See Advanced Search Fields (Second Drop-Down List) for more information.
If you want to search for an exact phrase having two or more words, you need to put
quotation marks around the words in the phrase. This includes email addresses (for
example, "[email protected]").
9. Click Apply.
USM Anywhere enables you to toggle the mode of search. The available modes are Standard
and Advanced. You can change from one mode to the other by clicking the icon or
clicking the icon located in the upper left corner of the page.
Standard Mode
This mode enables you to select one value per filter at the same time, and then the search is
automatically performed. This mode is on by default.
Note: If you exit the advanced mode and the selected filters are not compatible with
the standard mode, a warning dialog box opens to inform you the current filters will
be removed.
Advanced Mode
Advanced mode enables you to select more than one value per filter at the same time. This
mode is off by default.
4. In the lower-left corner of the page, click Apply Filters. Or in the upper side of the page,
click Apply.
Note: The selected filter displays the icon and the filter chiclet is labeled in red.
Important: Some filters don't include the NOT operator (for example, Services or
Software).
5. Click Apply.
Use an asset scan to discover hosts and services in the deployed network. To accomplish this
goal, the scanner sends crafted packets to the target asset and analyzes the responses. This
is not an authenticated scan. You can run scans on individual assets.
Important: This option is available if the sensor associated with the asset allows it.
The asset for which you are scanning must be visible by the sensor through the network. This
means that both the sensor and the asset should be able to see each other through at least
Layer 3 (network) protocols. If the sensor and the asset are in the same network segment
(Layer 2), use Address Resolution Protocol (ARP) requests to discover the asset.
The USM Anywhere Sensor sends ARP, Internet Control Message Protocol (ICMP), and TCP
requests to discover hosts on the network to which the sensor is connected. A new asset is
created if the sensor receives an acknowledgment from any of the previously mentioned
protocols.
Note: If a scan is suspended or otherwise running for more than two hours, it will time
out. You can see the timeout result in the asset's Scan History, as well as in the system
event generated for that scan.
Note: This item is not available on Amazon Web Services (AWS) sensors.
4. Click Enable.
l Next to the asset name that you want to scan, click the icon, select Full Details,
l Next to the asset name that you want to scan, click the icon, and then select Asset
Scan.
l Discovery: This profile scans the known ports and services searching for the most-
used ports. (There are 4571 ports.)
l Complete: This profile scans all TCP and UDP ports to find the possible ports in a
deployment. (There are 65535 ports.)
l Vulnerability Discovery: Performs general network discovery and checks for specific
known vulnerabilities. It only reports results if they are found.
l Extended Vulnerability Discovery: Performs a Vulnerability Discovery scan, which act-
ively discovers more about the network.
4. Select Set Debug Mode if you want to log the results of the scan or if you have a problem
with a scan.
Note: The Set Debug Mode option must be used only for debugging purposes
because it needs a large amount of disk space for the file or files that it generates.
Only AT&T Cybersecurity Technical Support should review these files. You can
contact this department for more information.
5. Click Scan.
6. In the Asset details page, click Scan History in the table area to display the results of the
scan.
You can see the status of each scan and the details. USM Anywhere also creates a system
event named Asset Scanner Result with the same details.
Important: Make sure the Asset Scanner app is enabled. See Enabling the Asset Scanner
App for more information.
Note: See Scheduling Asset Scans from Assets and Scheduling Asset Scans from the
Job Scheduler Page for more information about how to schedule an asset scan.
3. The Scan the newly added asset for asset details field is selected by default. Use it for
scanning the newly added asset.
Important: The Asset Scan options are available only for the VMware Sensor and
Hyper-V Sensor. USM Anywhere uses the Discovery profile to conduct the scans.
4. Click Save.
A message displays at the top of the page to inform you that the scan has been launched
and is running. When the scan is complete, the results are visible in the tab Scan History
of the asset details page. See Viewing Assets Details for more information.
USM Anywhere enables you to select an asset and run an asset scan through an AlienApp.
The asset for which you are scanning must be visible by the sensor through the network. This
means that both the sensor and the asset should be able to see each other through at least
Layer 3 (network) protocols. If the sensor and the asset are in the same network segment
(Layer 2), use Address Resolution Protocol (ARP) requests to discover the asset.
USM Anywhere Sensor sends ARP, Internet Control Message Protocol (ICMP), and TCP
requests to discover hosts on the network to which the sensor is connected. A new asset is
created if the sensor receives an acknowledgment from any of the previously mentioned
protocols.
l Next to the asset name that you want to scan, click the icon, select Full Details,
l Next to the asset name that you want to scan, click the icon that you want to scan,
Important: The available AlienApps on this dialog box are those that have been
configured with the Asset Discovery capability. See Advanced AlienApps for more
information.
l AT&T Cybersecurity: See Configuring the AlienApp for DDI Frontline VM for more
information.
l Digital Defense: See AlienApp for DDI Frontline VM Orchestration for more inform-
ation.
l Qualys: See AlienApp for Qualys Actions for more information.
4. Fill out the details for the scan action you selected.
5. Click Run.
An authenticated asset scan verifies scanned Internet Protocol (IP) addresses and detects
vulnerabilities. Log in as administrator or root to perform an authenticated scan. See
Managing Credentials in USM Anywhere for more information.
Warning: An authenticated scan may fail if the local mail exchanger, which applies to
Linux hosts, is enabled in the target asset.
You can scan an instance or network, but first you need to check these points:
If your USM Anywhere Sensor is deployed in Amazon Web Services (AWS) to a virtual private
cloud (VPC), see Amazon VPC-to-Amazon VPC connectivity options for more information.
The following table shows the asset scan credentials and escalation options.
Note: If a scan is suspended or otherwise running for more than two hours, it will time
out. You can see the timeout result in the asset's Scan History, as well as in the system
event generated for that scan.
l Next to the asset name that you want to scan, click the icon select Full Details, and
or
l Next to the asset name you want to scan, click the icon and select Authenticated
Scan to directly start the asset scan. If the option is not enabled, you need to add a cre-
dential. See Managing Credentials in USM Anywhere for more information.
A message displays at the top of the page to inform you that the authenticated scan is in
progress.
Important: Credentials assigned directly to an asset have higher priority than those
assigned to an asset group.
3. In the asset details page, click Scan History in the table area to display the results of the
scan.
You can see the status of each scan and its details, which informs you if the scan is
unsuccessful due to bad credentials or a connectivity issue between the USM Anywhere
Sensor and the asset you are attempting to scan. USM Anywhere also creates a system
event named Authenticated Asset Scanner Result for the scan and for testing the
credentials.
Each asset has a Scan Details link you can click to download a zip file containing the
details of the recent scan. The link is only present for the most recent scan of each asset,
and is available for one week after the scan has been run.
Below the Vulnerabilities tab, you can see the vulnerabilities that the scan has found.
You can also see the vulnerabilities that the scan has found by going to Environment >
Vulnerabilities. While the scan is running, a Scanning button displays. When the scan
finishes, the message Scan finished. Refresh to view scan results displays. Click
Refresh Scan Results to update the list.
Note: See Scheduling Authenticated Asset Scans from Assets and Scheduling Asset
Scans from the Job Scheduler Page for more information about how to schedule an
authenticated asset scan.
USM Anywhere provides a simple way to include scans for scheduling using its web user
interface (UI). See USM Anywhere Scheduler for more information.
The description is optional, but it is a best practice to provide this information so that
others can easily understand what it does.
Depending on the USM Anywhere Sensor that you have installed, this field can include
different options.
4. In the App Action field, leave Scan, which is the default option.
This option discovers services, operating systems (OSes), hostnames, IP and media access
control (MAC) addresses, and vulnerabilities of known hosts.
5. The Asset field displays the name of the asset to scan. You can't modify this field.
l Discovery: This profile scans the known ports and services searching for the most-
used ports. (There are 4572 ports.)
l Complete: This profile scans all TCP and UDP ports to find the possible ports in a
deployment. (There are 65535 ports.)
l Vulnerability Discovery: Performs general network discovery and checks for specific
known vulnerabilities. It only reports results if they are found.
l Extended Vulnerability Discovery: Performs a Vulnerability Discovery scan, which act-
ively discovers more about the network.
l Intensive Vulnerability Discovery: Performs several tasks to discover vulnerabilities,
which uses a significant number of resources on the targeted machine. Because of
this, sensitive targets may perceive a brief disruption on their services.
7. Select Set Debug Mode if you want to log the results of the scan or if you have a problem
with a scan.
Note: The Set Debug Mode option must be used only for debugging purposes
because it needs a large amount of disk space for the file or files that it generates.
Only AT&T Cybersecurity Technical Support should review these files. You can
contact this department for more information.
8. In the Schedule section, specify when USM Anywhere runs the job:
The selected increment determines the available options. For example, on a weekly
increment, you can select the days of the week to run the job.
Or on a monthly increment, you can specify a date or a day of the week that occurs
within the month.
Important: USM Anywhere restarts the schedule on the first day of the month if
the option "Every x days" is selected.
This is the time that the job starts at the specified interval. It uses the time zone
configured for your USM Anywhere instance (the default is Coordinated Universal
Time [UTC]).
9. Click Save.
USM Anywhere provides a simple way to include authenticated scans for scheduling using its
web user interface (UI). See USM Anywhere Scheduler for more information.
To schedule an authenticated asset scan job from the asset details window
The description is optional, but it is a best practice to provide this information so that
others can easily understand what it does.
Depending on the USM Anywhere Sensor that you have installed, this field can include
different options.
5. The Asset field displays the name of the asset to scan. You can't modify this field.
6. In the Schedule section, specify when USM Anywhere runs the job:
The selected increment determines the available options. For example, on a weekly
increment, you can select the days of the week to run the job.
Or on a monthly increment, you can specify a date or a day of the week that occurs
within the month.
Important: USM Anywhere restarts the schedule on the first day of the month if
the option "Every x days" is selected.
This is the time that the job starts at the specified interval. It uses the time zone
configured for your USM Anywhere instance (the default is Coordinated Universal
Time [UTC]).
7. Click Save.
USM Anywhere receives syslog log data from external data sources: devices, applications, or
operation systems. If that data is not automatically matched with an AlienApp through hints
(see Auto-discovered AlienApps), you must manually associate the AlienApp with an asset in
USM Anywhere. There are two methods for creating these associations:
l By assigning one or more assets to the AlienApp. See Assign Assets to AlienApps for
details.
l By adding one or more AlienApps to the asset (this document).
You can use a combination of these methods to ensure that USM Anywhere can identify the
correct AlienApps for the log data it receives from an asset.
Important: Assigning an AlienApp to an asset disables the usage of hints for the logs
coming from this asset; therefore, USM Anywhere only uses the assigned AlienApps to
parse and normalize those logs.
If you use a log-forwarding software (such as Splunk or Loggly) to send logs to USM
Anywhere, AT&T Cybersecurity recommends that you use at least two such forwarders:
one forwarder for all the auto-discoverable AlienApps, and the other for the non-auto-
discoverable AlienApps. In the latter case, you must create an asset in USM Anywhere to
denote the forwarder and assign it to the non-auto-discoverable AlienApps. This
ensures that USM Anywhere uses the correct AlienApp to parse your logs.
Adding an AlienApp to an asset requires that you know what log data that the USM Anywhere
Sensor receives from the asset and which AlienApp(s) are the best match for parsing and
normalizing that data to produce meaningful events for your needs.
You can add an AlienApp on the Asset Details page. The Asset Details page provides access to
all of the available information and tools for managing an individual asset. See Asset
Management for more information about managing discovered assets in USM Anywhere.
2. (Optional.) Use the Search & Filters option to filter the list and help you to locate the
asset you want.
3. Click the icon next to the asset name and select Full Details.
4. At the bottom of the expanded page, select the AlienApps tab and click Add AlienApp.
5. In the dialog box, select the AlienApp you want to assign to the asset. Enter full or part of
the name in the Set a New AlienApp field and select one from the displayed list.
On the AlienApps tab, you can see the list of AlienApps added.
For logs where a matching AlienApp is not identified, USM Anywhere parses it using a generic
data source. You can review the generated events in the AlienVault Generic Data Source
events view. If the reporting device for the event is defined in the USM Anywhere asset
inventory, you can manually assign an AlienApp directly from this view.
See AlienVault Generic Data Source in the USM Anywhere User Guide for more information
about the information and tools available in this view.
5. In the Reporting Device column, click the icon next to the asset name and select
Assign AlienApp.
6. In the dialog box, select the AlienApp to use for log data from the asset.
Enter part of the AlienApp name in the Set a New AlienApp field and select the AlienApp
from the displayed list.
7. (Optional.) Repeat the previous step to add another AlienApp for the asset.
8. Click the icon to close the dialog box.
Note: You can view your bookmarked items by going to the secondary menu and click-
ing the icon. This will display all of your bookmarked items and provide direct links to
each of them.
In the upper left side of the page is the name and IP address of the asset, along with
additional attributes that describe the particular asset. One of these fields is the Create
event if asset stops sending data. Use this field to configure the amount of time after
which you want USM Anywhere to generate events if the asset has not received messages.
See Events Created When an Asset Stops Sending Data for more information.
On the right is the status summary for your asset. It displays the total number of alarms,
events, vulnerabilities, and configuration issues. The circle can be orange (for alarms and
configuration issues), blue for events, and red for vulnerabilities. The number inside each
circle indicates the number of alarms, events, vulnerabilities, and configuration issues related
to the asset. You can click each circle to view the full list of issues represented by that
number.
Note: Configuration Issues are only shown on AWS and Azure Sensors.
Important: The alarms and events counts are not updated in real time but instead are
calculated every hour. If the counts are not updated, it can happen because new events
or alarms are in your environment after the last count.
The vulnerabilities and configuration issues counts are updated after every scan.
l Agent Status. If there is a deployed agent, it displays the connection status of the Ali-
enVault Agent. You can deploy an agent from here.
l Credentials. If the credential has been associated to the asset, it displays its name. You
can assign and create the credential from here. See Managing Credentials in USM Any-
where for more information.
l Last Scanned. If it exists, the date of the latest scan. You can schedule jobs from here. See
Scheduling Asset Scans from Assets, Scheduling Authenticated Asset Scans from Assets,
and Scheduling Asset Scans from the Job Scheduler Page for more information.
In the lower side of the page, there is a table area with tabs, some of them correspond to the
circles. Each tab contains a table with records, if present, for your asset.
The following table lists the tabs you see on the page.
Alarms Alarms related to the asset. There is a bubble graph that provides a
graphical representation of alarms by intent. Blue circles indicate the
number of times that an alarm in an intent showed. A bigger circle indicates
a higher number of alarms. You can hover over each of the circles to get the
actual number of different types of intent. In addition, if you click any of the
blue circles, they display only the alarms corresponding to that circle. You
can change the displayed period of time by clicking the Last 24 Hours filter.
Events Events related to the asset. Click an event to see its details.
Vulnerabilities Vulnerabilities related to the asset. You can filter the active or inactive
vulnerabilities by clicking the specific radio button. Click a vulnerability to
see its details.
Note: Multiple rows may display for the same vulnerability if it has
been reported by more than one source. This may result in a
discrepancy between the numbers displayed on the Vulnerabilities tab
at the bottom and in the Vulnerabilities counter at the upper right of
this page.
Configuration Issues Information about operational processes. You can filter the active or
inactive configuration issues by clicking the specific radio button. Click a
configuration issue to see its details.
Scan History List of the asset scans already run. It includes a time-stamp of the scan, the
scan type, the status, and the details of each scan. You can also click the
Scan Details link here to download a file containing the details of the most
recent authenticated asset scan here for up to a week after the scan was
run.
File Integrity This tab is available if the AlienVault Agent has been deployed in the asset. It
displays stats about File Integrity Monitoring Events. You can configure a
time slot on which the events were received. These slots can be last hour, 24
hours, 7 days, 30 days, or 90 days.
Agent This tab is available if the AlienVault Agent has been deployed in the asset. It
displays information about the agent. You can see the status of the agent
(connected or not) and the current version. You can configure a time slot on
which the events were received. These slots can be last hour, 24 hours, 7
days, 30 days, or 90 days. You can also see the query history. Users whose
role is Manager, can also change the configuration profile. See Assigning
AlienVault Agent Configuration Profiles for more information.
In the upper right corner of the page is the Actions button. Use this button to perform
actions on the asset. These are the actions:
USM Anywhere gives you the option of configuring a threshold after which asset inactivity is a
concern. When your environment is not receiving events from an asset within the configured
period of time, USM Anywhere generates monitoring events that display in the Events List
View page. Since these events are not tied to any USM Anywhere Sensor that you have
deployed, you will see a new sensor with the name of your USM Anywhere subdomain listed
for these events. USM Anywhere will generate new monitoring events until the asset starts
reporting again. You can see two types of monitoring events:
l Event from asset not received: Event details include the asset name, the total
disconnected time, and when the last message was received.
Warning: Currently, the Event from asset not received event is generated at the same
time as the regular event and system event. Soon, this event will be generated only
as a system event. See Regular Events and System Events and Orchestration Rule for
the "Event from Asset Not Received" System Event for more information.
l Event from asset received: Event details include the asset name.
Warning: Monitoring events are generated when your environment is not receiving
events from an asset either because the asset is not sending events or because of a
filtering rule. If you have a rule that filters events coming from an asset, from the
perspective of USM Anywhere that asset is not sending events.
Note: If your sensor is collecting logs using anything other than syslog (like scheduled
log scans), your logs may not include enough data to inform these events. To ensure
that you are receiving events when your asset stops sending data, ensure that the
Reporting Device field is present and populating accurately.
4. In the upper-left side of the page, set a period of time in the Create Event If Asset Stops
Sending Data field by clicking the icon.
You can select a predefined value between None, 1 hour, 6, 12, 24, or 72 hours, 1 week, or 2
weeks.
Important: The Create event if asset stops sending data field is based on the
Reporting Device Address field, not the Source field. When a device reports
information about its state, the Reporting Device Address field will display the same
data as the Source or Destination fields. If the device reports information that is
different from its state, for example issues in its network, the Reporting Device
Address field will display different information from the Source or Destination fields.
4. At the bottom of the Configure Assets dialog box, set a period of time in the Create Event
If Asset Stops Sending Data field by clicking the icon.
You can select a predefined value between None, 1 hour, 6, 12, 24, 72 hours, 1 week, or 2
weeks.
Important: The Create event if asset stops sending data field is based on the
Reporting Device Address field, not the Source field. When a device reports
information about its state, the Reporting Device Address field will display the same
data as the Source or Destination fields. If the device reports information that is
different from its state, for example issues in its network, the Reporting Device
Address field will display different information from the Source or Destination fields.
2. Locate the Event Name filter, and then select the filter Event from Asset Not Received.
All assets include several fields for identifying and classifying each asset. You can add all fields
you need, modify them or delete them when you do not need them.
Note: It is not possible to modify or delete the fields that are system defaults.
7. Select a type.
Denomination Description
Select Enter the choices. You can add more than one by clicking the icon.
Numeric Enter a numerical data to identify the field. You can use the icon to increase
or decrease the number ( ).
IP Enter an IP address.
8. Click Save.
line of the editable fields that are not in the system by default.
5. Modify the information of the items that need to be modified.
6. Click Save.
4. Select the asset fields you want to assign the selected assets.
5. Click Save.
Keep in mind these points when you are deleting assets and your environment has an
Amazon Web Services (AWS) Sensor, Microsoft Azure Sensor, Google Cloud Platform (GCP)
Sensor, or a VMware Sensor installed:
l If you delete an asset, but it is still active/visible in your network environment, the asset is
automatically added to your asset inventory for any asset discovery jobs that run after the
deletion action.
l If you delete an asset that has alarms or vulnerabilities associated to it, the asset state will
be marked as "terminated”. All saved data associated to the asset is maintained in its cur-
rent state.
l If you delete a sensor, all assets on the sensor will be removed from USM Anywhere.
However, if you redeploy the sensor, asset configurations that point to the replaced
sensor will have the universally unique identifier (UUID) information in that configuration
updated to the new sensor UUID.
2. Next to the asset name that you want to delete, click the icon and select Delete
Asset.
4. Click Delete.
Editing Assets
If you want to change, delete, or add information regarding assets that have been identified
by your USM Anywhere Sensor, follow the guidelines on this page to edit your assets.
2. Next to the asset name that you want to edit, click the icon and select Configure
Asset.
3. Modify the data of the items that need to be modified, as described in the Field Descrip-
tions table below.
Asset Type (Optional.) Device type that identifies the asset. Select an option
from the list. See USM Accepted Asset Types for more
information.
Time Zone Time zone assigned to the asset. The default value is System
Default, which causes the asset to inherit the sensor's time zone.
Changing the asset's time zone automatically applies the new
time zone to all new logs collected from the asset.
Compliance Scope Add the asset to Payment Card Industry (PCI) and/or Health
Insurance Portability and Accountability Act (HIPAA). See
Working with Assets and PCI DSS and USM Anywhere
Compliance Templates for more information.
Custom Fields Asset fields created by the user. The fields that are system
defaults will not be displayed. See Managing Asset Fields for
more information.
Important: You must enter at least one of the three fields in Network Interfaces.
These fields are highlighted when the values are not valid.
4. Click Save.
Bridge A bridge combines two or more subnetworks into one. With a bridge this
happens at a lower level than with a router. This category also includes
things like Ethernet-to-serial bridges.
Broadband router Devices in this category connect a network to the Internet through
cable, asymmetric digital subscriber line (ADSL), and fiber optics. Some
of these devices provide network address translation, a firewall, port
forwarding, or other services.
Cloud Model of computer data storage in which the digital data is stored in
logical pools.
Firewall A firewall controls what traffic is allowed into or out of a network. Some
also have additional capabilities. This category does not include general-
purpose operating systems (OSes) that happen to come with a firewall,
but it does include OS distributions purpose-built to work only as a
firewall.
Game console A video game console like the Microsoft Xbox or Sony PlayStation.
General purpose General-purpose operating systems like Linux and Microsoft Windows.
Hub A hub joins network segments by re-broadcasting all traffic. Hubs are
distinct from switches, which selectively transmit packets only to
relevant destinations.
Load balancer A device that distributes inbound traffic to multiple devices to ease the
load on those devices.
Media device This category includes all kinds of audiovisual equipment, including
portable music players, home audio systems, TVs, and projectors.
PBX A private branch exchange (PBX) routes telephone calls within a private
organization and connects them to the public telephone network or
Voice over Internet Protocol (VoIP).
Print server A print server connects a printer to a network. Printers that contain their
own print server go in the "printer" category instead.
Proxy server Any kind of proxy, including web proxies and other servers that cache
data or understand high-level protocols.
Router Routers connect multiple networks. They are distinct from hubs and
switches because they route packets between different networks as
opposed to extending one network.
Security-misc Any security device that doesn't fall into the “firewall” category belongs
in this category. This includes intrusion detection and prevention
systems.
Specialized The catch-all category. If a device doesn't fall into one of the other
categories, it is specialized. Examples in this category are diverse and
include such things as clocks, oscilloscopes, climate sensors, and more.
Storage-misc Data storage devices like tape decks and network-attached storage
appliances.
Telecom-misc Devices used by telephone systems that are not PBXs, like voicemail and
Integrated Services Digital Network (ISDN) systems.
Terminal A device with a keyboard and monitor with the primary purpose of
communicating directly with a terminal server or mainframe.
VoIP adapter A device that converts between VoIP protocols and normal telephone
traffic. Also may convert different VoIP protocols.
Web server Device that provides contents to the World Wide Web. A web server
processes incoming network requests over HTTP and several other
related protocols.
Webcam Any kind of camera that stores or transmits pictures or video. This
includes everything from consumer webcams to security system
cameras.
You can create a PDF or CSV report of the assets directly from the assets page.
2. You can use filters to define the assets content you want to display in your report, or
select the assets you want to include in your report.
The filters selected and displayed for the page view are the ones that are populated in the
report.
4. Click Edit Filters if you want to modify the selected filters, and then click Continue to Fil-
ters. Do the modifications you need, and then click Edit Report.
5. Under the Format section, select either CSV or PDF for the format of the report.
6. Select if you want to generate the report again, and then choose Never, Daily, Weekly,
Bi-weekly, or Monthly.
7. Enter an email address to send the report.
Select the Send to my Email Address option to add your email automatically.
8. Select the Enable Link Expiration option. This link is delivered by email and expires in 14
days.
9. Click Next.
10. In the Report Name field, enter a name for the report.
This name will be displayed in the Saved Reports page.
11. (Optional.) Add a description that will be included.
12. Under the Number of records section, choose the maximum number of records to include
on the report. For CSV the options are 20, 50, 100, 500, 1000, or 50 K. For PDF the options
are 20, 50, 100, 500, 1000, or 2500.
13. If you have chosen the PDF format, you will see the Graphs section, which you can use to
include additional views.
You can add or remove graphs included in the report by clicking the and icons.
14. Select Save & Run if you wish to keep the report in your Saved Reports on USM Any-
where page and receive the report in the indicated email.
15. Click Run to run the report.
Asset groups are administratively created objects that group similar assets for specific
purposes. Assets are grouped based on IP addresses, and USM Anywhere monitors these
groups. Grouping based on IP addresses facilitates an easier search and management of
assets.
USM Anywhere supports static and dynamic asset groups. A static group consists of assets
that you manually assign to the group. A dynamic group is defined using rules that
automatically add or remove assets from the group, based on the criteria you have defined.
USM Anywhere also creates a default asset group for each Amazon Web Services (AWS)
Elastic Load Balancing (ELB) instance in your environment. The AWS Sensor ELB group
includes the ELB instance and any AWS Sensor instance connected to the load balancer and
registered with the ELB service. USM Anywhere automatically discovers and enables you to
collect ELB access logs if you have ELB access logging enabled.
Important: AT&T Cybersecurity recommends that you limit your asset groups to 1024
or fewer assets. While asset groups can be larger, selecting an asset group for any
searching or filtering will only return data for the most recent 1024 assets. To see more
data, create multiple asset groups each with 1024 or fewer assets.
To create a static asset group from the asset groups main window
Note: The valid characters for the asset group name are uppercase letters (A-Z),
lowercase letters (a-z), numerical digits (0-9), hyphens ( - ), underscore (_), and blank
space. You can enter up to 64 characters.
Important: You can not use special characters like forward slash (/), backslash (\) or
ampersand (&). When a special character is not valid, the Save button remains
inactive.
If you click Scan Network, enter the name for a network and the Classless Inter-Domain
Routing (CIDR) block to specify the subnet's IP address block that you want to scan.
6. (Optional.) Delete assets from the group by clicking the icon. You can view a specific
asset by clicking the icon, and use Cancel to discard the changes.
7. Click Save.
To create a dynamic asset group from the asset groups main window
Note: The valid characters for the asset group name are uppercase letters (A-Z),
lowercase letters (a-z), numerical digits (0-9), hyphens ( - ), underscore (_), and blank
space. You can enter up to 64 characters.
Important: You can not use special characters like forward slash (/), backslash (\) or
ampersand (&). When a special character is not valid, the Save button remains
inactive.
Asset State Search asset groups by asset state. Depending on your installed
sensor, this state can vary:
l AWS:
l Running: Asset (AWS instance) is running.
l Available: RDS instance is running.
l Stopped: Asset is not running.
l VmWare /Hyper-V:
l PoweredOn : Asset is running.
l PoweredOff : Asset is not running. This state can be used for
correlation.
l Suspended: Asset is not running. This state can be used for
correlation.
l GCP / Azure:
l Running: Asset is running.
l Stopped: Asset is not running.
Associated Plugin Search asset groups by the plugin associated to the asset.
PCI Asset Search asset groups by Payment Card Industry (PCI) Asset, if the
asset is included or not in the PCI Data Security Standards (DSS)
Asset Group. See Asset Group List View and Working with Assets
and PCI DSS for more information.
Custom User Fields Search asset groups by the fields you have created. If you have not
created fields, this filter does not display.
Tags (Only for Amazon Web Services [AWS] Sensors). Identify asset
groups by the tag assigned to an AWS resource.
Sensor Apps Fields (Only for AWS Sensors). Identify asset groups by parameters of the
AWS instance.
Note: The result of a search when you use the Alarm Counter filter or the Event
Counter filter depends on if an alarm or an event can identify the source or
destination as an asset in the inventory. Your environment can have alarms or
events associated with assets both included in the inventory and those not
included in the inventory. Assets included in the inventory display their names in
blue, and assets not included in the inventory display their names in gray. The
alarm and event counter filters only count the identified (blue) assets.
Important: The alarm and event counts are not updated in real time, but are
calculated every hour. If the counts are not updated, it can happen because new
events or alarms are in your environment after the last count.
l Select an operator: Depending on the selected field, you can choose different oper-
ators. The table below shows the available operators:
Operator Meaning
Equal Equal to
Operator Meaning
Note: You can use the same field multiple times in a group.
You click this icon to add several fields. You can use the same field multiple times in a
group.
7. Click Apply Criteria.
8. Click Save.
Note: You can also add a dynamic asset group from the Setup Wizard, by scanning a
network.
In this example we are going to create a PCI Dynamic Asset Group for tagging instances in
AWS as PCI compliant. This asset group helps you to tag all instances automatically. You do
not have to mark them manually; the compliance scanners work with auto-scaling.
9. Click Save.
In this example we are going to create a dynamic asset group based on a sensor. This is
helpful when you have more than one USM Anywhere Sensor deployed in your environment.
The asset group tags all assets monitored by the same sensor automatically. You do not have
to mark them manually.
2. From the Sensor filter on the left, select the USM Anywhere Sensor you want to create
the asset group for.
The page reloads showing only the assets monitored by the selected sensor.
3. (Optional.) If desired, add filters to limit the assets to more specific criteria.
6. Click Save.
The asset group is created. You can find it under Environment > Asset Groups.
USM Anywhere also creates a default asset group for each Amazon Web Services (AWS)
Elastic Load Balancing (ELB) instance in your environment. The AWS Sensor ELB group
includes the ELB instance and any AWS Sensor instance connected to the load balancer and
registered with the ELB service. USM Anywhere automatically discovers and enables you to
collect ELB access logs if you have ELB access logging enabled.
Note: It is not possible to edit or delete a dynamic asset group created by default.
The asset groups page displays asset groups inventory and information on those asset
groups. On the left you can find the search and filter options. In the upper side of the page,
you can see any filters you have applied, and you have the option to create and select
different views of the asset groups. The main part of the page is the actual list of asset
groups. Each row describes an individual asset group.
If you want to analyze the data, you can maximize the screen and hide the filter pane. Click
the icon to hide the filter pane. Click the icon to expand the filter pane.
USM Anywhere creates by default static and dynamic asset groups. See Creating an Asset
Group.
Column Field
Description
Name
Created Exact date of creation of the asset group. The displayed date depends on your
computer's time zone.
Next to the asset group name, click the icon to access these options:
You can choose the number of items to display by selecting 20, 50, or 100 below the table.
You can classify some columns by clicking the icons to the right side of the heading. You can
sort the item information in ascending or descending order.
Click Generate Report to open the Configure Report dialog box. The management of this
feature is similar to the one for assets, see Create an Assets Report for more details.
Select Actions > Static or Actions > Dynamic to create an asset group. See Creating a Static
Asset Group and Creating a Dynamic Asset Group for more details.
Note: You can view your bookmarked items by going to the secondary menu and click-
ing the icon. This will display all of your bookmarked items and provide direct links to
each of them.
Views
You can configure the view you want for the list of items in the page.
1. From the List view, select the filters you want to apply.
2. Click Saved Views and then select the view you want to see.
3. Click Apply.
1. From the Asset Groups list view, click View above the filters.
2. Click Saved Views and then click the icon next to the saved view you want to delete.
3. Click Accept.
USM Anywhere includes the option of searching items of interest on the page. There are
several filters displayed by default. You can either filter your search or enter what you are
looking for in the search field.
You can configure more filters and change which filters to display by clicking the Configure
Filters link located in the upper-left side of the page. The management of filters is similar to
that for assets. See Managing Filters for more information.
Advanced Search Use this filter to search for a specific value of a field. The advanced search is
similar to that for assets. See Advanced Search Filter for more information.
Asset Origin Type Filter asset groups by who added the asset group to the system.
Instance Type (Only for the AWS Sensor). Filter asset groups by AWS instance type.
Region (Only for the AWS Sensor). Filter asset groups by AWS region.
Asset Type Filter asset groups by asset type. See USM Accepted Asset Types for more
information.
Associated Plugin Filter asset groups by assets that have plugins manually enabled.
Note: Keep in mind that the "Enter search phrase" box and the "Asset Grouping" filter
make the search in the asset groups. The rest of the filters make the search in the
members of the asset group. So long as a member of the asset group matches the
selected filter, USM Anywhere will display the asset group, even if there is only a
member matching that filter.
The number between brackets displayed by each filter indicates the number of items that
matches the filter. You can also use the filter controls to provide a method of organizing your
search and filtered results.
The following table shows the icons displayed with each filter box.
Icon Meaning
In the upper-left side of the page, you can see any filters you have applied. Remove filters by
clicking the icon next to the filter. Or clear all filters by clicking Reset.
Note: When applying filters, the search uses the logical AND operator if the used filters
are different. However, when the filter is of the same type, the search uses the logical
OR operator.
Those filters that have more than 10 options include a Filter Values search field for writing
text and making the search easier. If there are more than 50 search results, a icon appears
to the right of the Filter Values search field. Click this icon to download a CSV containing up
to 1024 results.
USM Anywhere enables you to toggle the mode of search. The available modes are Standard
and Advanced. You can change from one mode to the other by clicking the icon or
clicking the icon located in the upper left corner of the page.
Standard Mode
This mode enables you to select one value per filter at the same time, and then the search is
automatically performed. This mode is on by default.
Note: If you exit the advanced mode and the selected filters are not compatible with
the standard mode, a warning dialog box opens to inform you the current filters will
be removed.
Advanced Mode
Advanced mode enables you to select more than one value per filter at the same time. This
mode is off by default.
4. In the lower-left corner of the page, click Apply Filters. Or in the upper side of the page,
click Apply.
Literal, using Matches fields that contain the full term. "Event from asset not received"
double quotes Literal searches are case-sensitive.
Boolean Including AND or OR between two search (http OR tcp) AND ftp
operators or terms will search for results that match
using parentheses both of those terms.
Any characters may be used in a query, but certain characters are reserved and must be
escaped. The reserved characters are these:
+-=&|><!{}[]^"~:\/
Use a backslash (for example, "\>") to escape any reserved character (including a backslash).
If you want to search for an exact phrase having two or more words, you need to put
quotation marks around the words in the phrase. This includes email addresses (for
example, "[email protected]").
The following table shows the filter fields that you can find in the first drop-down list.
IP/CIDR Filter asset groups by IP and Classless Inter-Domain Routing (CIDR). This is
a method for allocating IP addresses and routing IP packets. It is the range
of IP addresses that define the network.
Associated Plugin Filter asset groups by the plugin associated to the asset.
PCI Asset Filter asset groups by Payment Card Industry (PCI) Asset, if the asset is
included or not in the PCI Data Security Standards (DSS) Asset Group. See
Asset Group List View and Working with Assets and PCI DSS for more
information.
HIPAA Asset Filter asset groups by Health Insurance Portability and Accountability Act
(HIPAA) Asset, whether the asset is included in the HIPAA Asset Group. See
Asset Group List View for more information.
Custom User Fields Filter asset groups by the fields you have created. If you have not created
fields, this filter does not display.
Note: The result of a search when you use the Alarm Counter filter or the Event Counter
filter depends on if an alarm or an event can identify the source or destination as an
asset in the inventory. Your environment can have alarms or events associated with
assets both included in the inventory and those not included in the inventory.
The following table shows the operators that you can find in the second drop-down list.
Operator Meaning
Is Empty Include assets with no IP addresses. This operator is available only for
IP/CIDR.
Is Not Empty Include assets with IP addresses. This operator is available only for IP/CIDR.
The following table shows the operators that you can include in your query string.
Use the search field to enter queries and refine your search. You can enter free text, use
wildcards, and use advanced search syntax. When searching, keep in mind the accepted query
string syntax list in this table.
Literal, using Matches fields that contain the full term. "Event from asset not received"
double quotes Literal searches are case-sensitive.
Boolean Including AND or OR between two search (http OR tcp) AND ftp
operators or terms will search for results that match
using parentheses both of those terms.
Any characters may be used in a query, but certain characters are reserved and must be
escaped. The reserved characters are these:
+-=&|><!{}[]^"~:\/
Use a backslash (for example, "\>") to escape any reserved character (including a backslash).
See Advanced Search Fields (First Drop-Down List) for more information.
Important: Depending on the field you have chosen in the first drop-down list, the
operators vary.
See Advanced Search Fields (Second Drop-Down List) for more information.
If you want to search for an exact phrase having two or more words, you need to put
quotation marks around the words in the phrase. This includes email addresses (for
example, "[email protected]").
9. Click Apply.
USM Anywhere enables you to run a scan against assets included in an asset group. To
accomplish this, the scanner sends crafted packets to the target asset group and analyzes
the responses. This is not an authenticated scan.
Note: If you want to discover new assets, you can run an asset discovery scan. See
Running an Asset Discovery for more information.
l Next to the asset group name that you want to scan, click the icon, select Full
or
l Next to the asset group name that you want to scan, click the icon and select
l Discovery: This profile scans the known ports and services searching for the most-
used ports. (There are 4573 ports.)
l Complete: This profile scans all TCP and UDP ports to find the possible ports in a
deployment. (There are 65535 ports.)
l Vulnerability Discovery: Performs general network discovery and checks for specific
known vulnerabilities. It only reports results if they are found.
l Extended Vulnerability Discovery: Performs a Vulnerability Discovery scan, which act-
ively discovers more about the network.
l Intensive Vulnerability Discovery: Performs several tasks to discover vulnerabilities,
which uses a significant number of resources on the targeted machine. Because of
this, sensitive targets may perceive a brief disruption on their services.
3. Select Set Debug Mode if you want to log the results of the scan or if you have a problem
with a scan.
Note: The Set Debug Mode option must be used only for debugging purposes
because it needs a large amount of disk space for the file or files that it generates.
Only AT&T Cybersecurity Technical Support should review these files. You can
contact this department for more information.
4. Click Scan.
5. In the Asset Groups details page, click Scan History in the table area to display the results
of the scan.
You can see the status of each scan and the details. USM Anywhere also creates a system
event named Asset Scanner Result with the same details.
Note: See Scheduling Asset Group Scans from Asset Groups and Scheduling Asset
Groups Scans from the Job Scheduler Page for more information about how to
schedule an asset group scan.
Important: Make sure when you use a virtual private network (VPN) using a Cisco
Firewall, that arp-proxy is enabled in the firewall. Otherwise, all the assets will be
reported using the same media access control (MAC) address, and USM Anywhere
will consider all of them to be different interfaces for the same asset.
This step may be different depending on the sensor you have installed.
Note: In Amazon Web Services (AWS) Sensors, this option is not available because
the instances are automatically set.
5. Click Scan Another to start a new scan or click Next to continue with the following step.
6. In the Asset Groups details page, click Scan History in the table area to display the results
of the scan.
You can see the status of each scan and the details. USM Anywhere also creates a system
event named Asset Scanner Result with the same details.
Important: If you run Asset Discovery in an environment that discovers assets using
a native application (AWS, Google Cloud Platform [GCP], Microsoft Azure, VMware,
etc.), or in a Dynamic Host Configuration Protocol (DHCP) network environment,
then you could potentially duplicate assets in USM Anywhere. You can configure
local DNS Nameservers to avoid duplicate assets from being created and update
existing assets with the new and correct IP Address. See Defining the DNS
Nameservers for more information.
An authenticated asset scan verifies scanned IPs within an Asset Group and detects
vulnerabilities. Log in as administrator or root to perform an authenticated scan. See
Managing Credentials in USM Anywhere for more information.
Warning: Keep in mind that an authenticated scan may fail if the local mail exchanger,
which applies to Linux hosts, is enabled in the target asset.
l Next to the asset group name that you want to scan, click the icon , select Full
or
l Next to the asset group name that you want to scan, click the icon and select
Authenticated Scan to directly start the asset group scan. If the option is not enabled,
you will need to add a credential. See Managing Credentials in USM Anywhere.
Important: Credentials assigned directly to an asset have higher priority than those
assigned to an asset group.
2. In the asset group details page, click Scan History in the table area to display the results
of the scan.
You can see the status of each scan and its details, which informs you if the scan has been
successful or not. You can also click a line to expand the asset group row to check the
individual asset results.
Each asset group has a Scan Details link you can click to download a zip file containing
the details of the recent scan. The link is only present for the most recent scan of each
asset, and is available for one week after the scan has been run.
l If you click Scan Details located in the asset group job row, the downloaded file will
include one file per scanned asset.
l If you click Scan Details located in the individual asset results, the downloaded file will
include the information for just that asset.
Note: You can see the vulnerabilities that the scan has found below the
Vulnerabilities Events tab.
USM Anywhere provides a simple way to include scans for scheduling using its web user
interface (UI). See USM Anywhere Scheduler for more information.
The description is optional, but it is a best practice to provide this information so that
others can easily understand what it does.
Depending on the USM Anywhere Sensor that you have installed, this field can include
different options.
3. Select a USM Anywhere sensor in case you have more than one installed.
4. Select the App Action:
Asset Discovery
Discovers assets in your environment, detects changes in assets, and discovers malicious
assets in the network.
l Select Existing Asset Group: In the Enter asset group name field, search for the asset
groups to scan. These asset groups are already existing, and you can search for them
by entering the name of the asset group or by browsing for them.
l Create New Asset Group to Scan Using CIDR Block: You can create a new asset
group from a Classless Inter-Domain Routing (CIDR) block. You need to indicate the
CIDR block and the network name you want to scan. This option discovers new assets
and scans the discovered assets.
Important: Use the Create New Asset Group to Scan Using CIDR Block option for
creating new CIDR-based asset groups without leaving the scheduler form. After
clicking Save, a new asset group based on the selected CIDR is created.
Your scan job will have the Select Existing Asset Group option selected and the
CIDR-based asset group assigned automatically.
Important: Make sure when you use a virtual private network (VPN) using a Cisco
Firewall, that arp-proxy is enabled in the firewall. Otherwise, all the assets will be
reported using the same media access control (MAC) address, and USM
Anywhere will consider all of them to be different interfaces for the same asset.
The Asset Group field displays the name of the asset group to scan. You can't modify this
field.
5. In the App Action field, the Asset Group Scan is the default option.
l Discovery: This profile scans the known ports and services searching for the most-
used ports. (There are 4574 ports.)
l Complete: This profile scans all TCP and UDP ports to find the possible ports in a
deployment. (There are 65535 ports.)
l Vulnerability Discovery: Performs general network discovery and checks for specific
known vulnerabilities. It only reports results if they are found.
l Extended Vulnerability Discovery: Performs a Vulnerability Discovery scan, which act-
ively discovers more about the network.
l Intensive Vulnerability Discovery: Performs several tasks to discover vulnerabilities,
which uses a significant number of resources on the targeted machine. Because of
this, sensitive targets may perceive a brief disruption on their services.
7. (Optional.) Select the assets you want to exclude from the scan.
8. Select Set Debug Mode if you want to log the results of the scan or if you have a problem
with a scan.
Note: The Set Debug Mode option must be used only for debugging purposes
because it needs a large amount of disk space for the file or files that it generates.
Only AT&T Cybersecurity Technical Support should review these files. You can
contact this department for more information.
9. In the Schedule section, specify when USM Anywhere runs the job:
The selected increment determines the available options. For example, on a weekly
increment, you can select the days of the week to run the job.
Or on a monthly increment, you can specify a date or a day of the week that occurs
within the month.
Important: USM Anywhere restarts the schedule on the first day of the month if
the option "Every x days" is selected.
This is the time that the job starts at the specified interval. It uses the time zone
configured for your USM Anywhere instance (the default is Coordinated Universal
Time [UTC]).
USM Anywhere provides a simple way to include authenticated scans for scheduling using its
web user interface (UI). See USM Anywhere Scheduler for more information.
To schedule an authenticated asset group scan job from the asset group details
window
The description is optional, but it is a best practice to provide this information so that
others can easily understand what it does.
6. In the Schedule section, specify when USM Anywhere runs the job:
The selected increment determines the available options. For example, on a weekly
increment, you can select the days of the week to run the job.
Or on a monthly increment, you can specify a date or a day of the week that occurs
within the month.
Important: USM Anywhere restarts the schedule on the first day of the month if
the option "Every x days" is selected.
This is the time that the job starts at the specified interval. It uses the time zone
configured for your USM Anywhere instance (the default is Coordinated Universal
Time [UTC]).
7. Click Save.
3. Modify the name of the asset group if you need to. This field is required.
4. (Optional.) Modify the description if you need to.
5. You can add search criteria to the group. Click Apply Criteria if you want to add the
searched criteria.
6. You also can modify or delete assets from the group by clicking the or icons.
3. Modify the name of the asset group if you need to. This field is required.
4. (Optional.) Modify the description.
5. Search the assets you want to add to the group and click Add Asset or Scan Network.
If you click Scan Network, type the name of a network and the CIDR block to specify the
subnet's IP Address block that you want to scan.
6. You can also delete assets from the group by clicking the icon. You can view a specific
7. Use Cancel to discard the changes and Delete to delete the group.
8. Click Save.
From the Asset Group List view, you can display the details of an asset group.
In the asset groups details, on the upper left side of the page, you see the name, the
description, the type of grouping, the number of assets that are part of that group, and the
criteria of grouping.
On the right, you see the status summary for your asset group. It displays the total number of
configuration issues, vulnerabilities, alarms, and events. The circle can display in orange (for
alarms and configuration issues), blue for events, and red for vulnerabilities. There is a number
inside each circle to indicate the number of alarms, events, vulnerabilities and configuration
issues associated with the members of the asset group. You can click each circle to explore
the information of each one.
Note: Configuration Issues are only available for AWS and Azure Sensors.
At the bottom, there is a table area with tabs, some of which correspond to the circles. Each
tab contains a table with records, if present, for your asset group.
Assets Assets that are part of the group. Click View to go to the details
of the asset.
Events Events related to the assets of the group. Click an event to see
its details.
Vulnerabilities Vulnerabilities related to the assets of the group. You can filter
the active or inactive vulnerabilities by clicking the specific radio
button. Click a vulnerability to see its details.
Configuration Issues Information about operational processes. You can filter the
active or inactive configuration issues by clicking the specific
radio button. Click a configuration issue to see its details.
Scan History List of the asset scans already run. It includes a time-stamp of
the scan, the scan type, the status, and the details of each scan.
You can also click the Scan Details link here to download a file
containing the details of the most recent authenticated asset
group scan here for up to a week after the scan was run.
The button Actions, located in the upper right side of the page, enables you to access these
options:
l Configure Asset Group, see Configuring an Asset Group for more details.
l Delete Asset Group, see Deleting an Asset Group for more details.
l Edit Fields. This option is similar to the one for Assets, see To assign asset fields to an asset
or group of assets for more details.
Note: Keep in mind if you assign an asset field to an asset group, you assign the asset
field to its members, not to the asset group.
l Assign Credentials to Group Members. This option assigns credentials to the members of
the asset group. This option is similar to the one for Assets, see Managing Credentials in
USM Anywhere for more details.
l Assign Agent Profile. This option assigns a specific agent profile to the members of the
asset group. See Assigning AlienVault Agent Configuration Profiles to Asset Groups for
more information.
l Set Sensor, see To assign a sensor to an asset group for more details.
l Asset Group Scan, see Running Asset Groups Scans.
l Assign Credentials. This option assigns credentials to current members of the Asset Group
and Assets added to the group later. See Managing Credentials in USM Anywhere for more
details.
l Authenticated Scan, see Running Authenticated Asset Groups Scans.
l Schedule Scan Job, see Scheduling Asset Group Scans from Asset Groups, Scheduling
Authenticated Asset Group Scans from Asset Groups, and Scheduling Asset Groups Scans
from the Job Scheduler Page for more details.
Note: It is not possible to edit or delete a dynamic asset group created by default.
3. Select Delete Asset Group to display a new window and confirm the deletion.
4. Click Delete.
To delete an asset group from the edit asset group details page
3. Select Actions > Delete Asset Group to open a new window and confirm the deletion.
4. Click Delete.
In addition to analyzing users, UBA also analyzes each of a user's separate accounts, and
enables you to manually combine detected users to ensure that your user analytics are
accurate. Events and alarms can thus be enhanced with user data, including user entities and
their individual accounts, as either the source user or the destination user.
To incorporate UBA into your USM Anywhere instance, you must provide information about
all users acting in your environment. Each user must be identified by a unique username and
account type.
Once users have been identified, there are several tasks that you must complete to ensure
that complete and actionable data is being captured and acted upon. This chapter describes
these necessary tasks, and covers topics such as user discovery and merging, user scans, user
monitoring, and configuration.
Events, Alarms, and Notifications Created When a User's Status Changes 292
USM Anywhere provides a centralized view of users in your environment. To view the user list,
go to Environment > Users.
The Users main page displays user inventory and information on those users. On the left side
of the page, you can find the search and filter options. At the top of the page, you can see any
filters you have applied. The main part of the page is the list of users, where each row
describes an individual user.
If you want to analyze the data and see the additional columns without having to scroll left
and right, you can maximize the screen and hide the filter pane. Click the icon to hide the
Note: User entities with no name or service account in their name field appear as
"Unspecified".
The following table lists the default columns that appear in the user list view, and their
descriptions.
Last Seen The date and time on which that user was last active in your
environment.
Email A list of the email addresses associated with that user entity.
Origins The name of each sensor in which one of this user's accounts was
discovered.
User Discovery
USM Anywhere automatically discovers users in your environment with the user discovery
jobs you have configured. See Scheduling User Discovery Jobs from the Job Scheduler Page
to learn about these jobs and how to configure them.
AD SOURCE_USERNAME
DESTINATION_USERNAME
DESTINATION_USERNAME
Okta SOURCE_USERNAME
DESTINATION_USERNAME
SOURCE_USER_EMAIL
DESTINATION_USERNAME
DESTINATION_USER_EMAIL
To see a list of the users active in your environment and their accounts
Note: By default, inactive users are not shown. You can use this list's filters to view
them.
2. Click the name (or the chevron next to the name) of a user whose accounts you want to
view, and then click Full User Details.
This user's accounts are listed under the Accounts tab.
While different user authentication mechanisms each approach users' active status
differently, USM Anywhere normalizes all of those disparate approaches to present one
unified and unambiguous reporting of the status of each user entity and all of its accounts.
Note: See Understanding User Status in the User Data Source to read more about how
each user authentication mechanism handles users' statuses.
To view a user entity's or account's status, check the dot next to the username or account
name. When the dot is green, the user or account it represents is active. If it is gray, the user
or account it represents is in a status other than active.
State Description
User Entity Active If any of the user's accounts are active, the
user is active.
State Description
USM Anywhere detects the status of user entities and their accounts, and normalizes those
statuses for you under Environment > Users. To understand how USM Anywhere normalizes
these statuses, review the following table. This table lists the normalized states for each data
source next to the unique states that map to them in the data source.
Note: See Managing Users to read more about how USM Anywhere uses and displays
the normalized states for users and their accounts.
Disabled Unsupported.
Active directory and Retired The user is sent to the Microsoft Windows
Office 365 Recycle Bin using the delete action.
In the upper left side of the page, you see the details for the user entity, including their
description, last seen datestamp, location, manager, phone number, and emails. On any user
that has been merged, you will see a list of emails.
Across the bottom of the page, you see the accounts, alarms, and events for your asset.
User Accounts
You will find all of this user's accounts listed under the Accounts tab.
User Alarms
You will find all of the alarms related to this user account under the Alarms tab. An alarm may
be related to a user if that user was the source of the action (the source user) or was acted
upon (the destination user).
Note: You can filter the alarms list by limiting the Created Date using the dropdown on
the right.
The columns in the Alarms table are automatically populated from the alarms. See Alarm
Management for more information about these alarm details.
User Events
You will find all of the events related to this user account under the Eventstab. An event may
be related to a user if that user was the source of the action (the source user) or was acted
upon (the destination user).
Note: You can filter the events list by limiting the Created Date using the drop-down on
the right.
The columns in the Events table are automatically populated from the events. See Event
Management for more information about these event details.
USM Anywhere enables you to configure alarms to alert you when a user's entity or account
status changes. USM Anywhere generates monitoring events that display in the Events List
View page. See Events List View for more information. You can see two types of monitoring
events related to User Behavior Analytics (UBA) user status: user status changed and account
status changed. From these events, you may configure alarm rules to alert you when these
status changes trigger events.
5. Select Event Name, then Equals, and then either User Status Changed or Account
Status Changed.
The alarm rule has been created. You can see it from Settings > Rules. See Alarm Rules
from the Orchestration Rules Page for more information.
Merging Users
If there are user entities in your user list who all represent the same user in your environment,
you have the option of manually merging the entities together. The resulting single user
entity retains associations with all user accounts connected to any of the former user
entities, and after the merge will behave in every way as one single user entity.
When two users are merged, all of the user accounts, activity, and associated alarms and
events from each user entity are unified under a single merged user entity. User details (like
"Description", "Location", and "Phone") are merged using the Primary User principle. During
the merge process, User Behavior Analytics (UBA) will look for user details in your primary
user entity first, and populate the newly merged user entity with those details. If the primary
user has a blank detail field, UBA will use data from the secondary user to populate that field
in the merged user.
Important: Any data from the secondary user that is not included in the resulting
merged user entity will be deleted after the merge process is complete.
The one exception to this rule is a user's email address. If both of your user entities have email
addresses, instead of keeping the primary and discarding the secondary, the resulting merged
user will retain both emails in a comma-separated list. Similarly, every email associated with a
user entity is preserved through the merge process.
Note: While secondary user entities are deleted as part of the merge process, if you
search for a user who has been merged and deleted, your search will automatically
return the user entity into which your searched user was merged.
Note: You can also access this dialog by click the icon on the User List view.
5. Use the search bar on the right to search for the other user you wish to merge, and select
it from the list.
6. Use the radio buttons to identify one of two entities as the primary.
7. Click Review.
The review window opens. This is where you can preview all of the user accounts that will
be united under your new merged user entity.
When the merge process completes, you will see a new Full User Details page displaying the
details of your newly merged user.
Deleting Users
USM Anywhere provides different ways to delete users from your user behavior monitoring:
3. Click Delete.
4. Click Delete.
4. Click Delete.
USM Anywhere enables you to import users from a CSV or text file. Use this option to add
users in large quantities to your environment from a single file. User information added this
way supersedes user information from other sources but will not remove any preexisting
information about any users in your environment.
Warning: If the file does not follow the specific format, the users will not be successfully
imported. See About the CSV File for more information.
Note: If a user in your CSV or text file shares an email address with an existing user
behavior analytics (UBA) user, then all fields from your file will be added to that existing
user's entry. Where both the existing user and your file's entry have information in a
field, the fields will be combined, with the file's information becoming the new primary.
Note: When an import process starts and finishes, USM Anywhere generates system
events. See Searching for System Events Related to a User Import Process for more
information.
Important: Do not include a header line in the CSV file because it will result in an error of
invalid format.
You need to provide at minimum a username and user email valid for USM Anywhere. All
other fields are optional.
l One or more rules performed by the correlation engine of USM Anywhere, which analyzes
these events for behavioral patterns. These rules look at and connect events to assess
their priority and reliability. When the engine identifies a pattern, it generates an alarm,
which requires attention and investigation. See Correlation Rules for more information.
l One orchestration rule, which is designed to raise an alarm when a particular type of event
is found. See Orchestration Rules for more information.
Note: USM Anywhere stores 10 of the events which have generated the alarm, for 365
days. If the alarm was generated by more than 10 events, USM Anywhere stores the first
and the last 9 events.
Alarms themselves are stored for 365 days.
USM Anywhere enables you to drive actions in response to incoming alarms. Perhaps the
most common action is sending an email to administrators to provide real-time notification
of a critical security incident. Each user can decide if they want to receive alarm notifications.
See Managing Your Profile Settings for more information.
Note: You can watch the Conducting Security Analysis with AT&T Cybersecurity USM
Anywhere customer training webcast on-demand to learn how to leverage USM
Anywhere to perform security analyst duties.
USM Anywhere provides a centralized view of your alarms. Go to Activity > Alarms to see
this centralized view.
Note: You can watch the Conducting Security Analysis with AT&T Cybersecurity USM
Anywhere customer training webcast on-demand to learn how to leverage USM
Anywhere to perform security analyst duties.
The Alarms page displays information on alarms. These are the different parts of the Alarms
page:
l On the left side of the page are the search and filters options. Use filters to delimit your
search.
l At the top of the page, you can see any filters you have applied, and you have the option to
create and select different views of the alarms.
l The main part of the page is the list of alarms, where each row describes an individual
alarm. Click an alarm to open a summary view. See Viewing Alarm Details for more inform-
ation. Each alarm includes a check box that you can use to select it. You can select all
alarms in the same page by clicking the check box in the first column of the header row.
You can also select all the alarms in the system. See Selecting Alarms in Alarm List View for
more information.
Important: An alarm is created when USM Anywhere receives the event, which may
appear later than the time when the event was created. You can verify by comparing the
Time Created and Time Received field of an event.
If you want to analyze the data, you can maximize the screen and hide the filter pane. Click
the icon to hide the filter pane. Click the icon to expand the filter pane.
Following the name of the view, you can click the icon to stop the auto-refresh
There is an auto-refresh countdown that refreshes the page at a regular interval. The number
inside the blue circle indicates the remaining time until the next refresh. See Managing Your
Profile Settings to configure this interval.
1. At the bottom of the expanded pane of the USM Anywhere web user interface (UI), hover
over the profile settings options, and select Profile Settings.
2. Click the Alarms Auto Refresh field and select Every 15 Minutes, Every 30 Minutes,
Every Hour, or Every 2 Hours. Select is Disabled if you don't want the alarms to
automatically refresh.
3. Click Save.
Alarms graphed by intent are sorted into five different categories, which are represented by
the graphic icons in the display:
l
Delivery & Attack ( )
l
Environmental Awareness ( )
l
Exploitation & Installation ( )
l
Reconnaissance & Probing ( )
l
System Compromise ( )
If you want to analyze the data and see the additional columns without having to scroll left
and right, you can maximize the screen and hide the filter pane. Click the icon to hide the
Use the icon to change the alarms view, which is by default Alarms by Intent.
l Alarms by Intent: This view is a bubble graph that provides a graphical representation of
alarms by intent.
l Count / Time: The Count/Time view is a graph that provides a graphical representation of
the number of alarms in a period of time.
Important: The period of time is mapped with the timestamp_occurred field. This
field can be overwritten by the current sensor UTC timestamp if, when processing
events, a delay is detected up to 15 minutes or the timestamp_occurred field is not
provided.
l MITRE ATT&CK: The MITRE ATT&CK (Adversarial Tactics, Techniques, and Common Know-
ledge) is a framework for understanding attackers' behaviors and actions.
l Alarm Strategies by Intent: This view is a table that provides a representation of alarms
strategies by intent.
The headers of the table are the 11 ATT&CK tactics, and each tactic has numerous techniques,
which are the rows. The tooltips match the identification (ID) technique provided by MITRE
ATT&CK. Some techniques display in several tactics. If you click in one of the techniques, the
specific filters are added and the list shows the result.
USM Anywhere includes MITRE ATT&CK Dashboard to display MITRE ATT&CK information.
The Alarm Strategies by Intent view displays a table that lists the purposes of the alarm. The
table headers represent the intent of the alarms. The table rows display the strategies.
For each alarm in the alarm columns list, USM Anywhere displays useful information to help
you determine the best response.
The following table lists the fields you see on the page.
Alarm Summary It displays several fields, which are the type of attack, the method of
attack, and how long the alarm happened in the past.
Priority Impact of the detected attack. It can be Low, Medium, or High. See
Priority Field for Alarms for more information.
Alarm Status Status applied to the alarm. By default, it can be Open, In Review, and
Closed. See Alarm Status for more information. The alarms that have
the status "Closed" are not displayed in the list.
Source Users Name of the user entity that was the source for an event creating the
alarm.
Destination Users Name of the user entity that was the destination of an event creating
the alarm.
Sensors The sensor name associated with the alarm. The type of sensor is also
displayed below the sensor name.
From the list of alarms, you can click any individual alarm row to display more information on
the selected alarm, including individual events that triggered the alarm. See Viewing Alarm
Details for more information.
To select an alarm, select the checkbox to the left of the alarm. You can select all alarms at
the same time by selecting the first checkbox in the column. These buttons display when you
select an alarm:
l Remove Alarm Labels: This button displays if there are labels associated to any alarm. Use
this button to remove a label or labels from an alarm. See Labeling the Alarms for more
information.
l Apply Labels: You can add a label to an alarm, which enables you to have classified alarms.
See Labeling the Alarms for more information.
l Add To Investigation: You can create an investigation for an alarm or associate an invest-
igation to an alarm. See Adding an Alarm to an Investigation and USM Anywhere Invest-
igations for more information.
l Alarm Status: You can add a status to an alarm. See Alarm Status for more information.
See Differences between Statuses and Labels to distinguish between label and status.
The asset name includes a chevron icon that can be gray ( ) if the asset is not in the system,
l Add to current filter: Use this option to add the asset name as a search filter. See Search-
ing Events for more information.
l Find in events: Use this option to execute a search of the asset name in the Events page.
See Searching Events for more information.
l Look up in OTX: This option searches the IP address of the source asset in the AT&T
Cybersecurity Alien Labs Open Threat Exchange® (OTX™) page. See Using OTX in USM Any-
where for more information.
l Add asset to system: Use this option to create the asset in the system. See Adding Assets
for more information.
l Add to Current Filter: Use this option to add the asset name as a search filter. See Search-
ing Events for more information.
l Find in Events: Use this option to execute a search of the asset name in the Events page.
See Searching Events for more information.
l Look up in OTX: This option searches the IP address of the asset in the OTX page. See
Using OTX in USM Anywhere for more information.
l Full Details: See Viewing Assets Details for more information.
l Configure Asset: See Editing Assets for more information.
l Delete Asset: See Deleting the Assets for more information.
l Assign Credentials: See Managing Credentials in USM Anywhere for more information.
l Authenticated Scan: This option displays depending on the USM Anywhere Sensor asso-
ciated with the asset. See Running Authenticated Asset Scans for more information.
l Scan with AlienApp: This option enables you to run an asset scan through an AlienApp.
See Running Asset Scans Using an AlienApp for more information.
l Configuration Issues: This option opens the Assets Details page. The Configuration Issues
tab is selected in the page. See Viewing Assets Details for more information.
l Vulnerabilities: This option opens the Assets Details page. The Vulnerabilities tab is selec-
ted in the page. See Viewing Assets Details for more information.
l Alarms: This option opens the Assets Details page. The Alarms tab is selected in the page.
See Viewing Assets Details for more information.
l Events: This option opens the Assets Details page. The Events tab is selected in the page.
See Viewing Assets Details for more information.
You can configure the view you want for the list of alarms. See Alarms Views for more
information.
Click Generate Report to open the Configure Report dialog box. See Create an Alarms
Report for more information.
Click the icon to change the graph to a Count/Time, MITRE ATT&CK (Adversarial Tactics,
Techniques, and Common Knowledge) or Alarms Strategies by Intent view. See Alarms List
View for more information.
Note: You can view your bookmarked items by going to the secondary menu and click-
ing the icon. This will display all of your bookmarked items and provide direct links to
each of them.
Click the icon to filter your search by row fields. See Filtering Alarms by Row Fields for
more information.
You can choose the number of items to display by selecting 20, 50, or 100 below the table.
You can classify some columns by clicking the icons to the right side of the heading. You can
sort the item information in ascending or descending order.
Within the page, you can configure the columns and fields that display in the List view. You
can also save your columns configuration to return to it whenever you need it.
2. Search the columns you want to have in the list view. You can enter your search in the
search field.
3. Use the and icons to pass the items from one column to the other and select the
4. You can order the columns by clicking one of them and dragging the column to the
desired place.
5. Click Apply.
Note: If you generate a report when you have set custom columns, your report keeps
the columns you have configured.
Important: If you want to keep your configuration, you need to save it by selecting
Save View > Save as. Otherwise, your custom view is not kept when you move to
another feature. See Alarms Views for more information.
In USM Anywhere, all alarms have a Priority field, which indicates the importance of the alarm.
This is a measurement to determine the impact of the alarm in the network.
The priority field can display Low, Medium, or High. This text comes from correlation and
orchestration rules. When you create an orchestration rule, you must enter a priority value
between 0 and 100. AT&T Alien Labs™ creates the correlation rules and include a value. The
Alien Labs team sets the value for the correlation rules depending on how critical the alarm is.
The displayed text in the column of alarms depends on the value that the rule has according
to this table:
Open the details of an alarm to learn the exact value of the priority level. See Viewing Alarm
Details for more information. After you are in the Alarm Details page, hover over the priority
text and a dialog box will show you the exact value.
Alarms Views
The main part of the Alarms page is the list of the most recent alarms triggered. You can
configure the displayed columns by creating a view configuration.
You can configure the view you want for the list of items in the page.
2. Use the and icons to pass the items from one column to another and select the
2. Click Saved Views and then select the view you want to see.
3. Click Apply.
1. From the Alarms list view, click View above the filters.
2. Click Saved Views and then click the icon next to the saved view you want to delete.
3. Click Accept.
USM Anywhere includes a wide range of report templates classified according to the
compliance templates for alarms, vulnerabilities, and events collected in the system. The
templates are combined into these two groups:
l NIST CSF: The National Institute of Standards Technology (NIST) Cybersecurity Frame-
work provides a policy framework of computer security guidance for how private sector
organizations can assess and improve their ability to prevent, detect, and respond to cyber
attacks.
l ISO 27001: ISO/IEC 27001 provides guidance for implementing information security con-
trols to achieve a consistent and reliable security program. The ISO and the International
Electrotechnical Commission (IEC) developed 27001 to provide requirements for an inform-
ation security management system (ISMS).
3. Select a report.
You can use the search field or scroll down the list.
4. Click Apply.
USM Anywhere enables you to select an alarm or multiple alarms to add a label, an
investigation, or a status to the selected alarms.
Note: If you go to the next page to select more alarms, USM Anywhere does not
preserve the selection on the previous page.
You can apply labels to all the alarms on the page, or add them to an investigation, or
change their alarm status.
To select all the alarms returned from a search or all the alarms in your environment
Text similar to the following example displays above the alarm table:
All 20 alarms on this page are selected. Select all 3572 related to this
filter
where
3572 is the number of alarms related to the selected filter in your environment.
2. To select all the alarms, click Select all 3572 related to this filter.
Important: Keep in mind that when you select all the alarms in your environment,
the Alarms Status button is the only active button. This means that you cannot
apply the same labels to all the alarms related to the filter, nor can you add all of
them to an investigation.
Searching Alarms
USM Anywhere includes the option of searching items of interest on the page. There are
several filters displayed by default. You can either filter your search or enter what you are
looking for in the search field.
You can configure more filters and change which filters to display by clicking the Configure
Filters link located in the upper-left side of the page. The management of filters is similar to
that for assets. See Managing Filters for more information.
The following table lists the filters you see on the page.
Last 24 Hours Identify alarms triggered in the last hour, 24 hours, 7 days, 30 days, or 90
days. You can also configure your own period of time by clicking the
Custom Range option. This option enables you to customize a range.
When you click Custom Range, a calendar opens. You can choose the first
and last day to delimit your search by clicking the days on the calendar or
entering the days directly. Then select the hours, minutes, and seconds by
clicking the specific box. Finally, select AM or PM.
Open/In Filter alarms by Alarm Status. See Alarm Status for more information.
Review/Closed
Suppressed Filter suppressed alarms. See Creating Suppression Rules from the Alarms
Page for more information.
Not Suppressed Filter hidden suppressed alarms. The suppressed alarms are hidden by
default.
Labels Filter alarms by the applied labels. See Labeling the Alarms for more
information.
Intent Filter alarms by the purpose of the alarm. It can be Delivery & Attack,
Environmental Awareness, Exploitation & Installation, Reconnaissance &
Probing, and System Compromise. See Intent for more information.
Strategy Filter alarms by the type of attack. See Strategy for more information.
Sensors Filter alarms by the associated USM Anywhere Sensor. See USM Anywhere
Sensor Management for more information.
Priority Filter alarms by low, medium, or high priority. See Priority Field for Alarms
for more information.
Note: Filtering large asset groups will only return data from the most recent 1024
assets. See Creating An Asset Group for more information about this limitation.
The number between brackets displayed by each filter indicates the number of items that
matches the filter. You can also use the filter controls to provide a method of organizing your
search and filtered results.
The following table shows the icons displayed with each filter box.
Icon Meaning
In the upper-left side of the page, you can see any filters you have applied. Remove filters by
clicking the icon next to the filter. Or clear all filters by clicking Reset.
Note: When applying filters, the search uses the logical AND operator if the used filters
are different. However, when the filter is of the same type, the search uses the logical
OR operator.
Those filters that have more than 10 options include a Filter Values search field for writing
text and making the search easier. If there are more than 50 search results, a icon appears
to the right of the Filter Values search field. Click this icon to download a CSV containing up
to 1024 results.
icon to add filters to your search. When you click this icon, a dialog box opens with the specific
fields of that row.
1. Click the icon of the row to which you want to add the filters.
2. Select the fields that you want to filter during your search and click Equals or Not to limit
your search.
3. Click Apply.
Use the search field to enter queries and refine your search. You can enter free text, use
wildcards, and use advanced search syntax. When searching, keep in mind the accepted query
string syntax list in this table.
Literal, using Matches fields that contain the full term. "Event from asset not received"
double quotes Literal searches are case-sensitive.
Boolean Including AND or OR between two search (http OR tcp) AND ftp
operators or terms will search for results that match
using parentheses both of those terms.
Any characters may be used in a query, but certain characters are reserved and must be
escaped. The reserved characters are these:
+-=&|><!{}[]^"~:\/
Use a backslash (for example, "\>") to escape any reserved character (including a backslash).
If you want to search for an exact phrase having two or more words, you need to put
quotation marks around the words in the phrase. This includes email addresses (for
example, "[email protected]").
The result of your search displays with the items identified. This result matches entries
containing IOCs in your environment.
USM Anywhere enables you to toggle the mode of search. The available modes are Standard
and Advanced. You can change from one mode to the other by clicking the icon or
clicking the icon located in the upper left corner of the page.
Standard Mode
This mode enables you to select one value per filter at the same time, and then the search is
automatically performed. This mode is on by default.
Note: If you exit the advanced mode and the selected filters are not compatible with
the standard mode, a warning dialog box opens to inform you the current filters will
be removed.
Advanced Mode
Advanced mode enables you to select more than one value per filter at the same time. This
mode is off by default.
4. In the lower-left corner of the page, click Apply Filters. Or in the upper side of the page,
click Apply.
Note: The selected filter displays the icon and the filter chiclet is labeled in red.
Important: Some filters don't include the NOT operator (for example, Services or
Software).
5. Click Apply.
Note: This option searches all filter values that are not empty. If the filter includes
the [No Value], this value will not be checked not displayed. See Searching Alarms
for more information.
The [No Value] option is a special value available for some filters. Use this value when you
want to filter items that do not have the filter property defined or do not match the other
defined property values in the filter. You can use the No Value option with other filter criteria
and apply this value to an individual filter. (For example, you can use this filter for filtering
alarms without labels.)
The alarm details page provides in-depth information on an alarm, what caused it, and how to
resolve the situation.
Note: You can view your bookmarked items by going to the secondary menu and
clicking the icon. This will display all of your bookmarked items and provide direct
Not all alarms found during monitoring are necessary in managing your environment
because they do not pose a security threat. It is common for low priority alarms to create
noise, which can make it difficult to monitor alarms that require more attention. You can
identify these alarms and suppress them by using a rule.
The Alarms Details Page includes alarm management functions that are supported for
your assigned user role:
The alarm details include the main fields that identify an alarm. You can edit or add values
into these fields:
l Status: This field indicates the status for the alarm: open, in review, or closed. You can
click the icon to edit the field and apply a status. See Alarm Status for more inform-
ation.
l Labels: This field indicates if the alarm has been classified by using a label. You can
click the icon to manage the labels of the alarm. See Labeling the Alarms for more
information.
l Investigations: This field indicates if the alarm has been associated to an invest-
igation. You can click the icon to edit the field and enter the title or the number
that identifies each investigation. See Adding an Alarm to an Investigation for more
information.
l
Notes: This field allows you to enter notes regarding this alarm. You can click the
Below the alarm details you can see the source, the destination, the associated alarm if it
exists, the associated events, a description, and, in the case of an alarm with a high
priority, a recommendation to fix the problem.
Your environment can have sources and destinations included in the inventory and those
not included in the inventory. Assets included in the inventory display their names in blue,
and assets not included in the inventory display their names in gray.
The icon located next to the source and destination fields allows you to access these
options:
l Search Pivot: Identify alarms triggered in the last hour, 24 hours, 7 days, 30 days, or 90
days. You can also configure your own period of time by clicking the Custom Range
option. When you click the icon, a calendar opens. You can choose the first and last day
to delimit your search by clicking the days on the calendar or entering the days
directly. Then select the hours, minutes, and seconds by clicking the specific box.
Finally, select AM or PM.
l Find Source or Destination in Events: Use this link to search events having the same
source or destination as the alarm.
l Find Source & Destination in Events: Use this link to search events having the same
source and destination as the alarm.
The icon located next to the asset enables you to access these options:
l Add to current filter: Use this option to add the asset name as a search filter. See
Searching Alarms for more information.
l Find in events: Use this option to execute a search of the asset name in the Events
page. See Events List View for more information.
l Look up in OTX: This option searches the IP address of the source asset in the Open
Threat Exchange page. See Using OTX in USM Anywhere for more information.
l Add asset to system: Use this option to create the asset in the system, see Adding
Assets for more information.
Note: The value in the FQDN field comes from the event itself (raw log). This field
can have a real FQDN, an IP address, or be empty.
The icon located next to the asset enables you to access these options:
l Add to Current Filter: Use this option to add the asset name as a search filter. See
Searching Events for more information.
l Find in Events: Use this option to execute a search of the asset name in the Events
page. See Searching Events for more information.
l Look up in OTX: This option searches the IP address of the asset in the OTX page. See
Using OTX in USM Anywhere for more information.
l Full Details: See Viewing Assets Details for more information.
l Configure Asset: See Editing Assets for more information.
l Delete Asset: See Deleting the Assets for more information.
l Assign Credentials: See Managing Credentials in USM Anywhere for more inform-
ation.
l Authenticated Scan: This option displays depending on the USM Anywhere Sensor
associated with the asset. See Running Authenticated Asset Scans for more inform-
ation.
l Scan with AlienApp: This option enables you to run an asset scan through an Ali-
enApp. See Running Asset Scans Using an AlienApp for more information.
l Configuration Issues: This option opens the Assets Details page. The Configuration
Issues tab is selected in the page. See Viewing Assets Details for more information.
l Vulnerabilities: This option opens the Assets Details page. The Vulnerabilities tab is
selected in the page. See Viewing Assets Details for more information.
l Alarms: This option opens the Assets Details page. The Alarms tab is selected in the
page. See Viewing Assets Details for more information.
l Events: This option opens the Assets Details page. The Events tab is selected in the
page. See Viewing Assets Details for more information.
The Associated Events list displays all events associated with the alarm.
4. In the upper right corner, click previous and next to navigate between items.
5. Click the icon to close the dialog box.
Note: See the Searching Events from the Details of an Alarm page for more
information about the options in the HTTP Hostname, DNS RR Name, Source, and
Destination fields.
USM Anywhere enables you to respond to the alarm. Use this button to associate the item
with an action. Depending on the USM Anywhere Sensor you have installed, you will see
different actions:
l Get Forensics Information: This option enables you to run pre-defined Linux and Win-
dows scripts to get more info from the system. These scripts are already defined in USM
Anywhere. The Basic, Moderate, and Full Forensic Info options get elemental, limited, and
complete forensic information from assets. Keep in mind that the Full Forensic Info option
will take more time for including all options. See Scheduling a Forensics and Response Job
in the USM Anywhere AlienApps Guide for more information.
l Scan (unauthenticated): You can launch an unauthenticated scan of an asset. See Run-
ning Asset Scans for more information.
l Scan (authenticated): You can launch an authenticated scan of an asset. See Performing
Vulnerability Scans for more information.
l Report Domain: See AlienApp for Cisco Umbrella Actions in the USM Anywhere AlienApps
Guide for more information.
l Agent Query: You can run an agent query in response to any alarm. See for more inform-
ation.
USM Anywhere enables you to create and manage your own orchestration rules from the
Alarms Details Page, which is the easiest way to configure an orchestration rule.
Suppression rules using the Contains, Match and Match, case insensitive
operators apply to future events and alarms, not to events and alarms received in the
current day.
l Suppression rule: You can create a rule to suppress alarms that match a particular set of
criteria. See Creating Suppression Rules from the Alarms Page and Suppression Rules from
the Orchestration Rules Page for more information.
l Notification rule: You can create a notification rule according to a method. See Creating
Notification Rules from the Alarms Page and Notification Rules from the Orchestration
Rules Page.
There are cases where the alarms in USM Anywhere are false positives, and you may want to
suppress these kinds of alarms to prevent the false positives from flooding your system. To
suppress an alarm, you need to create a suppression rule. USM Anywhere applies the
suppression rule to similar alarms from the current day (up to 10 K alarms) and to future
alarms. Existing alarms are suppressed but kept open, while future alarms are suppressed and
closed.
Suppression rules using the Contains, Match and Match, case insensitive
operators apply to future events and alarms, not to events and alarms received in the
current day.
2. Locate the alarm that you want to include in the suppression rule.
Note: If the field is related to the name of a country, you should use the country
code defined by the ISO 3166.
Note: The Sources or Destinations field needs to match the universally unique
identifier (UUID) of the event or alarm. You can use the Source Name or Destination
Name field instead.
Important: Instead of using the equals and equals, case insensitive operators
for array fields, AT&T Cybersecurity recommends the use of the in or contains
operators.
1This packet type refers to configuration issues that are used to identify incorrect uses of certain fea-
tures. For example, the app for AWS assesses your configuration of AWS to identify insecure use of the
AWS security features.
Note: If you need to add a property value that maps with a property key, you need
to know the mapping of the field. See Determining the Mapping of a Field for more
information.
Note: The current rule box shows you the syntax of your rule, and the rule
verification box reviews that syntax before saving the rule.
9. Click Next.
Important: A dialog box opens if there are warning messages. Click Cancel to
review the warning messages, or click Accept to continue creating the rule.
l Occurrences: Specify the number of event occurrences that produce a match on the
conditional expression to trigger the rule. You can enter the number of occurrences or
use the arrow to scroll the value up or down. You need to enter a number between 1
and 100.
l Length: Specify the length of the timespan used to identify a match for multiple
occurrences. Enter the number and choose a value of seconds, minutes, or hours.
This duration identifies the amount of time that transpires from the beginning to the
end of the occurrence. If the number of occurrences is not met within this period, the
rule is not a match.
In this example, the rule applies when the configured conditions happen five times
every three hours.
These two options function together to specify the number of occurrences within a time
period that will produce a match for the rule. For example, you can define a rule to trigger
an alarm for an unauthorized access attempt when a failed SSH login occurs three times
within a five-minute window.
The created rule displays in the list of rules. You can see it from Settings > Rules >
Orchestration Rules. See Orchestration Rules for more information.
Suppressed alarms remain in the system but are hidden in the web user interface (UI) by
default. If you want to see these alarms, click Suppressed in the Search & Filters area. The
table displays suppressed alarms along with the other alarms. Use the following instructions if
you want to display just the suppressed alarms.
7. Click the icon to pass the selected filter from the available filters to the selected ones.
8. Click Apply.
The page reloads, and the Suppress Rule Name filter is added at the lower-left corner.
9. Search the Suppress Rule Name filter and click the rule.
If no rule name displays, it is because the rules are not suppressing the alarms or the
Suppressed filter is not enabled
See Searching Alarms for more information about the icons below the filters.
Note: You can save the view for later use. See Alarms Views for more information about
how to create a configuration view.
The Alarms List View page opens. The page includes Rules Name as a filter so that you
can see how many alarms match the selected rule.
You can create your own notification rules from the Orchestration Rules page or the Alarms
details page, which is the easiest way to configure the matching conditions.
2. Search the alarms that you want to include in the notification rule and click one of them.
Note: If the field is related to the name of a country, you should use the country
code defined by the ISO 3166.
Note: The Sources or Destinations field needs to match the universally unique
identifier (UUID) of the event or alarm. You can use the Source Name or Destination
Name field instead.
1This packet type refers to configuration issues that are used to identify incorrect uses of certain fea-
tures. For example, the app for AWS assesses your configuration of AWS to identify insecure use of the
AWS security features.
Important: Instead of using the equals and equals, case insensitive operators
for array fields, AT&T Cybersecurity recommends the use of the in or contains
operators.
Note: If you need to add a property value that maps with a property key, you need
to know the mapping of the field. See Determining the Mapping of a Field for more
information.
8. Click Next.
Important: A dialog box opens if there are warning messages. Click Cancel to
review the warning messages, or click Accept to continue creating the rule.
more information.
l Datadog: This method requires the creation of a Datadog API key and additional steps.
See Sending USM Anywhere Notifications to Datadog in the USM Anywhere Deploy-
ment Guide for more information.
l Email: This method sends the notification by email. You need to enter information for
the email subject and enter a destination email address. Multiple comma-separated
email addresses are possible. This method uses a built-in integration with the Amazon
Simple Email Service (SES) function and is limited to a maximum of 200 emails per
rolling 24-hour period. The only user-customizable information available is the email
subject line.
Note: The rolling 24-hour, 200-email limit refers to all email accounts. For
example, you can have a rule with multiple emails, which counts as a single email
delivery. Alternately, if you have several rules with several emails, each of these
counts as an individual email account. Sensor-disconnect emails do not count
against this number because they are critical and are only sent to users whose
role is manager.
Select the Sanitize Email Content checkbox to replace detailed email contents with a
generic message and a link that requires user authentication to view further
information.
l PagerDuty: This method is performed using an integration in the product, and user
setup is required. See Sending USM Anywhere Notifications to PagerDuty in the USM
Anywhere Deployment Guide for more information.
l Slack: This method makes use of a user-created Slack Webhook integration. Slack
integration can also be performed using Amazon SNS. See Sending USM Anywhere
Notifications to Slack in the USM Anywhere Deployment Guide for more information.
l Occurrences: Specify the number of event occurrences that produce a match on the
conditional expression to trigger the rule. You can enter the number of occurrences or
use the arrow to scroll the value up or down. You need to enter a number between 1
and 100.
l Length: Specify the length of the timespan used to identify a match for multiple
occurrences. Enter the number and choose a value of seconds, minutes, or hours.
This duration identifies the amount of time that transpires from the beginning to the
end of the occurrence. If the number of occurrences is not met within this period, the
rule is not a match.
In this example, the rule applies when the configured conditions happen five times
every three hours.
These two options function together to specify the number of occurrences within a time
period that will produce a match for the rule. For example, you can define a rule to trigger
an alarm for an unauthorized access attempt when a failed SSH login occurs three times
within a five-minute window.
The created rule displays in the list of rules. You can see it from Settings > Rules. See
Orchestration Rules for more information.
Note: Click Create New Investigation if you want to start a new investigation. See
Creating a New Investigation for more information.
4. Click Apply.
The connection has been done and you can see it from Investigations. See Evidence on
Investigations for more information.
USM Anywhere enables you to search for events from the details of an alarm using the
selected value as a filter in the search.
3. In the search filters box, enter HTTP or DNS and select the desired filter.
4. Use the and icons to pass the items from one column to the other.
5. Click Apply.
To use the search pivot in the HTTP Hostname or the DNS RR Name fields
USM Anywhere includes a set of labels to further classify your alarms. See Searching Alarms
for more information.
l Closed
l False Positive
l In Progress
l Open
USM Anywhere enables you to create, edit, and delete your own labels. You can apply a label
to one or more alarms. You can also apply multiple labels to the same alarm. To distinguish
between labels and statuses, see Differences between Statuses and Labels.
Note: Users in the Investigator role can apply and remove labels but cannot create, edit,
or delete labels.
l Click the icon in the labels column of the alarm you want to label, select the label,
l Select the checkbox to the left of an alarm, click Apply Labels, select the label, and
click Save.
You can also select several alarms or select all alarms at the same time by selecting the
first checkbox in the column.
To edit a label
You can also select several alarms or select all alarms at the same time by selecting the
first checkbox in the column.
To delete a label
You can also select several alarms or select all alarms at the same time by selecting the
first checkbox in the column.
l Select the checkbox to the left of an alarm. You can also select several alarms or select
all alarms at the same time by selecting the first checkbox in the column. Then click
Remove Alarm Labels, click the label, and click Remove.
l Locate the alarm from which you want to remove the label, and click the icon next
to the label.
Alarm Status
USM Anywhere includes a set of statuses, which you can use to classify your alarms, track
alarm status, and search alarms using statuses as a filter. See Searching Alarms for more
information on how to search alarms.
l Open
l In Review
l Closed
USM Anywhere enables you to apply just one status to an alarm. You can't apply multiple
statuses to the same alarm. See Differences between Statuses and Labels to distinguish
between label and status.
Note: The alarms that have the "closed" status will not display in the Alarm list view.
5. Click Apply.
2. Select all of the alarms to which you want to apply a status by selecting the checkbox to
the left of an alarm.
See Searching Alarms for more information. You can also select several alarms or select
all alarms at the same time by selecting the first checkbox in the column. You can also
select all the alarms in the system. See Selecting Alarms in Alarm List View for more
information.
2. Click the filter to select the name of the status on the left pane.
The alarm list displays the alarms that have the selected status.
l You can add all the labels you need, but you are not able to create a new alarm status.
l You can apply a label to more than one alarm, but you are not able to apply more than one
status to an alarm.
l Alarms that have the "Closed" status will not display in the List view in the Alarms page.
You can create a PDF or CSV report of the alarms directly from the alarms page.
2. You can use filters to define the alarms content you want to display in your report, or
select the alarms you want to include in your report.
The filters selected and displayed for the page view are the ones that are populated in the
report.
4. Click Edit Filters if you want to modify the selected filters, and then click Continue to Fil-
ters. Do the modifications you need, and then click Edit Report.
5. Click the Date field if you want to choose a different date range.
Choose Last Hour, Last 24 Hours, Last 7 Days, Last 30 Days, Last 90 Days, or Custom
to set a particular date range.
Note: This option is not available when generating reports for assets or asset
groups.
6. Under the Format section, select either CSV or PDF for the format of the report.
7. Select if you want to generate the report again, and then choose Never, Daily, Weekly,
Bi-weekly, or Monthly.
8. Enter an email address to send the report.
Select the Send to my Email Address option to add your email automatically.
9. Select the Enable Link Expiration option. This link is delivered by email and expires in 14
days.
10. Click Next.
11. In the Report Name field, enter a name for the report.
This name will be displayed in the Saved Reports page.
12. (Optional.) Add a description that will be included.
13. Under the Number of records section, choose the maximum number of records to include
on the report. For CSV the options are 20, 50, 100, 500, 1000, or 50 K. For PDF the options
are 20, 50, 100, 500, 1000, or 2500.
14. If you have chosen the PDF format, you will see the Graphs section, which you can use to
include additional views.
You can add or remove graphs included in the report by clicking the and icons.
15. Select Save & Run if you wish to keep the report in your Saved Reports on USM Any-
where page and receive the report in the indicated email.
16. Click Run to run the report.
After USM Anywhere is installed in your environment, events start flowing through your
system, so you can start gaining visibility into the type of events that are occurring, what
natural or non-threatening activity is taking place, and what activity can be a possible attack.
USM Anywhere provides a centralized view of your events. Go to Activity > Events to see
this centralized view.
The Events page displays information on events. These are the different parts of the Events
page:
l On the left side of the page are the search and filters options. Use filters to delimit your
search. See Searching Events for more information.
l At the top of the page, you can see any filters you have applied, and you have the option to
create and select different views of the events.
l The main part of the page is the list of events, where each row describes an individual
event. Click an event to open a summary view. See Viewing Event Details for more inform-
ation.
Your environment can display events when an asset has not received messages within a
configured period of time. To see this kind of events, you previously need to configure a
period of time that indicates when the asset has to start generating events. See Events
Created When an Asset Stops Sending Data for more information.
If you want to analyze the data and see the additional columns without having to scroll left
and right, you can maximize the screen and hide the filter pane. Click the icon to hide the
The following table lists the fields you see on the page.
Time Created The date and time of the creation of the event. The displayed date
depends on your computer's time zone.
OTX Indicate if it is an OTX event or not. If the icon displays active, click it to
go to OTX.
Source Asset Hostname or IP address of the host (with the national flag if the country
is known) that initiates the event.
Destination Asset Hostname or IP address of the host (with the national flag if the country
is known) that receives the event.
Sensor Name of the USM Anywhere Sensor detecting the event. The type of
sensor is also displayed below the sensor name.
The asset name includes the icon if the asset is not in the system, or the icon if the
l Add to current filter: Use this option to add the asset name as a search filter. See Search-
ing Events.
l Look up in OTX: This option searches the IP address of the source asset in the Open
Threat Exchange page. See Using OTX in USM Anywhere
l Add asset to system: Use this option to create the asset in the system. See Adding
Assets.
l Add to Current Filter: Use this option to add the asset name as a search filter. See Search-
ing Events for more information.
l Look up in OTX: This option searches the IP address of the asset in the OTX page. See
Using OTX in USM Anywhere for more information.
l Full Details: See Viewing Assets Details for more information.
l Configure Asset: See Editing Assets for more information.
You can configure the view you want for the list of events. See Event Views for more
information.
Click Generate Report to open the Configure Report dialog box. See Create an Events Report
for more details.
The graph above the events list displays the amount of events in a period of time. You can
change this period by clicking Last 24 Hours filter.
l Actions / User: Reports USM Anywhere account activity based on specific account users
and summarized by Create, Read, Update, and Delete categories.
l Count / Time: The Count/Time view is a graph that provides a graphical representation of
the number of events in a period of time.
Important: The period of time is mapped with the timestamp_occurred field. This
field can be overwritten by the current sensor UTC timestamp if, when processing
events, a delay is detected up to 15 minutes or the timestamp_occurred field is not
provided.
Note: You can view your bookmarked items by going to the secondary menu and click-
ing the icon. This will display all of your bookmarked items and provide direct links to
each of them.
Click the icon to filter your search by row fields. See Filtering Events by Row Fields for
more information.
You can choose the number of items to display by selecting 20, 50, or 100 below the table.
You can classify some columns by clicking the icons to the right side of the heading. You can
sort the item information in ascending or descending order.
Configuring Columns
Within the page, you can configure the columns and fields that display in the List view. You
can also save your columns configuration to return to it whenever you need it.
2. Search the columns you want to have in the list view. You can enter your search in the
search field.
3. Use the and icons to pass the items from one column to the other and select the
4. You can order the columns by clicking one of them and dragging the column to the
desired place.
5. Click Apply.
Note: If you generate a report when you have set custom columns, your report keeps
the columns you have configured.
Important: If you want to keep your configuration, you need to save it by selecting
Save View > Save as. Otherwise, your custom view is not kept when you move to
another feature. See Event Views for more information.
Event Views
You can configure the view you want for the list of items in the page.
2. Use the and icons to pass the items from one column to another and select the
2. Click Saved Views and then select the view you want to see.
3. Click Apply.
1. From the Events list view, click View above the filters.
2. Click Saved Views and then click the icon next to the saved view you want to delete.
3. Click Accept.
Predefined Views
USM Anywhere includes several predefined views of events based on usual environments and
technologies. These views have pre-defined column headers that show the most relevant
event fields. You can see a summarized event view without having to spend the time creating
a custom view.
These predefined views operate the same way as the views you can create yourself. Some of
these views have also predefined filters.
View Meaning
AlienVault Displays log data when the USM Anywhere Sensor is unable to match them with
Generic Plugin AlienApps based on hints and manual associations.
AWS Cloud Displays the most relevant event fields for AWS CloudTrail, AWS S3 Access, and
Activity ELB Access.
View Meaning
Azure Cloud Displays the most relevant event fields for Azure environmental logs.
Activity
Firewall Events Displays the most relevant fields for firewall events. For instance request URL,
source username, destination username, etc. depending on the set of fields that is
most common to the list of supported firewall AlienApps.
Linux Events Displays the most relevant fields for Linux Events generated by the Linux CRON,
SSH, and SUDO AlienApps.
Network IDS Displays the most relevant event fields for NIDS.
Open Threat Displays the most relevant feeds that the pulse has matched.
Exchange
Web Server Displays the most relevant fields for Web Server Events, which include Apache,
Events NGinx, and Windows IIS.
Windows Events Displays the most relevant fields for Windows Events forwarded by NXLog.
USM Anywhere includes a wide range of report templates classified according to the
compliance templates for alarms, vulnerabilities, and events collected in the system. The
templates are grouped into:
l PCI. Payment Card Industry Data Security Standards (PCI DSS) is a set of security stand-
ards designed to ensure that all companies that accept, process, store, or transmit credit
card information maintain a secure environment. These reports are identified and based
on specific PCI DSS requirements to provide the auditor with the specific information
requested. For example, PCI DSS requirement 10.7.a: Retain audit trail history for at least
one year, with a minimum of three months immediately available for analysis.
l NIST CSF. The National Institute of Standards Technology (NIST) Cybersecurity Frame-
work provides a policy framework of computer security guidance for how private sector
organizations can assess and improve their ability to prevent, detect, and respond to cyber
attacks.
l HIPAA. The Health Insurance Portability and Accountability Act (HIPAA) sets the standard
for protecting sensitive patient data. Any company that deals with protected health
information (PHI) must ensure that all the required physical, network, and process security
measures are in place and followed. This includes covered entities, anyone who provides
treatment, payment and operations in healthcare, and business associates, anyone with
access to patient information and provides support in treatment, payment, or operations.
Subcontractors, or business associates of business associates, must also be in compliance.
l ISO 27001. ISO/IEC 27001 provides guidance for implementing information security con-
trols to achieve a consistent and reliable security program. The ISO and the International
Electrotechnical Commission (IEC) developed 27001 to provide requirements for an inform-
ation security management system (ISMS).
l Type of Data Source. Event Type Templates enable you to easily run a general firewall,
authentication, and other types of normalized queries that do not require you to build com-
plex filters based on specific data source or event types. USM Anywhere supports these
reports: Anomaly Detection, Antivirus, Application, Application Firewall, Authentication,
Authentication and DHCP, Cloud Application, Cloud Infrastructure, DNS Server, Data Pro-
tection, Database, Endpoint Protection, Endpoint Security, Firewall, IDS, Infrastructure Mon-
itoring, Intrusion Detection, Intrusion Prevention, Load Balancer, Mail Security, Mail Server,
Management Platform, Network Access Control, Operating System, Other Devices, Proxy,
Router, Router/Switch, Server, Switch, Unified Threat Management, VPN, Web Server, Wire-
less Security/Management.
l Data Sources. You can find templates based on the most commonly used data sources
including NIDS, AWS, Amazon DynamoDB, Amazon S3, AWS VPC Flow Logs, AWS Load Bal-
ancers, Azure, Cisco Umbrella, Cylance, FireEye, Fortigate, G Suite, McAfee ePO, Office 365,
Okta, Palo Alto, SonicWall, Sophos UTM, Watchguard, VMware, Windows, AlienVault Agent.
There is also a template for the AlienVault Generic Data Source.
3. Select a report.
You can use the search field or scroll down the list.
4. Click Apply.
The AlienVault Generic Data Source is a predefined view of events which displays log data
when the USM Anywhere Sensor is unable to match them with any AlienApps based on hints
and manual associations.
This view works the same as the events list view. On the left you can find the search and filter
options. In the upper side of the page, you can see any filters you have applied, and you have
the option to create and select different views of the events. The main part of the page is the
actual list of events. Each row describes an individual event.
If you want to analyze the data and see the additional columns without having to scroll left
and right, you can maximize the screen and hide the filter pane. Click the icon to hide the
The following table lists the fields you see on the page.
Time Created The date and time of the creation of the event. The displayed date
depends on your computer's time zone.
List of the Default Columns in the AlienVault Generic Data Source (Continued)
OTX Indicate if it is an OTX event or not. If the icon displays as active, click it
to go to OTX.
Source Asset Hostname or IP address of the host (with the national flag if the country
is known) that initiates the event.
Destination Asset Hostname or IP address of the host (with the national flag if the country
is known) that receives the event.
Sensor Name of the USM Anywhere Sensor detecting the event. The type of
sensor is also displayed below the sensor name.
The Reporting Device column includes the assets that sent the syslog. Next to the asset name
of this column, click the icon to access these options:
l Configuration Issues: This option opens the Assets Details page. The Configuration Issues
tab is selected in the page. See Viewing Assets Details for more information.
l Vulnerabilities: This option opens the Assets Details page. The Vulnerabilities tab is selec-
ted in the page. See Viewing Assets Details for more information.
l Alarms: This option opens the Assets Details page. The Alarms tab is selected in the page.
See Viewing Assets Details for more information.
l Events: This option opens the Assets Details page. The Events tab is selected in the page.
See Viewing Assets Details for more information.
Next to the source and destination asset name, click the icon to access these options:
l Add to current filter: Use this option to add the asset name as a search filter. See
Searching Events.
l Look up in OTX: This option searches the IP address of the source asset in the Open
Threat Exchange page. See Using OTX in USM Anywhere
l Add asset to system: Use this option to create the asset in the system. See Adding
Assets.
You can configure the view you want for the list of events; see Views for more information.
Click Generate Report to open the Configure Report dialog box. See Create an Events Report
for more details.
The graph above the events list displays the amount of events in a period of time. You can
change this period by clicking Last 24 Hours filter.
l Actions / User: Reports USM Anywhere account activity based on specific account users
and summarized by Create, Read, Update, and Delete categories.
l Count / Time: Provides Reports USM Anywhere account activity based on specific
account users and summarized by Create, Read, Update, and Delete categories.
l Auth / User: Reports authorization actions.
l Source Map: Provides the number of events associated with each country on a global
map.
Note: You can view your bookmarked items by going to the secondary menu and
clicking the icon. This will display all of your bookmarked items and provide direct
Click the icon to filter your search by row fields. See Filtering Events by Row Fields for
more information.
You can choose the number of items to display by selecting 20, 50, or 100 below the table.
You can classify some columns by clicking the icons to the right side of the heading. You can
sort the item information in ascending or descending order.
Configuring Columns
Within the page, you can configure the columns and fields that display in the List view. You
can also save your columns configuration to return to it whenever you need it.
1. From the AlienVault Generic Data Source list view, click the icon.
2. Search the columns you want to have in the list view. You can enter your search in the
search field.
3. Use the and icons to pass the items from one column to the other and select the
4. You can order the columns by clicking one of them and dragging the column to the
desired place.
5. Click Apply.
Note: If you generate a report when you have set custom columns, your report keeps
the columns you have configured.
Important: If you want to keep your configuration, you need to save it by selecting
Save View > Save as. Otherwise, your custom view is not kept when you move to
another feature. See AlienVault Generic Data Source for more information.
Views
You can configure the view you want for the list of items in the page.
2. Use the and icons to pass the items from one column to another and select the
2. Click Saved Views and then select the view you want to see.
3. Click Apply.
1. From the AlienVault Generic Plugin list view, click View above the filters.
2. Click Saved Views and then click the icon next to the saved view you want to delete.
3. Click Accept.
Searching Events
USM Anywhere includes the option of searching items of interest on the page. There are
several filters displayed by default. You can either filter your search or enter what you are
looking for in the search field.
You can configure more filters and change which filters to display by clicking the Configure
Filters link located in the upper-left side of the page. The management of filters is similar to
that for assets. See Managing Filters for more information.
Last 24 Hours Filter events triggered in the last hour, last 24 hours, last 7 days, last 30
days, or last 90 days. You can also configure your own period of time by
clicking the Custom Range option. This option enables you to customize a
range. When you click Custom Range, a calendar opens. You can choose
the first and last day to delimit your search by clicking the days on the
calendar or entering the days directly. Then select the hours, minutes, and
seconds by clicking the specific box. Finally, select AM or PM.
Suppressed Filter suppressed events. The suppressed events are hidden by default. See
Creating Suppression Rules from the Events Page for more information.
Account Name Filter events by the account that has generated the event.
Data Source Filter events by the data source used to normalize the event.
Event Name Filter events by the short, user-readable description of the event.
Source Asset Filter events by the name of the asset that produced the event.
Source User Filter events by the name of the user that produced the event.
Sensor Filter events by the name of the USM Anywhere Sensor that received the
event.
Asset Groups When the host for the event source or destination is an asset belonging to
one or more of your asset groups, this field filters the asset group name or
names.
Username Filter events by the username associated with the asset that generated the
event.
Note: Filtering large asset groups will only return data from the most recent 1024
assets. See Creating an Asset Group for more information about this limitation.
The number between brackets displayed by each filter indicates the number of items that
matches the filter. You can also use the filter controls to provide a method of organizing your
search and filtered results.
The following table shows the icons displayed with each filter box.
Icon Meaning
In the upper-left side of the page, you can see any filters you have applied. Remove filters by
clicking the icon next to the filter. Or clear all filters by clicking Reset.
Note: When applying filters, the search uses the logical AND operator if the used filters
are different. However, when the filter is of the same type, the search uses the logical
OR operator.
Those filters that have more than 10 options include a Filter Values search field for writing
text and making the search easier. If there are more than 50 search results, a icon appears
to the right of the Filter Values search field. Click this icon to download a CSV containing up
to 1024 results.
Important: An event having the "Was Fuzzied" field with the value "true" has its data
source property as "[empty]".
See The AlienVault Generic Data Source in the USM Anywhere Deployment Guide for more
information about how this attempts to normalize an unmatched log message.
To search events that are not matched with a specific data source
2. In the upper-left side of the page, click the Configure Filters link.
5. Click Apply.
6. In the left pane, search the Was Fuzzied integration.
7. Click true. The number between parentheses indicates the number of events that were
created with the AlienVault Generic Data Source.
Note: The false value displays the events that have an assigned data source. The
number between parentheses indicates the number of events.
icon to add filters to your search. When you click this icon, a dialog box opens with the specific
fields of that row.
1. Click the icon of the row to which you want to add the filters.
2. Select the fields that you want to filter during your search and click Equals or Not to limit
your search.
3. Click Apply.
Use the search field to enter queries and refine your search. You can enter free text, use
wildcards, and use advanced search syntax. When searching, keep in mind the accepted query
string syntax list in this table.
Literal, using Matches fields that contain the full term. "Event from asset not received"
double quotes Literal searches are case-sensitive.
Boolean Including AND or OR between two search (http OR tcp) AND ftp
operators or terms will search for results that match
using parentheses both of those terms.
Any characters may be used in a query, but certain characters are reserved and must be
escaped. The reserved characters are these:
+-=&|><!{}[]^"~:\/
Use a backslash (for example, "\>") to escape any reserved character (including a backslash).
If you want to search for an exact phrase having two or more words, you need to put
quotation marks around the words in the phrase. This includes email addresses (for
example, "[email protected]").
Important: The indexed fields are Event Name, Raw Log, Rep Device Asset ID,
Source Asset ID, and Destination Asset ID.
As an example, to search for hosts in the 25. network range, enter the following regex into the
search field:
/25.[0-9]{1,3}.[0-9]{1,3}.[0-9]{1,3}/
Here is a more detailed anatomy of this example:
l / ... /: The regex search is indicated by the expression contents being contained
between forward slashes.
Note: Because the search field does not search all fields in an event, the results will be
limited to IP addresses in the Event Name, Raw Log, Rep Device Asset ID, Source Asset
ID, and Destination Asset ID fields.
The result of your search displays with the items identified. This result matches entries
containing IOCs in your environment.
USM Anywhere enables you to toggle the mode of search. The available modes are Standard
and Advanced. You can change from one mode to the other by clicking the icon or
clicking the icon located in the upper left corner of the page.
Standard Mode
This mode enables you to select one value per filter at the same time, and then the search is
automatically performed. This mode is on by default.
Note: If you exit the advanced mode and the selected filters are not compatible with
the standard mode, a warning dialog box opens to inform you the current filters will
be removed.
Advanced Mode
Advanced mode enables you to select more than one value per filter at the same time. This
mode is off by default.
4. In the lower-left corner of the page, click Apply Filters. Or in the upper side of the page,
click Apply.
Note: The selected filter displays the icon and the filter chiclet is labeled in red.
Important: Some filters don't include the NOT operator (for example, Services or
Software).
5. Click Apply.
Note: This option searches all filter values that are not empty. If the filter includes
the [No Value], this value will not be checked not displayed. See Searching Events
for more information.
The [No Value] option is a special value available for some filters. Use this value when you
want to filter items that do not have the filter property defined or do not match the other
defined property values in the filter. You can use the No Value option with other filter criteria
and apply this value to an individual filter. (For example, you can use this filter for filtering
events without an associated account name.)
In the Data Source filter, the equivalent of No Value is [AlienVault Generic Data Source]. If you
select this option, it means you are searching for events that do not have a specific data
source. See The AlienVault Generic Data Source for more information.
In the Packet Payload filter, the equivalent of No Value is [No Parsable Value]. The Packet
Payload field stores the Base64 encoded payload associated with the network-based
intrusion detection system (NIDS) events. Due to the size limit of the underlying technology,
the maximum length USM Anywhere can parse is 32766 B. When the payload exceeds this
limit, USM Anywhere stores the data in this field unparsed. The No Parsable Value option
includes two types of events: events with no data and events with data exceeding 32766 B.
Both events are not parsable. Therefore, sometimes you may see events with payload data
when you select the No Parsable Value option in the Packet Payload filter, similar to the
following screenshot.
Note: You can view your bookmarked items by going to the secondary menu and
clicking the icon. This will display all of your bookmarked items and provide direct
The Event Details page includes event management functions that are supported for
your assigned user role:
The event details include the main fields that identify an event. Keep in mind that you can
edit or add values into this field:
l Investigation: This field indicates if the event has been associated to an investigation.
You can click the icon to edit the field and enter the title or the number that iden-
tifies each investigation. See Adding an Event to an Investigation for more information.
You can see the event details, then the source, the destination, the source and
destination users, the payload, and the log. The icon located next to the Source,
Destination, and two User fields enables you the access to several options. See Events List
View for more information about those options.
l Add to current filter: This option enables you to add the asset to the selected filters.
l Look up in OTX: This option searches the IP address of the source asset in the AT&T
Cybersecurity Open Threat Exchange (OTX™) page. See Using OTX in USM Anywhere
for more information.
l Add asset to system: Use this option to create the asset, see Adding Assets for more
information.
Note: The value in the FQDN field comes from the event itself (raw log). This field
can have a real FQDN, an IP address, or be empty.
3. In the upper right corner, click previous and next to navigate between items.
4. Click the icon to close the dialog box.
USM Anywhere enables you to respond to the event. Use this button to associate the item
with an action. Depending on the USM Anywhere Sensor you have installed, you will see
different actions:
l Get Forensics Information: This option enables you to run pre-defined Linux and Win-
dows scripts to get more info from the system. These scripts are already defined in USM
Anywhere. The Basic, Moderate, and Full Forensic Info options get elemental, limited, and
complete forensic information from assets. Keep in mind that the Full Forensic Info option
will take more time for including all options. See Scheduling a Forensics and Response Job
in the USM Anywhere AlienApps Guide for more information.
l Scan (unauthenticated): You can launch an unauthenticated scan of an asset. See Run-
ning Asset Scans for more information.
l Report Domain: See AlienApp for Cisco Umbrella Actions in the USM Anywhere AlienApps
Guide for more information.
l Agent Query: You can run an agent query in response to any event. See for more inform-
ation.
USM Anywhere enables you to create and manage your own orchestration rules from the
Events details pages, which is the easiest way to configure an orchestration rule.
Suppression rules using the Contains, Match and Match, case insensitive
operators apply to future events and alarms, not to events and alarms received in the
current day.
l Suppression Rule: See Creating Suppression Rules from the Events Page and Suppression
Rules from the Orchestration Rules Page for more information.
Note: Users in the Investigator role can create suppression rules but cannot create
filtering, alarm, or notification rules.
l Filtering Rule: See Creating Filtering Rules from the Events Page and Filtering Rules from
the Orchestration Rules Page for more information.
Important: The Create Filtering Rule option is not visible if the Agent has sent the
event.
l Alarm Rule: See Creating Alarm Rules from the Events Page and Correlation Rules for
more information.
l Notification Rule: See Creating Notification Rules from the Events Page and Correlation
Rules for more information.
You can create suppression rules from the Events page to prevent some events from
flooding your system.
USM Anywhere saves the events that match a suppression rule, but does not correlate these
suppressed events. By default, USM Anywhere hides these suppressed events. If you want to
see these events, click Suppressed in the Search & Filters area. The table displays suppressed
events along with all events. See To only display the suppressed events if you want to display
just the suppressed events.
Suppression rules using the Contains, Match and Match, case insensitive
operators apply to future events and alarms, not to events and alarms received in the
current day.
You can create your own rules from the Suppression Rules page or the Events details page,
which is the easiest way to configure the matching conditions.
2. Search the events which you want to include in the suppression rule.
1This packet type refers to configuration issues that are used to identify incorrect uses of certain fea-
tures. For example, the app for AWS assesses your configuration of AWS to identify insecure use of the
AWS security features.
Note: If the field is related to the name of a country, you should use the country
code defined by the ISO 3166.
Note: The Sources or Destinations field needs to match the universally unique
identifier (UUID) of the event or alarm. You can use the Source Name or Destination
Name field instead.
Important: Instead of using the equals and equals, case insensitive operators
for array fields, AT&T Cybersecurity recommends the use of the in or contains
operators.
Note: If you need to add a property value that maps with a property key, you need
to know the mapping of the field. See Determining the Mapping of a Field for more
information.
Note: The current rule box shows you the syntax of your rule, and the rule
verification box reviews that syntax before saving the rule.
9. Click Next.
Important: A dialog box opens if there are warning messages. Click Cancel to
review the warning messages, or click Accept to continue creating the rule.
l Occurrences: Specify the number of event occurrences that produce a match on the
conditional expression to trigger the rule. You can enter the number of occurrences or
use the arrow to scroll the value up or down. You need to enter a number between 1
and 100.
l Length: Specify the length of the timespan used to identify a match for multiple
occurrences. Enter the number and choose a value of seconds, minutes, or hours.
This duration identifies the amount of time that transpires from the beginning to the
end of the occurrence. If the number of occurrences is not met within this period, the
rule is not a match.
In this example, the rule applies when the configured conditions happen five times
every three hours.
These two options function together to specify the number of occurrences within a time
period that will produce a match for the rule. For example, you can define a rule to trigger
an alarm for an unauthorized access attempt when a failed SSH login occurs three times
within a five-minute window.
The created rule displays in the list of rules. You can see it from Settings > Rules. See
Orchestration Rules for more information.
7. Click Apply.
The page reloads, and the Suppress Rule Name filter is added at the lower-left corner.
8. Search the Suppress Rule Name filter and click the rule.
If no rule name displays, it is because the rules are not suppressing the events or the
Suppressed filter is not enabled
See Searching Events for more information about the icons below the filters.
Note: You can save the view for later use. See Event Views for more information about
how to create a configuration view.
The Events List View page opens. The page includes Rules Name as a filter so that you
can see how many events match the selected rule.
USM Anywhere enables you to make the sensor drops future events that match the rule.
These events will be neither correlated nor stored. Through these rules, you can define which
event data you are going to store in USM Anywhere. You will pay for the data you use.
Note: Filtering rules is not retroactive. The rule applies to future items, but not to to
previous items, even if those items follow the rule.
Important: You can't use a correlation list when you create a filtering rule.
2. Search the events which you want to include in the filtering rule.
1This packet type refers to configuration issues that are used to identify incorrect uses of certain fea-
tures. For example, the app for AWS assesses your configuration of AWS to identify insecure use of the
AWS security features.
Note: If the field is related to the name of a country, you should use the country
code defined by the ISO 3166.
Note: The Sources or Destinations field needs to match the universally unique
identifier (UUID) of the event or alarm. You can use the Source Name or Destination
Name field instead.
Important: Instead of using the equals and equals, case insensitive operators
for array fields, AT&T Cybersecurity recommends the use of the in or contains
operators.
Note: If you need to add a property value that maps with a property key, you need
to know the mapping of the field. See Determining the Mapping of a Field for more
information.
Note: The current rule box shows you the syntax of your rule, and the rule
verification box reviews that syntax before saving the rule.
9. Click Next.
Important: A dialog box opens if there are warning messages. Click Cancel to
review the warning messages, or click Accept to continue creating the rule.
The created rule displays in the list of rules. You can see it from Settings > Rules. See
Orchestration Rules for more information.
USM Anywhere enables you to easily identify existing and emerging threats, which are of
interest. Through alarm rules on events, you can organize your threats and only see high-
priority alarms, which can be received in an email and will help you to reduce noise and focus
on important things.
2. Search the events which you want to include in the alarm rule.
Note: If the field is related to the name of a country, you should use the country
code defined by the ISO 3166.
Note: The Sources or Destinations field needs to match the universally unique
identifier (UUID) of the event or alarm. You can use the Source Name or Destination
Name field instead.
Important: Instead of using the equals and equals, case insensitive operators
for array fields, AT&T Cybersecurity recommends the use of the in or contains
operators.
1This packet type refers to configuration issues that are used to identify incorrect uses of certain fea-
tures. For example, the app for AWS assesses your configuration of AWS to identify insecure use of the
AWS security features.
Note: If you need to add a property value that maps with a property key, you need
to know the mapping of the field. See Determining the Mapping of a Field for more
information.
Note: The current rule box shows you the syntax of your rule, and the rule
verification box reviews that syntax before saving the rule.
9. Click Next.
Important: A dialog box opens if there are warning messages. Click Cancel to
review the warning messages, or click Accept to continue creating the rule.
10. Enter a name for the rule and, if desired, a description to clarify its use in the Description
field.
11. Select an intent.
The intent describes the context of the behavior that is being observed. These intents
roughly map to the stages of the intrusion kill chains but are collapsed to ensure that
each is discrete. See Intent for more information about the available threat categories.
If known, it is the method of attack or infiltration associated with the indicator that
generated the alarm.
Note: This is a required field; if you do not complete this field, the Save button
remains inactive.
The strategy describes the broad-based strategy or behavior that is detected. The
intention is to describe the malicious user's strategy to achieve their goal.
You can use the mute value to set the period of time during which, once an alarm is
createdUSM Anywhere will not create a new alarm based on the same conditions.
Note: Take care to set a mute duration that is long enough to cover the span of
time in which matching events will occur to maximize the efficacy of your mute.
Important: If your USM Anywhere™ is restarted when one of your alarm mutes is
active, or if there is an update or hotfix, the alarm mute will be canceled.
l Occurrences: Specify the number of event occurrences that produce a match on the
conditional expression to trigger the rule. You can enter the number of occurrences or
use the arrow to scroll the value up or down. You need to enter a number between 1
and 100.
l Length: Specify the length of the timespan used to identify a match for multiple
occurrences. Enter the number and choose a value of seconds, minutes, or hours.
This duration identifies the amount of time that transpires from the beginning to the
end of the occurrence. If the number of occurrences is not met within this period, the
rule is not a match.
In this example, the rule applies when the configured conditions happen five times
every three hours.
These two options function together to specify the number of occurrences within a time
period that will produce a match for the rule. For example, you can define a rule to trigger
an alarm for an unauthorized access attempt when a failed SSH login occurs three times
within a five-minute window.
17. (Optional.) Select the fields that you want to display in the generated alarm.
You can select or remove the fields you want to include in the details of the alarm. A field
passes from one column to the other by clicking it.
The created rule displays in the list of rules. You can see it from Settings > Rules. See
Orchestration Rules for more information.
You can create your own notification rules from the Orchestration Rules page or from the
Events details page, which are the easiest ways to configure the matching conditions.
Note: If the field is related to the name of a country, you should use the country
code defined by the ISO 3166.
Note: The Sources or Destinations field needs to match the universally unique
identifier (UUID) of the event or alarm. You can use the Source Name or Destination
Name field instead.
1This packet type refers to configuration issues that are used to identify incorrect uses of certain fea-
tures. For example, the app for AWS assesses your configuration of AWS to identify insecure use of the
AWS security features.
Important: Instead of using the equals and equals, case insensitive operators
for array fields, AT&T Cybersecurity recommends the use of the in or contains
operators.
Note: If you need to add a property value that maps with a property key, you need
to know the mapping of the field. See Determining the Mapping of a Field for more
information.
Note: The current rule box shows you the syntax of your rule, and the rule
verification box reviews that syntax before saving the rule.
9. Click Next.
Important: A dialog box opens if there are warning messages. Click Cancel to
review the warning messages, or click Accept to continue creating the rule.
Amazon Web Services (AWS) account for setup and use. The Amazon SNS allows the
first 1000 email notifications per month to fall into the free messaging tier. See Send-
ing Notifications Through Amazon SNS in the USM Anywhere Deployment Guide for
more information.
l Datadog: This method requires the creation of a Datadog API key and additional steps.
See Sending USM Anywhere Notifications to Datadog in the USM Anywhere Deploy-
ment Guide for more information.
l Email: This method sends the notification by email. You need to enter information for
the email subject and enter a destination email address. Multiple comma-separated
email addresses are possible. This method uses a built-in integration with the Amazon
Simple Email Service (SES) function and is limited to a maximum of 200 emails per
rolling 24-hour period. The only user-customizable information available is the email
subject line.
Note: The rolling 24-hour, 200-email limit refers to all email accounts. For
example, you can have a rule with multiple emails, which counts as a single email
delivery. Alternately, if you have several rules with several emails, each of these
counts as an individual email account. Sensor-disconnect emails do not count
against this number because they are critical and are only sent to users whose
role is manager.
Select the Sanitize Email Content checkbox to replace detailed email contents with a
generic message and a link that requires user authentication to view further
information.
l PagerDuty: This method is performed using an integration in the product, and user
setup is required. See Sending USM Anywhere Notifications to PagerDuty in the USM
Anywhere Deployment Guide for more information.
l Slack: This method makes use of a user-created Slack Webhook integration. Slack
integration can also be performed using Amazon SNS. See Sending USM Anywhere
Notifications to Slack in the USM Anywhere Deployment Guide for more information.
l Occurrences: Specify the number of event occurrences that produce a match on the
conditional expression to trigger the rule. You can enter the number of occurrences or
use the arrow to scroll the value up or down. You need to enter a number between 1
and 100.
l Length: Specify the length of the timespan used to identify a match for multiple
occurrences. Enter the number and choose a value of seconds, minutes, or hours.
This duration identifies the amount of time that transpires from the beginning to the
end of the occurrence. If the number of occurrences is not met within this period, the
rule is not a match.
In this example, the rule applies when the configured conditions happen five times
every three hours.
These two options function together to specify the number of occurrences within a time
period that will produce a match for the rule. For example, you can define a rule to trigger
an alarm for an unauthorized access attempt when a failed SSH login occurs three times
within a five-minute window.
The created rule displays in the list of rules. You can see it from Settings > Rules >
Orchestration Rules. See Orchestration Rules for more information.
3. In the Investigation field, click the icon to edit it and enter the title or the number
Note: Click Create New Investigation if you want to start a new investigation. See
Creating a New Investigation for more information.
4. Click Apply.
The connection has been done and you can see it from Investigations. See Evidence on
Investigations for more information.
You can create a PDF or CSV report of the events directly from the events page.
2. You can use filters to define the events content you want to display in your report.
The filters selected and displayed for the page view are the ones that are populated in the
report.
4. Click Edit Filters if you want to modify the selected filters, and then click Continue to Fil-
ters. Do the modifications you need, and then click Edit Report.
5. Click the Date field if you want to choose a different date range.
Choose Last Hour, Last 24 Hours, Last 7 Days, Last 30 Days, Last 90 Days, or Custom
to set a particular date range.
Note: This option is not available when generating reports for assets or asset
groups.
6. Under the Format section, select either CSV or PDF for the format of the report.
7. Select if you want to generate the report again, and then choose Never, Daily, Weekly,
Bi-weekly, or Monthly.
8. Enter an email address to send the report.
Select the Send to my Email Address option to add your email automatically.
9. Select the Enable Link Expiration option. This link is delivered by email and expires in 14
days.
10. Click Next.
11. In the Report Name field, enter a name for the report.
This name will be displayed in the Saved Reports page.
12. (Optional.) Add a description that will be included.
13. Under the Number of records section, choose the maximum number of records to include
on the report. For CSV the options are 20, 50, 100, 500, 1000, or 50 K. For PDF the options
are 20, 50, 100, 500, 1000, or 2500.
14. If you have chosen the PDF format, you will see the Graphs section, which you can use to
include additional views.
You can add or remove graphs included in the report by clicking the and icons.
15. Select Save & Run if you wish to keep the report in your Saved Reports on USM Any-
where page and receive the report in the indicated email.
16. Click Run to run the report.
To protect the health of your system, USM Anywhere monitors the rate of events being sent
to your sensor. If that rate, measured in events per second (EPS), threatens to impact your
sensor's capacity USM Anywhere will engage EPS Adaptive Response. EPS Adaptive Response
enables your system to take more time to process events coming in by throttling your EPS,
keeping your system running without risking event loss.
Note: See Reaching the Monthly Usage Limit to read more about sensor capacity and
USM Anywhere tier limits.
EPS Adaptive Response may cause delays in the correlation of alarms. While activated, events
will enter an adaptive processing queue on sensors or the agent pipeline to assist product
stability. When deactivated, the queue will be processed at normal speeds. USM Anywhere
views events in the user interface (UI) based on the time the actual event occurred and not
the time the event was received by the sensor. When EPS Adaptive Response is ended and
queued events get forwarded, they will be backfilled into the appropriate timeslots.
Important: After EPS Adaptive Response has ended, alarms may be delayed while
throttled events are being forwarded.
l Your sensor's disk space is almost full: When your sensor's disk space approaches full,
throttling engages to preserve remaining disk space. This is enabled for all customers.
l Your USM Anywhere is projected over tier: When your USM Anywhere is projected to be
over tier, throttling slows down the event ingestion in both sensors and agents until you
are back within your tier limits. This is only enabled for heavy usage customers.
Note: Every time EPS Adaptive Response is engaged or disengaged, your USM
Anywhere sensor will create a system event. In addition, a system event is created when
throttling rates change.
You may also create custom events around throttling to best suit your environment's
needs.
88 0.25
90 0.5
92 2
95 5
98 10
99 100
If you have more than one sensor or agent, USM Anywhere will begin by throttling only the
sensor with the highest EPS. This is determined by retrieving your system's EPS per minute
for every sensor and maintaining a rolling EPS average. Every hour, your system determines if
throttling is necessary, and EPS Adaptive Response will be engaged on any sensor sending
more EPS than 75% of this average.
When your USM Anywhere is projected to go over tier, EPS throttling is progressive, starting
at 1 ms and increasing up to 250 ms as necessary until data ingestion decreases or your tier
changes. Once throttling has been engaged, the projection will be sampled regularly. If the
tier decrement is smaller than 2%, then the throttling factor is doubled. Otherwise, it remains
the same until throttling is no longer necessary.
l EPS throttling has been engaged: Your sensor's EPS is being throttled.
l EPS throttling has ended: Your sensor's EPS is no longer being throttled.
Each throttling system event type has a number of possible event keys, specifying which type
of event has been triggered.
sensor_uuid Sensor ID
sensor_uuid Sensor ID
customfield_0 0
USM Anywhere archives raw event data as logs. Raw logs are an invaluable asset for forensic
analysis and compliance mandates. You can download raw logs for review and find details
about specific incidents, search the logs for instances using a specific IP address, or analyze
the patterns of multiple attacks.
USM Anywhere enables you to configure the Raw Log column when viewing events or
download raw logs from events.
1. From the Events List view, click the icon to open the Columns Configuration dialog
box.
2. Enter raw in the search field of the available columns.
3. Use the icon to pass the Raw Log column from one side to the other.
4. Click Apply.
Note: If you want to keep your configuration, you need to save it by selecting Save
View > Save as. Otherwise, your custom view will not be kept when you move to
another page.
5. Choose a date range. You can select a predefined range between Last Hour, Last 24
Hours, Last 7 Days, Last 30 Days, or Last 90 Days or Custom Range to set a particular
date range.
6. Under the Number of records section, choose the maximum number of records to include
on the report: 20, 50, 100, 500, 1000, or 2500.
7. Click Download Logs.
USM Anywhere enables you to display system events. These events are any events generated
within your environment. They are not actions associated with any of the monitored assets or
networks collected by your environment. For instance, the system generates a system event
when an asset, a user, or a node is created, updated, or deleted or when you modify your
MFA subscription.
USM Anywhere provides a centralized view of your system events. Go to Settings > System
Events to see this centralized view.
The system events page displays information on any events generated within your
environment. On the left you can find the search and filters options. In the upper-left side of
the page, you can see any filters you have applied, and you have the option to create and
select different views of the system events. The main part of the page is the actual list of
system events. Each row describes an individual system event. The following table lists the
default columns for system events.
Note: System events older than 30 days are cleared from hot storage on a regular basis.
Time Created Date and time of the creation of the event. The displayed date depends
on your computer's time zone.
Sensor Name of the USM Anywhere Sensor detecting the event. The type of
sensor is also displayed below the sensor name.
Source User Email Email of the user that performed the action. For example, when user
[email protected] logs in, the source email is [email protected].
Destination User Email Email of the user that the action is being performed on. For example, if
user [email protected] modifies or creates user
[email protected], then the destination email is [email protected].
Event Outcome Indicates if the action was successful and completed or if it failed.
Event Change Brief description of what was changed in the system event.
It only gets populated for certain actions and indicates what is being
changed. Most of these are user changes (for example, when a user is
suspended, locked status is reset, multifactor authentication (MFA) is
enabled or disabled, or password updated).
Source Asset Hostname or IP address of the host (with the national flag if the country
is known) that initiates the event.
Identity Source Address IP address of the event or computer that it takes place on.
If you want to analyze the data, you can maximize the screen and hide the filter pane. Click
the icon to hide the filter pane. Click the icon to expand the filter pane.
Click Generate Report to open the Configure Report dialog box. See Create and Schedule
Reports for more details.
Note: You can view your bookmarked items by going to the secondary menu and click-
ing the icon. This will display all of your bookmarked items and provide direct links to
each of them.
You can choose the number of items to display by selecting 20, 50, or 100 below the table.
You can classify some columns by clicking the icons to the right side of the heading. You can
sort the item information in ascending or descending order.
Configure Columns
Within the page, you can configure the columns and fields that display in the List view. You
can also save your columns configuration to return to it whenever you need it.
2. Search the columns you want to have in the list view. You can enter your search in the
search field.
3. Use the and icons to pass the items from one column to the other and select the
4. You can order the columns by clicking one of them and dragging the column to the
desired place.
5. Click Apply.
Note: If you generate a report when you have set custom columns, your report keeps
the columns you have configured.
Important: If you want to keep your configuration, you need to save it by selecting
Save View > Save as. Otherwise, your custom view is not kept when you move to
another feature. See Views for more information.
Views
USM Anywhere enables you to define and save a custom System Events view to have your
own selected filters.
You can configure the view you want for the list of items in the page.
1. From the List view, select the filters you want to apply.
2. If you want to delimit the search, select the filters you want to apply.
2. Click Saved Views and then select the view you want to see.
3. Click Apply.
1. From the System Events list view, click View above the filters.
2. Click Saved Views and then click the icon next to the saved view you want to delete.
3. Click Accept.
USM Anywhere includes the option of searching items of interest on the page. There are
several filters displayed by default. You can either filter your search or enter what you are
looking for in the search field.
You can configure more filters and change which filters to display by clicking the Configure
Filters link located in the upper-left side of the page. The management of filters is similar to
that for assets. See Managing Filters for more information.
The following table lists the filters you see on the page.
Last 24 Hours Filter system events triggered in the last hour, last 24 hours, last 7 days, last
30 days, or last 90 days. You can also configure your own period of time by
clicking the Custom Range option. This option enables you to customize a
range. When you click Custom Range, a calendar opens. You can choose
the first and last day to delimit your search by clicking the days on the
calendar or entering the days directly. Then select the hours, minutes, and
seconds by clicking the specific box. Finally, select AM or PM.
Not Suppressed Filter hiding suppressed system events. The suppressed system events are
hidden by default.
Event Name Filter system events by the short, user-readable description of the system
event.
Source User Email Filter system events by the email of the user that performed the action. For
example, when user [email protected] logs in, the source email is
[email protected].
Destination User Email Filter system events by the email of the user that the action is being
performed on. For example, if user [email protected] modifies or
creates user [email protected], then the destination email is
[email protected].
Event Change Filter system events by the description of what was changed in the system
event.
Source Asset Filter system events by the hostname or IP address of the host that
initiates the system event.
The number between brackets displayed by each filter indicates the number of items that
matches the filter. You can also use the filter controls to provide a method of organizing your
search and filtered results.
The following table shows the icons displayed with each filter box.
Icon Meaning
In the upper-left side of the page, you can see any filters you have applied. Remove filters by
clicking the icon next to the filter. Or clear all filters by clicking Reset.
Note: When applying filters, the search uses the logical AND operator if the used filters
are different. However, when the filter is of the same type, the search uses the logical
OR operator.
Those filters that have more than 10 options include a Filter Values search field for writing
text and making the search easier. If there are more than 50 search results, a icon appears
to the right of the Filter Values search field. Click this icon to download a CSV containing up
to 1024 results.
USM Anywhere enables you to toggle the mode of search. The available modes are Standard
and Advanced. You can change from one mode to the other by clicking the icon or
clicking the icon located in the upper left corner of the page.
Standard Mode
This mode enables you to select one value per filter at the same time, and then the search is
automatically performed. This mode is on by default.
Note: If you exit the advanced mode and the selected filters are not compatible with
the standard mode, a warning dialog box opens to inform you the current filters will
be removed.
Advanced Mode
Advanced mode enables you to select more than one value per filter at the same time. This
mode is off by default.
4. In the lower-left corner of the page, click Apply Filters. Or in the upper side of the page,
click Apply.
Note: The selected filter displays the icon and the filter chiclet is labeled in red.
Important: Some filters don't include the NOT operator (for example, Services or
Software).
5. Click Apply.
If you want to search for an exact phrase having two or more words, you need to put
quotation marks around the words in the phrase. This includes email addresses (for
example, "[email protected]").
The system event details page provides in-depth information on system events.
Note: You can view your bookmarked items by going to the secondary menu and
clicking the icon. This will display all of your bookmarked items and provide direct
3. In the upper right corner, click previous and next to navigate between items.
4. Click the icon to close the dialog box.
USM Anywhere provides a centralized view of regular events and system events.
From now on, and during a grace period, the following regular events are also generated as
system events:
l Sensor appears offline (see Sensor Disconnected from the USM Anywhere Service for
more information)
l Sensor reconnected (see Sensor Disconnected from the USM Anywhere Service for more
information)
l Event from asset not received (see Events Created When an Asset Stops Sending Data for
more information)
l Event from AlienApp not received (see Events Created When AlienApps Stop Receiving
Data for more information)
Warning: Soon the previously listed regular events will be generated only as system
events. AT&T Cybersecurity will announce this change in advance. Meanwhile, AT&T
Cybersecurity recommends that you disable all orchestration rules in your environment
regarding these kinds of regular events and create new orchestration rules based on
these system events. See Orchestration Rule for the "Sensor Appears Offline" System
Event, Orchestration Rule for the "Sensor Reconnected" System Event,Orchestration
Rule for the "Event from Asset Not Received" System Event, and Orchestration Rule for
the "Event from AlienApp Not Received" System Event for more information.
This turns the icon gray and disables the orchestration rule.
AT&T Cybersecurity recommends that you create new orchestration rules regarding the
Sensor appears offline system event.
The usual way is to create alarm rules or notification rules. See Alarm Rules from the
Orchestration Rules Page and Notification Rules from the Orchestration Rules Page for more
information.
To create a notification rule for the Sensor appears offline system event
4. Click Add Conditions and select the property values you want to include in the rule to
create a matching condition.
Note: You can check the fields from Settings > System Events. See Viewing
System Event Details for more information.
Note: The current rule box shows you the syntax of your rule, and the rule
verification box reviews that syntax before saving the rule.
6. Click Next.
Important: A dialog box opens if there are warning messages. Click Cancel to
review the warning messages, or click Accept to continue creating the rule.
Note: The rolling 24-hour, 200-email limit refers to all email accounts. For
example, you can have a rule with multiple emails, which counts as a single email
delivery. Alternately, if you have several rules with several emails, each of these
counts as an individual email account. Sensor-disconnect emails do not count
against this number because they are critical and are only sent to users whose
role is manager.
Select the Sanitize Email Content checkbox to replace detailed email contents with a
generic message and a link that requires user authentication to view further
information.
l PagerDuty: This method is performed using an integration in the product, and user
setup is required. See Sending USM Anywhere Notifications to PagerDuty in the USM
Anywhere Deployment Guide for more information.
l Slack: This method makes use of a user-created Slack Webhook integration. Slack
integration can also be performed using Amazon SNS. See Sending USM Anywhere
Notifications to Slack in the USM Anywhere Deployment Guide for more information.
l Occurrences: Specify the number of event occurrences that produce a match on the
conditional expression to trigger the rule. You can enter the number of occurrences or
use the arrow to scroll the value up or down. You need to enter a number between 1
and 100.
l Length: Specify the length of the timespan used to identify a match for multiple
occurrences. Enter the number and choose a value of seconds, minutes, or hours.
This duration identifies the amount of time that transpires from the beginning to the
end of the occurrence. If the number of occurrences is not met within this period, the
rule is not a match.
In this example, the rule applies when the configured conditions happen five times
every three hours.
These two options function together to specify the number of occurrences within a time
period that will produce a match for the rule. For example, you can define a rule to trigger
an alarm for an unauthorized access attempt when a failed SSH login occurs three times
within a five-minute window.
The created rule displays in the list of rules. You can see it from Settings > Rules >
Orchestration Rules. See Orchestration Rules for more information.
AT&T Cybersecurity recommends that you create new orchestration rules regarding the
Sensor reconnected system event.
The usual way is to create alarm rules or notification rules. See Alarm Rules from the
Orchestration Rules Page and Notification Rules from the Orchestration Rules Page for more
information.
4. Click Add Conditions and select the property values you want to include in the rule to
create a matching condition.
Note: You can check the fields from Settings > System Events. See Viewing
System Event Details for more information.
5. Click Add Conditions and select the property values you want to include in the rule to
create a matching condition.
Note: You can check the fields from Settings > System Events. See Viewing
System Event Details for more information.
Note: The current rule box shows you the syntax of your rule, and the rule
verification box reviews that syntax before saving the rule.
7. Click Next.
Important: A dialog box opens if there are warning messages. Click Cancel to
review the warning messages, or click Accept to continue creating the rule.
Note: The rolling 24-hour, 200-email limit refers to all email accounts. For
example, you can have a rule with multiple emails, which counts as a single email
delivery. Alternately, if you have several rules with several emails, each of these
counts as an individual email account. Sensor-disconnect emails do not count
against this number because they are critical and are only sent to users whose
role is manager.
Select the Sanitize Email Content checkbox to replace detailed email contents with a
generic message and a link that requires user authentication to view further
information.
l PagerDuty: This method is performed using an integration in the product, and user
setup is required. See Sending USM Anywhere Notifications to PagerDuty in the USM
Anywhere Deployment Guide for more information.
l Slack: This method makes use of a user-created Slack Webhook integration. Slack
integration can also be performed using Amazon SNS. See Sending USM Anywhere
Notifications to Slack in the USM Anywhere Deployment Guide for more information.
l Occurrences: Specify the number of event occurrences that produce a match on the
conditional expression to trigger the rule. You can enter the number of occurrences or
use the arrow to scroll the value up or down. You need to enter a number between 1
and 100.
l Length: Specify the length of the timespan used to identify a match for multiple
occurrences. Enter the number and choose a value of seconds, minutes, or hours.
This duration identifies the amount of time that transpires from the beginning to the
end of the occurrence. If the number of occurrences is not met within this period, the
rule is not a match.
In this example, the rule applies when the configured conditions happen five times
every three hours.
These two options function together to specify the number of occurrences within a time
period that will produce a match for the rule. For example, you can define a rule to trigger
an alarm for an unauthorized access attempt when a failed SSH login occurs three times
within a five-minute window.
The created rule displays in the list of rules. You can see it from Settings > Rules >
Orchestration Rules. See Orchestration Rules for more information.
Orchestration Rule for the "Event from Asset Not Received" System
Event
AT&T Cybersecurity recommends that you create new orchestration rules regarding the
Event from asset not received system event.
The usual way is to create alarm rules or notification rules. See Alarm Rules from the
Orchestration Rules Page and Notification Rules from the Orchestration Rules Page for more
information.
To create a notification rule for the Event from asset not received system event
4. Click Add Conditions and select the property values you want to include in the rule to
create a matching condition.
Note: You can check the fields from Settings > System Events. See Viewing
System Event Details for more information.
Note: The current rule box shows you the syntax of your rule, and the rule
verification box reviews that syntax before saving the rule.
6. Click Next.
Important: A dialog box opens if there are warning messages. Click Cancel to
review the warning messages, or click Accept to continue creating the rule.
Note: The rolling 24-hour, 200-email limit refers to all email accounts. For
example, you can have a rule with multiple emails, which counts as a single email
delivery. Alternately, if you have several rules with several emails, each of these
counts as an individual email account. Sensor-disconnect emails do not count
against this number because they are critical and are only sent to users whose
role is manager.
Select the Sanitize Email Content checkbox to replace detailed email contents with a
generic message and a link that requires user authentication to view further
information.
l PagerDuty: This method is performed using an integration in the product, and user
setup is required. See Sending USM Anywhere Notifications to PagerDuty in the USM
Anywhere Deployment Guide for more information.
l Slack: This method makes use of a user-created Slack Webhook integration. Slack
integration can also be performed using Amazon SNS. See Sending USM Anywhere
Notifications to Slack in the USM Anywhere Deployment Guide for more information.
l Occurrences: Specify the number of event occurrences that produce a match on the
conditional expression to trigger the rule. You can enter the number of occurrences or
use the arrow to scroll the value up or down. You need to enter a number between 1
and 100.
l Length: Specify the length of the timespan used to identify a match for multiple
occurrences. Enter the number and choose a value of seconds, minutes, or hours.
This duration identifies the amount of time that transpires from the beginning to the
end of the occurrence. If the number of occurrences is not met within this period, the
rule is not a match.
In this example, the rule applies when the configured conditions happen five times
every three hours.
These two options function together to specify the number of occurrences within a time
period that will produce a match for the rule. For example, you can define a rule to trigger
an alarm for an unauthorized access attempt when a failed SSH login occurs three times
within a five-minute window.
The created rule displays in the list of rules. You can see it from Settings > Rules >
Orchestration Rules. See Orchestration Rules for more information.
Orchestration Rule for the "Event from AlienApp Not Received" System
Event
AT&T Cybersecurity recommends that you create new orchestration rules regarding the
Event from AlienApp not received system event.
The usual way is to create alarm rules or notification rules. See Alarm Rules from the
Orchestration Rules Page and Notification Rules from the Orchestration Rules Page for more
information.
To create a notification rule for the Event from AlienApp not received system event
4. Click Add Conditions and select the property values you want to include in the rule to
create a matching condition.
Note: You can check the fields from Settings > System Events. See Viewing
System Event Details for more information.
Note: The current rule box shows you the syntax of your rule, and the rule
verification box reviews that syntax before saving the rule.
6. Click Next.
Important: A dialog box opens if there are warning messages. Click Cancel to
review the warning messages, or click Accept to continue creating the rule.
Note: The rolling 24-hour, 200-email limit refers to all email accounts. For
example, you can have a rule with multiple emails, which counts as a single email
delivery. Alternately, if you have several rules with several emails, each of these
counts as an individual email account. Sensor-disconnect emails do not count
against this number because they are critical and are only sent to users whose
role is manager.
Select the Sanitize Email Content checkbox to replace detailed email contents with a
generic message and a link that requires user authentication to view further
information.
l PagerDuty: This method is performed using an integration in the product, and user
setup is required. See Sending USM Anywhere Notifications to PagerDuty in the USM
Anywhere Deployment Guide for more information.
l Slack: This method makes use of a user-created Slack Webhook integration. Slack
integration can also be performed using Amazon SNS. See Sending USM Anywhere
Notifications to Slack in the USM Anywhere Deployment Guide for more information.
l Occurrences: Specify the number of event occurrences that produce a match on the
conditional expression to trigger the rule. You can enter the number of occurrences or
use the arrow to scroll the value up or down. You need to enter a number between 1
and 100.
l Length: Specify the length of the timespan used to identify a match for multiple
occurrences. Enter the number and choose a value of seconds, minutes, or hours.
This duration identifies the amount of time that transpires from the beginning to the
end of the occurrence. If the number of occurrences is not met within this period, the
rule is not a match.
In this example, the rule applies when the configured conditions happen five times
every three hours.
These two options function together to specify the number of occurrences within a time
period that will produce a match for the rule. For example, you can define a rule to trigger
an alarm for an unauthorized access attempt when a failed SSH login occurs three times
within a five-minute window.
The created rule displays in the list of rules. You can see it from Settings > Rules >
Orchestration Rules. See Orchestration Rules for more information.
USM Anywhere enables you to view the activity of these console user events. All generated
events display in the page. Go to Settings > Console User Events to display the page.
USM Anywhere provides a centralized view of your console user events. Go to Settings >
Console User Events.
The console user events page displays information on any actions generated within your
environment by the user. On the left you can find the search and filters options. In the upper
side of the page, you can see any filters you have applied. The main part of the page is the
actual list of console user events. Each row describes an individual console user event.
If you want to analyze the data, you can maximize the screen and hide the filter pane. Click
the icon to hide the filter pane. Click the icon to expand the filter pane.
Note: By default, the list displays all console user events generated throughout the last
180 days.
This table includes the list of the default columns in the console user events page.
Time Created The date and time of the creation of the event. The displayed date
depends on your computer's time zone.
Username Email account associated with the person who triggered the event.
Note: You can view your bookmarked items by going to the secondary menu and click-
ing the icon. This will display all of your bookmarked items and provide direct links to
each of them.
You can choose the number of items to display by selecting 20, 50, or 100 below the table.
You can classify some columns by clicking the icons to the right side of the heading. You can
sort the item information in ascending or descending order.
Above the list, you also have a filter to sort the list by a specific column.
USM Anywhere includes several filters displayed by default. These filters enable you to search
for your items of interest. You can either filter your search, or enter what you are looking for
in the search field, which is in the upper-left corner of the page.
Note: The management of filters is similar to that for assets. See Managing Filters for
more information.
This table includes the filters displayed by default in the main page of the Console User
Events page.
Last 24 Hours Filter system events triggered in the last hour, last 24 hours, last 7 days, last
30 days, or last 90 days. You can also configure your own period of time by
clicking the Custom Range option. This option enables you to customize a
range. When you click Custom Range, a calendar opens. You can choose
the first and last day to delimit your search by clicking the days on the
calendar or entering the days directly. Then select the hours, minutes, and
seconds by clicking the specific box. Finally, select AM or PM.
Event Name Filter system events by the short, user-readable description of the system
event.
The number between brackets displayed by each filter indicates the number of items that
matches the filter. You can also use the filter controls to provide a method of organizing your
search and filtered results.
The following table shows the icons displayed with each filter box.
Icon Meaning
In the upper-left side of the page, you can see any filters you have applied. Remove filters by
clicking the icon next to the filter. Or clear all filters by clicking Reset.
Note: When applying filters, the search uses the logical AND operator if the used filters
are different. However, when the filter is of the same type, the search uses the logical
OR operator.
Those filters that have more than 10 options include a Filter Values search field for writing
text and making the search easier. If there are more than 50 search results, a icon appears
to the right of the Filter Values search field. Click this icon to download a CSV containing up
to 1024 results.
USM Anywhere enables you to toggle the mode of search. The available modes are Standard
and Advanced. You can change from one mode to the other by clicking the icon or
clicking the icon located in the upper left corner of the page.
Standard Mode
This mode enables you to select one value per filter at the same time, and then the search is
automatically performed. This mode is on by default.
Note: If you exit the advanced mode and the selected filters are not compatible with
the standard mode, a warning dialog box opens to inform you the current filters will
be removed.
Advanced Mode
Advanced mode enables you to select more than one value per filter at the same time. This
mode is off by default.
4. In the lower-left corner of the page, click Apply Filters. Or in the upper side of the page,
click Apply.
Note: The selected filter displays the icon and the filter chiclet is labeled in red.
Important: Some filters don't include the NOT operator (for example, Services or
Software).
5. Click Apply.
If you want to search for an exact phrase having two or more words, you need to put
quotation marks around the words in the phrase. This includes email addresses (for
example, "[email protected]").
l From the Console User Events page by using the username filter
l From the Users List page
To filter console user events by the username from the users list page
The console user events page opens displaying the events related to that username.
The Console User Events details page provides in-depth information on Console User Events.
Note: You can view your bookmarked items by going to the secondary menu and
clicking the icon. This will display all of your bookmarked items and provide direct
You can create a PDF or CSV report of the console user events directly from the console user
events page.
2. You can use filters to define the console user events content you want to display in your
report.
The filters selected and displayed for the page view are the ones that are populated in the
report.
4. Click Edit Filters if you want to modify the selected filters, and then click Continue to Fil-
ters. Do the modifications you need, and then click Edit Report.
5. Click the Date field if you want to choose a different date range.
Choose Last Hour, Last 24 Hours, Last 7 Days, Last 30 Days, Last 90 Days, or Custom
to set a particular date range.
Note: This option is not available when generating reports for assets or asset
groups.
6. Under the Format section, select either CSV or PDF for the format of the report.
7. Select if you want to generate the report again, and then choose Never, Daily, Weekly,
Bi-weekly, or Monthly.
8. Enter an email address to send the report.
Select the Send to my Email Address option to add your email automatically.
9. Select the Enable Link Expiration option. This link is delivered by email and expires in 14
days.
15. Select Save & Run if you wish to keep the report in your Saved Reports on USM Any-
where page and receive the report in the indicated email.
16. Click Run to run the report.
The configuration issues page displays information on configuration issues. On the left you
can find the search and filters options. In the upper side of the page, you can see any filters
you have applied, and you have the option to create and select different views of the
configuration issues. The main part of the page is the actual list of configuration issues. Each
row describes an individual configuration issue and includes a check box on the left side of
each one for selecting it. You can select all the configuration issues on the same page by
clicking the check box in the first column of the header row.
If you want to analyze the data, you can maximize the screen and hide the filter pane. Click
the icon to hide the filter pane. Click the icon to expand the filter pane.
The following table displays the list of the default columns found on the page.
Last Seen Last date on which the configuration issue was seen in the asset. The
displayed date depends on your computer's time zone
Category Category of the configuration issue. Issues with similar impacts have the
same category
First Seen Date of detection of the configuration issue in the asset (the displayed
date depends on your computer's time zone)
l Add to Current Filter: Use this option to add the asset name as a search filter. See
Searching Events for more information.
l Find in Events: Use this option to execute a search of the asset name in the Events page.
See Searching Events for more information.
l Look up in OTX: This option searches the IP address of the asset in the OTX page. See
Using OTX in USM Anywhere for more information.
l Full Details: See Viewing Assets Details for more information.
l Configure Asset: See Editing Assets for more information.
l Delete Asset: See Deleting the Assets for more information.
l Assign Credentials: See Managing Credentials in USM Anywhere for more information.
l Authenticated Scan: This option displays depending on the USM Anywhere Sensor
associated with the asset. See Running Authenticated Asset Scans for more information.
l Scan with AlienApp: This option enables you to run an asset scan through an AlienApp.
See Running Asset Scans Using an AlienApp for more information.
l Run Scan: This option displays depending on the USM Anywhere Sensor associated with
the asset. See Running Asset Scans for more information.
l Configuration Issues: This option opens the Assets Details page. The Configuration Issues
tab is selected in the page. See Viewing Assets Details for more information.
l Vulnerabilities: This option opens the Assets Details page. The Vulnerabilities tab is
selected in the page. See Viewing Assets Details for more information.
l Alarms: This option opens the Assets Details page. The Alarms tab is selected in the page.
See Viewing Assets Details for more information.
l Events: This option opens the Assets Details page. The Events tab is selected in the page.
See Viewing Assets Details for more information.
You can configure the view you want for the list of configuration issues. See Views for more
information.
Click Generate Report to open the Configure Report dialog box. See Create a Configuration
Issues Report for more details.
Note: You can view your bookmarked items by going to the secondary menu and
clicking the icon. This will display all of your bookmarked items and provide direct
You can choose the number of items to display by selecting 20, 50, or 100 below the table.
You can classify some columns by clicking the icons to the right side of the heading. You can
sort the item information in ascending or descending order.
Views
USM Anywhere enables you to define and save a custom Configuration Issues view to have
your own selected filters.
You can configure the view you want for the list of items in the page.
1. From the List view, select the filters you want to apply.
2. Click Saved Views and then select the view you want to see.
3. Click Apply.
1. From the Configuration Issues list view, click View above the filters.
2. Click Saved Views and then click the icon next to the saved view you want to delete.
3. Click Accept.
USM Anywhere includes the option of searching items of interest on the page. There are
several filters displayed by default. You can either filter your search or enter what you are
looking for in the search field.
You can configure more filters and change which filters to display by clicking the Configure
Filters link located in the upper-left side of the page. The management of filters is similar to
that for assets. See Managing Filters for more information.
This table shows the filters displayed by default in the main Configuration Issues page.
Last 24 Hours Filter configuration issues triggered in the last hour, the last 24 hours, last 7
days, or last 30 days. You can also configure your own period of time by
clicking the Custom Range option. This option enables you to customize a
range. When you click Custom Range, a calendar opens. You can choose
the first and last day to delimit your search by clicking the days on the
calendar or entering the days directly. Then select the hours, minutes, and
seconds by clicking the specific box. Finally, select AM or PM.
Severity Filter configuration issues by severity of the issue. Values are Low, Medium,
or High.
Asset Filter configuration issues by asset associated with the configuration issue.
The number between brackets displayed by each filter indicates the number of items that
matches the filter. You can also use the filter controls to provide a method of organizing your
search and filtered results.
The following table shows the icons displayed with each filter box.
Icon Meaning
In the upper-left side of the page, you can see any filters you have applied. Remove filters by
clicking the icon next to the filter. Or clear all filters by clicking Reset.
Note: When applying filters, the search uses the logical AND operator if the used filters
are different. However, when the filter is of the same type, the search uses the logical
OR operator.
Those filters that have more than 10 options include a Filter Values search field for writing
text and making the search easier. If there are more than 50 search results, a icon appears
to the right of the Filter Values search field. Click this icon to download a CSV containing up
to 1024 results.
USM Anywhere enables you to toggle the mode of search. The available modes are Standard
and Advanced. You can change from one mode to the other by clicking the icon or
clicking the icon located in the upper left corner of the page.
Standard Mode
This mode enables you to select one value per filter at the same time, and then the search is
automatically performed. This mode is on by default.
Note: If you exit the advanced mode and the selected filters are not compatible with
the standard mode, a warning dialog box opens to inform you the current filters will
be removed.
Advanced Mode
Advanced mode enables you to select more than one value per filter at the same time. This
mode is off by default.
4. In the lower-left corner of the page, click Apply Filters. Or in the upper side of the page,
click Apply.
Note: The selected filter displays the icon and the filter chiclet is labeled in red.
Important: Some filters don't include the NOT operator (for example, Services or
Software).
5. Click Apply.
If you want to search for an exact phrase having two or more words, you need to put
quotation marks around the words in the phrase. This includes email addresses (for
example, "[email protected]").
The configuration issues details page provides in-depth information on configuration issues.
Note: You can view your bookmarked items by going to the secondary menu and
clicking the icon. This will display all of your bookmarked items and provide direct
You can see the configuration issues details, then a description, and the associated asset.
Click the icon if you want more information. See Viewing Assets Details for more
information.
3. In the upper right corner, click previous and next to navigate between items.
4. Click the icon to close the dialog box.
You can create a PDF or CSV report of the configuration issues directly from the
configuration issues page.
2. You can use filters to define the configuration issues content you want to display in your
report.
The filters selected and displayed for the page view are the ones that are populated in the
report.
4. Click Edit Filters if you want to modify the selected filters, and then click Continue to Fil-
ters. Do the modifications you need, and then click Edit Report.
5. Click the Date field if you want to choose a different date range.
Choose Last Hour, Last 24 Hours, Last 7 Days, Last 30 Days, Last 90 Days, or Custom
to set a particular date range.
Note: This option is not available when generating reports for assets or asset
groups.
6. Under the Format section, select either CSV or PDF for the format of the report.
7. Select if you want to generate the report again, and then choose Never, Daily, Weekly,
Bi-weekly, or Monthly.
8. Enter an email address to send the report.
Select the Send to my Email Address option to add your email automatically.
9. Select the Enable Link Expiration option. This link is delivered by email and expires in 14
days.
15. Select Save & Run if you wish to keep the report in your Saved Reports on USM Any-
where page and receive the report in the indicated email.
16. Click Run to run the report.
This table includes all configuration issues you can find in USM Anywhere:
Protocol
Category Subcategory Description
(Port)
Global access to SSH TCP (22) Global access to the SSH port has
administration port been defined within this security
group. This should be restricted to
the IP Range of the company.
Global access to DNS (UDP) UDP (53) Global access to the DNS port has
internal port been defined within this security
group.
Global access to DNS (TCP) TCP (53) Global access to the DNS port has
internal port been defined within this security
group.
Protocol
Category Subcategory Description
(Port)
Global access to Mini SQL TCP (4333) Global access to the MSQL port has
internal port been defined within this security
group. This should be an internally
facing port only.
Global access to SQL Server (UDP UDP (1434) Global access to the SQL Server port
internal port Port) has been defined within this security
group. This should be an internally
facing port only.
Global access to SQL Server (TCP TCP (1433) Global access to the SQL Server port
internal port Port) has been defined within this security
group. This should be an internally
facing port only.
Global access to PostgreSQL Server TCP (5432) Global access to the PostgreSQL port
internal port has been defined within this security
group. This should be an internally
facing port only.
Global access to MySQL Server TCP (3306) Global access to the MySQL port has
internal port been defined within this security
group. This should be an internally
facing port only.
Global access to Syslog UDP (514) Global access to the Syslog port has
internal port been defined within this security
group. This should be an internally
facing port only.
Global access to rsync TCP (873) Global access to the rsync port has
internal port been defined within this security
group. This should be an internally
facing port only.
Global access to MongoDB (UDP) UDP (27017) Global access to the MongoDB port
internal port has been defined within this security
group. This should be an internally
facing port only.
Protocol
Category Subcategory Description
(Port)
Global access to MongoDB (TCP) TCP (27017) Global access to the MongoDB port
internal port has been defined within this security
group. This should be an internally
facing port only.
Global access to CouchDB (UDP) UDP (5984) Global access to the CouchDB port
internal port has been defined within this security
group. This should be an internally
facing port only.
Global access to CouchDB (TCP) TCP (5984) Global access to the CouchDB port
internal port has been defined within this security
group. This should be an internally
facing port only.
Global access to VNC Server TCP (5900) Global access to the VNC Server port
administration port has been defined within this security
group. This should be restricted to a
company owned CIDR.
Global access to VNC Listener TCP (5500) Global access to the VNC Listener
administration port port has been defined within this
security group. This should be
restricted to a company owned CIDR.
Global access to Windows RPC TCP (135) Global access to the Windows RPC
administration port port has been defined within this
security group. This should be
restricted to a company owned CIDR.
Global access to Windows Remote TCP (3389) Global access to the Windows
administration port Desktop Remote Desktop port has been
defined within this security group.
This should be restricted to a
company owned CIDR.
Global access to Telnet TCP (23) Global access to the Telnet port has
administration port been defined within this security
group. This should be restricted to a
company owned CIDR.
Protocol
Category Subcategory Description
(Port)
Global access to X11 (TCP) TCP (6000) Global access to the X11 port has
administration port been defined within this security
group. This should be restricted to a
company owned CIDR.
Global access to X11 (UDP) UDP (6001) Global access to the X11 port has
administration port been defined within this security
group. This should be restricted to a
company owned CIDR.
Global access to SMTP TCP (25) Global access to the SMTP port has
service port been defined within this security
group. This should be restricted to a
company owned CIDR.
Global access to FTP TCP (21) Global access to the FTP port has
service port been defined within this security
group. This should be restricted to a
company owned CIDR.
Global access to FTP Data TCP (20) Global access to the FTP (data) port
service port has been defined within this security
group. This should be restricted to a
company owned CIDR.
Global access to CIFS UDP (445) Global access to the CIFS port has
service port been defined within this security
group. This should be restricted to a
company owned CIDR.
Global access to NetBios (Named UDP (137) Global access to the NetBios (Named
service port Services) Services) port has been defined
within this security group. This
should be restricted to a company
owned CIDR.
Global access to NetBios (Datagram UDP (138) Global access to the NetBios
service port Services) (Datagram Services) port has been
defined within this security group.
This should be restricted to a
company owned CIDR.
Protocol
Category Subcategory Description
(Port)
Global access to All TCP Ports Open TCP (1) All TCP ports have been explicitly
service port permitted by this security group.
Access to your system should be
restricted to the minimal set of TCP
ports you require to access for
operation. In addition, ensure ports
that are for administrative access or
do not require global access should
be restricted to a company owned
CIDR.
Global access to All UDP Ports Open UDP (1) All UDP ports have been explicitly
service port permitted by this security group.
Access to your system should be
restricted to the minimal set of UDP
ports you require to access for
operation. In addition, ensure ports
that are for administrative access or
do not require global access should
be restricted to a company owned
CIDR.
l Log Collection: Select this display option to review the list of scheduled log collection jobs.
See Log Collection from Your Data Sources for more information.
l Asset Scans: Select this option to review the list of scheduled asset scan jobs. This option
displays both asset scan, authenticated asset scan, and asset discovery jobs. See Schedul-
ing Asset Scans from Assets, Scheduling Authenticated Asset Scans from Assets, and Run-
ning an Asset Discovery for more information.
l Asset Group Scans: Select this option to review the list of scheduled asset group scan
jobs. This option displays both asset group scan and authenticated asset group scan jobs.
See Running Asset Groups Scans, and Running Authenticated Asset Groups Scans for
more information.
l User Scans: Select this option to review the list of scheduled user scan jobs. These jobs
detect users in your environment for User Behavior Analytics.
USM Anywhere provides automatic repeatable actions that are collectively called jobs, which
you can run in your environment. The jobs are initiated on a schedule stored in your
provisioned USM Anywhere cloud instance. All jobs are directly assigned to a source, and
acted upon by the assigned sensor or cloud connector. The cloud instance doesn't perform
job activities; it only schedules them and collects the output of the job for processing.
Go to Settings > Scheduler to open the Scheduler page and display all jobs by default.
The scheduler specifies when a job is sent to the assigned sensor or cloud connector for
processing based on the job schedule. Preloaded log collection jobs can't be edited. These
jobs don't have the icon associated with it, but they can be enabled ( ) or disabled (
). These jobs have settings that are created and managed by USM Anywhere.
Log Collection jobs run endpoint-specific API calls against target systems. Some log collection
jobs are source-type specific because they query endpoints specific to the sensor or cloud
connector type in use. For example, the Scan Azure Audit Sharepoint Events job is only active
for Azure Sensors.
Many of these jobs are associated with an AlienApp selection. Go to Data Source >
AlienApps to view the available AlienApps. See The USM Anywhere AlienApps Guide for more
information. Assigning multiple sensors to perform API calls to the same endpoint can cause
unnecessary duplication of data and effort, therefore must be avoided.
Note: You can enable AlienApps on the AlienApp page, but it does not automatically
enable the job to run. See USM Anywhere Scheduler for more information.
Asset Scans are used for asset discovery. This app has multiple actions and scan profiles. See
Scheduling Asset Scans from Assets and Scheduling Asset Scans from the Job Scheduler
Page for more information. The Asset Scans section also include asset discoveries performed
through API calls. Some examples of this include the discover S3 buckets job for AWS Sensors,
the discover virtual machines job for VMware Sensors, and the scan Azure IIS log locations job
for Azure Sensors.
Asset Group Scans are performed for vulnerability scanning. This app also has multiple scan
profiles. See Scheduling Asset Group Scans from Asset Groups and Scheduling Asset Groups
Scans from the Job Scheduler Page for more information.
Asset Scans and Asset Group Scans are user-created jobs. No such jobs come pre-loaded into
a system image. All of these jobs can be edited, enabled and disabled.
Keep in mind the following points when scheduling your jobs because they have a direct
impact on the performance of a sensor and USM Anywhere cloud instance:
l When specifying a Classless Inter-Domain Routing (CIDR) block for jobs that require it, limit
it to a /24 or smaller network segment. Avoid using a /16 CIDR block size. The smaller the
CIDR block number used, the larger the network IP address range it will process. These are
some sample IP ranges:
l /16 notation will access 64,000 IP addresses
l /24 notation will access 256 IP addresses
l /28 notation will access 16 IP addresses
l If multiple user-defined scheduled jobs are required for the environment, spread them
over a 24-hour period, and avoid having more than one scan job type running at any given
time. This holds true for all jobs regardless of the sensor or sensors in use. Although the
scan jobs may be readily run on any given sensor, all sensor data is forwarded to the USM
Anywhere cloud instance and can, cumulatively, cause performance issues.
l Scheduling an Asset Scan or Asset Group Scan job to run more than once a day is coun-
terproductive and directly affects system performance. This is also true for AD Scanner
jobs. The best practice is to run them, at most, no more than once a day, or, every other
day, and overlap them on alternate days. Additionally, initiate the job at off-hours where
sensor and USM Anywhere cloud instance activity is lowest.
l Vulnerability scans should be run weekly or at even larger intervals. This job checks for soft-
ware vulnerabilities on installed servers. Unless continuous software updates are being per-
formed in the environment, scanning no more than once a week is sufficient. This job can
also be initiated manually if immediate results are required.
l Try to space jobs at least one hour apart on any given day. At least two hours is recom-
mended. Do not “stack” more than two to three jobs for any start time.
l Ensure job start time intervals are larger than the time it takes for the job to complete. If
not, this will cause the job to continuously run and put a constant load on the sensor.
l If multiple AWS Sensors are in the same account subscription, only one AWS log collection
job is required as any given AWS Sensor has visibility to all AWS regions associated with the
account. AWS log collection jobs that explicitly span all regions and streams are noted in
the description field of the job. Although not noted there, all AWS EC2 Scan jobs will tra-
verse all regions as well. The processing of multiple regions by such a job can't be limited in
the job settings.
The Job Scheduler enables you to configure specific jobs to run automatically in your
environment on a set schedule, keeping your USM Anywhere up to date on the latest changes
in your environment. Visit the Job Scheduler page at Settings > Scheduler to view a list of all
jobs that are defined in your USM Anywhere environment and to manage the jobs that are
scheduled to run in your environment.
To change the sort order of the displayed list, click the column label for the field that you
want to use to sort the list. Use the filters in the upper side of the list to change the displayed
list so that it includes only the jobs you want to see.
l Filter by: Enter a search string for the name of the app or the job name to display only
matching jobs.
l Source: If you have more than one deployed USM Anywhere Sensor or cloud connector,
select an option to display only the jobs that are configured for it. You also have the All
Sources option to display all of the sources you have in your environment.
l Job Type: Set this option to display only the jobs of the selected type. The available items
are based on the jobs currently displayed on the page:
l All Types
l Collection
l Scan
l Configuration
l Asset Discovery
l User Scan
l Task Status: Set this option to display only jobs for the selected status, Enabled or Dis-
abled. You also have the option All Tasks.
l Clear Filters: Click this button to remove filtering options and display all items for the cat-
egory selected in the left navigation.
When you locate a scheduled job in the list, you can select it to expand the details for the job
and review its history.
When most logs in your Amazon Web Services (AWS) or Microsoft Azure account are enabled,
USM Anywhere automatically discovers them and they can start generating events, based on
AWS CloudTrail, Amazon Simple Storage Service (S3), AWS Elastic Load Balancing (ELB) access
logs, Azure security event logs, and others. But, because these out-of-box log collection and
asset scan jobs deploy as disabled initially, you must decide which jobs you want to activate
and enable them.
You can disable or enable a predefined or custom job in the Job Scheduler page.
This turns the icon green. To disable an already-enabled job, toggle the icon to its
original status.
You can only change the parameters of out-of-the-box jobs related to USM Anywhere
AlienApps. Other USM Anywhere defined jobs cannot be modified.
3. In the Edit Job dialog box, change the parameters for the job as needed.
4. Click Save.
USM Anywhere includes defined jobs to perform many of the standard log collection and
scanning actions that you will need to monitor your networks. These jobs are predefined to
run using a recurrence according to industry best practices. However, if you need to define a
scheduled job to perform log collection, asset scans, or asset group scans, you can add a new
job directly on the Job Scheduler page.
The description is optional, but it is a best practice to provide this information so that
others can easily understand what it does.
You can choose between Sensor or Cloud Connector. Depending on the previously
selected source, there are different actions or parameters.
5. In the Schedule section, specify when USM Anywhere runs the job:
The selected increment determines the available options. For example, on a weekly
increment, you can select the days of the week to run the job.
Or on a monthly increment, you can specify a date or a day of the week that occurs
within the month.
Important: USM Anywhere restarts the schedule on the first day of the month if
the option "Every x days" is selected.
This is the time that the job starts at the specified interval. It uses the time zone
configured for your USM Anywhere instance (the default is Coordinated Universal
Time [UTC]).
6. Click Save.
You cannot change or delete the parameters of the out-of-the-box jobs in USM Anywhere.
You can only enable or disable the predefined jobs. However, you can make changes to the
scheduled jobs that you have defined, such as changing the schedule parameters to run the
job more or less frequently. If a custom job is no longer needed, you can delete it.
3. In the Edit Job dialog box, change the parameters for the job as needed.
See Add a New Custom Job for more information about these options.
4. Click Save.
To effectively manage your Microsoft Windows systems, USM Anywhere can perform scans
through an Active Directory (AD) server to collect inventory information. When you configure
your VMware Sensor, Microsoft Hyper-V Sensor, or Microsoft Azure Sensor, you can define
the credentials that USM Anywhere will use to perform AD scans through the sensor. When
you configure these credentials, USM Anywhere performs an initial AD asset scan. You can
also schedule a job to perform scans through the Active Directory Scanner and collect
updated information about the assets managed by your AD server. The scan returns
information for each computer in the AD domain in the following format:
Name : WIN2K12-DC
DistinguishedName : CN=WIN2K12-DC,OU=Domain
Controllers,DC=ECORP,DC=local
DNSHostName : WIN2K12-DC.ECORP.local
OperatingSystem : Windows Server 2012 R2 Standard
OperatingSystemServicePack :
OperatingSystemVersion : 6.3 (9600)
IPv4Address : 10.20.30.15
The Active Directory Scanner runs a PowerShell (version 5.1 or later) command through
Windows Remote Management (WinRM) (version 2.0 or later). See Granting Access to Active
Directory for USM Anywhere for information about configuring the AD server to allow access
for USM Anywhere,.
The description is optional, but it is a best practice to provide this information so that
others can easily understand what it does.
7. If you have more than one deployed USM Anywhere Sensor, select the sensor you want to
use to run the scan.
This should be the sensor that is associated with the asset that you want to specify as the
target.
8. In App Action, the Get Active Directory Asset Information option is already selected.
9. Specify the asset that you want to use as a target for the action.
You can enter the name or IP address of the asset in the field to display matching items
that you can select. Or you can click Browse Assets to open the Select Asset dialog box
and browse the asset list to make your selection.
10. In the Schedule section, specify when USM Anywhere runs the job:
The selected increment determines the available options. For example, on a weekly
increment, you can select the days of the week to run the job.
Or on a monthly increment, you can specify a date or a day of the week that occurs
within the month.
Important: USM Anywhere restarts the schedule on the first day of the month if
the option "Every x days" is selected.
This is the time that the job starts at the specified interval. It uses the time zone
configured for your USM Anywhere instance (the default is Coordinated Universal
Time [UTC]).
If you want to run Active Directory (AD) scans in USM Anywhere, you need to configure your
AD server assets to grant access to the USM Anywhere Sensor. You also need to configure
credentials in USM Anywhere to make an authenticated connection.
l Create a dedicated administrator account in AD on all the hosts you want to scan. This is
used by USM Anywhere to log into that host system to perform a scan.
l Activate Windows Remote Management (WinRM) in the domain controller and in all the
hosts you want to scan.
l Apply the AD account credentials for those assets in USM Anywhere.
Note: See Microsoft's guide on authentication for remote connections for more
information on Microsoft Windows authentication permissions.
To activate WinRM, you can use a group policy to combine the domain controller and all the
hosts in your AD. (For reference, see this How to enable PowerShell Remoting via Group
Policy article.)
Alternatively, if you prefer to activate WinRM manually in each system you want to scan, use
this procedure to activate a Windows RM listener on port 5985.
1. Open the Windows Command Prompt using administrator privledges and run the
command winrm qc.
The command starts the WinRM service and configures a listener for the port 5985.
For more information about WinRM, you can refer to these Microsoft articles:
Note: Credentials assigned directly to an asset have higher priority than those assigned
to an asset group.
When USM Anywhere runs a scan or executes a system-level action, it uses the
credential set assigned directly to the asset, if there is one. If those credentials don't
connect or the asset doesn't have an assigned credential set, it uses the credential set
assigned to the group where the asset is a member, if that asset is a member of an asset
group.
USM Anywhere provides a simple way to include scans for scheduling using its web user
interface (UI).
The description is optional, but it is a best practice to provide this information so that
others can easily understand what it does.
Depending on the USM Anywhere Sensor that you have installed, this field can include
different options.
5. In the App Action field, leave Scan, which is the default option.
This option discovers services, operating systems (OSes), hostnames, IP and media access
control (MAC) addresses, and vulnerabilities of known hosts.
6. The Asset field displays the name of the asset to scan. You can't modify this field.
l Discovery: This profile scans the known ports and services searching for the most-
used ports. (There are 4575 ports.)
l Complete: This profile scans all TCP and UDP ports to find the possible ports in a
deployment. (There are 65535 ports.)
l Vulnerability Discovery: Performs general network discovery and checks for specific
known vulnerabilities. It only reports results if they are found.
l Extended Vulnerability Discovery: Performs a Vulnerability Discovery scan, which act-
ively discovers more about the network.
l Intensive Vulnerability Discovery: Performs several tasks to discover vulnerabilities,
which uses a significant number of resources on the targeted machine. Because of
this, sensitive targets may perceive a brief disruption on their services.
8. Select Set Debug Mode if you want to log the results of the scan or if you have a problem
with a scan.
Note: The Set Debug Mode option must be used only for debugging purposes
because it needs a large amount of disk space for the file or files that it generates.
Only AT&T Cybersecurity Technical Support should review these files. You can
contact this department for more information.
9. In the Schedule section, specify when USM Anywhere runs the job:
The selected increment determines the available options. For example, on a weekly
increment, you can select the days of the week to run the job.
Or on a monthly increment, you can specify a date or a day of the week that occurs
within the month.
Important: USM Anywhere restarts the schedule on the first day of the month if
the option "Every x days" is selected.
This is the time that the job starts at the specified interval. It uses the time zone
configured for your USM Anywhere instance (the default is Coordinated Universal
Time [UTC]).
To schedule an authenticated asset scan job from the Job Scheduler page
The description is optional, but it is a best practice to provide this information so that
others can easily understand what it does.
Depending on the USM Anywhere Sensor that you have installed, this field can include
different options.
7. In the Schedule section, specify when USM Anywhere runs the job:
The selected increment determines the available options. For example, on a weekly
increment, you can select the days of the week to run the job.
Or on a monthly increment, you can specify a date or a day of the week that occurs
within the month.
Important: USM Anywhere restarts the schedule on the first day of the month if
the option "Every x days" is selected.
This is the time that the job starts at the specified interval. It uses the time zone
configured for your USM Anywhere instance (the default is Coordinated Universal
Time [UTC]).
8. Click Save.
USM Anywhere provides a simple way to include scans for scheduling using its web user
interface (UI).
To schedule an asset group scan job from the Job Scheduler page
The description is optional, but it is a best practice to provide this information so that
others can easily understand what it does.
Depending on the USM Anywhere Sensor that you have installed, this field can include
different options.
4. Select a USM Anywhere sensor in case you have more than one installed.
5. Select the App Action:
Asset Discovery
Discovers assets in your environment, detects changes in assets, and discovers malicious
assets in the network.
l Select Existing Asset Group: In the Enter asset group name field, search for the asset
groups to scan. These asset groups are already existing, and you can search for them
by entering the name of the asset group or by browsing for them.
l Create New Asset Group to Scan Using CIDR Block: You can create a new asset
group from a Classless Inter-Domain Routing (CIDR) block. You need to indicate the
CIDR block and the network name you want to scan. This option discovers new assets
and scans the discovered assets.
Important: Use the Create New Asset Group to Scan Using CIDR Block option for
creating new CIDR-based asset groups without leaving the scheduler form. After
clicking Save, a new asset group based on the selected CIDR is created.
Your scan job will have the Select Existing Asset Group option selected and the
CIDR-based asset group assigned automatically.
Important: Make sure when you use a virtual private network (VPN) using a Cisco
Firewall, that arp-proxy is enabled in the firewall. Otherwise, all the assets will be
reported using the same media access control (MAC) address, and USM
Anywhere will consider all of them to be different interfaces for the same asset.
The Asset Group field displays the name of the asset group to scan. You can't modify this
field.
6. In the App Action field, the Asset Group Scan is the default option.
l Discovery: This profile scans the known ports and services searching for the most-
used ports. (There are 4576 ports.)
l Complete: This profile scans all TCP and UDP ports to find the possible ports in a
deployment. (There are 65535 ports.)
l Vulnerability Discovery: Performs general network discovery and checks for specific
known vulnerabilities. It only reports results if they are found.
l Extended Vulnerability Discovery: Performs a Vulnerability Discovery scan, which act-
ively discovers more about the network.
l Intensive Vulnerability Discovery: Performs several tasks to discover vulnerabilities,
which uses a significant number of resources on the targeted machine. Because of
this, sensitive targets may perceive a brief disruption on their services.
8. (Optional.) Select the assets you want to exclude from the scan.
9. Select Set Debug Mode if you want to log the results of the scan or if you have a problem
with a scan.
Note: The Set Debug Mode option must be used only for debugging purposes
because it needs a large amount of disk space for the file or files that it generates.
Only AT&T Cybersecurity Technical Support should review these files. You can
contact this department for more information.
10. In the Schedule section, specify when USM Anywhere runs the job:
The selected increment determines the available options. For example, on a weekly
increment, you can select the days of the week to run the job.
Or on a monthly increment, you can specify a date or a day of the week that occurs
within the month.
Important: USM Anywhere restarts the schedule on the first day of the month if
the option "Every x days" is selected.
This is the time that the job starts at the specified interval. It uses the time zone
configured for your USM Anywhere instance (the default is Coordinated Universal
Time [UTC]).
To schedule an authenticated asset group scan job from the Job Scheduler page
The description is optional, but it is a best practice to provide this information so that
others can easily understand what it does.
7. In the Schedule section, specify when USM Anywhere runs the job:
The selected increment determines the available options. For example, on a weekly
increment, you can select the days of the week to run the job.
Or on a monthly increment, you can specify a date or a day of the week that occurs
within the month.
Important: USM Anywhere restarts the schedule on the first day of the month if
the option "Every x days" is selected.
This is the time that the job starts at the specified interval. It uses the time zone
configured for your USM Anywhere instance (the default is Coordinated Universal
Time [UTC]).
8. Click Save.
USM Anywhere provides a simple way to enable scheduled user scans for user behavior
analytics (UBA). Your USM Anywhere instance includes preconfigured scans for each of the
user sources UBA supports.
There are several apps in USM Anywhere that support the creation of scheduled jobs for user
behavior monitoring.
If you have a deployed Amazon Web Services (AWS) Sensor, the AWS Sensor app provides
support for the predefined user discovery jobs that USM Anywhere uses to monitor AWS
Identity and Access Management (IAM) activity. You can also use the app to define custom
jobs.
The AWS user discovery job is enabled by default and runs every 20 minutes to collect AWS
users.
Azure
If you have a deployed Microsoft Azure Sensor, the Azure Sensor app provides support for the
predefined Azure Active Directory (AD) user discovery jobs that USM Anywhere uses to
monitor your Azure AD users, either as an actor in the Azure cloud or as an identity provider.
You can also use the app to define custom jobs.
The Azure user discovery job is enabled by default and runs every 20 minutes to collect Azure
AD users. See Azure Log Discovery and Collection in USM Anywhere in the USM Anywhere
Deployment Guide for more information about jobs for the Azure Sensor app.
You can verify that your app is properly configured to collect user data by viewing the app
status. Go to Data Sources > Sensors to open the sensors main page, click a sensor to open
its detail, and click the App Status tab.
Active Directory
If you are using Microsoft Active Directory to authenticate users in your environment, the
Azure AD Sensor app provides support for the predefined user discovery job that scans for
both assets and users authenticated via Microsoft Active Directory. Go to Data Sources >
Sensors to open the sensors main page, click the sensor to open its details, and click the
Active Directory tab.
You can execute a new Microsoft Active Directory scan either from the Getting Started
Wizard during your sensor's deployment, or at any time from the sensor details page. In
addition, you can schedule a custom job to collect users regularly.
See Running Active Directory Scans in the USM Anywhere Deployment Guide for more
information about jobs for this app.
Okta
If you are using Okta in your environment to authenticate users, the Okta Sensor app
provides support for the predefined user discovery job that scans for users authenticated via
Okta.
You can confirm your Okta app is configured to collect user data by checking the app. Go to
Data Sources > AlienApps > Available Apps, search for Okta, and then click the tile. See
AlienApp for Okta for more information.
Office 365
If you are using Microsoft Office 365 in your environment to authenticate users, the Office 365
Sensor app provides support for the predefined user discovery job that scans for users
authenticated via Office 365.
You can confirm your Office 365 app is configured to collect user data by checking the app
status. Go to Data Sources > AlienApps > Available Apps, search for Office 365, and then
click the tile. See AlienApp for Office 365 for more information.
G Suite
If you are using Google G Suite in your environment to authenticate users and would like to
set up a scheduled job to discover them, you must create a new job for that purpose.
Note: Because of the nature of Google G Suite scans, no preconfigured scan is available
for G Suite users.
To configure a scheduled job to discover G Suite users, use the following values:
See USM Anywhere Scheduler for detailed instructions on how to create new scheduled jobs.
If you are using Google Cloud Platform (GCP) in your environment to authenticate users, the
GCP Sensor app provides support for the predefined user discovery job that scans for users
authenticated via GCP.
Important: You must have a privileged GCP user account for your user discovery jobs to
run successfully.
USM Anywhere provides a simple way to include scans for scheduling using its web user
interface (UI). Go to the Job Scheduler page at Settings > Scheduler and click Log Collection
to view a list of all jobs that are defined in your USM Anywhere environment and to manage
the jobs that are scheduled to run in your environment.
Depending on your deployed sensor, you can collect different kind of logs:
Amazon Web Services (AWS) customers have access to service-specific log files to gain
insight into how each AWS service is operating. In addition, applications running in AWS also
generate various log files in different formats. With a deployed AWS Sensor, USM Anywhere
can collect both logs from AWS, but the procedures are slightly different:
USM Anywhere automatically discovers the AWS CloudTrail logs, the Amazon Simple
Storage Service (S3) access logs, and some Amazon CloudWatch logs when they are
enabled within your AWS account. There are predefined scheduler jobs in USM Anywhere
to collect these logs but they are disabled by default. Go to Settings > Scheduler > Log
Collection for the full list. You need to enable each job based on which log you want to
collect. See Collect AWS CloudTrail Logs on an AWS Sensor, Collect Amazon S3 Access
Logs and Collect ELB Access Logs for more information.
If none of the predefined jobs collect from your log location, you can create a new job
under Settings > Scheduler > Log Collection. Depending on where your logs are stored,
USM Anywhere provides two ways to collect them:
o Amazon CloudWatch Logs: If you choose to use Amazon CloudWatch Logs in your
AWS environment, USM Anywhere can collect CloudWatch logs directly. See Collect
AWS CloudTrail Logs on an AWS Sensor for more information. For example, you can col-
lect the Amazon Virtual Private Cloud (VPC) flow logs using this method.
o Amazon S3 bucket: If you choose to store logs in an Amazon S3 bucket instead, USM
Anywhere can also collect logs directly from an Amazon S3 bucket. See Collect Other
Logs from an Amazon S3 Bucket for more information.
You can leverage your Amazon GuardDuty service within the AWS Sensor to translate the raw
log data into normalized events for analysis.
Amazon GuardDuty service is automatically detected when a new AWS Sensor is deployed.
However, it still needs to be enabled for USM Anywhere to receive information from it.
Amazon Web Services (AWS) CloudTrail provides a complete audit log for all actions taken
with the Amazon API, either through the web user interface (UI), the AWS Command Line
Interface (CLI), or an AWS software development kit (SDK). Ongoing monitoring of this log
gives you visibility of end user and automated actions in your environment. This helps you
quickly detect abuse cases and security incidents, such as a user trying to make changes to an
AWS account that are inconsistent with their privileges.
USM Anywhere automatically detects AWS CloudTrail and retrieves your AWS CloudTrail logs
across all regions within a single AWS account. USM Anywhere also provides you the
credentials to securely access your AWS CloudTrail logs. When a new trail is detected, a new
log collection job is automatically created and enabled to capture the logs in that trail.
Similarly, if a trail is deleted, the existing job that was created for it is automatically deleted.
As the AWS Sensor collects this raw log data, USM Anywhere uses its AWS CloudTrail data
source to normalize the data and generate meaningful events. Depending on the size and
activity in your AWS account, this log collection can produce an excessive number of events.
See Managing Collected CloudTrail Event Logs for a list of possible CloudTrail events.
Similarly, if your AWS instance includes organizations, you may create a trail that will log all
events for any AWS accounts assigned to an organization.
Note: If you choose not to enable AWS CloudTrail, USM Anywhere processes all stored
logs at initial startup. See the Amazon documentation for information about enabling
AWS CloudTrail. After that initial processing, log collection jobs run every five minutes to
ensure that logs are captured and can generate meaningful events in a timely manner.
Note: Sometimes you may see that the CloudTrail events in USM Anywhere display a
different username compared to the raw log. This is because CloudTrail provides
different types of user identities, one of which is AssumedRole. When the user identity
type is set to AssumedRole, it means that the user credential is temporary and the
username you see in the raw log is not the actual username. See Amazon
documentation for more information.
3. In the row for the CloudTrail job, click the icon to enable the AWS CloudTrail jobs.
Amazon CloudWatch Logs monitors applications and systems using log data, aggregating and
storing application logs. CloudWatch Logs is useful because you can easily configure it to
process additional metadata with the log files. Visit the AWS documentation to learn more
about VPC flow log collection.
Important: If you choose to enable CloudWatch Logs in your Amazon Web Services
(AWS) environment, you should make sure that you are not collecting more data than
you need because this service incurs AWS costs based upon usage. See the CloudWatch
pricing information to plan and configure your usage.
If not already done, install and configure the Amazon CloudWatch agent to collect logs from
Amazon Elastic Compute Cloud (EC2) instances. See Amazon documentation for instructions.
USM Anywhere provides some CloudWatch log collection jobs out of the box, but they are
disabled by default. You can enable them under Settings > Scheduler. When enabled, these
jobs monitor certain log groups and collect logs from CloudWatch every five minutes. You
must configure your CloudWatch agent to use these log group names and to keep the log
types the same within a given log group.
USM
Anywhere CloudWatch
Log Log Group Default File Path Date Format
Collection Name
Job Name
USM Anywhere Log Collection Jobs and CloudWatch Log Groups (Continued)
USM
Anywhere CloudWatch
Log Log Group Default File Path Date Format
Collection Name
Job Name
If you want to collect logs from other log groups, ensure that all streams in the same group
are of the same type so that USM Anywhere can use a designated data source to parse the
collected raw log data. You can then set up a CloudWatch log collection job for each log
group.
Note: You can use the Sensor filter at the top of the list to review the available log
collection jobs on your AWS Sensor.
Note: If you have recently deployed a new USM Anywhere Sensor, it can take up to
20 minutes for USM Anywhere to discover the various log sources. After it discovers
the logs, you must manually enable the AWS log collection jobs you want before the
system collects the log data.
The description is optional, but it is a best practice to provide this information so that
others can easily understand what it does.
5. Enter the Region Name, Group Name, and Stream Name information for your AWS
account. Region name can be an asterisk ( * ) to monitor all regions for a given group.
l Syslog: All messages transmitted to USM Anywhere are processed with the
assumption that they are syslog formatted.
When you choose syslog as the source format, the data source selection is bypassed
and USM Anywhere uses the auto-detect hints from the data sources to match the
incoming messages to the correct data source.
If you select this option, you must choose the data source that USM Anywhere will use
to parse all of the streams in the group. For example, to collect Amazon Virtual Private
Cloud (VPC) flow logs, select the VPC Flow Logs data source.
undesired results. In this case, you need to configure CloudWatch to separate the
streams into different groups so that each contains only a single log type that
can be mapped to the correct data source.
7. In the Schedule section, specify when USM Anywhere runs the job:
The selected increment determines the available options. For example, on a weekly
increment, you can select the days of the week to run the job.
Or on a monthly increment, you can specify a date or a day of the week that occurs
within the month.
Important: USM Anywhere restarts the schedule on the first day of the month if
the option "Every x days" is selected.
This is the time that the job starts at the specified interval. It uses the time zone
configured for your USM Anywhere instance (the default is Coordinated Universal
Time [UTC]).
8. Click Save.
USM Anywhere detects any enabled jobs with the same configuration and asks you to
confirm before continuing. This is because having two jobs with the same configuration
generates duplicate events and alarms.
Amazon Simple Storage Service (S3) is object storage with a simple web service interface
that you can use to store and retrieve any amount of data from anywhere on the web.
Organizations running an Amazon Web Services (AWS) environment typically use it as the
primary storage for their cloud-native applications, as a bulk repository, as a target for
backup and recovery, and as a long-term archive location.
When enabled, Amazon S3 can provide complete access logs for all actions taken in an
Amazon S3 bucket. This gives you insight into who is accessing the data, and what actions are
being taken. See Amazon's documentation to learn how to enable S3 access logging.
Note: In AWS, you must enable Amazon S3 access logging in every Amazon S3 bucket
that you want to monitor.
With a deployed AWS Sensor, USM Anywhere automatically discovers the Amazon S3 access
logs when you have enabled them within your AWS account. All you need to do is to enable
the log collection job in USM Anywhere.
This turns the icon green ( ). To disable an already-enabled job, toggle the icon to its
original status.
After you have enabled log collection, USM Anywhere automatically discovers your Amazon
S3 access logs every 20 minutes. They will now begin generating events and you can see them
in the Amazon S3 Dashboard.
Elastic Load Balancing (ELB) is an important feature in Amazon Web Services (AWS) because it
automatically distributes incoming application traffic across multiple targets. AWS ELB access
logs provide insight into who is accessing your web resources. They also help you identify
common abuse patterns and use of automated hacking tools such as web application
scanners.
l AWS Application Load Balancer: You must enable Application Load Balancer logs for
every AWS ELB that you want to monitor. See the Amazon documentation to learn how to
enable Application Load Balancer access logging in AWS.
l AWS Classic Load Balancer: You must enable Classic Load Balancer logs for every AWS
ELB that you want to monitor. See the Amazon documentation to learn how to enable
Classic Load Balancer access logging in AWS.
Once you have enabled Application Load Balancer access logging in AWS, you must also
configure a scheduled job to monitor the Amazon Simple Storage Service (S3) bucket for the
AWS Application Load Balancer. Only after this has been completed will USM Anywhere be
able to automatically discovery your ELB access logs.
To create an AWS Application Load Balancer access log collection in USM Anywhere
5. Click Save.
After you have enabled your new job, USM Anywhere will use this job to discover your AWS
Application Load Balancer access logs on the schedule you chose. These logs will now begin
generating events and you can see them in the AWS Load Balancer Dashboard.
The AWS Sensor automatically detects Classic Load Balancer access logs after you have
enabled them in AWS. After they're enabled in AWS, all you need to do is to enable the log
collection job in USM Anywhere.
To enable AWS Classic Load Balancer access log collection in USM Anywhere
3. Locate the Discover Elastic Load Balancer (ELB) job and click the icon.
This turns the icon green ( ). To disable an already-enabled job, toggle the icon to its
original status.
After you have enabled log collection, USM Anywhere automatically discovers your AWS
Classic Load Balancer access logs every 20 minutes. They will now begin generating events
and you can see them in the AWS Load Balancer dashboard.
In addition to the native service-specific logging that Amazon Web Services (AWS) provides,
individual applications you run in the AWS environment often generate their own log files. You
can forward these logs to an Amazon Simple Storage Service (S3) bucket and configure USM
Anywhere to collect logs from that Amazon S3 bucket. USM Anywhere does not restrict the
number of logs you can collect, but AWS does set limits on the number of logs it can return in
each operation.
For example, to collect logs from AWS Web Application Firewall (WAF), you first need to follow
AWS documentation to configure AWS WAF logging to store logs in an Amazon S3 bucket.
Then configure a scheduler job in USM Anywhere to collect logs from the bucket.
Note: USM Anywhere accepts any file type when collecting log files. For compressed
files, it looks for the file extension .gz, .zip, or .bz2 and uses the standard java.util or
Apache Commons library to read the files. All other files are read as plain text.
Note: You can use the Sensor filter at the top of the list to review the available log
collection jobs on your AWS Sensor.
Note: If you have recently deployed a new USM Anywhere Sensor, it can take up to
20 minutes for USM Anywhere to discover the various log sources. After it discovers
the logs, you must manually enable the AWS log collection jobs you want before the
system collects the log data.
The description is optional, but it is a best practice to provide this information so that
others can easily understand what it does.
The bucket name is the name of the Amazon S3 bucket as configured in your AWS
account, such as alienvault-test-0726 in the screenshot below.
The path is the path prefix within the Amazon S3 bucket, such as sub-folder1 in the
screenshot below. This does not include the bucket name.
Note: Logs from the directory and its subdirectories are collected.
Important: If you have selected Elastic Load Balancer (ELB), Application Load
Balancer (ALB), or Cloud Trail sources, then you need to use, inside the path field, the
same prefix you have introduced in your AWS configuration. If the prefix field is
empty in your AWS configuration, then you must leave the path field inside USM
Anywhere empty.
11. In the Schedule section, specify when USM Anywhere runs the job:
The selected increment determines the available options. For example, on a weekly
increment, you can select the days of the week to run the job.
Or on a monthly increment, you can specify a date or a day of the week that occurs
within the month.
Important: USM Anywhere restarts the schedule on the first day of the month if
the option "Every x days" is selected.
This is the time that the job starts at the specified interval. It uses the time zone
configured for your USM Anywhere instance (the default is Coordinated Universal
Time [UTC]).
USM Anywhere detects any enabled jobs with the same configuration and asks you to
confirm before continuing. This is because having two jobs with the same configuration
generates duplicate events and alarms.
13. In the AWS console, restart the AWS Sensor instance so that it detects the new con-
figuration.
You can confirm that the scheduled job is collecting logs by going back to Settings
> Scheduler > Log Collection and expanding the job you've created. Each log collection
event will be listed under Schedule History.
In Amazon Elastic Compute Cloud (EC2), it can be difficult to create direct network
connections between isolated parts of your environment. Amazon S3 provides a convenient
way to move application logs from an Amazon EC2 instance to an Amazon S3 bucket. Amazon
S3 buckets are used to store objects that consist of data and metadata that describes the
data. You then configure the AWS Sensor to retrieve and process the log files.
You'll want to synchronize logs from your instance with an Amazon S3 bucket. There are
multiple ways to do this. The easiest method is to use the AWS Command Line Interface (CLI)
as documented by Amazon. You then create a script similar to the following example and
configure it to run periodically as a cron job.
With a USM Anywhere Sensor deployed in your Microsoft Azure environment, referred to as
the Azure Sensor, USM Anywhere can discover and collect logs in two different ways.
An Azure Sensor is preconfigured to automatically discover and collect these types of Azure
resource logs (previously referred to as diagnostic logs):
Furthermore, if you stream data to Azure Event Hubs, you can connect an Azure Sensor to
your event hub and collect the following logs:
l Azure Active Directory (AD) logs, including audit logs and sign-in logs
l Azure Monitor logs
l Azure SQL Database logs
l Microsoft Defender Advanced Threat Protection (ATP) logs
See Collect Logs from Azure Event Hubs for more information.
Microsoft Azure resource logs (previously referred to as diagnostic logs) provide insight into
operations performed within an Azure resource, such as Microsoft Azure Internet Information
Services (IIS) or Microsoft Azure SQL Server. USM Anywhere discovers and collects these logs
through the Azure APIs. A USM Anywhere Sensor deployed in your Azure environment is
preconfigured to automatically discover logs from your Azure storage account. You can
enable or disable the predefined jobs from the Azure Sensor Setup Wizard (see Azure Log
Collection) or within the USM Anywhere scheduler (see USM Anywhere Scheduler).
To supplement the default log location or to add log collection for Microsoft Azure Web Apps,
you can create custom log collection jobs that operate through the Azure Sensor app.
Note: What an Azure log job collects depends on whether you granted contributor
permissions to one of your resources or to your entire Azure subscription for the USM
Anywhere application. Depending on the Azure credentials configured for the deployed
Azure Sensor, the sensor could have access to individual resource groups or the whole
subscription. See Creating an Application and Obtaining Azure Credentials for more
information.
Microsoft Azure Monitor (formerly Azure Insights) provides base-level infrastructure metrics
and logs for most services in Azure. It helps you to track user activities within an Azure
subscription, including when users log on, deploy or shut down virtual machines (VMs), and
more. Through the Microsoft Azure Monitor Representational State Transfer (REST) API, USM
Anywhere captures those logs and creates events.
You need to perform a specific configuration of Azure Monitor in the Azure console for USM
Anywhere to collect the Azure-related logs. You need to enable the archive to a storage
account option on the Azure subscription, which then enables USM Anywhere to
automatically detect and create a job for the Azure-related jobs. When you complete the Log
Collection step for your Azure Sensor setup, you can enable this default job, which runs every
20 minutes.
You can also enable or disable this default job in the USM Anywhere Scheduler page. When
you select the job in this page, you can review the history for the scheduled job.
Microsoft Azure Security Center is an Azure service that continuously monitors your Azure
environment and applies analytics to automatically detect a wide range of potentially
malicious activity. It surfaces these detections as security alerts. Security Center performs this
function by collecting data from your VMs, which is enabled for all VMs in your subscription by
default. You can also customize this data collection in the Security Center policy.
You do not need to perform a specific configuration of the Azure Security Center alerts in the
Azure console to be able to collect these logs. USM Anywhere automatically detects these
logs and creates a job for Azure Security Center alerts logs. When you complete the Log
Collection step for your Azure Sensor setup, you can enable this default job, which runs every
20 minutes.
You can also enable or disable this default job in in the USM Anywhere Scheduler page. When
you select the job in this page, you can review the history for the scheduled job.
For individual VMs running IIS with Azure diagnostics enabled, you can designate storage for
the IIS logs. USM Anywhere automatically detects these logs through the Azure APIs and
Azure software development kits (SDKs). For each Azure Storage container locations with
Azure IIS logs that it detects, USM Anywhere creates a default log collection job. When you
complete the Log Collection step for your Azure Sensor setup, you can enable these default
jobs, which run every five minutes.
Warning: If there are network restrictions in your environment restricting access to the
storage account, those restrictions must allow access to the sensor.
Note: This type of IIS implementation is different than Azure Web Apps, which is a
platform service and uses a different logging configuration. See Azure Web Apps Logs
for information about collecting logs for web apps.
You can also enable or disable this default job in the Job Scheduler. When you select the job in
this page, you can review the history for the scheduled job. You could choose to disable this
default job based on the IIS log locations that USM Anywhere discovers, and create a custom
Azure IIS log collection job for a location that you specify.
When you configure the new job, set the App Action option to Process Azure IIS Logs. You
must also specify the Resource Group, Storage Account, and Blob Container for the
custom log collection job. See Create a New Azure Log Collection Job for more information
about scheduling an Azure log collection job.
For individual VMs running an Azure SQL Server with Azure diagnostics enabled, you can
designate storage for the IIS logs. You must configure this to use Microsoft Azure Table
storage. To simplify the tracking of related security issues, USM Anywhere treats the SQL
service as an asset, and maps events and other security issues directly with the SQL service.
When it detects Azure Table storage locations with Azure SQL Server logs, USM Anywhere
creates a default log collection job for each. When you complete the Log Collection step for
your Azure Sensor setup, you can enable these default jobs, which run every five minutes.
Important: The Azure SQL Server job is deprecated. Use the Event Hub Integration to
collect Azure SQL Server logs. See Collect Logs from Azure Event Hubs for more
information.
If you want to supplement this automatic Azure log collection in USM Anywhere, you can
create an additional Azure SQL Server log collection job.
When you configure the new job, set the App Action option to Process Azure SQL Server
Logs. You must also specify the Resource Group, Storage Account, and Table Container for
the custom log collection job. See Create a New Azure Log Collection Job for more
information about creating a new Azure log collection job.
Warning: If there are network restrictions in your environment restricting access to the
storage account, those restrictions must allow access to the sensor.
Azure App Service Web Apps is a fully managed compute platform that is optimized for
hosting websites and web applications. A web app represents the compute resources that
Azure provides for hosting a website or web application. These compute resources may be on
shared or dedicated VMs. For each deployed web application in your Azure environment, you
can enable diagnostic logging to capture and store the web server and application
information.
Important: When configuring Azure Web Apps logs, you must use the World Wide Web
Consortium (W3C) format and select the following fields:
Unlike the other supported Azure logs, the USM Anywhere Sensor does not perform an
automatic discovery job for Web Apps to look for the storage location. If you want USM
Anywhere to collect the log data for your Web Apps, you must create a new log job and
specify the storage location parameters.
When you configure the new job, set the App Action option to Process Azure Web Apps
Logs. You must also specify the Resource Group, Storage Account, and Blob Container for
the custom log collection job. See Create a New Azure Log Collection Job for more
information about creating a new Azure log collection job.
Warning: If there are network restrictions in your environment restricting access to the
storage account, those restrictions must allow access to the sensor.
For individual VMs running Microsoft Windows with Azure diagnostics enabled, Azure stores
the Windows Events logs by default. USM Anywhere automatically detects these logs through
Azure APIs and Azure SDKs. When it detects Azure Storage container locations with Azure
Windows logs, USM Anywhere creates a default log collection job for each. When you
complete the Log Collection step for your Azure Sensor setup, you can enable these default
jobs, which run every five minutes.
If you want to supplement this automatic Azure log collection in USM Anywhere, you can
create an additional Azure Windows log collection job.
When you configure the new job, set the App Action option to Process Azure Windows Logs.
You must also specify the Resource Group, Storage Account, and Blob Container for the
custom log collection job. See Create a New Azure Log Collection Job for more information
about creating a new Azure log collection job.
If you have Azure Web Apps running in your Azure environment, you can enable diagnostics
logging for these web apps in the Azure console and then create log collection jobs in USM
Anywhere to retrieve and process the log data.
The Azure App Service web apps provide diagnostic functionality for logging information
from both the web server and the web application. It logically separates this into web server
diagnostics and application diagnostics. When you enable this feature in Azure, you specify a
log data storage account and container for each of these. See the Microsoft Azure
documentation at https://docs.microsoft.com/en-us/azure/app-service/web-sites-enable-
diagnostic-log for more information.
This is the storage account and container that Azure will use to store logs for the Web
App. Make note of this information because you will need it to set up a log collection
job in USM Anywhere. You can click + Storage Account to create a new storage
account or container, or select an existing one.
5. Click Storage Settings and select the same storage account and container that you set
for the application logging.
6. Click Save.
USM Anywhere automatically creates log collection jobs for Azure Monitor and security logs.
It also creates jobs for Internet Information Services (IIS), Microsoft Azure SQL Server, and
Microsoft Windows if it detects storage locations for these log types. When you complete the
Log Collection step for the Azure Sensor, you can enable these default jobs. You can review
these jobs and their history in the Scheduler, but you cannot modify the parameters of these
default jobs.
Note: What an Azure log job collects depends on whether you granted contributor
permissions to one of your resources or to your entire Azure subscription for the USM
Anywhere application. Depending on the Azure credentials configured for the deployed
Azure Sensor, the sensor could have access to individual resource groups or the whole
subscription. See Creating an Application and Obtaining Azure Credentials for more
information.
To supplement the automatic Azure log collection in USM Anywhere and to set up log
collection for Azure Web Apps, add new Azure log collection jobs.
Important: Before your scheduled jobs can collect logs, you may also have to perform
specific configuration steps outside of USM Anywhere in your environment. See Collect
Azure Resource Logs for detailed descriptions of the configuration steps your
environment might require.
Note: You can use the Sensor filter at the top of the list to review the available log
collection jobs on your Azure Sensor.
Note: If you have recently deployed a new USM Anywhere Sensor, it can take up to
20 minutes for USM Anywhere to discover the various log sources. After it discovers
the logs, you must manually enable the Azure log collection jobs you want before
the system collects the log data.
The description is optional, but it is a best practice to provide this information so that
others can easily understand what it does.
7. In the App Action option, select the action for Azure log type that you want to schedule
for collection.
See Collect Azure Resource Logs to review details about the Azure log types that USM
Anywhere can collect.
8. Depending on the selected app action (log type), specify the Resource Group, Storage
Account, and Container for the logs.
You can obtain this information by logging into the Azure console and reviewing the
configuration for your diagnostic and storage resources.
Note: For Azure IIS logs, Azure Web Apps logs, and Azure Windows logs, you must
specify a binary large object (BLOB) container used for the log storage. For the
Azure SQL Server log type, you must specify the table container used for the log
storage.
The Azure SQL Server job is deprecated. Use the Event Hub Integration to collect
Azure SQL Server logs. See Collect Logs from Azure Event Hubs for more
information.
9. In the Schedule section, specify when USM Anywhere runs the job:
The selected increment determines the available options. For example, on a weekly
increment, you can select the days of the week to run the job.
Or on a monthly increment, you can specify a date or a day of the week that occurs
within the month.
Important: USM Anywhere restarts the schedule on the first day of the month if
the option "Every x days" is selected.
This is the time that the job starts at the specified interval. It uses the time zone
configured for your USM Anywhere instance (the default is Coordinated Universal
Time [UTC]).
Microsoft Azure Event Hubs is a data and event processing service for Microsoft Azure. The
integration between USM Anywhere and Azure Event Hubs enables the Azure Sensor to
receive and process information from an event hub so that you can manage it in your USM
Anywhere environment.
Warning: To process and display the custom events received from the Azure Event
Hubs as generic events, USM Anywhere needs these custom events in a specific format.
The correct format is an array as a value of a "records" key in JSON format. For example
{ "records": [ {<event-content>} ] }.
Important: Be sure to review the Azure requirements page for any environmental
requirements specific to Azure Event Hubs before implementing the streaming of your
logs to Azure Event Hubs.
The Azure Sensor can process different types of logs sent through Azure Event Hubs,
including but not limited to the following:
l Azure Active Directory (AD) logs, including audit logs and sign-in logs
l Azure Application Gateway logs
l Azure Monitor logs
l Azure SQL Database logs
l Microsoft Defender Advanced Threat Protection (ATP) logs
l Microsoft Intune logs
Important: The Azure Sensor will need to be connected to ports 5671 and 5672 in order
to integrate with Azure Event Hubs.
Before configuring the Azure Event Hubs integration in USM Anywhere, you must stream the
logs you want to be analyzed to Azure Event Hubs. Make sure to stream your logs to the
same event hub, because each Azure Sensor can only collect from a single event hub.
5. Copy the connection string listed in the policy under Connection String–Primary Key.
Note: You will need to enter this string when configuring the Event Hubs connection
in USM Anywhere.
6. Configure streaming for the logs you want to collect. For example:
Note: Make sure to enable Stream to an event hub and select the Event Hub you just
created as the destination.
l Azure AD logs: See Stream Azure Active Directory Logs to an Azure Event Hub for
instructions from Microsoft.
l Azure Application Gateway logs: See Enable Logging for Application Gateway for
instructions from Microsoft.
l Azure Monitor logs: See Create Diagnostic Settings to Send Logs for instructions
from Microsoft.
l Azure SQL Database logs: See Set up auditing for your database for instructions
from Microsoft. Make sure to select Event Hub as the destination.
l Microsoft Defender ATP logs: See Configure Microsoft Defender ATP to stream
Advanced Hunting events to your Azure Event Hubs for instructions from Microsoft.
l Microsoft Intune logs: See Send log data to storage, event hubs, or log analytics in
Intune for instructions from Microsoft.
After completing the initial setup of your Azure Event Hubs, return to your USM Anywhere
Sensors page to enable the Azure Event Hubs connection in USM Anywhere.
1. Go to Data Sources > Sensors, and then open the Azure Sensor.
l Event Hub Name: The name of the event hub created during initial setup.
l Event Hub Connection String: A string containing unique configuration data about
your Azure Event Hubs implementation. This is the connection string that was copied
under Connection String–Primary Key in the Stream Logs to Azure Event Hubs pro-
cedure.
l Event Hub Consumer Group: The name of your Event Hubs consumer group. You can
locate this name by opening your Event Hubs overview in the Azure portal and
scrolling to the bottom of the page.
4. (Optional.) Select Process Generic Events to collect events for which USM Anywhere cur-
rently does not have a parser. These events will display as "GENERIC event" under Activity
> Events.
5. Click Save.
6. Click the Event Hub tab to check the connection status and the number of events pro-
cessed by each data source.
The Event Hub tab on the Azure Sensor page provides a glimpse into the health of your
sensor's connection to Azure Event Hubs. This page contains the name of your event hub, its
connectivity status, and the number of events being processed by USM Anywhere.
Keep in mind that setting up a rule base is an iterative process. That means it happens
relatively slowly and needs to be tuned over a period of time. There are always new attacks
and new indicators to monitor.
l Correlation rules: These are predefined rules, which are developed by AT&T Cybersecurity.
See Correlation Rules for more information.
l Orchestration rules: You can create and customize these rules to add specific policies for a
particular event or alarm. See Orchestration Rules for more information. These are the
orchestration rules:
l Suppression rules: Use these rules to suppress events or alarms that create noise in
your system. See Suppression Rules from the Orchestration Rules Page for more
information.
l Filtering rules: Use these rules to make the sensor drop future events that match the
rule. See Filtering Rules from the Orchestration Rules Page for more information.
l Alarm rules: Use these rules to identify existing and emerging threats. See Alarm Rules
from the Orchestration Rules Page for more information.
l Notification rules: Use these rules to create your own rules and receive notifications.
See Notification Rules from the Orchestration Rules Page for more information.
l Response action rules: Use these rules to respond to an event or an alarm running an Ali-
enApp. See Response Action Rules from the Orchestration Rules Page for more inform-
ation.
Orchestration Rules
USM Anywhere enables you to create and manage your own orchestration rules. Keep in mind
that these rules verify whether they match with every new event coming into the system.
Suppression rules using the Contains, Match and Match, case insensitive
operators apply to future events and alarms, not to events and alarms received in the
current day.
l Suppression rules: See Suppression Rules from the Orchestration Rules Page
l Filtering rules: See Filtering Rules from the Orchestration Rules Page
l Alarm rules: See Alarm Rules from the Orchestration Rules Page
l Notification rules: See Notification Rules from the Orchestration Rules Page
l Response action rules: See Response Action Rules from the Orchestration Rules Page
Note: USM Anywhere follows a specific order for applying orchestration rules. See
Orchestration Rules Workflow for more information.
The order of the conditions is significant because USM Anywhere follows a specific order
when it evaluates the rule conditions, reading them from left to right. If your rule
includes the packet_type and plugin_device fields, these should always occur first in the
order.
You can also create orchestration rules from the details of an event or alarm. The
functionality works the same way and the dialog box is similar when you are creating a rule
either from a detail page of an event or alarm or from the settings page.
Important: The easiest way to configure an orchestration rule is from the Alarm and the
Events details pages. See Creating Notification Rules from the Alarms Page, Creating
Alarm Rules from the Events Page, and Creating Notification Rules from the Events Page
for more information.
l The AlienApp for Carbon Black Endpoint Detection and Response (EDR)
l The AlienApp for Cisco Umbrella
l The AlienApp for Palo Alto Networks PAN-OS
The USM Anywhere™ AlienApps™ Guide provides detailed information about creating
orchestration rules for a configured AlienApp.
1. Filtering rules: These rules are essential to control the traffic of your events. USM Any-
where does not process nor save events that match a filtering rule.
2. Suppression rules: USM Anywhere saves the events that match a suppression rule, but
does not correlate these suppressed events. By default, USM Anywhere hides these sup-
pressed events. If you want to see these events, click Suppressed in the Search & Filters
area. The table displays suppressed events along with all events. See To only display the
suppressed events if you want to display just the suppressed events.
3. Notification, alarm, and response action rules: USM Anywhere processes and cor-
relates all events that match one of these rules.
All orchestration rules, including event filtering rules, are processed on the USM Anywhere
Service (control node). USM Anywhere Sensor only processes event filtering rules. Event
filtering rules are reapplied on the control node because event enrichment for the event on
the control node can modify or add to event details with items not found on the sensor
during normalization.
USM Anywhere enables you to create and customize your own orchestration rules to
conform with your company's cybersecurity practice, but a poorly-written rule can easily
overwhelm the sensor, fill up storage, or even crash the system. Therefore, AT&T
Cybersecurity recommends the following best practice guideline for creating orchestration
rules.
General Guideline
When creating an orchestration rule, you must specify an item you want to match and your
matching criteria. Depending on the type of rule, the matching item can be alarms, logs
(events), configuration issues, vulnerabilities, system events, or console user events. Your
matching criteria is called rule conditions in USM Anywhere. Each rule condition contains three
parts: a field, an operator, and a value.
Ensure that all fields referenced by your rule are present in the item you are matching against;
otherwise, your rule won't be evaluated and, therefore, won't be applied. See Orchestration
Rule Validation for more information.
Carefully decide whether to suppress alarms or events. Suppression rules are usefull for
suppressing false positives, but you must take care not to suppress true positives. Once an
alarm or event is suppressed, all subsequent correlation or orchestration rule activity is
terminated for that event or alarm and will not trigger any notifications.
Since alarms are raised from events, it's more efficient to suppress events when they are
deemed unimportant so that alarms won't be generated. If you want to keep the events but
don't need the alarms, you can filter the alarms to prevent them from being processed any
further.
When USM Anywhere evaluates these conditions, it processes them from left to right and
stops whenever a condition evaluates to true or false. At that point, any rules criteria
following this state are discarded, and the rule action is taken if true and dropped if false.
Consequently, AT&T Cybersecurity provides the following best practice guideline for rule
conditions:
l To ensure efficient processing, all rules should contain at least two conditions, one for
packet_type and the other for plugin.
packet_type is the internal field name for the item you are matching against, while plugin
is the internal field name for Data Source.
l Place the most restrictive condition immediately after Data Source to save time pro-
cessing the conditions.
l Use Equals for string comparison (case sensitive) as much as possible because it con-
sumes the least resources.
l Evaluate your conditions carefully (from left to right) to make sure that it isn't always true
or always false.
On the other hand, a rule with the following conditions is always true:
Important: While always-true conditions are ineffective for most rules, they can be
detrimental in Filtering Rules because the sensor will discard all the events when
applying such a rule. Discarded events cannot be recovered. See How can I Test an
Orchestration Filtering Rule? for more information on how to validate a Filter Rule
before it is enabled.
l Reduce the total number of rules. Avoid having multiple rules with the same conditions to
reduce resource consumption.
Rule 1:
Rule 2:
The last condition is unnecessary because all SSH attempts use pluggable authentication
modules (PAM) for authentication.
Equals, Not Equals, Contains, Assign or Equals, In, Match, In List, and Not In List offer both
case-sensitive and case-insensitive comparisons.
Use:
Use:
l If you want to match a field with no values, use the Is Empty operator.
This is how the AlienVault Generic Data Source events are identified. Search for events
where the Data Source field is empty. The AlienVault Generic Data Source is not a valid
data source name. Use it as plugin == “” for the Data Source Event field, which means
that the data source is empty. See USM Anywhere Rules - Use of “AlienVault Generic Data
Source” in Orchestration Rules for more information.
The Match operator requires a valid regular expression (regex) as the value.
Using a malformed regex to search a large raw log can cause performance
degradation. If you have to use Match, form a simple regex and place this
condition as the last one in your rule.
l Avoid using OR, OR NOT, and AND NOT operators unless absolutely necessary. It's very
easy to create always-true or always-false conditions when using these operators.
l Do not use packet_payload event detail for rule criteria because the rule will not validate
as true. Use raw log event details if you need them, which consist of the packet syslog
header followed by the packet payload data. The use of this event detail generates a
warning message in the rules user interface (UI) views. Specify packet type==log to have
a valid rule. Alarm rules do not have access to this data field and will never validate as true.
Important: Don't use packet type==alarm for a filter rule. Alarms can't be filtered
out. Use packet type==log.
USM Anywhere enables you to manage your own orchestration rules. To view orchestration
rules, go to Settings > Rules. The All Orchestration Rules page opens. The page displays the
list of rules and includes these parts:
l At the top of the page, you can see a banner if there is at least one rule that has errors.
This yellow banner is recommended for reviewing and fixing rules with any error. Errors
can impact system stability and must be reviewed immediately.
l Below the banner, you can see the filters that you can apply. You can filter by name, by rule
status, and by orchestration rule.
l The main part of the page is the list of rules, where each row describes an individual rule.
You can enable, disable, edit, and delete a rule. You can also choose a rule by selecting the
checkbox to the left of the rule. Select all rules at the same time by selecting the first
checkbox in the column. Enable ( ) and disable ( ) rules by using the buttons below
the enabled column. You can also see the details of a rule by clicking it. The icon is avail-
The following table lists the columns you see on the page.
Column Description
Rule Status Status notification of the rule. Each rule is classified by its
severity. Values are (in increasing severity): info, warning, and
error.
Last Modified Date and time on which that rule has been modified.
Note: The default time range for the trend chart is 24 hours. You can click Last Hour,
Last Day, or Last 7 Days to change the time range.
l Evaluations vs. Hits: This graph shows the progress of the rule triggers over the last 7
days, 24 hours, or 1 hour.
l All Systems: This combo box displays when you have expanded a filtering rule. Choose
between the control node or the sensor. Choose the All Systems option if you want to
display the data of both control node and sensor.
l Average Duration: Average time it takes (in milliseconds) to evaluate the rule.
l Evaluations: How many times a rule has been evaluated.
l Alarms Triggered: How many times the rule has executed the associated action. This num-
ber might be different than Hits if the rule has a mute period assigned.
Important: This field only displays when you have expanded an alarm rule.
l Total Evaluation Rate: How often the rule is evaluated against the total number of items.
The item can be alarms, events, configuration issues, vulnerabilities, system events, or con-
sole user events. Rules are only evaluated if the item contains all the fields specified in the
rule criteria, so providing detailed criteria might improve the performance.
l Hits: How many times a rule has matched its criteria against an event.
l Created: The date of creation and email of the user.
l Updated: The date of the update and email of the user.
l Rules Status: Status notification of the rule. Each rule is classified by its severity. Values
are (in increasing severity): info, warning, and error.
l Rules History: This table shows the user who has made an action related with an orches-
tration rule, the action, and the date of creation.
This icon is available for the Event Suppression and Create an Alarm rows.
Depending on the selected option, the Events List View page or the Alarms List View page
opens. The page includes Rules Name as a filter so that you can see how many alarms or
events match the selected rule.
l From the detail of an alarm or event, select the create rule option.
l From the orchestration rules page, select the rule you want to create.
When orchestration rules are active, USM Anywhere inspects and validates them to show you
how well the rule is working. Be sure to check your rule's validation, and make recommended
or necessary changes to optimize the rule based on the validation status. See Orchestration
Rule Validation for more information.
7. You have already suggested property values to create a matching condition, but you can
add new property values by clicking Add Condition.
Note: If the field is related to the name of a country, you should use the country
code defined by the ISO 3166.
Note: The Sources or Destinations field needs to match the universally unique
identifier (UUID) of the event or alarm. You can use the Source Name or Destination
Name field instead.
Important: Instead of using the equals and equals, case insensitive operators
for array fields, AT&T Cybersecurity recommends the use of the in or contains
operators.
Note: If you need to add a property value that maps with a property key, you need
to know the mapping of the field. See Determining the Mapping of a Field for more
information.
Note: The current rule box shows you the syntax of your rule, and the rule
verification box reviews that syntax before saving the rule.
9. Click Next.
Important: A dialog box opens if there are warning messages. Click Cancel to
review the warning messages, or click Accept to continue creating the rule.
l Occurrences: Specify the number of event occurrences that produce a match on the
conditional expression to trigger the rule. You can enter the number of occurrences or
use the arrow to scroll the value up or down. You need to enter a number between 1
and 100.
l Length: Specify the length of the timespan used to identify a match for multiple
occurrences. Enter the number and choose a value of seconds, minutes, or hours.
This duration identifies the amount of time that transpires from the beginning to the
end of the occurrence. If the number of occurrences is not met within this period, the
rule is not a match.
In this example, the rule applies when the configured conditions happen five times
every three hours.
These two options function together to specify the number of occurrences within a time
period that will produce a match for the rule. For example, you can define a rule to trigger
an alarm for an unauthorized access attempt when a failed SSH login occurs three times
within a five-minute window.
14. (Optional.) Click the box labeled Schedule Rule to configure a schedule within which this
rule will apply.
Modify these two options:
l Start Date and Time: Specify the date and time at which this rule will begin applying.
l End Date and Time: Specify the date and time at which this rule will stop applying.
If an otherwise matching event occurs outside of this set schedule, it will not be
considered a match and will not trigger an alarm.
15. (Optional.) If you choose to configure a schedule for this rule, you can also set it to recur
on a configured schedule.
Click the box labeled Set Recurrence Details to configure when and how frequently or on
which days this new rule will apply.
The created rule displays in the list of rules. You can see it from Settings > Rules. See
Orchestration Rules for more information.
1. Go to Settings > Rules and select the rule you want to create:
l Suppression Rule (see Suppression Rules from the Orchestration Rules Page for more
information)
l Filtering Rule (see Filtering Rules from the Orchestration Rules Page for more inform-
ation)
l Alarm Rule (see Alarm Rules from the Orchestration Rules Page for more information)
l Notification Rule (see Notification Rules from the Orchestration Rules Page for more
information)
l Response Action Rule (see Response Action Rules from the Orchestration Rules Page
for more information)
4. Click Add Conditions and select the property values you want to include in the rule to cre-
ate a matching condition.
Note: If the field is related to the name of a country, you should use the country
code defined by the ISO 3166.
Note: The Sources or Destinations field needs to match the universally unique
identifier (UUID) of the event or alarm. You can use the Source Name or Destination
Name field instead.
Important: Instead of using the equals and equals, case insensitive operators
for array fields, AT&T Cybersecurity recommends the use of the in or contains
operators.
Note: If you need to add a property value that maps with a property key, you need
to know the mapping of the field. See Determining the Mapping of a Field for more
information.
Note: The current rule box shows you the syntax of your rule, and the rule
verification box reviews that syntax before saving the rule.
6. Click Next.
Important: A dialog box opens if there are warning messages. Click Cancel to
review the warning messages, or click Accept to continue creating the rule.
l Occurrences: Specify the number of event occurrences that produce a match on the
conditional expression to trigger the rule. You can enter the number of occurrences or
use the arrow to scroll the value up or down. You need to enter a number between 1
and 100.
l Length: Specify the length of the timespan used to identify a match for multiple
occurrences. Enter the number and choose a value of seconds, minutes, or hours.
This duration identifies the amount of time that transpires from the beginning to the
end of the occurrence. If the number of occurrences is not met within this period, the
rule is not a match.
In this example, the rule applies when the configured conditions happen five times
every three hours.
These two options function together to specify the number of occurrences within a time
period that will produce a match for the rule. For example, you can define a rule to trigger
an alarm for an unauthorized access attempt when a failed SSH login occurs three times
within a five-minute window.
11. (Optional.) Click the box labeled Schedule Rule to configure a schedule within which this
rule will apply.
Modify these two options:
l Start Date and Time: Specify the date and time at which this rule will begin applying.
l End Date and Time: Specify the date and time at which this rule will stop applying.
If an otherwise matching event occurs outside of this set schedule, it will not be
considered a match and will not trigger an alarm.
12. (Optional.) If you choose to configure a schedule for this rule, you can also set it to recur
on a configured schedule.
Click the box labeled Set Recurrence Details to configure when and how frequently or on
which days this new rule will apply.
The created rule displays in the list of rules. You can see it from Settings > Rules. See
Orchestration Rules for more information.
USM Anywhere enables you to use operators in orchestration rules to match specific events
or alarms.
The following table lists the orchestration rule operators, their meanings, and an example for
each.
The Match and Match, case insensitive operators enable you to use regular
expressions (regex) to define a pattern to match the content of a field.
Important: USM Anywhere uses the Java Regular Expression Syntax, which is different
from JavaScript, Perl, Gnu, and other flavors of regex, so be sure to read their
documentation and familiarize yourself with the differences.
It is highly recommended that you find and use a tool to test your regular expressions
before saving them into rules. Some popular examples include Java Regular Expression
Tester or RegexPlanet.
When using regular expressions in USM Anywhere, keep the following in mind:
l The expression pattern must be delimited with the forward slash "/" character. For
example:
/Router -.*/
l Use a backslash ("\") to escape special characters that would otherwise be interpreted as
regex syntax, which includes the "\" character itself. For example:
/C:\\Windows\\System\\.*/
Note: Since the backslashes are not used as literals in Java code, but are carried as
data in strings in the system, you do not need to double-escape them like you would
if you were putting a regex pattern into a Java literal in coding.
l You can use capture and grouping syntax such as \1, $1, or (?:).
l Modifiers such as /i, /x, /m, and /s are not supported.
When you are creating a rule, you may receive one or more of these messages.
Rules Messages
At least one criterion is required besides Packet Type is the unique criterion in the rule condition.
packet type
All condition fields must have a value The condition value is missing.
Case insensitive operator does not apply You selected a case insensitive operator and the
to numbers condition value is a number.
A regular expression must be used with You selected the Match operator and the condition
"Match" operator (example: ~ /value/) value has to be a valid regexp.
Rules Messages(Continued)
A variable expression must be used with You selected the Assign or Equal operator and the
"Assign or Equal" operator (example: >> condition value must be a valid variable name between
varname) brackets.
Some characters used could be part of a Your condition value contains *, +, [, or ], but the Match
regular expression (use "Match" operator) operator is not selected.
You can determine the mapping of a field by adding the request in the condition of an
orchestration rule. From an asset that has an assigned integration or from AlienApps, you can
determine the mapping between the property value and its property key. Once you know the
property key, you can add the field as a condition in your rule.
4. Search the property key inside the text box and copy the property value that maps with
that property key.
Note: In this example the field is “customfield_11“. This is only for this integration;
the same field from another integration may be mapped to another field.
1This packet type refers to configuration issues that are used to identify incorrect uses of certain fea-
tures. For example, the app for AWS assesses your configuration of AWS to identify insecure use of the
AWS security features.
Note: The fields found in the integration code may be different from the fields used
in the rule conditions. In the example, "customfield_11" is actually the "Custom Field
11" in rule conditions.
Important: A dialog box opens if there are warning messages. Click Cancel to
review the warning messages, or click Accept to continue creating the rule.
l Amazon SNS: This method requires the setup of the Amazon Simple Notification Ser-
vice (SNS) API call from the USM Anywhere server. There is no limit to the number of
Amazon SNS endpoint notifications sent. However, this method requires having an
Amazon Web Services (AWS) account for setup and use. The Amazon SNS allows the
first 1000 email notifications per month to fall into the free messaging tier. See Send-
ing Notifications Through Amazon SNS in the USM Anywhere Deployment Guide for
more information.
l Datadog: This method requires the creation of a Datadog API key and additional steps.
See Sending USM Anywhere Notifications to Datadog in the USM Anywhere Deploy-
ment Guide for more information.
l Email: This method sends the notification by email. You need to enter information for
the email subject and enter a destination email address. Multiple comma-separated
email addresses are possible. This method uses a built-in integration with the Amazon
Simple Email Service (SES) function and is limited to a maximum of 200 emails per
rolling 24-hour period. The only user-customizable information available is the email
subject line.
Note: The rolling 24-hour, 200-email limit refers to all email accounts. For
example, you can have a rule with multiple emails, which counts as a single email
delivery. Alternately, if you have several rules with several emails, each of these
counts as an individual email account. Sensor-disconnect emails do not count
against this number because they are critical and are only sent to users whose
role is manager.
Select the Sanitize Email Content checkbox to replace detailed email contents with a
generic message and a link that requires user authentication to view further
information.
l PagerDuty: This method is performed using an integration in the product, and user
setup is required. See Sending USM Anywhere Notifications to PagerDuty in the USM
Anywhere Deployment Guide for more information.
l Slack: This method makes use of a user-created Slack Webhook integration. Slack
integration can also be performed using Amazon SNS. See Sending USM Anywhere
Notifications to Slack in the USM Anywhere Deployment Guide for more information.
l Occurrences: Specify the number of event occurrences that produce a match on the
conditional expression to trigger the rule. You can enter the number of occurrences or
use the arrow to scroll the value up or down. You need to enter a number between 1
and 100.
l Length: Specify the length of the timespan used to identify a match for multiple
occurrences. Enter the number and choose a value of seconds, minutes, or hours.
This duration identifies the amount of time that transpires from the beginning to the
end of the occurrence. If the number of occurrences is not met within this period, the
rule is not a match.
In this example, the rule applies when the configured conditions happen five times
every three hours.
These two options function together to specify the number of occurrences within a time
period that will produce a match for the rule. For example, you can define a rule to trigger
an alarm for an unauthorized access attempt when a failed SSH login occurs three times
within a five-minute window.
The created rule displays in the list of rules. You can see it from Settings > Rules. See
Orchestration Rules for more information.
7. Search the property key inside the copied text and copy the property value that maps
with that property key. For example, search the property key fromPort. This property key
maps with customfield_11.
Note: In this example the field is “customfield_11“. This is only for this integration;
the same field from another integration may be mapped to another field.
See Notification Rules from the Orchestration Rules Page for more information.
Note: The fields found in the integration code may be different from the used in the
rule conditions. In the example, “customfield_11“ is actually the “Custom Field 11“ in
rule conditions.
1This packet type refers to configuration issues that are used to identify incorrect uses of certain fea-
tures. For example, the app for AWS assesses your configuration of AWS to identify insecure use of the
AWS security features.
Important: A dialog box opens if there are warning messages. Click Cancel to
review the warning messages, or click Accept to continue creating the rule.
l Amazon SNS: This method requires the setup of the Amazon Simple Notification Ser-
vice (SNS) API call from the USM Anywhere server. There is no limit to the number of
Amazon SNS endpoint notifications sent. However, this method requires having an
Amazon Web Services (AWS) account for setup and use. The Amazon SNS allows the
first 1000 email notifications per month to fall into the free messaging tier. See Send-
ing Notifications Through Amazon SNS in the USM Anywhere Deployment Guide for
more information.
l Datadog: This method requires the creation of a Datadog API key and additional steps.
See Sending USM Anywhere Notifications to Datadog in the USM Anywhere Deploy-
ment Guide for more information.
l Email: This method sends the notification by email. You need to enter information for
the email subject and enter a destination email address. Multiple comma-separated
email addresses are possible. This method uses a built-in integration with the Amazon
Simple Email Service (SES) function and is limited to a maximum of 200 emails per
rolling 24-hour period. The only user-customizable information available is the email
subject line.
Note: The rolling 24-hour, 200-email limit refers to all email accounts. For
example, you can have a rule with multiple emails, which counts as a single email
delivery. Alternately, if you have several rules with several emails, each of these
counts as an individual email account. Sensor-disconnect emails do not count
against this number because they are critical and are only sent to users whose
role is manager.
Select the Sanitize Email Content checkbox to replace detailed email contents with a
generic message and a link that requires user authentication to view further
information.
l PagerDuty: This method is performed using an integration in the product, and user
setup is required. See Sending USM Anywhere Notifications to PagerDuty in the USM
Anywhere Deployment Guide for more information.
l Slack: This method makes use of a user-created Slack Webhook integration. Slack
integration can also be performed using Amazon SNS. See Sending USM Anywhere
Notifications to Slack in the USM Anywhere Deployment Guide for more information.
l Occurrences: Specify the number of event occurrences that produce a match on the
conditional expression to trigger the rule. You can enter the number of occurrences or
use the arrow to scroll the value up or down. You need to enter a number between 1
and 100.
l Length: Specify the length of the timespan used to identify a match for multiple
occurrences. Enter the number and choose a value of seconds, minutes, or hours.
This duration identifies the amount of time that transpires from the beginning to the
end of the occurrence. If the number of occurrences is not met within this period, the
rule is not a match.
In this example, the rule applies when the configured conditions happen five times
every three hours.
These two options function together to specify the number of occurrences within a time
period that will produce a match for the rule. For example, you can define a rule to trigger
an alarm for an unauthorized access attempt when a failed SSH login occurs three times
within a five-minute window.
The created rule displays in the list of rules. You can see it from Settings > Rules. See
Orchestration Rules for more information.
USM Anywhere includes suppression rules which enable you to manage false positive alarms
and events. After you have confirmed that these issues do not pose a security threat, create a
suppression rule to prevent them from displaying in the user interface (UI), and avoid noise in
your system.
Suppression rules using the Contains, Match and Match, case insensitive
operators apply to future events and alarms, not to events and alarms received in the
current day.
You can create a suppression rule from the details page of an event (Viewing Event Details) or
from the details page of an alarm (Viewing Alarm Details). This functionality works the same
way, and the Create Rule dialog box is similar when you are creating a rule either from a detail
page or from the system configuration window.
Important: The easiest way to configure a suppression rule is from the Events details
page (see Creating Suppression Rules from the Events Page) or from the Alarms details
page (see Creating Suppression Rules from the Alarms Page).
Note: USM Anywhere saves the events that match a suppression rule, but does not
correlate these suppressed events. By default, USM Anywhere hides these suppressed
events. If you want to see these events, click Suppressed in the Search & Filters area.
The table displays suppressed events along with all events. See To only display the
suppressed events if you want to display just the suppressed events.
Note: The suppression rule you create will apply to future items. It also will apply to
items of the current day, up to 10 K events/alarms.
See Example: Creating a Suppression Rule for Sudo Events and Example: Creating a
Suppression Rule for VPC Flow Logs if you want to see an example of a suppression rule.
USM Anywhere enables you to manage your own suppression rules from the All Orchestration
Rules page.
Note: If the field is related to the name of a country, you should use the country
code defined by the ISO 3166.
Note: The Sources or Destinations field needs to match the universally unique
identifier (UUID) of the event or alarm. You can use the Source Name or Destination
Name field instead.
Important: Instead of using the equals and equals, case insensitive operators
for array fields, AT&T Cybersecurity recommends the use of the in or contains
operators.
1This packet type refers to configuration issues that are used to identify incorrect uses of certain fea-
tures. For example, the app for AWS assesses your configuration of AWS to identify insecure use of the
AWS security features.
Note: If you need to add a property value that maps with a property key, you need
to know the mapping of the field. See Determining the Mapping of a Field for more
information.
Note: The current rule box shows you the syntax of your rule, and the rule
verification box reviews that syntax before saving the rule.
7. Click Next.
Important: A dialog box opens if there are warning messages. Click Cancel to
review the warning messages, or click Accept to continue creating the rule.
l Occurrences: Specify the number of event occurrences that produce a match on the
conditional expression to trigger the rule. You can enter the number of occurrences or
use the arrow to scroll the value up or down. You need to enter a number between 1
and 100.
l Length: Specify the length of the timespan used to identify a match for multiple
occurrences. Enter the number and choose a value of seconds, minutes, or hours.
This duration identifies the amount of time that transpires from the beginning to the
end of the occurrence. If the number of occurrences is not met within this period, the
rule is not a match.
In this example, the rule applies when the configured conditions happen five times
every three hours.
These two options function together to specify the number of occurrences within a time
period that will produce a match for the rule. For example, you can define a rule to trigger
an alarm for an unauthorized access attempt when a failed SSH login occurs three times
within a five-minute window.
The created rule displays in the list of rules. You can see it from Settings > Rules. See
Orchestration Rules for more information.
In this example, we are going to create a suppression rule to avoid having a lot of sudo events.
You can create this rule whenever you trust the origin host, or because you need to do
maintenance. This way you will avoid noise in your list of events.
Note: You can also create your own rules from the Events page, which is an easier way
to configure the matching conditions. See Creating Suppression Rules from the Events
Page for more information.
1This packet type refers to configuration issues that are used to identify incorrect uses of certain fea-
tures. For example, the app for AWS assesses your configuration of AWS to identify insecure use of the
AWS security features.
6. Click Next.
Important: A dialog box opens if there are warning messages. Click Cancel to
review the warning messages, or click Accept to continue creating the rule.
7. Enter a name for the rule, (for example, Suppress Sudo Events).
8. (Optional.) Enter a description for identifying this rule.
l Occurrences: Specify the number of event occurrences that produce a match on the
conditional expression to trigger the rule. You can enter the number of occurrences or
use the arrow to scroll the value up or down. You need to enter a number between 1
and 100.
l Length: Specify the length of the timespan used to identify a match for multiple
occurrences. Enter the number and choose a value of seconds, minutes, or hours.
This duration identifies the amount of time that transpires from the beginning to the
end of the occurrence. If the number of occurrences is not met within this period, the
rule is not a match.
In this example, the rule applies when the configured conditions happen five times
every three hours.
These two options function together to specify the number of occurrences within a time
period that will produce a match for the rule. For example, you can define a rule to trigger
an alarm for an unauthorized access attempt when a failed SSH login occurs three times
within a five-minute window.
The suppression rule has been created. You can see it from Settings > Rules. See
Suppression Rules from the Orchestration Rules Page for more information.
In this example, we are going to create a suppression rule to suppress VPC Flow Logs events.
This way you will avoid noise in your list of events.
7. Click Next.
Important: A dialog box opens if there are warning messages. Click Cancel to
review the warning messages, or click Accept to continue creating the rule.
8. Enter a name for the rule, for example Suppress VPC Flow Logs.
9. (Optional.) Enter a description for identifying this rule.
l Occurrences: Specify the number of event occurrences that produce a match on the
conditional expression to trigger the rule. You can enter the number of occurrences or
use the arrow to scroll the value up or down. You need to enter a number between 1
and 100.
l Length: Specify the length of the timespan used to identify a match for multiple
occurrences. Enter the number and choose a value of seconds, minutes, or hours.
This duration identifies the amount of time that transpires from the beginning to the
end of the occurrence. If the number of occurrences is not met within this period, the
rule is not a match.
In this example, the rule applies when the configured conditions happen five times
every three hours.
These two options function together to specify the number of occurrences within a time
period that will produce a match for the rule. For example, you can define a rule to trigger
an alarm for an unauthorized access attempt when a failed SSH login occurs three times
within a five-minute window.
The suppression rule has been created. You can see it from Settings > Rules. See
Suppression Rules from the Orchestration Rules Page for more information.
USM Anywhere enables you to make the sensor drop future events that match the rule.
These future events are neither correlated nor stored. Through these rules, you are able to
define which event data you are going to store in USM Anywhere. You pay for the data you
use, so discarded event information is not stored and does not count against the service-level
tier of an account. This rule runs on a sensor and control node. The action of this rule has no
recovery, so you must be careful when creating the rule. This action can cause a user-
generated data loss environment.
Note: Filtering rules are not retroactive. The rule applies to future items and it does not
apply to previous items, even if those items follow the rule.
Important: You can't use a correlation list when you create a filtering rule.
Note: If the field is related to the name of a country, you should use the country
code defined by the ISO 3166.
Note: The Sources or Destinations field needs to match the universally unique
identifier (UUID) of the event or alarm. You can use the Source Name or Destination
Name field instead.
Important: Instead of using the equals and equals, case insensitive operators
for array fields, AT&T Cybersecurity recommends the use of the in or contains
operators.
1This packet type refers to configuration issues that are used to identify incorrect uses of certain fea-
tures. For example, the app for AWS assesses your configuration of AWS to identify insecure use of the
AWS security features.
Note: If you need to add a property value that maps with a property key, you need
to know the mapping of the field. See Determining the Mapping of a Field for more
information.
Note: The current rule box shows you the syntax of your rule, and the rule
verification box reviews that syntax before saving the rule.
7. Click Next.
Important: A dialog box opens if there are warning messages. Click Cancel to
review the warning messages, or click Accept to continue creating the rule.
The created rule displays in the list of rules. You can see it from Settings > Rules. See
Orchestration Rules for more information.
The events, which triggered the rule and are suppressed, display.
6. Create a filtering rule with the exact same match criteria if the event information dis-
played is correct. If the event information displayed is not correct, modify the suppression
rule match criteria until the correct values are found that suppresses the correct event
data. Then generate the filter rule.
USM Anywhere enables you to easily identify existing and emerging threats that are of
interest. Through alarm rules, you can organize your threats and only see high-priority alarms,
which can be received via email and will help you to reduce noise and focus on important
things.
Note: You can also create alarm rules from the details of an event. See Creating Alarm
Rules from the Events Page for more information.
Note: If the field is related to the name of a country, you should use the country
code defined by the ISO 3166.
Note: The Sources or Destinations field needs to match the universally unique
identifier (UUID) of the event or alarm. You can use the Source Name or Destination
Name field instead.
Important: Instead of using the equals and equals, case insensitive operators
for array fields, AT&T Cybersecurity recommends the use of the in or contains
operators.
1This packet type refers to configuration issues that are used to identify incorrect uses of certain fea-
tures. For example, the app for AWS assesses your configuration of AWS to identify insecure use of the
AWS security features.
Note: If you need to add a property value that maps with a property key, you need
to know the mapping of the field. See Determining the Mapping of a Field for more
information.
Note: The current rule box shows you the syntax of your rule, and the rule
verification box reviews that syntax before saving the rule.
7. Click Next.
Important: A dialog box opens if there are warning messages. Click Cancel to
review the warning messages, or click Accept to continue creating the rule.
8. Enter a name for the rule and, if desired, a description to clarify its use in the Description
field.
9. Select an intent.
The intent describes the context of the behavior that is being observed. These intents
roughly map to the stages of the intrusion kill chains but are collapsed to ensure that
each is discrete. See Intent for more information about the available threat categories.
If known, it is the method of attack or infiltration associated with the indicator that
generated the alarm.
Note: This is a required field; if you do not complete this field, the Save button
remains inactive.
The strategy describes the broad-based strategy or behavior that is detected. The
intention is to describe the malicious user's strategy to achieve their goal.
You can use the mute value to set the period of time during which, once an alarm is
createdUSM Anywhere will not create a new alarm based on the same conditions.
Note: Take care to set a mute duration that is long enough to cover the span of
time in which matching events will occur to maximize the efficacy of your mute.
Important: If your USM Anywhere™ is restarted when one of your alarm mutes is
active, or if there is an update or hotfix, the alarm mute will be canceled.
l Occurrences: Specify the number of event occurrences that produce a match on the
conditional expression to trigger the rule. You can enter the number of occurrences or
use the arrow to scroll the value up or down. You need to enter a number between 1
and 100.
l Length: Specify the length of the timespan used to identify a match for multiple
occurrences. Enter the number and choose a value of seconds, minutes, or hours.
This duration identifies the amount of time that transpires from the beginning to the
end of the occurrence. If the number of occurrences is not met within this period, the
rule is not a match.
In this example, the rule applies when the configured conditions happen five times
every three hours.
These two options function together to specify the number of occurrences within a time
period that will produce a match for the rule. For example, you can define a rule to trigger
an alarm for an unauthorized access attempt when a failed SSH login occurs three times
within a five-minute window.
15. (Optional.) Select the fields that you want to display in the generated alarm.
You can select or remove the fields you want to include in the details of the alarm. A field
passes from one column to the other by clicking it.
The created rule displays in the list of rules. You can see it from Settings > Rules. See
Orchestration Rules for more information.
4. Click Next.
5. Click Save.
Notification rules are a mechanism to generate a specified notification method when the
match criteria is met. One major difference between notification rules and other rules is that
it does not have the mute operator available. These rules always generate a notification
whenever the match criteria is met and never go silent.
You can create your own notification rules from the Orchestration rules page or from the
Events details page, which is the easiest way to configure the matching conditions. See
Creating Notification Rules from the Events Page for more information.
Note: If the field is related to the name of a country, you should use the country
code defined by the ISO 3166.
Note: The Sources or Destinations field needs to match the universally unique
identifier (UUID) of the event or alarm. You can use the Source Name or Destination
Name field instead.
1This packet type refers to configuration issues that are used to identify incorrect uses of certain fea-
tures. For example, the app for AWS assesses your configuration of AWS to identify insecure use of the
AWS security features.
Important: Instead of using the equals and equals, case insensitive operators
for array fields, AT&T Cybersecurity recommends the use of the in or contains
operators.
Note: If you need to add a property value that maps with a property key, you need
to know the mapping of the field. See Determining the Mapping of a Field for more
information.
Note: The current rule box shows you the syntax of your rule, and the rule
verification box reviews that syntax before saving the rule.
7. Click Next.
Important: A dialog box opens if there are warning messages. Click Cancel to
review the warning messages, or click Accept to continue creating the rule.
Amazon Web Services (AWS) account for setup and use. The Amazon SNS allows the
first 1000 email notifications per month to fall into the free messaging tier. See Send-
ing Notifications Through Amazon SNS in the USM Anywhere Deployment Guide for
more information.
l Datadog: This method requires the creation of a Datadog API key and additional steps.
See Sending USM Anywhere Notifications to Datadog in the USM Anywhere Deploy-
ment Guide for more information.
l Email: This method sends the notification by email. You need to enter information for
the email subject and enter a destination email address. Multiple comma-separated
email addresses are possible. This method uses a built-in integration with the Amazon
Simple Email Service (SES) function and is limited to a maximum of 200 emails per
rolling 24-hour period. The only user-customizable information available is the email
subject line.
Note: The rolling 24-hour, 200-email limit refers to all email accounts. For
example, you can have a rule with multiple emails, which counts as a single email
delivery. Alternately, if you have several rules with several emails, each of these
counts as an individual email account. Sensor-disconnect emails do not count
against this number because they are critical and are only sent to users whose
role is manager.
Select the Sanitize Email Content checkbox to replace detailed email contents with a
generic message and a link that requires user authentication to view further
information.
l PagerDuty: This method is performed using an integration in the product, and user
setup is required. See Sending USM Anywhere Notifications to PagerDuty in the USM
Anywhere Deployment Guide for more information.
l Slack: This method makes use of a user-created Slack Webhook integration. Slack
integration can also be performed using Amazon SNS. See Sending USM Anywhere
Notifications to Slack in the USM Anywhere Deployment Guide for more information.
l Occurrences: Specify the number of event occurrences that produce a match on the
conditional expression to trigger the rule. You can enter the number of occurrences or
use the arrow to scroll the value up or down. You need to enter a number between 1
and 100.
l Length: Specify the length of the timespan used to identify a match for multiple
occurrences. Enter the number and choose a value of seconds, minutes, or hours.
This duration identifies the amount of time that transpires from the beginning to the
end of the occurrence. If the number of occurrences is not met within this period, the
rule is not a match.
In this example, the rule applies when the configured conditions happen five times
every three hours.
These two options function together to specify the number of occurrences within a time
period that will produce a match for the rule. For example, you can define a rule to trigger
an alarm for an unauthorized access attempt when a failed SSH login occurs three times
within a five-minute window.
The created rule displays in the list of rules. You can see it from Settings > Rules. See
Orchestration Rules for more information.
Note: If the field is related to the name of a country, you should use the country
code defined by the ISO 3166.
Note: The Sources or Destinations field needs to match the universally unique
identifier (UUID) of the event or alarm. You can use the Source Name or Destination
Name field instead.
1This packet type refers to configuration issues that are used to identify incorrect uses of certain fea-
tures. For example, the app for AWS assesses your configuration of AWS to identify insecure use of the
AWS security features.
Important: Instead of using the equals and equals, case insensitive operators
for array fields, AT&T Cybersecurity recommends the use of the in or contains
operators.
Note: If you need to add a property value that maps with a property key, you need
to know the mapping of the field. See Determining the Mapping of a Field for more
information.
Note: The current rule box shows you the syntax of your rule, and the rule
verification box reviews that syntax before saving the rule.
7. Click Next.
Important: A dialog box opens if there are warning messages. Click Cancel to
review the warning messages, or click Accept to continue creating the rule.
l AT&T Cybersecurity Forensics and Response App: See Collecting Forensics and
Response Data in the USM Anywhere Deployment Guide for more information.
l Authenticated Asset Scanner: See Performing Vulnerability Scans for more inform-
ation.
l Agent Query: You can run a user-initiated agent query. There are several ad-hoc quer-
ies, which are in your environment by default. These queries generate events which
can be used for a forensic investigation, so you can focus on fast response and remedi-
ation. See The AlienVault Agent for more information.
l Occurrences: Specify the number of event occurrences that produce a match on the
conditional expression to trigger the rule. You can enter the number of occurrences or
use the arrow to scroll the value up or down. You need to enter a number between 1
and 100.
l Length: Specify the length of the timespan used to identify a match for multiple
occurrences. Enter the number and choose a value of seconds, minutes, or hours.
This duration identifies the amount of time that transpires from the beginning to the
end of the occurrence. If the number of occurrences is not met within this period, the
rule is not a match.
In this example, the rule applies when the configured conditions happen five times
every three hours.
These two options function together to specify the number of occurrences within a time
period that will produce a match for the rule. For example, you can define a rule to trigger
an alarm for an unauthorized access attempt when a failed SSH login occurs three times
within a five-minute window.
The created rule displays in the list of rules. You can see it from Settings > Rules. See
Orchestration Rules for more information.
When orchestration rules are active, USM Anywhere inspects and validates them to show how
well the rule is working.
The orchestration rule validation process is engaged whenever a new rule is created or an
existing rule is updated. Additionally, active rules are validated periodically for the duration of
the time they are active. The orchestration rule validation process checks your rule against a
set of tests, called rule checks, which evaluate how well your orchestration rule will perform,
and checks it for common errors. For example, this validation process keeps you from
creating a rule that will collect nothing (or everything).
Note: Any time you create a new rule or edit an existing rule, be sure to review your
rule's validation and make recommended or necessary changes to optimize the rule
based on the validation status.
For every rule check that your orchestration rule fails, you are shown a status notification,
which explains in detail what should be improved in your rule. Each status notification is
classified by its severity into four statuses (in increasing severity): ok, info, warning, and error.
While an info-level status notification may indicate that optimizing the rule would be useful, a
warning-level status notification indicates a more critical problem that should be addressed.
An error-level status notification will prevent you from saving the new rule until it is fixed.
To read a detailed breakdown of your rule's validation, click the rule. This opens a window
listing the details that apply to your rule, with an icon indicating each status notification's
severity. From this view, you can see a clear list of all the changes you can make to optimize
your rule. You can also see any changes that are required for your rule to function.
When more than one validation check applies to an orchestration rule, USM Anywhere
considers the most severe of those the rule's validation status. For example, in the
screenshot, you can see that a warning, info, and error notifications were all triggered by the
"Alarm without Condition" rule, so its overall validation status is error.
INFO There are minor issues in this rule's definition that might affect
your rule's operation.
WARNING There are issues in this rule's definition that might negatively
impact your system.
Both static and dynamic checks show up as status notifications on your orchestration rule.
Static Checks
These checks evaluate your rule against common mistakes such as the presence of a data
source or packet type, in addition to validating fields like IP and operator. Some of the static
checks will prevent users from creating or updating a rule if they fail.
Rules are evaluated immediately against static checks when they are created or updated.
Static checks don’t have a predetermined lifetime and will persist until the triggering
condition is fixed or removed from the rule. They will be ignored in scheduled purge tasks
used to clean invalid rule checks.
Note: Static checks help prevent you from creating a rule that is invalid or a rule that
risks capturing everything or nothing.
Dynamic Checks
These checks will analyze your rule's behaviors, like their match ratio or how quickly they are
processed. They are evaluated as long as your orchestration rule is active.
Active rules are evaluated against dynamic checks every 10 minutes with the help of a
scheduler task. Dynamic checks have a predetermined lifetime of 7 days. During those 7 days,
another scheduler task runs every 6 hours to confirm whether those dynamic checks still
apply to your rule. If the conditions for that check haven't been seen on your rule for 7 days,
the check and its related status will be removed from your rule.
Correlation Rules
Correlation is the processing of the event stream to identify important events or patterns of
events within large volumes of data. The logic to identify these events is encapsulated in a
correlation rule. The AT&T Alien Labs™ Security Research Team creates correlation rules,
which associate multiple events from one or more data sources to identify potential security
threats. These rules identify patterns associated with malicious activity. Alarms are generated
by an explicit call within these rules.
These correlation rules are created by the Security Research Team and you are not able to
modify them. However, you can use orchestration rules to modify the way USM Anywhere
treats events. See Orchestration Rules for more information.
What Is Correlation?
Correlation is a process performed by the correlation engine in USM Anywhere. It identifies
potential security threats by detecting behavior patterns across different types of assets,
which produce disparate yet related events. Correlation links different events, turning data
into more useful information.
The logs received and processed by USM Anywhere carry important information such as what
your users are doing, what data is being accessed, how your system and network are
performing, and if there are any security threats or attacks taking place. However, reading
logs has these disadvantages:
l Logs vary from system to system or even from version to version on the same system.
l Logs have limited perspective because each system sees events from its own perspective.
l Logs are static, fixed points in time without the full context or sequence of related events.
The correlation process provides answers to these challenges, putting the events into full
context. For example, a network firewall sees packets and network sessions, while an
application sees users, data, and requests. While different systems report logs of similar
activities, the way in which they articulate these activities is quite different. With the help of
correlation rules, USM Anywhere can correlate the two types of events, generating an alarm if
a threat exists.
Event correlation enables the security analysts and the incident responders to do the
following:
l Intent: The first tier is the "intent" of the behavior. This roughly maps to the "intrusion kill
chain" to provide an understanding of the context of the behavior.
l Strategy: The second tier is the strategy the attacker took, used to describe the
methodology employed.
l Method: The third tier is the "method" of the behavior, used to describe the details of the
particular methodology.
Intent
The intent describes the context of the behavior that is being observed. These intents
roughly map to the stages of the intrusion kill chains but are collapsed to ensure that each is
discrete.
Intent Description
Delivery & Attack Behavior indicating an attempted delivery of an exploit. This can include
detection of malicious email attachments, network-based detection of
known attack payloads, or analysis-based detection of known attack
strategies such as an SQL injection.
Reconnaissance & Probing Behavior indicating an actor attempting to discover information about
your organization. This is broad-based, including everything from port
scans to social engineering to open-source intelligence.
Environmental Awareness Behavior and status about the environment being monitored. This
includes information about services running, behavior of users in the
environment, and the configuration of the systems.
Strategy
Method
The method describes the approach that the actor employs. To further the previous example,
the method would provide additional detail on the target of the attack and the vulnerability
"Firefox - CVE-2008-4064".
Some rules are more specific, which means that the rule only matches a particular data
source. For example, the following rule only matches data from Watchguard XTM:
Note: When a more specific rule exists in USM Anywhere, it takes precedence over the
generic rule.
You can see the strategy, the method, and the rule itself.
Important: Correlation rule details are not visible to users with a trial license.
The page includes Rules Name as a filter so that you can see how many alarms match the
selected rule.
Note: The mute length indicates during how long that rule is not going to generate
an alarm.
USM Anywhere provides built-in rules and adds more every week through the AT&T Alien
Labs™ OTX Subscription. These rules are the result of the combination of operators and USM
Anywhere fields.
in* List contains, case insensitive: Will event_name in* ('Update route in
return true if the list contains the route table','Update route table for
value. This will perform a ==* VPC')
comparison for every value in the list
returning true on the first match.
==> Checks the value against a list filled source_country ==> |countries|
with previous events values. Will
validate the condition if the element
is not already included in the list.
!-> Not in List: Checks that a value is not source_name !-> [[SAFE_NAMES]]
contained in a correlation list.
Correlation Lists
USM Anywhere enables you to create correlation lists. Use a correlation list to group values
together to apply to a single rule. So instead of creating a rule for each value, you can save
time and effort by creating a correlation list and using it in a rule.
When creating correlation lists for rules, you can use a standard field, such as event_name or
event_description. A helpful use for correlation lists is the creation of user denylists,
allowlists, or both, like event_names. Or you can enter anything you want in the items of the
correlation lists, but only up to 500 characters per item. There is a limit of 1000 items per
correlation list.
To see an example of an alarm rule using a correlation list, see Example: Creating an Alarm
Rule Using a Correlation List.
3. Enter a name for the correlation list in the Name field and, if desired, a description to cla-
rify its use in the Description field.
Important: The valid characters for the correlation list name are uppercase letters
(A–Z), lowercase letters (a–z), numerical digits (0–9), and underscore (_). You can
enter up to 64 characters.
Important: The list items are restricted to a string format to match the formats of
the tested event detail items.
5. Click Save.
3. Click Delete.
In this example, an orchestration rule is created to generate an alarm whenever a user, who is
included in a correlation list, generates an event.
Important: The valid characters for the correlation list name are uppercase letters
(A-Z), lowercase letters (a-z), numerical digits (0-9), and underscore (_). You are
allowed to enter from 1 to 64 characters.
1This packet type refers to configuration issues that are used to identify incorrect uses of certain fea-
tures. For example, the app for AWS assesses your configuration of AWS to identify insecure use of the
AWS security features.
Important: A dialog box opens if there are warning messages. Click Cancel to
review the warning messages, or click Accept to continue creating the rule.
12. Enter a name for the rule (for instance "Alarm for undesirable users") and, if desired, a
description to clarify its use in the Description field.
13. Select an intent.
The intent describes the context of the behavior that is being observed. These intents
roughly map to the stages of the intrusion kill chains but are collapsed to ensure that
each is discrete. See Intent for more information about the available threat categories.
If known, it is the method of attack or infiltration associated with the indicator that
generated the alarm.
Note: This is a required field; if you do not complete this field, the Save button
remains inactive.
The strategy describes the broad-based strategy or behavior that is detected. The
intention is to describe the malicious user's strategy to achieve their goal.
You can use the mute value to set the period of time during which, once an alarm is
createdUSM Anywhere will not create a new alarm based on the same conditions.
Note: Take care to set a mute duration that is long enough to cover the span of
time in which matching events will occur to maximize the efficacy of your mute.
Important: If your USM Anywhere™ is restarted when one of your alarm mutes is
active, or if there is an update or hotfix, the alarm mute will be canceled.
l Occurrences: Specify the number of event occurrences that produce a match on the
conditional expression to trigger the rule. You can enter the number of occurrences or
use the arrow to scroll the value up or down. You need to enter a number between 1
and 100.
l Length: Specify the length of the timespan used to identify a match for multiple
occurrences. Enter the number and choose a value of seconds, minutes, or hours.
This duration identifies the amount of time that transpires from the beginning to the
end of the occurrence. If the number of occurrences is not met within this period, the
rule is not a match.
In this example, the rule applies when the configured conditions happen five times
every three hours.
These two options function together to specify the number of occurrences within a time
period that will produce a match for the rule. For example, you can define a rule to trigger
an alarm for an unauthorized access attempt when a failed SSH login occurs three times
within a five-minute window.
19. (Optional.) Select the fields that you want to display in the generated alarm.
You can select or remove the fields you want to include in the details of the alarm by
clicking the and the icons.
The created rule displays in the list of rules. You can see it from Settings > Rules. See
Orchestration Rules for more information.
Playbooks
USM Anywhere enables you to create and manage playbooks, with which you can
predetermine a set of steps that should be taken to remediate alarms generated from either
a correlation rule or a custom orchestration rule. These playbooks allow you to accelerate
your threat detection and incident response process by streamlining and automating
common or alarm-specific workflows.
USM Anywhere enables you to create and manage playbooks, with which you can
predetermine a set of steps that should be taken to remediate alarms generated from either
a correlation rule or a custom orchestration rule.
l History: This tab shows a history of all of the playbooks that have been run in your envir-
onment. This view also lists the status and owner of each playbook that has been run.
l My Playbooks: This tab displays all of the playbooks that have been created in your
instance, and includes the Create Playbook button which allows you to create new play-
books.
History Tab
The History tab shows a historic view of the playbooks that have been run in your instance,
along with some attendant information, like the current status and owner of each playbook.
You can use the panel on the left to search for a specific playbook or to filter the playbooks
displayed on this tab by criteria you choose.
The following table lists the criteria available for use in filtering playbooks.
Filter Description
Status The three status buttons allow you to search for playbooks by
their current status.
l Overdue:
l In Progress:
l Completed:
My Playbooks Tab
The My Playbooks tab shows the complete list of all playbooks that have been created in your
instance, and allows you to create new playbooks with the Create Playbook button. You can
enable or disable a playbook from this page by using the toggle next to any playbook.
Note: For complete instructions to guide you through creating a new playbook, see
Creating a Playbook.
The following table lists the columns you see on the page.
Column Description
In addition, USM Anywhere provides some visibility into your existing playbooks from the My
Playbooks tab. Click the plus icon to the left of any playbook in the list to view its details.
l Created On: The timestamp from when this playbook was created
l Configured By: The user who created this playbook
The following table lists the columns you see in the dashboard.
Column Description
Alarm Name Name of the alarm this playbook is currently being run
against
Creating a Playbook
Each playbook comprises one or more actions, and is associated with an alarm rule in USM
Anywhere. When an alarm is triggered based off of that alarm rule, users will have the option
to run a playbook and execute one or all of the actions within that playbook as part of their
response to the alarm in USM Anywhere.
Note: Toggle the Assign Now button to Assign Later if you would like to skip this step.
Your playbook will then be available on all alarms.
Actions in a playbook must be completed in the order in which they are configured. Take
care when assigning actions to your playbook to ensure that they are in the correct
sequence.
You can drag and drop individual actions within the Actions section to ensure that they
are in the right order.
Column Description
Warning: Actions in a playbook must be completed in the order in which they are
configured. Take care when assigning actions to your playbook to ensure that they are
in the correct sequence.
You can drag and drop individual actions within the Actions section to ensure that they
are in the right order before creating your playbook, or edit an existing playbook to
change the order of its actions.
Executing a Playbook
Each playbook comprises one or more actions, which are associated with one or more alarms
in USM Anywhere. When an alarm associated with a configured playbook is triggered users
will have the option to run that playbook, executing any or all of the actions within it. Once an
action is executed that playbook is considered In Progress. Once all of a playbook's actions
have been executed, the playbook is considered Complete.
Note: You can view all of your In Progress playbooks in the Playbooks In Progress
dashboard, and view a history of all of your executed playbooks in the Playbooks History
page. A list of all playbooks created in your instance can be found in the My Playbooks
page.
1. Go to Activity > Alarms and select an alarm to open its detail pane.
This must be an alarm generated from an alarm rule associated with a playbook, unless
you have configured playbooks that apply to all alarms.
2. Click the Run Playbook drop-down to open a list of all playbooks available for that alarm.
A popup will open and list all of the actions in the playbook you selected.
Note: If this drop-down is not shown, then there are no playbooks available for the
alarm.
3. Click Run Action to execute the current action. Since actions are configured sequentially,
actions can only be executed in order.
l If this playbook has not yet been executed for this alarm, only the first action will be
available.
l If the playbook is already in progress for this alarm, the next action that has not yet
been run will be available.
Important: If the playbook includes any manual actions, you will have to manually
execute the step or steps described in that action. Once you have completed the
steps this action describes, use the button to mark it Completed.
Once you have executed an action, you will see a notification message in the top right of
your USM Anywhere screen indicating whether the action was successfully executed. If so,
the status of that action will change to Completed and the next action's Run Action
button will be enabled.
If the Run Playbook popup is closed before all actions are successfully executed, the
playbook is considered In Progress.
5. Once all actions in a playbook are successfully executed, the playbook is considered
Completed.
USM Anywhere works on both CVSS version 3 (CVSSv3) and the previous version 2 (CVSSv2)
for scoring.
l Running and scheduling vulnerability scans (see Performing Vulnerability Scans for more
information)
l Generating and examining reports (see Viewing Vulnerabilities Scan Results for more
information)
USM Anywhere detects vulnerabilities using an authenticated scan, where the USM Anywhere
Sensor initiates a credentialed SSH (in Linux systems) or Microsoft Windows Remote
Management (WinRM) (in Windows systems) connection to the asset, and remotely runs a
series of commands for host-based assessment.
AT&T Alien Labs™ Open Threat Exchange® (OTX™) queries NVD and MITRE every hour looking
for the latest vulnerabilities. Every time you run a vulnerability scan, USM Anywhere queries
OTX for updating the vulnerabilities information.
For Linux variants, USM Anywhere performs a series of generic UNIX and independent schema
tests in addition to flavor-specific tests for IBM AIX, FreeBSD, Hewlett Packard Enterprise HP-
UX, and Linux. For Windows, USM Anywhere performs a series of Windows schema and
independent schema tests.
Warning: USM Anywhere removes vulnerabilities older than 90 days from the database.
The following table shows the CVSS v2.0 and v3.0 ratings.
Important: There is also an Under Analysis severity. This severity displays when the
National Vulnerability Database (NVD) has not assigned a CVSS base score to the
vulnerability. OTX queries NVD and MITRE every hour looking for the latest
vulnerabilities. Every time you run a vulnerability scan, USM Anywhere queries OTX to
update the vulnerabilities information. If the NVD has updated the CVSS base score for
that vulnerability, USM Anywhere will update the status after you run a new vulnerability
scan.
A Practical Example
USM Anywhere finds 15 vulnerabilities when you run a scan over an asset, so you will see
"active: 15, inactive: 0". Then you fix these vulnerabilities. A week later, you run a scan over the
same asset. This new scan finds 3 vulnerabilities, so you will have 3 vulnerabilities active out of
15 vulnerabilities found and USM Anywhere will display "active: 3, inactive: 12".
If you want to see the inactive vulnerabilities, select the filter Inactive. USM Anywhere
displays the list of your inactive vulnerabilities.
You can also see if a vulnerability is active or inactive from the full details screen of a
vulnerability.
Operating
Methods and Credentials Escalation
System
Note: Additionally, the user account performing the authenticated scan must have
permissions to connect to the host via SSH server.
l Fedora: https://docs.fedoraproject.org/en-US/fedora/latest/system-administrators-
guide/infrastructure-services/OpenSSH
l Ubuntu: https://help.ubuntu.com/community/SSH/OpenSSH/Configuring
l Debian: https://wiki.debian.org/SSH
l FreeBSD: https://www.freebsd.org/doc/handbook/openssh.html
l Port 5985 open on your firewall. WinRM listens for HTTP traffic at port 5985 by default.
Make sure that your firewall allows incoming connections through this port.
l The Windows Management Instrumentation (WMI) service enabled. WinRM supports WMI
classes and operations. It also leverages WMI to collect data about disks, network adapters,
services, or processes in your environment.
Note: Permitting WMI access over the Distributed Component Object Model (DCOM)
network is not necessary to perform authenticated scans for USM Anywhere.
Important: For a Windows server that is hardened according to the Center for Internet
Security (CIS) benchmarks, such as the CIS Amazon Machine Image (AMI) for Windows
Server 2016 available in the Amazon Web Services (AWS) Marketplace, there are local
group policies that block these connectivity requirements. For these servers, you must
open the port and re-enable WinRM and remote access each time you boot the server.
Note: In addition, you must have the Windows Remote Registry service enabled on each
asset you want to scan. When not in use, this service stops after 10 minutes and
authenticated scans will not be able to scan Windows registries while service is stopped.
To prevent the service from stopping when idle, the following registry needs to be set to
1 on the Windows endpoints:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows
NT\CurrentVersion\RemoteRegistry\DisableIdleStop
Warning: While any account that is a member of the "Remote Management Users"
group can perform some of the required actions, AT&T Cybersecurity strongly
recommends using an admin account with all of the attendant privileges. While some
operations will work without explicit admin rights, other operations require admin-level
privileges and will return an "unknown", "error", or "fail" message without them.
When creating such an account, you must keep in mind the following:
l This account needs to be able to create temporary files and temporary registry values.
l This account must have remote and local logon rights. See Setting Log on Locally and the
Security Policy for more information.
l If using Active Directory (AD), assign user rights to either the Remote Management Users
group or the Administrators group because only these two groups can log in through
WinRM. This authentication uses sAMAccountName, which is limited to 20 characters.
l When configuring network access policy for this account, select Classic: Local Users
Authenticate as Themselves.
l If your machine is joined to a domain, a local account won't be able to log in. In this case,
you must add a new registry named LocalAccountTokenFilterPolicy:
Path: HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
Value Name: LocalAccountTokenFilterPolicy
Type: DWORD
Value: 1
Note: Set the local logon rights to avoid large numbers of processes and large amounts
of memory usage.
Important: The vulnerability scan needs to be able to perform a local logon on the
target device because it needs to create a "delegatable" identity token to access
domain resources from its session on the target device. Although it is possible to run a
scan without having the local logon privileges and without the correct token, the
attempts to collect certain information can fail with errors, for example "Access Denied",
which might impact the rule results.
1. Select Start > All Programs > Accessories > Run, and then enter gpedit.msc to open
the Local Group Policy Editor.
2. In the console tree, select Computer Configuration > Windows Settings > Security
Settings > Local Policies > User Rights Assignment.
Note: These instructions are to enable Windows Remote Registry on one asset. Enabling
Remote Registry from group policy is possible, but those instructions will depend on
your environment. See these steps for an example of that process, though your
environment may require different steps.
3. Select Services.
When running a scan in USM Anywhere, you can run it with or without authentication, a
process used to verify the identity of a user, user device, or other entity, usually through a
username and password. A credential is an identification that proves you are who you claim
to be, and you are, therefore, a reliable source.
When running a scan without authentication, USM Anywhere probes the network services
available on the target machine. Using known protocol behaviors, it attempts to identify the
software that is running as well as its configuration and version. With this information, USM
Anywhere then attempts to match the identified software with the known vulnerabilities to
produce a report. The benefit of this approach is that the detection can be very specific in
identifying known vulnerable behaviors.
When you choose to run a scan with authentication, your credentials allow USM Anywhere to
query the running machine to gain detailed and accurate information about the running
software and its configuration. This prevents false positives from misidentified services that
can sometimes occur in the unauthenticated approach. In addition, an authenticated scan
ensures that all services and software are analyzed regardless of whether the service is
running or accessible from the network.
l USM Anywhere uses the credentials available for a given asset, no matter what the priv-
ileges are for those credentials.
l When you run a scan for an asset, USM Anywhere uses the asset credential if the asset has
one; if the credential does not work or the asset does not have an assigned credential,
USM Anywhere uses the credential of the group which the asset is a member of, if it is part
of an asset group.
Important: Credentials assigned directly to an asset have higher priority than those
assigned to an asset group.
l When the asset does not have an assigned credential and the asset is a member of several
asset groups with different assigned credentials, USM Anywhere tests every credential and
uses the first one that works.
l When you assign a credential to an asset group, USM Anywhere assigns the credential to
the group instead of assigning it to all of its members. If you want to assign a credential to
all members of a group, see Assign Credentials to Group Members.
l USM Anywhere supports these cipher types:
aes128-ctr
3des-ctr
blowfish-cbc
aes256-cbc
aes192-cbc
aes128-cbc
3des-cbc
aes256-ctr
l Creating Credentials
l Assigning Credentials to Assets
l Removing Credentials from Assets
Important: Any operating systems (OSes) not listed here are unsupported. USM
Anywhere operations, such as vulnerability scans, may not behave as intended on
unsupported platforms.
Microsoft Windows:
Linux:
Apple macOS:
Creating Credentials
USM Anywhere enables you to assign credentials to your assets. If the required credential set
is not yet defined in USM Anywhere, you must add it before you can associate it with one or
more assets. The Credentials page displays a list of all credential sets that are defined and
available to be associated with an asset or asset group.
3. Enter a name for the credential in the Name field and, if desired, a description to clarify its
use in the Description field.
4. In Credential Type, select SSH or Windows RM based on the operating system of the
asset.
Windows RM
Use the Windows RM credential for a Windows operating system. After selecting Windows
RM, complete these fields:
l Username: Enter the username for the account with the required privileges.
l Domain: (Optional.) Enter the domain name registered in the Domain Name System
(DNS).
Note: Use a fully qualified domain name (FQDN) instead of a Network Basic
Input/Output System (NetBIOS) name. If you use a NetBIOS name, you will get an
invalid SSH gateway error.
l Port: If an alternative port number is required, enter the port number. The default port,
5985, is standard.
SSH
Use the SSH credential for a Linux, Apple macOS, or any other device that supports an
SSH connection. After selecting SSH, complete these fields:
l Username: Enter the username for the account with the required privileges.
l Authentication method: Set the SSH authentication mode and enter the password,
private key, or both.
l Password: Select this option to use a simple password to authenticate the user
account. It is mandatory if you do not use a private key.
l Private key (no passphrase): Select this option to use a private key to authen-
ticate the user account.
l Private key with passphrase: Select this option to use a private key and password
combination to authenticate the user account.
Important: A private key must start with an appropriate header, such as "---
--BEGIN RSA PRIVATE KEY----" and "-----END RSA PRIVATE KEY-----".
Always copy the certificate in the form with the header.
l Password: This field only appears if you select Password as authentication method.
Enter the password that authenticates the user.
l Privilege elevation: Select the elevated privilege to use for the credentials.
l sudo: Use this option to run single commands with root privileges. For example:
5. Click Save.
There are a variety of ways to create an SSH key, and your company may already have
predefined rules regarding an algorithm to use and what strength the key needs to be.
However, if you need to create an SSH key manually and don't have a predefined company
policy for the creation of the SSH key, you can use the following procedure to make a basic
RSA SSH key to add to your credentials.
2. Enter ssh-keyken to create a 2048-bit SSH key or ssh-keygen -b 4096 to create a 4096-
bit SSH key, and then press Enter.
The command line prompts you to specify a passphrase and enter it again to confirm it.
4. Specify a passphrase or, if you don't want to use a passphrase, leave the line blank, and
then press Enter.
5. The SSH key is saved to either the default location or the location you specified.
Note: Credentials assigned directly to an asset have higher priority than those assigned
to an asset group.
When USM Anywhere runs a scan or executes a system-level action, it uses the
credential set assigned directly to the asset, if there is one. If those credentials don't
connect or the asset doesn't have an assigned credential set, it uses the credential set
assigned to the group where the asset is a member, if that asset is a member of an asset
group.
2. In the line of the credential you want to assign, click the icon.
3. Enter part of the asset name in the field at the bottom of the dialog box
This displays the matching items below the field. You can enter more text to filter the list
further.
Warning: If the asset has already assigned credentials, these credentials are going
to be overwritten.
5. Next to the displayed asset name, click Test to execute a test connection to the asset
using the credentials.
If the test detects any warnings, a Permissions Warnings section displays. This section
contains a Warning column that lists the individual warnings.
A permissions error doesn't prevent the scan from running, but it can result in the
incomplete information being detailed in the scan results.
2. Next to the asset name, click the icon and select Assign Credentials.
Note: If the needed credentials do not already exist, you can select Add New
Credentials to define them in USM Anywhere. See Creating Credentials for more
information. Use the icon to modify any information.
4. (Optional.) Select the Jump Box option if you want to authenticate through another
asset.
Select the checkbox and use the field to search for the asset you want to use as an
authentication server.
5. Click Test to execute a test connection to the asset using the selected credentials.
If the test detects any warnings, a Permissions Warnings section displays. This section
contains a Warning column that lists the individual warnings and a Remediation that
provides a suggested solution to resolve each warning. A permissions error doesn't
prevent the scan from running, but it can result in the incomplete information being
detailed in the scan results.
6. Click Save.
Important: When you assign a credential to an asset group, USM Anywhere assigns the
credential to the asset group instead of assigning it to all of its members. If you want to
assign a credential to all members of a group, see Assign Credentials to Group Members.
2. In the line of the credential you want to assign, click the icon.
This displays the matching items below the field. You can enter more text to filter the list
further.
After you select the asset group, the dialog displays the item at the top. If needed, you
can enter text for another asset group name and select it to assign multiple asset groups
for the credential set.
2. Next to the asset name, click the icon and select Assign Credentials.
Note: If the needed credentials do not already exist, you can select Add New
Credentials to define them in USM Anywhere. See Creating Credentials to create
the new credential set. Use the icon to modify any information. Click Remove
Current Credentials From Asset Group to remove that credential from the asset
group.
4. Click Save.
4. Select the credentials to use or create a new one, see Creating Credentials
5. Click Save.
2. Click the icon in the line of the credential you want to remove the association from.
Note: You can use the icon from the main credentials page to check the assets
assigned to the credential. Once you delete the credential, the association between
the asset and the credential finishes.
Note: You can also remove a credential from the assets details page. See Viewing
Assets Details for more information.
5. Click Save.
Remove a Credential Associated with an Asset Group from the Asset Groups
Page
1. Go to Environment > Asset Groups.
2. Locate the asset group that you want to remove the credential from and click the icon
5. Click Save
Authenticated scans
An authenticated scan verifies scanned IPs and detects vulnerabilities, configuration issues,
and software. The USM Anywhere Sensor initiates a credentialed SSH (Linux), WinRM
(Windows), or MacOS connection to the asset and remotely runs a series of commands for
host-based assessment. See Managing Credentials in USM Anywhere. You can run
authenticated asset scans from these pages:
l Environment > Assets for running an authenticated scan in that precise moment. See
Running Authenticated Asset Scansfor more information.
l Environment > Asset Groups for running an authenticated asset groups scan in that pre-
cise moment. See Running Authenticated Asset Groups Scans for more information.
l Settings > Scheduler for scheduling an authenticated scan job during a specific period of
time. See Scheduling Asset Scans from the Job Scheduler Page and Scheduling Asset
Groups Scans from the Job Scheduler Page for more information.
l Environment > Vulnerabilities for running an asset scan. You can scan a single asset, an
asset group, or enter a network range. See Running an Asset Scan from Vulnerabilities for
more information.
Warning: An authenticated scan may fail if the local mail exchanger, which applies to
Linux hosts, is enabled in the target asset.
Unauthenticated scans
Use an asset scan to discover services, operating systems, hostnames, IP and MAC addresses,
and vulnerabilities of known hosts in the deployed network. You can run non-authenticated
asset scans from these pages:
l Environment > Assets for running an asset scan in that precise moment. See Running
Asset Scans for more information.
l Environment > Asset Groups for running an asset group scan in that precise moment.
See Running Asset Groups Scans for more information.
l Settings > Scheduler for scheduling an asset scan job during a specific period of time. See
Scheduling Asset Scans from the Job Scheduler Page and Scheduling Asset Groups Scans
from the Job Scheduler Page for more information.
Note: See USM Anywhere Scans Best Practices for more information.
Linux
Linux-authenticated scans use privilege escalation over ssh. Commands are logged in the
audit log:
l
/var/log/secure*
l
/var/log/auth*
Windows
Windows-authenticated scans perform file and registry checks to determine the version of
the installed patch.
4. Click Next.
5. Click Assign Credentials for assigning credentials to the assets and devices you want to
scan. Click Create New Credentials for creating a credential. See Managing Credentials in
USM Anywhere for more information.
6. Click Select Another Target if you want to come back.
7. You can select the targets to scan if you have more than one.
8. Click Start Scan.
The scan starts. Depending on the selected asset, the scan can last several minutes. When
the scan finishes, you can see the status and if the scan found vulnerabilities. If you want
to view the results of your scan, you need to go to the asset details page. See Viewing
Assets Details for more information.
While the scan is running, a Scanning button shows. When the scan finishes, the message
Scan finished. Refresh to view scan results displays.
l On the left side of the page are the search and filters options. Use filters to delimit your
search.
l At the top of the page, you can see any filters you have applied, and you have the option to
create and select different views of the vulnerabilities.
l The main part of the page is the list of vulnerabilities, where each row describes an indi-
vidual vulnerability. Click a vulnerability to open its details. See Viewing Vulnerabilities
Details for more information. Each vulnerability includes a checkbox that you can use to
select it. You can select all vulnerabilities in the same page by clicking the checkbox in the
first column of the header row.
If you want to analyze the data, you can maximize the screen and hide the filter pane. Click
the icon to hide the filter pane. Click the icon to expand the filter pane.
3. Next to the asset name that you want to explore, Click the icon and then select
Vulnerabilities.
link to it.
For each vulnerability in the vulnerabilities columns list, USM Anywhere displays useful
information to help you manage that vulnerability.
The following table lists the fields you see on the page.
Last Seen Last date on which the vulnerability was seen in the asset. The displayed
date depends on your computer's time zone.
Vulnerability ID Displays the associated Common Vulnerabilities and Exposures (CVE) ID,
in case of having it.
Labels Label applied to the vulnerability. See Labeling the Vulnerabilities for
more information.
Severity Indicates the severity of the vulnerability. Values are High, Medium, Low,
and Under Analysis. See About Vulnerability Severity.
Score Displays the score in the Common Vulnerability Scoring System (CVSS).
See Common Vulnerability Scoring System SIG for more information.
First Seen Detection date of the vulnerability in the asset. The displayed date
depends on your computer's time zone.
Available Patches Displays the name of the patch and the number of additional available
patches (for example, patch name [2 more patches]).
From the list of vulnerabilities, you can click any individual vulnerability row to display more
information on the selected vulnerability. See Viewing Vulnerabilities Details for more
information.
To select a vulnerability, select the checkbox to the left of the vulnerability. You can select all
vulnerabilities at the same time by selecting the first checkbox in the column. These buttons
display when you select a vulnerability:
l Apply Labels: You can add a label to a vulnerability, which enables you to have classified
vulnerabilities. See Labeling the Vulnerabilities for more information.
l New Scan: This button runs a new authenticated asset scan. See Running an Asset Scan
from Vulnerabilities for more information.
You can choose the number of items to display by selecting 20, 50, or 100 below the table.
You can classify some columns by clicking the icons to the right side of the heading. You can
sort the item information in ascending or descending order.
Note: You can view your bookmarked items by going to the secondary menu and click-
ing the icon. This will display all of your bookmarked items and provide direct links to
each of them.
Click Generate Report to open the Configure Report dialog box. See Create a Vulnerabilities
Report for more information.
Click the icon displayed next to the asset name below the asset column to access these
options:
l Add to Current Filter: Use this option to add the asset name as a search filter. See Search-
ing Events for more information.
l Find in Events: Use this option to execute a search of the asset name in the Events page.
See Searching Events for more information.
l Look up in OTX: This option searches the IP address of the asset in the OTX page. See
Using OTX in USM Anywhere for more information.
l Full Details: See Viewing Assets Details for more information.
l Configure Asset: See Editing Assets for more information.
l Delete Asset: See Deleting the Assets for more information.
l Assign Credentials: See Managing Credentials in USM Anywhere for more information.
l Authenticated Scan: This option displays depending on the USM Anywhere Sensor asso-
ciated with the asset. See Running Authenticated Asset Scans for more information.
l Scan with AlienApp: This option enables you to run an asset scan through an AlienApp.
See Running Asset Scans Using an AlienApp for more information.
l Configuration Issues: This option opens the Assets Details page. The Configuration Issues
tab is selected in the page. See Viewing Assets Details for more information.
l Vulnerabilities: This option opens the Assets Details page. The Vulnerabilities tab is selec-
ted in the page. See Viewing Assets Details for more information.
l Alarms: This option opens the Assets Details page. The Alarms tab is selected in the page.
See Viewing Assets Details for more information.
l Events: This option opens the Assets Details page. The Events tab is selected in the page.
See Viewing Assets Details for more information.
Vulnerabilities Views
You can configure the view you want for the list of items in the page.
1. From the List view, select the filters you want to apply.
2. Click Saved Views and then select the view you want to see.
3. Click Apply.
1. From the Vulnerabilities list view, click View above the filters.
2. Click Saved Views and then click the icon next to the saved view you want to delete.
3. Click Accept.
USM Anywhere includes a wide range of report templates classified according to the
compliance templates for alarms, vulnerabilities, and events collected in the system. The
templates are combined into these three groups:
l PCI: Payment Card Industry Data Security Standards (PCI DSS) is a set of security stand-
ards designed to ensure that all companies that accept, process, store, or transmit credit
card information maintain a secure environment. These reports are identified and based
on specific PCI DSS requirements to provide the auditor with the specific information
requested. For example, PCI DSS requirement 10.7.a: Retain audit trail history for at least
one year, with a minimum of three months immediately available for analysis.
l NIST CSF: The National Institute of Standards Technology (NIST) Cybersecurity Frame-
work provides a policy framework of computer security guidance for how private sector
organizations can assess and improve their ability to prevent, detect, and respond to cyber
attacks.
l ISO 27001: ISO/IEC 27001 provides guidance for implementing information security con-
trols to achieve a consistent and reliable security program. The ISO and the International
Electrotechnical Commission (IEC) developed 27001 to provide requirements for an inform-
ation security management system (ISMS).
3. Select a report.
You can use the search field or scroll down the list.
4. Click Apply.
Searching Vulnerabilities
USM Anywhere includes the option of searching items of interest on the page. There are
several filters displayed by default. You can either filter your search or enter what you are
looking for in the search field.
You can configure more filters and change which filters to display by clicking the Configure
Filters link located in the upper-left side of the page. The management of filters is similar to
that for assets. See Managing Filters for more information.
The following table lists the filters you see on the page.
Last 24 Hours Filter vulnerabilities triggered in the last hour, last 24 hours, last 7 days, last
30 days, or last 90 days. You can also configure your own period of time by
clicking the Custom Range option. This option enables you to customize a
range. When you click Custom Range, a calendar opens. You can choose
the first and last day to delimit your search by clicking the days on the
calendar or entering the days directly. Then select the hours, minutes, and
seconds by clicking the specific box. Finally, select AM or PM.
Labels Filter vulnerabilities by the labels applied to the vulnerability. See Labeling
the Vulnerabilities for more information.
Asset Groups This is the asset group that has vulnerable asset. The number between
parentheses indicates the number of assets in the asset group.
The number between brackets displayed by each filter indicates the number of items that
matches the filter. You can also use the filter controls to provide a method of organizing your
search and filtered results.
The following table shows the icons displayed with each filter box.
Icon Meaning
In the upper-left side of the page, you can see any filters you have applied. Remove filters by
clicking the icon next to the filter. Or clear all filters by clicking Reset.
Note: When applying filters, the search uses the logical AND operator if the used filters
are different. However, when the filter is of the same type, the search uses the logical
OR operator.
Those filters that have more than 10 options include a Filter Values search field for writing
text and making the search easier. If there are more than 50 search results, a icon appears
to the right of the Filter Values search field. Click this icon to download a CSV containing up
to 1024 results.
If you want to search for an exact phrase having two or more words, you need to put
quotation marks around the words in the phrase. This includes email addresses (for
example, "[email protected]").
USM Anywhere enables you to toggle the mode of search. The available modes are Standard
and Advanced. You can change from one mode to the other by clicking the icon or
clicking the icon located in the upper left corner of the page.
Standard Mode
This mode enables you to select one value per filter at the same time, and then the search is
automatically performed. This mode is on by default.
Note: If you exit the advanced mode and the selected filters are not compatible with
the standard mode, a warning dialog box opens to inform you the current filters will
be removed.
Advanced Mode
Advanced mode enables you to select more than one value per filter at the same time. This
mode is off by default.
4. In the lower-left corner of the page, click Apply Filters. Or in the upper side of the page,
click Apply.
Note: The selected filter displays the icon and the filter chiclet is labeled in red.
Important: Some filters don't include the NOT operator (for example, Services or
Software).
5. Click Apply.
If you want to search for an exact phrase having two or more words, you need to put
quotation marks around the words in the phrase. This includes email addresses (for
example, "[email protected]").
2. Click the vulnerability to display a summary view, and then click the vulnerability name to
open the full details of the vulnerability.
Note: You can view your bookmarked items by going to the secondary menu and
clicking the icon. This will display all of your bookmarked items and provide direct
The Vulnerabilities Details page includes the Select Action button that is supported for
your assigned user role. Use this button to launch an authenticated asset scan. See
Applying Actions to Vulnerabilities for more information.
You can see the vulnerabilities details, then a description, the affected software, and the
associated asset. If you want more information, click the icon. See Viewing Assets
The Labels field indicates if the vulnerability has been classified by using a label. You can
click the icon to manage the labels of the vulnerability. See Labeling the
The Suppressed field enables you to indicate whether this vulnerability has been
suppressed. You can click the icon to select a suppression option (Yes or No). A
vulnerability marked Yes will continue to be marked as suppressed on all future scans or
until this field is updated.
3. In the upper right corner, click previous and next to navigate between items.
4. Click the icon to close the dialog box.
USM Anywhere enables you to respond to the vulnerability. Use this button to launch an
authenticated scan of an asset. You need to select the sensor, if you have more than one
installed in your environment, and then indicate the asset to scan.
4. The vulnerability details dialog box opens with the information about the specific
vulnerability.
A dialog box opens, but depending on the sensor installed in your environment and the
advanced AlienApps available for that or those sensors, you can see a different dialog box
with different options. See Advanced AlienApps for more information.
USM Anywhere enables you to display the available remediation patches for a vulnerability. In
case of an existing remediation patch for a vulnerability, USM Anywhere displays the patch
name, a description, the source, and the reference identification (ID).
USM Anywhere includes a set of labels that you can use to classify your vulnerabilities, to
track the status of the vulnerabilities, and to search vulnerabilities using them as a filter. See
Searching Vulnerabilities for more information on how to search vulnerabilities.
l In Progress
l Closed
l Open
l False Positive
USM Anywhere enables you to create, edit, and delete your own labels. You can apply a label
to one or more vulnerabilities. You can also apply multiple labels to the same vulnerability.
l Click the icon in the labels column of the vulnerability you want to label, select the
l Select the checkbox to the left of a vulnerability, click Apply Labels, select the label,
and click Apply.
5. Click Save.
To edit a label
You can create a PDF or CSV report of the vulnerabilities directly from the vulnerabilities
page.
2. You can use filters to define the vulnerabilities content you want to display in your report,
or select the vulnerabilities you want to include in your report.
The filters selected and displayed for the page view are the ones that are populated in the
report.
4. Click Edit Filters if you want to modify the selected filters, and then click Continue to Fil-
ters. Do the modifications you need, and then click Edit Report.
5. Click the Date field if you want to choose a different date range.
Choose Last Hour, Last 24 Hours, Last 7 Days, Last 30 Days, Last 90 Days, or Custom
to set a particular date range.
Note: This option is not available when generating reports for assets or asset
groups.
6. Under the Format section, select either CSV or PDF for the format of the report.
7. Select if you want to generate the report again, and then choose Never, Daily, Weekly,
Bi-weekly, or Monthly.
8. Enter an email address to send the report.
Select the Send to my Email Address option to add your email automatically.
9. Select the Enable Link Expiration option. This link is delivered by email and expires in 14
days.
10. Click Next.
11. In the Report Name field, enter a name for the report.
This name will be displayed in the Saved Reports page.
12. (Optional.) Add a description that will be included.
13. Under the Number of records section, choose the maximum number of records to include
on the report. For CSV the options are 20, 50, 100, 500, 1000, or 50 K. For PDF the options
are 20, 50, 100, 500, 1000, or 2500.
14. If you have chosen the PDF format, you will see the Graphs section, which you can use to
include additional views.
You can add or remove graphs included in the report by clicking the and icons.
15. Select Save & Run if you wish to keep the report in your Saved Reports on USM Any-
where page and receive the report in the indicated email.
16. Click Run to run the report.
USM Anywhere provides several kinds of scans that can be done in different ways. This page
gives you clearer information about scans, types of scans, the specific ways of doing a scan,
the right order for doing scans and avoid asset duplicity, and so on. See USM Anywhere
Scheduler Best Practices for more information.
Discovery Methods
The following table shows the types of scans that you can run using USM Anywhere.
Log collection Log files from an Job Scheduler All USM Anywhere
scans external data page: log Scheduler
source collection jobs are
initially preset at
installation and
can't be modified
by a user
l Run API scans first to avoid duplicates and discover the most assets in your environment,
and then run asset discovery/asset (group) scans with the Asset Scanner to update the
asset. When an asset is discovered through a network scan, and then that asset is dis-
covered through an APIs method, the asset will be duplicated.
l After deploying an agent, link it to existing assets.
l When an AD scan discovers an asset, any asset discovery/asset (group) scan updates the
existing asset created by the AD scan.
l Assets discovered by API methods contain far more information than assets discovered by
network scans and greatly reduce the risk of having duplicate assets. For example, assets
discovered by API methods can include information such as the asset state (powered on,
powered off, terminated, and so on), the resources allocated to the asset, or the asset
operating system.
l If multiple API methods return the same assets, then use only the method that provides
the most assets to prevent duplicate assets. The other API methods can be disabled in the
Job Scheduler page. See USM Anywhere Scheduler for more information.
l The following table gives you information about the use of some scan types over other:
Scans Differences
Asset info Yes Yes Yes Yes Yes Yes Depends on Depends on
updates information information
gathered gathered
Information in OTX derives from both public and private entities. Alien Labs and other security
researchers constantly monitor, analyze, reverse engineer, and report on sophisticated
threats including malware, botnets, phishing campaigns, and more. An OTX pulse consists of
one or more Indicators of Compromise (IOCs) that constitute a threat or define a sequence of
actions that could be used to carry out an attack.
About OTX
AT&T Alien Labs™ Open Threat Exchange® (OTX™) is a threat data platform that provides
open access for all, allowing you to collaborate with a worldwide community of threat
researchers and security professionals.
On the OTX page, you can connect the deployed USM Anywhere Sensor to your OTX account.
Once connected, the sensor starts to receive raw pulse data from OTX and USM Anywhere
correlates that data.
When it detects Indicators of Compromise (IOCs) interacting with assets in your environment,
USM Anywhere generates related OTX pulse and IP Reputation-related security events and
alarms. The platform consists of these two chief components:
An IOC is an artifact observed on a network or in an end point, judged with a high degree of
confidence to be a threat vector. Examples of threat vectors include campaigns or
infrastructures used by an attacker. This table provides a list of IOC types:
File Hashes (MD5, A hash computation for a file that can be used to determine whether contents
SHA1, SHA256, of a file may have been altered or corrupted.
PEHASH, IMPHASH)
File Paths Unique location in a file system of a resource suspected of malicious activity.
Hostnames The hostname for a server located within a domain, suspected of malicious
(subdomains) activity.
MUTEX Name Mutual exclusion object allowing multiple program threads to share the same
resource. Mutexes are often used by malware as a mechanism to detect
whether a system has already been infected.
URI A uniform resource identifier (URI) that describes the explicit path to a file
hosted online, which is suspected of malicious activity.
URL Uniform resource locations (URLs) that summarizes the online location of a file
or resource associated with suspected malicious activity.
Note: AT&T Cybersecurity ensures that none of the data shared with OTX can be traced
to the contributor or their USM Anywhere deployment.
When you open an OTX account, you may elect to share IP Reputation data with other OTX
users. Any data you contribute are anonymous and secure.
Note: You can configure USM Anywhere to stop sharing IP Reputation data with OTX at
any time by visiting the Open Threat Exchange Configuration page.
IP Reliability
IP Reputation data derives from many data sources of differing reliability. Ranking in this case
is based on the relative number of reports regarding a malicious IP in relation to others
reported. If, for example, OTX receives 10 reports on a given IP address versus 20 on another,
it gives the IP with 10 reports a lower reliability ranking than the IP with 20 reports.
IP Priority
OTX ranks IP address priority, based on the behavior associated with each IP address listed.
For example, an IP address used as a scanning host receives a lower priority than an IP
address known to have been used as a Botnet server.
When you sign up for and connect your Open Threat Exchange® (OTX) account to your USM
Anywhere deployment, it configures USM Anywhere to receive raw pulse data and other IP
reputation information. (Reputation data is updated separately from OTX pulse information.)
USM Anywhere then correlates that data with incoming events, alerting you to OTX pulse and
IP Reputation-related security events and alarms when it detects IOCs interacting with assets
in your environment. Such interactions might consist of malicious IPs communicating with
systems, malware detected in your network, or outbound communication with command-
and-control (C&C) servers.
Connecting OTX to USM Anywhere helps manage risks and threats in these ways:
l USM Anywhere receives threat updates every 15 minutes in the form of raw data for all
pulses to which you subscribe, either directly or through subscriptions to other OTX users.
l You receive updates on your subscribed pulses by email, either individually as they occur or
in digest mode.
l You can review an OTX pulse activity feed containing detailed analytics about related
threat vectors reported by OTX.
l As soon as you log into USM Anywhere, you can see which pulses are most active in your
environment by looking at Open Threat Exchange Dashboard.
l USM Anywhere evaluates IOCs against all events as long as they are generated and gen-
erates an alarm when a malicious IP address communicates with any of your assets, or
when any other IOCs become active in your network.
See Entering Your OTX Key for more information about how to enter your OTX key.
added to the data stored for the event. This enables USM Anywhere to support some
additional features like re-prioritization of events and alarms depending on the IP of the hosts
involved.
The IP reputation list maintained by USM Anywhere is stored on the USM Anywhere Cloud.
Activity, Reliability, and Priority values provided by OTX are saved with event information for
those events having reputation data for either source or destination IP addresses.
The main purpose of the IP reputation list is to provide a list of known or potentially
dangerous IP addresses. If any alarm or event is generated by the action of a listed dangerous
IP address, then this event will have a smaller probability of being a false positive. This also
enables for the recalculation of event/alarm risk depending on its "IP Reliability" and "IP
Priority" values.
Note: Reputation events are anonymized and submitted to the AT&T Cybersecurity
OTX service for those customers who enable that capability in USM Anywhere. With the
feedback received from customer systems and all the other sources AT&T
Cybersecurity uses, the IP Reputation values are updated before being redistributed to
customers.
If any new events related to the pulse occur after that 24-hour period, USM Anywhere
generates a second alarm and a new correlation period begins. As an exception to this rule,
should an event contain data on record with OTX IP Reputation information, USM Anywhere
correlates the alarm, using its standard directive taxonomy.
Note: If an OTX pulse is creating too much noise and generating too many false positive
alarms, you can always just unsubscribe from the pulse.
USM Anywhere does not offer a filter for IP Reputation-based alarms. However, you can view
these within the Alarms list, where they occur. See Alarms List View for more information.
You can configure the columns/fields related to OTX information to be displayed in the list
and save your columns configuration to get back to it whenever you need it. See Configuring
Columns within List View for more information.
You can configure the columns and fields related to OTX information to be displayed in the
list and save your columns configuration to get back to it whenever you need it. See
Configuring Columns for more information.
Once you have made your selection, the Event list display will be updated to show only those
events matching the IP Reputation criteria you specified, plus OTX pulse information, if you
selected that option.
In the Events main page, you can click the icon to display the OTX IP Reputation
information available for an event. This icon opens the AlienVault OTX page.
Note: If the field is related to the name of a country, you should use the country
code defined by the ISO 3166.
Note: The Sources or Destinations field needs to match the universally unique
identifier (UUID) of the event or alarm. You can use the Source Name or Destination
Name field instead.
Important: Instead of using the equals and equals, case insensitive operators
for array fields, AT&T Cybersecurity recommends the use of the in or contains
operators.
Note: If you need to add a property value that maps with a property key, you need
to know the mapping of the field. See Determining the Mapping of a Field for more
information.
5. Click Next.
6. Enter a name for the rule.
7. Select an intent.
The intent describes the context of the behavior that is being observed. These intents
roughly map to the stages of the intrusion kill chains but are collapsed to ensure that
each is discrete. See Intent for more information about the available threat categories.
8. Enter a method.
If known, it is the method of attack or infiltration associated with the indicator that
generated the alarm.
Note: This is a required field; if you do not complete this field, the Save button
remains inactive.
9. Select a strategy.
The strategy describes the broad-based strategy or behavior that is detected. The
intention is to describe the malicious user's strategy to achieve their goal.
You can use the mute value to set the period of time during which, once an alarm is
createdUSM Anywhere will not create a new alarm based on the same conditions.
Note: Take care to set a mute duration that is long enough to cover the span of
time in which matching events will occur to maximize the efficacy of your mute.
Important: If your USM Anywhere™ is restarted when one of your alarm mutes is
active, or if there is an update or hotfix, the alarm mute will be canceled.
l Occurrences: Specify the number of event occurrences that produce a match on the
conditional expression to trigger the rule. You can enter the number of occurrences or
use the arrow to scroll the value up or down. You need to enter a number between 1
and 100.
l Length: Specify the length of the timespan used to identify a match for multiple
occurrences. Enter the number and choose a value of seconds, minutes, or hours.
This duration identifies the amount of time that transpires from the beginning to the
end of the occurrence. If the number of occurrences is not met within this period, the
rule is not a match.
In this example, the rule applies when the configured conditions happen five times
every three hours.
These two options function together to specify the number of occurrences within a time
period that will produce a match for the rule. For example, you can define a rule to trigger
an alarm for an unauthorized access attempt when a failed SSH login occurs three times
within a five-minute window.
13. Select the fields that you want to display in the generated alarm.
You can select or remove the fields you want to include in the details of the alarm by
clicking the and the icons.
The created rule displays in the list of rules. See Alarm Rules from the Orchestration Rules
Page for more information.
You need to sign up for an AT&T Alien Labs™ Open Threat Exchange® (OTX™) account and
have an OTX key if you want USM Anywhere to receive alerts based on threats identified in
OTX.
2. Enter the OTX key you obtained from the OTX API page.
3. Select the look-back period. See The Look-Back Period for more information.
A message displays at the top of the page to inform you about the success of the
Note: USM Anywhere displays if the subscription is enabled and if the OTX pulses are
up-to-date. If the OTX pulses are not up-to-date, USM Anywhere displays when they
have been updated.
A message displays at the top of the page to inform you about that the subscription has
been deleted.
Note: The configuration of a look-back period helps you to avoid alarms generated by
old pulses and without a current value.
You can define a look-back period, which uses pulses from the current date back for a certain
range of time that you choose. These are the look-back period options from which you can
choose:
l 1 month: Select this option to use pulses from the current day to the previous month.
l 3 months: Select this option to use pulses from the current day to the previous 3 months.
l 6 months: Select this option to use pulses from the current day to the previous 6 months.
l 1 year: Select this option to use pulses from the current day to the previous year.
l Unlimited: Select this option to use pulses without a restriction of time.
Important: The longer the selected period is, the higher the chance to get false
positives on obsolete information.
Note: The range of the look-back period that you choose adjusts according to what is
the current day of the month. This means that, for example, if you have chosen the 1
month option and it is the first day of the month, you will receive pulses from the
previous month, and when it is the fifth day of the month, you will receive pulses from
that fifth day of the month to the fifth day of the previous month.
3. Click Update.
A message displays at the top of the page to inform you that the OTX Subscription has
been updated.
Important: It takes some time if you update the look-back period, depending on
your selection.
After you install and set up the USM Anywhere Sensor, it communicates with USM Anywhere
in the cloud about the assets in your network. The USM Anywhere Sensor then transfers any
available raw log data to USM Anywhere in the cloud for correlation and event generation,
among other things.
Note: The number of sensors that you can add to your environment depends on your
USM Anywhere license. You can go to Settings > My Subscription to view the number
of licensed sensors. See Subscription Management for more information.
The Sensors page enables you to add new sensors, configure the deployed sensors, delete
and redeploy sensors, and edit a sensor for modifying the name or description. Go to Data
Sources > Sensors to open the Sensors main page. The page displays the list of sensors you
have deployed in your environment.
The following table lists the default columns in the Sensors page.
Sensor Name Name of the deployed sensor. The type of sensor is displayed below the
name.
Waiting for connection: The sensor has been added to the system, but
it is not connected.
Connection lost: The sensor has lost the connection. (Logs, including
NXLog messages, are cached locally and will be forwarded to USM
Anywhere when the connection resumes.)
The icon only displays when the sensor is not configured. Use this icon to go back to the
Use the icon to modify the sensor name or the sensor description. See Editing a Sensor
Use the icon to delete the sensor and deploy a new one. See Redeploying a Sensor for
more information. You can also use this button to delete the sensor permanently. See
Deleting a Sensor for more information.
You can also click a sensor to display the specific information about that sensor. See
Configuring a Sensor for more information.
After your USM Anywhere service is provisioned and running, you can add and deploy new
sensors as needed. For these sensors, instead of receiving an authentication code from AT&T
Cybersecurity, you must generate the license key for any new sensor you intend to add from
within the USM Anywhere web user interface (UI). The rest of the sensor deployment process
is the same as the first one.
Note: The number of sensors that you can add to your environment depends on your
USM Anywhere license. You can go to Settings > My Subscription to view the number
of licensed sensors. See Subscription Management for more information.
Note: If you want to modify your USM Anywhere license, please contact the AlienVault
Sales department.
l AWS Sensor: See Deploy the AWS Sensor for more information.
l Azure Sensor: See Deploy the USM Anywhere Sensor from the Azure Marketplace for
more information.
l GCP Sensor: See Deploy the GCP Sensor for more information.
l Hyper-V Sensor: See Create the Hyper-V Virtual Machine fore more information.
l VMware Sensor: See Create the VMware Virtual Machine fore more information.
2. Obtain an authentication code for the new sensor.
a. In USM Anywhere, go to Data Sources > Sensors.
Note: Users in an Investigator role are restricted from creating more than one
sensor. If your USM Anywhere License does not allow you to create more
sensors, this button will remain inactive.
The dialog box displays an authentication code for the new sensor. This code starts
with an "S".
Note: While the authentication code used for the very first sensor you create
begins with a "C", any additional sensors are authenticated with codes beginning
with "S".
Click or enter the URL of your sensor to get to the setup page. It prompts you to provide
the following information:
c. In the field with the computer icon ( ), copy and paste the URL of your existing
instance.
For example, if the subdomain with which you registered with AT&T Cybersecurity
was "mycompany", the URL would be mycompany.alienvault.cloud for USM
Anywhere, or mycompany.gov.alienvault.us for AT&T TDR for Gov.
Upon login, this displays the USM Anywhere Sensor Configuration page with the
connected sensor listed in the page.
l AWS Sensor: See Complete the AWS Sensor Setup for more information.
l Azure Sensor: See Complete the Azure Sensor Setup for more information.
l GCP Sensor: See Complete the GCP Sensor Setup for more information.
l Hyper-V Sensor: See Complete the Hyper-V Sensor Setup for more information.
l VMware Sensor: See Complete the VMware Sensor Setup for more information.
Note: If you do not want to complete the sensor setup immediately, you can click
Start Using USM Anywhere at the bottom of the page. However, AT&T
Cybersecurity strongly recommends that you do so now, because you must
complete the sensor setup before you can use it.
Configuring a Sensor
USM Anywhere enables you to modify the configuration data of your sensor.
To configure a sensor
The specific information about the sensor displays. The tabs are similar to the Setup
Wizard. See the Setup Wizard documentation for more information.
3. Click the available tabs to modify the data of the items that need to be modified.
Editing a Sensor
This option enables you to change the sensor name and the description of a sensor.
To edit a sensor
4. Click Save.
Assigning a Sensor
All assets that are detected by a sensor in the scan of your network are assigned
automatically to that sensor. If you have several sensors, the asset will be assigned to the
sensor that has detected the asset. An asset cannot be assigned to more than one sensor.
It is best practice to identify, prioritize, and organize assets. By doing so, you can limit the
scope of network security audits to subsections of your network, making scan results more
manageable. You can also more easily distribute assets to multiple users to facilitate the
delegation of responsibilities. USM Anywhere provides a way of organizing your assets. If you
have more than one sensor configured and you want to organize your assets in your network,
you may want to assign a different sensor from the one that was assigned automatically.
For this reason, you may need to edit shared properties of some assets to assign a sensor.
Luckily you do not have to edit these assets one by one. Instead, you can select all the
relevant assets and modify their shared properties in one go. USM Anywhere enables you to
perform the following tasks for your own asset organization, which saves time and resources:
l Set a sensor to an asset if you want to change the one that was assigned automatically.
l Set multiple assets at the same time. You can do this by performing a bulk operation. You
can set a sensor to several assets at the same time if you want to have certain assets
assigned to a particular sensor.
l Set a sensor to an asset group if you want to have a group of assets assigned to a par-
ticular sensor.
l Set all assets to send enrichment information to all sensors or only the primary sensor to
which the asset is assigned.
5. Click Save.
Redeploying a Sensor
USM Anywhere enables you to redeploy a sensor when needed. If you redeploy a sensor, all
the assets, AlienVault Agents, events, alarms, rules, and scheduler jobs are kept and linked to
the new sensor. However, if you delete the sensor instead, you will lose all the information
related to that sensor.
When a sensor is redeployed, the disk and memory states of the old sensor are discarded.
Customer-specific configurations, stored on the sensor due to compliance constraints, are
lost. Therefore, you must redo the following configurations after redeploying a sensor:
l All the settings you have modified for the old sensor.
You can find these settings by selecting Data Sources > Sensors and then your sensor.
This includes the credentials to access your virtual environment and your Active Directory
(AD) settings. See Sensors Page Overview for more information.
l All the certificates you have uploaded for log forwarding, which can be Graylog, syslog, or
NXLog.
You can find these settings by selecting Data Sources > Sensors on the Sensor Apps tab.
See Data Sources and Log Collection for more information.
l Advanced AlienApps configurations you have entered, API Client connections, and keys.
AlienApps operate through your chosen deployed sensor and use APIs to integrate with
the connected third-party technology. Select the sensor that can access the integration
endpoint. The HTTPS connections to the API originate from this sensor, so the sensor
must have network access to the AlienApp API endpoints. This may require authentication
via a key or certificate depending on the service provider. See Advanced AlienApps for
more information.
To redeploy a sensor
A dialog box opens showing the authentication code that you need for activating the new
sensor. Copy the code for later usage.
4. Deploy the sensor following the instructions in the Deployment Guide. Depending on the
type of sensor, you must follow different instructions.
Note: AT&T Cybersecurity recommends that you keep the same IP address as the
old sensor to minimize reconfiguration efforts.
5. Open a web browser, enter the IP address of the sensor, and connect the new sensor
using the authentication code you have copied.
This code instructs USM Anywhere to link the assets, AlienVault Agents, events, alarms,
rules, and scheduler jobs on the old sensor to the new sensor.
6. Configure your USM Anywhere Sensor following the steps in the Setup Wizard. See the
Setup Wizard documentation for more information.
7. Redo the relevant configurations discussed at the beginning of this section.
8. Verify that the redeployed sensor can receive data from your network.
Deleting a Sensor
USM Anywhere enables you to delete completely a sensor from your environment. Keep in
mind that if you delete a sensor, you will delete all assets and jobs related to that sensor.
To delete a sensor
Important: Keep in mind that if you terminate an AWS instance, an Azure virtual
machine, GCP virtual machine, or a VMware virtual machine, any assets that have
vulnerabilities associated with them will not be automatically deleted when the
discovery scan finds them terminated in AWS, Azure, or VMware vCenter/vSphere.
USM Anywhere Sensors sometimes disconnect from the USM Anywhere service (for example,
during an update process). There is a process every hour to verify if the sensor has been
disconnected for 30 minutes or longer. When this happens, USM Anywhere informs users in a
Manager role by email and generates an event. A new event is generated every 30 minutes
until the sensor reconnects.
Warning: Currently, the Sensor Appears Offline and Sensor Reconnected events are
generated at the same time as the regular events and system events. Soon, these
events will be generated only as system events. See Regular Events and System Events,
Orchestration Rule for the "Sensor Appears Offline" System Event, and Orchestration
Rule for the "Sensor Reconnected" System Event for more information.
Note: Logs, including NXLog messages, are cached locally and will be forwarded to USM
Anywhere when the connection resumes.
When a sensor disconnects from the USM Anywhere service, it sends an email notice within
two hours to the email address you used to sign into USM Anywhere (as long as you are in a
Manager role). This notice informs you that your sensor is not connected. You can
immediately take action to restore your service either by working with AT&T Cybersecurity
Technical Support or by making an environmental, network connectivity change.
The notification will be generated daily until the sensor is reconnected. After seven days, the
notifications will no longer be issued.
USM Anywhere checks every hour to verify whether the sensor has been reconnected. After
your sensor reconnects, you receive an email notification informing you that your service has
been restored. Because of this automated notification, you do not have to log in to the
product to check the sensor connection status. USM Anywhere generates an event when a
sensor reconnects.
The first match criteria for all rules must be the packet_type detail field:
7. Click Next.
8. Enter a name for the rule.
9. (Optional.) Enter a description for identifying this rule.
10. Select an intent.
The intent describes the context of the behavior that is being observed. These intents
roughly map to the stages of the intrusion kill chains but are collapsed to ensure that
each is discrete. See Intent for more information about the available threat categories.
If known, it is the method of attack or infiltration associated with the indicator that
generated the alarm.
1This packet type refers to configuration issues that are used to identify incorrect uses of certain fea-
tures. For example, the app for AWS assesses your configuration of AWS to identify insecure use of the
AWS security features.
Note: This is a required field; if you do not complete this field, the Save button
remains inactive.
The strategy describes the broad-based strategy or behavior that is detected. The
intention is to describe the malicious user's strategy to achieve their goal.
You can use the mute value to set the period of time during which, once an alarm is
createdUSM Anywhere will not create a new alarm based on the same conditions.
Note: Take care to set a mute duration that is long enough to cover the span of
time in which matching events will occur to maximize the efficacy of your mute.
Important: If your USM Anywhere™ is restarted when one of your alarm mutes is
active, or if there is an update or hotfix, the alarm mute will be canceled.
l Occurrences: Specify the number of event occurrences that produce a match on the
conditional expression to trigger the rule. You can enter the number of occurrences or
use the arrow to scroll the value up or down. You need to enter a number between 1
and 100.
l Length: Specify the length of the timespan used to identify a match for multiple
occurrences. Enter the number and choose a value of seconds, minutes, or hours.
This duration identifies the amount of time that transpires from the beginning to the
end of the occurrence. If the number of occurrences is not met within this period, the
rule is not a match.
In this example, the rule applies when the configured conditions happen five times
every three hours.
These two options function together to specify the number of occurrences within a time
period that will produce a match for the rule. For example, you can define a rule to trigger
an alarm for an unauthorized access attempt when a failed SSH login occurs three times
within a five-minute window.
16. (Optional.) Select the fields that you want to display in the generated alarm.
You can select or remove the fields you want to include in the details of the alarm. A field
passes from one column to the other by clicking it.
The created rule displays in the list of rules. You can see it from Settings > Rules >
Orchestration Rules. See Orchestration Rules for more information.
After you install and enable the AWS Cloud Connector, it communicates with USM Anywhere
in the cloud about the data stored in your Amazon S3 buckets. See AWS Cloud Connector for
more information.
Through USM Anywhere you can manage your Amazon Web Services (AWS) Cloud Connector
according to your needs. The AWS Cloud Connector page enables you to add new Cloud
Connectors, edit deployed Cloud Connectors, delete and redeploy Cloud Connectors, and edit
a Cloud Connector to modify its name or description. Go to Data Sources > Cloud
Connectors to open the Cloud Connectors main page.
The page displays the list of AWS Cloud Connectors you have deployed in your environment.
The following table lists the default columns that appear in the AWS Cloud Connector list
view, and their descriptions.
Type The Cloud Connector type. This value is always AWS S3.
List of the Default Columns in the AWS Cloud Connectors Page (Continued)
Idle: The Cloud Connector hasn't received data in the last hour.
Not receiving data: The Cloud Connector hasn't received data in the
latest 24 hours.
Error (24 HRS) Errors in the latest 24 hours. You can click the number of a row to open
the errors tab. See Viewing AWS Cloud Connector Details for more
information.
Enabled Icon to indicate and change the Cloud Connector from enabled ( )
to ( ) or vice versa.
Button to view, edit, and delete a Cloud Connector. See Viewing AWS
Cloud Connector Details, Editing an AWS Cloud Connector, and
Deleting an AWS Cloud Connector for more information.
Use the icon to expand the specific information about an AWS Cloud Connector. There is a
graph to see the bucket events by the latest 24 hours or past seven days, and a button to
download the associated AWS CloudFormation template. You can click the number below the
errors columns to open and see the detected errors. See Viewing AWS Cloud Connector
Details for more information.
It is necessary to add an Amazon Web Service (AWS) Cloud Connector into USM Anywhere to
enable it to receive the data stored in your Amazon Simple Storage Service (S3) buckets,
generate the related events in USM Anywhere with that data, and provide real-time alerting
to identify malicious activity.
7. Click Next.
See Downloading an Existing AWS Cloud Connector Template for more information.
9. Click Done.
Note: USM Anywhere generates a console user event when an AWS Cloud Connector is
created, modified, enabled, disabled, or deleted. See USM Anywhere Console User
Events List View for more information.
The Amazon Web Services (AWS) Cloud Connector details page provides in-depth
information on an AWS Cloud Connector. There is a graph to see the bucket events in the
latest 24 hours, and seven days, and a button to download the AWS CloudFormation
template. You can also find the details of the buckets related to that Cloud Connector and
see any detected errors.
2. Click the icon of the sensor for which you want to view its details, and then select
View Connector.
Note: Only users in Manager and Analyst roles can enable and disable AWS Cloud
Connectors.
USM Anywhere enables you to manage rules to files stored in your Amazon Simple Storage
Service (S3) bucket. Using a rule, USM Anywhere can match a file with a specific data source
and generate the related events. If the file doesn't match with a data source, then USM
Anywhere will create an event as an AlienVault Generic Data Source. See AlienVault Generic
Data Source for more information.
1. Go to Data Sources > Cloud Connectors to open the Cloud Connectors main page.
2. Click the icon of the cloud connector for which you want to open the data source
USM Anywhere enables you to add and apply rules to files stored in your Amazon Simple
Storage Service (S3) bucket.
To add a rule
1. Go to Data Sources > Cloud Connectors to open the Cloud Connectors main page.
2. Click the icon of the cloud connector for which you want to add a rule, and then select
View Connector.
3. Click the Data Source Rules tab.
6. (Optional.) In the Filenames Matching With field, use regular expressions (regex) to specify
a pattern that must be followed by the files.
If you don't specify anything, USM Anywhere will match all files in the Amazon S3 bucket
with the specified data source. See Using Regular Expressions in USM Anywhere for more
information.
For example:
/^AWSLogs\/595129146488\/CloudTrail
This expression pattern means that all files inside the CloudTrail folder will match with the
rule.
Important: If the file-name is not matching any rule, USM Anywhere tries to identify
the data source based on the file-name and the event format. The events are parsed
as generic if the data source can't be identified.
7. In the Data Sources field, enter the data source you want to match with the files.
If you enter more than one data source, USM Anywhere will try to match with the first
data source. If USM Anywhere can't generate an event, then it will try to match with the
following data source, and so on. If the file doesn't match with any data source, then USM
Anywhere will create an event as an AlienVault Generic Data Source. See AlienVault
Generic Data Source for more information.
8. Click Save.
This option enables you to change the data source rule name, the Filenames Matching With
field, and the Data Sources field.
To edit a rule
1. Go to Data Sources > Cloud Connectors to open the Cloud Connectors main page.
2. Click the icon of the cloud connector for which you want to edit the rule, and then
4. Click the icon of the connector source you want to edit the rule.
To delete a rule
1. Go to Data Sources > Cloud Connectors to open the Cloud Connectors main page.
2. Click the icon of the sensor for which you want to open the data source rules tab, and
4. Click the icon of the connector source to which you want to delete the rule.
5. Click Delete.
USM Anywhere enables you to edit an Amazon Web Service (AWS) Cloud Connector. This
option enables you to change the region where you want to deploy the AWS CloudFormation
template and the name of your AWS Cloud Connector.
2. Click the icon of the sensor for which you want to edit, and then select Edit
Connector.
Note: USM Anywhere generates a console user event when an AWS Cloud Connector is
created, modified, enabled, disabled, or deleted. See USM Anywhere Console User
Events List View for more information.
USM Anywhere helps you in generating an Amazon Web Service (AWS) CloudFormation
template that you need for gathering data from your Amazon Simple Storage Service (S3)
buckets.
To download an Amazon Web Services (AWS) Cloud Connector template from the
Cloud Connectors main page
2. Click the icon to expand the specific information about the AWS Cloud Connector
The s3connector-template.json file downloads. This is the default name of the file, but
you can change it.
4. Open you AWS Management Console page and upload the template.
To download an AWS Cloud Connector template from the details page of a Cloud
Connector
2. Click the icon of the sensor for which you want to download the template, and then
The s3connector-template.json file downloads. This is the default name of the file, but
you can change it.
4. Open you AWS Management Console page and upload the template.
To download an AWS Cloud Connector template when you add a Cloud Connector
3. Select the AWS Cloud Connector type in case you have more than one.
4. Enter your AWS account identifier (ID).
5. Select the region where you want to deploy the AWS CloudFormation template.
7. Click Next.
The s3connector-template.json file downloads. This is the default name of the file, but
you can change it.
9. Open you AWS Management Console page and upload the template.
USM Anywhere generates system events when your Amazon Web Services (AWS) Cloud
Connector fails and there is an error in an Amazon simple Storage Service (S3) file. Through
these events, you have the option of retrying to process the Amazon S3 file.
1. Go to Settings > System Events to open the System Events main page.
2. Use the Event Name filter to search the AWS S3 collector errors.
5. Click Retry.
Note: After clicking Retry, USM Anywhere tries to process the file again. If the file
can't be read, a new system event is generated.
USM Anywhere enables you to completely delete an Amazon Web Services (AWS) Cloud
Connector from your environment.
2. Click the icon of the sensor for which you want to delete, and then select Delete.
3. Click Delete.
Note: USM Anywhere generates a console user event when an AWS Cloud Connector is
created, modified, enabled, disabled, or deleted. See USM Anywhere Console User
Events List View for more information.
With a USM Anywhere license, you can always view your subscription data in one place. Use
the My Subscription page to access your license information, event data, and raw log data
and to connect to a USM Central instance.
Subscription Data
Go to Settings > My Subscription to open the page.
The following table lists the fields you see on the page.
Field Description
License Usage
Consumed The amount of data USM Anywhere has processed every month.
Data
Field Description
Projected Data The amount of data already stored for the month plus calculated data storage
Consumption needs for the rest of the month. See Projected Data Consumption for more
information.
Sensors The number of licensed sensors and pending deployment sensors. Click Manage
Sensors to open the Sensors page. See Sensors Page Overview for more
information.
Filtering Rules Number of filtering rules in your environment. Click Manage Rules to open the
Filtering Rules page. See Filtering Rules from the Orchestration Rules Page for
more information.
Data The health status of your subscription's data consumption, reflecting real data
Consumption consumption rates compared to your subscription tier over time: healthy, caution,
Status warning, violation, or recovery. See Understanding Your Data Consumption Status
for more information.
License Information
Service Tier The monthly storage limit. See the AT&T Cybersecurity pricing page for details or
to request a quote.
License End Either the trial expiration date (for trial licenses) or support end date (for
Date subscription licenses). The displayed date depends on your computer's time zone.
Field Description
Cold Storage Click Export Raw Logs to download the raw log files in ZIP format. See Raw Log
Data for more information. By default, cold storage is unlimited for USM Anywhere
customers within their service terms but unlimited for AT&T Threat Detection and
Response for Government (AT&T TDR for Gov) customers for three years. Keep in
mind these points:
l You can export raw logs for a 31-day month, but you are limited to a 31-day span
if the range exceeds a single month.
l The start time is 00:00:00 on the start date selected, and the end time is 23:59:59
on the end date selected. So if you select from 1/1/2020 to 2/1/2020, the logs
start at 00:00:00 1/1/2020 and end at 23:59:59 2/1/2020.
MSSP Status Indicates whether the USM Anywhere deployment has been successfully
connected to a USM Central or not. See Connecting a USM Anywhere to a USM
Central for more information.
Historical Data A list of data consumption by month. Click Download CSV to download a file with
Consumption this information.
Top Data Displays a list of the top data sources. Click Download CSV to download a file with
Sources this information.
Top Event List of the top event names related to their data source. Click Download CSV to
Names download a file with this information.
Top Reporting List of top reporting devices. Click Download CSV to download a file with this
Devices information.
Important: AT&T Cybersecurity recommends that you download the raw log data on a
monthly basis.
When requesting raw log files, the date range cannot exceed 31 days. To download more
than 31 days' worth of data, you must make multiple requests. Refrain from making all
requests at the same time, which may tie up your USM Anywhere instance. You can
make two or three requests, wait for the emails to arrive, and then make your next
requests.
3. Select a date range to download the raw log files in ZIP format (dates are in UTC).
The Log Files Requested dialog box opens to inform you that your request is being
processed. This process can take up to 24 hours.
Important: The beginning date can't be earlier than your first day of storage.
5. Click OK.
7. Extract the zipped bundle, and you will see the files listed as forensics-YYYY-MM-DD.h-
h.log.gz, where YYYY-MM-DD.hh refers to the date and hour.
On the My Subscription page, USM Anywhere displays the total data you have consumed for
the month, the remaining data to be consumed, and the projected data you will consume
based on your current usage. The service tier specified on your license determines the
amount of data you're allowed to consume each month.
The Projected Data Consumption field is calculated using the following formula:
projectedMonthDataConsumption = currentMonthDataConsumption +
(consumptionInLast24Hours * (hoursLeftInCurrentMonth/24))
Where:
For example, in a 30-day month, if at the end of the 15th day the instance has received 10 TB
of data and the consumption in the last 24h is 0.48TB (20GB/h), the projected data
consumption will be 10 TB + (0.48 TB * (360h / 24h)) = 17.2 TB.
The Projected Data Consumption field is crucial because it provides an estimate on how much
data you will consume by the end of the month. This number should never exceed your
allocated monthly usage. Exceeding the monthly limit automatically transitions your USM
Anywhere into one of four Consumption Modes, determined by the degree to which you have
exceeded your tier. More importantly, USM Anywhere's performance deteriorates. System
process time increases, causing the sensor cache to fill up and the sensor to disconnect.
Note: See Understanding Your Data Consumption Status for more information on these
Consumption Modes.
AT&T Cybersecurity recommends that you monitor your projected data consumption early
and constantly so that you can perform countermeasures when you're expected to exceed
your monthly limit. You can reduce consumption by monitoring fewer networks, cutting down
the number of data sources, or creating filtering rules to restrict data collection.
On the same My Subscription page, there is a chart that displays the data collected during the
current period.
On the lower side of the page, there are three tables that show the breakdown of how much
data is being processed by each data source, event names, and reporting device. You can use
the Last 24 Hours filter for identifying data during the last hour, last 24 hours, last 7 days, last
30 days, or last 90 days. You can also configure your own period of time by clicking the
Custom Range option. This option enables you to customize a range. When you click Custom
Range, a calendar opens. You can choose the first and last day to delimit your search by
clicking the days on the calendar or entering the days directly. Then select the hours, minutes,
and seconds by clicking the specific box. Finally, select AM or PM.
Click Download CSV to create a comma-separated value (CSV) file detailing the specific
information of each table in a spreadsheet.
The My Subscription page displays if your deployment has been connected to a USM Central
or if there are no connections.
Deployment Status
USM Central is a unified console that gives you a single place to monitor and manage multiple
USM deployments. USM Anywhere displays if you have your deployment connected to a USM
Central, the status of that connection, the domain, and when it was connected.
Status Description
Connection A connection request was initiated from the deployment and the request was
Denied denied from the USM Central console.
Connection A connection request was initiated from the deployment and is awaiting an
Request Sent acceptance or denial.
You can accept or decline the request in the USM Central console.
3. Click Connect.
4. Enter the domain for the USM Central instance.
5. Click Connect.
The connection is not complete until the user accepts the connection request. See USM
Central Connections for more information.
Once the request has been accepted, the deployment has been connected.
3. Click Disconnect.
Your environment has a limited data consumption allotment that depends on your
subscription tier. Exceeding your allotted data consumption tier may result in temporary
limitations to your product performance or available features while you make necessary
changes to your USM Anywhere configuration to reduce your data consumption to a pace
that is appropriate to your tier.
AT&T Cybersecurity strives to guarantee that no data is lost, even when you're facing
inadequate storage space or processing power. Because of this, USM Anywhere always makes
data storage a top priority. When you exceed your data tier, or are projected to far exceed
your tier, your system tries to store as much data as possible, even if functionality must be
reduced to preserve the data. For instance, if you find that you are over your data tier, you
may find that your USM Anywhere has transitioned into one of four possible data
consumption tiers. In these tiers, your USM Anywhere may experience some small limitations
to its functionality, such as paused correlation, asset counters, and more. All functionality is
restored once your USM Anywhere is no longer experiencing resource limitations.
Important: Tier options do not have unlimited processing power, memory allotment, or
disk input/output (I/O) speeds. In addition to storage per month, your deployment size's
impact on any of these factors will influence which tier option is right for your
environment. AT&T Cybersecurity recommends pre-deployment sizing discussions with
your sales representative to help select the right tier for you.
Note: If the events per second (EPS) threatens to impact your sensor's capacity, USM
Anywhere may engage EPS Adaptive Response. EPS Adaptive Response enables your
system to take more time to process events coming in by throttling your EPS, which
keeps your system running without risking event loss. See Protecting Your Sensor's
Performance with EPS Adaptive Response to read more about EPS Adaptive Response.
USM Anywhere sends an email to warn you that it has reached your data consumption tier.
The account receiving this email is the one associated with your license.
In addition to the email, there are two types of in-product alerts designed to ensure that you
are aware of your environment's data consumption status. All users will see these product
alerts in your environment.
When you log in to your environment, if your data consumption status is anything other than
healthy you will be greeted with a dialog box informing you that your consumption allotment
has been exceeded and informing you of the reductions in performance (if any) that are tied
to your current data consumption status. This dialog box also contains some recommended
next steps to help you improve your system's data consumption.
Once you have logged into USM Anywhere, if your consumption status is anything other than
healthy you will continue to see a small banner across the top of your user interface (UI).
To refrain from reaching your monthly limit, AT&T Cybersecurity recommends that you
create filtering rules to restrict data collection.
USM Anywhere sends three emails four days apart to warn you that you are going to reach
your data consumption tier. USM Anywhere sends these emails to the address assigned to
the license.
Besides the yellow announcement, a dialog box opens if your environment is going to exceed
your data consumption tier each time you log in to USM Anywhere.
Caution Mode
As soon as your environment has consumed more data than is allotted by your subscription
tier, your subscription enters Caution Mode. An environment whose subscription is in Caution
Mode operates normally. While there is no direct change to your USM Anywhere features or
performance, you will be notified that your consumption status has changed.
If your environment remains in Caution Mode for three consecutive months, you will be
automatically transitioned into Warning Mode.
Warning Mode
Once your data consumption has exceeded 125% of your tier's data allowance, or if your
subscription has been in Caution Mode for more than three consecutive months, your
subscription enters Warning Mode. An environment in Warning Mode will operate normally,
except that no new sensors or integrations can be set up or configured while in this mode.
If your environment remains in Warning Mode for two consecutive months, you will be
automatically transitioned into Violation Mode.
Violation Mode
If your data consumption exceeds 150% of your tier's data allowance, or if your subscription
has been in Warning Mode for two consecutive months, your subscription enters Violation
Mode. In Violation Mode, no new sensors or integrations can be configured, and the product
enters a "transient mode", where searches are limited to the most recent 24 hours for events,
alarms, and vulnerabilities.
When running in transient mode, USM Anywhere no longer stores events in the hot storage or
searchable data store, but will still generate alarms, run authenticated asset scans, and store
raw logs associated with events in cold storage. This transient mode ends when you start a
new month (based on your anniversary start date) or if you upgrade your subscription tier. If
your environment has exceeded your data consumption tier, a red announcement displays in
your USM Anywhere to warn you about it.
Recovery Mode
While your environment is in Caution, Warning, or Violation Mode, you can request to enter
Recovery Mode. In Recovery Mode, your environment will operate with no restrictions, and
USM Anywhere will re-evaluate your environment's projected monthly data consumption
over a period of 24 hours. If your projected monthly data consumption reassessment is under
the threshold for your subscription tier, your environment will remain in Recovery Mode.
If your projected data consumption is still above the tier threshold after the 24-hour
reassessment, your environment will transition out of Recovery Mode and into the mode
appropriate to your new projected data consumption.
Note: Please contact the AT&T Cybersecurity Sales department if you need to upgrade
your subscription tier or modify your license.
Note: The report feature in AT&T TDR for Gov works differently compared to USM
Anywhere. See Reports in AT&T TDR for Gov for more information.
l Saved Reports — This page contains all of the reports that have been saved in USM Any-
where. You can filter the reports by category and whether they are scheduled to run at set
intervals (see Scheduled Reports for more information). You can edit, copy, or delete the
reports from this page, or review previously run reports. See Saved Reports on USM Any-
where for more information.
l Compliance Templates. Report templates related to Payment Card Industry (PCI),
National Institute of Standards Technology Cybersecurity Framework (NIST CSF), Health
Insurance Portability and Accountability Act (HIPAA), and ISO 27001 compliance protocols
are accessible from this page. See USM Anywhere Compliance Templates for more inform-
ation.
l Event Type Templates. Report templates based event data sources or types of event
data sources are contained on this page. See USM Anywhere Event Type Templates for
more information.
You can also create custom reports from the Create an Alarms Report, Create an Assets
Report, and Create an Events Report pages.
The Saved Reports page contains a list of all the reports that have been saved in USM
Anywhere. From this page you can edit, copy, delete, or run any of the reports you have saved.
The reports listed on the page can be filtered by category or scheduled status. You can also
click the icon next to any of the saved reports to view their export history or download a
Note: Read Only users can view saved reports, but they cannot edit, copy, delete, or run
reports.
Note: The report feature in AT&T TDR for Gov works differently compared to USM
Anywhere. See Reports in AT&T TDR for Gov for more information.
2. Click Edit Filters to add any additional filters you want to include in the report.
3. Select the date range for the information included in the report.
You can select a predefined range of Last Hour, Last 24 Hours, Last 7 Days, or Last 30
Days, or you can set your own date range by clicking the icon.
Note: This option is not available when generating reports for assets or asset
groups.
5. Under Repeat, click the drop-down list to select how often you want the scheduled report
to be generated.
If you don't want the report to be recurring, leave the selection as Never.
If you have selected a time interval for recurring reports to be generated, the First Run
Date, Repeat On, and Time sections show up below the Repeat section:
l First Run Date: Select the day you want the first report to be generated.
l Schedule: Define the frequency at which the report is generated. Options are Daily,
Weekly, Bi-Weekly, Monthly, or Yearly. Select Never if you only want to run the report
once.
l Time: Select the UTC time you want the reports to run on the days they're generated.
6. In the Email Addresses section, enter the email addresses of the people to whom you
want the report to be sent when it is generated. Select Enable Link Expiration if you
want the link to the report to expire after 14 days.
11. Select Save & Run to save your report and run it, or select Run if you don't wish to keep
the report in your Saved Reports page.
l PCI: Payment Card Industry Data Security Standards (PCI DSS) is a set of security stand-
ards designed to ensure that all companies that accept, process, store, or transmit credit
card information maintain a secure environment. These reports are identified and based
on specific PCI DSS requirements to provide the auditor with the specific information
requested. For example, PCI DSS requirement 10.7.a: Retain audit trail history for at least
one year, with a minimum of three months immediately available for analysis. See PCI DSS
Compliance Templates for more information.
l NIST CSF. The National Institute of Standards Technology (NIST) Cybersecurity Frame-
work provides a policy framework of computer security guidance for how private sector
organizations can assess and improve their ability to prevent, detect, and respond to cyber
attacks. See NIST CSF Compliance Templates for more information.
l HIPAA. The Health Insurance Portability and Accountability Act (HIPAA) sets the standard
for protecting sensitive patient data. Any company that deals with protected health
information (PHI) must ensure that all the required physical, network, and process security
measures are in place and followed. This includes covered entities, anyone who provides
treatment, payment and operations in healthcare, and business associates, anyone with
access to patient information and provides support in treatment, payment, or operations.
Subcontractors, or business associates of business associates, must also be in compliance.
See HIPAA Compliance Templates for more information.
l ISO 27001. ISO/IEC 27001 provides guidance for implementing information security con-
trols to achieve a consistent and reliable security program. The ISO and the International
Electrotechnical Commission (IEC) developed 27001 to provide requirements for an inform-
ation security management system (ISMS). See ISO 27001 Compliance Templates for more
information.
The Payment Card Industry Data Security Standards (PCI DSS) are a set of technical and
operational requirements designed to ensure that all companies that process, store, or
transmit credit card information maintain a secure environment. Administered by the PCI
Security Standards Council, the PCI standard requires validation of compliance on an annual
basis.
This section includes the descriptions for PCI DSS compliance templates on USM Anywhere:
The report generated from this template provides a list of all Login Failure events that USM
Anywhere records. The following table shows the event filters used by this template:
Field Values
Event Name "PAM authentication failure", "Failed password", "SSH connection: Failed
password", "PAM X more authentication failures", "Authentication failure",
"FAILED su"
Suppressed False
3. Click Edit Filters if you want to modify the selected filters, and then Continue to Filters.
Do the modifications you need, and then click Edit Report.
4. Click the date field if you want to choose a different date range.
Choose Last Hour, Last 24 Hours, Last 7 Days, Last 30 Days, Last 90 Days, or Custom
Range to set a particular date range.
5. Under the Format section, select either CSV or PDF for the format of the report.
6. Select if you want to generate the report again, and choose Never, Daily, Weekly, Bi-
weekly, and Monthly.
7. Enter an email address to send the report. Select the Send to my Email Address option
to add your email automatically.
8. Select the Enable link expiration option. This link is delivered by email and expires in 14
days.
9. Click Next.
10. In the Report Name field, enter a name for the report. This name will be displayed in the
Saved Reports page.
11. (Optional.) Add a description that will be included.
12. Under the Number of records section, choose the maximum number of records to include
on the report: 20, 50, 100, 500, 1000, or 2500.
13. If you have chosen the PDF format, you will see the Graphs section, which you can use to
include additional views. You can add or remove graphs included in the report by clicking
the and the icons.
14. Select Save & Run if you wish to keep the report in your Saved Reports on USM Any-
where page and receive the report in the indicated email.
15. Click Run to run the report.
This report provides a list of all Login Failure events that USM Anywhere records. The
following table shows the event filters used by this template:
Field Values
Category "Security"
Field Values
Reporting Device Rule "4625", "529", "530", "531", "532", "533", "534", "53", "536", "537", "539"
ID
Suppressed False
3. Click Edit Filters if you want to modify the selected filters, and then Continue to Filters.
Do the modifications you need, and then click Edit Report.
4. Click the date field if you want to choose a different date range.
Choose Last Hour, Last 24 Hours, Last 7 Days, Last 30 Days, Last 90 Days, or Custom
Range to set a particular date range.
5. Under the Format section, select either CSV or PDF for the format of the report.
6. Select if you want to generate the report again, and choose Never, Daily, Weekly, Bi-
weekly, and Monthly.
7. Enter an email address to send the report. Select the Send to my Email Address option
to add your email automatically.
8. Select the Enable link expiration option. This link is delivered by email and expires in 14
days.
9. Click Next.
10. In the Report Name field, enter a name for the report. This name will be displayed in the
Saved Reports page.
11. (Optional.) Add a description that will be included.
12. Under the Number of records section, choose the maximum number of records to include
on the report: 20, 50, 100, 500, 1000, or 2500.
13. If you have chosen the PDF format, you will see the Graphs section, which you can use to
include additional views. You can add or remove graphs included in the report by clicking
the and the icons.
14. Select Save & Run if you wish to keep the report in your Saved Reports on USM Any-
where page and receive the report in the indicated email.
15. Click Run to run the report.
The report generated from this template provides a list of all privilege escalations and the
performed action. The following table shows the event filters used by this template:
Field Values
Suppressed False
3. Click Edit Filters if you want to modify the selected filters, and then Continue to Filters.
Do the modifications you need, and then click Edit Report.
4. Click the date field if you want to choose a different date range.
Choose Last Hour, Last 24 Hours, Last 7 Days, Last 30 Days, Last 90 Days, or Custom
Range to set a particular date range.
5. Under the Format section, select either CSV or PDF for the format of the report.
6. Select if you want to generate the report again, and choose Never, Daily, Weekly, Bi-
weekly, and Monthly.
7. Enter an email address to send the report. Select the Send to my Email Address option
to add your email automatically.
8. Select the Enable link expiration option. This link is delivered by email and expires in 14
days.
9. Click Next.
10. In the Report Name field, enter a name for the report. This name will be displayed in the
Saved Reports page.
11. (Optional.) Add a description that will be included.
12. Under the Number of records section, choose the maximum number of records to include
on the report: 20, 50, 100, 500, 1000, or 2500.
13. If you have chosen the PDF format, you will see the Graphs section, which you can use to
include additional views. You can add or remove graphs included in the report by clicking
the and the icons.
14. Select Save & Run if you wish to keep the report in your Saved Reports on USM Any-
where page and receive the report in the indicated email.
15. Click Run to run the report.
The report generated from this template provides a list of any changes, additions, or
deletions to any account that a root or administrator user has made. The following table
shows the event filters used by this template:
Field Values
Category "Security"
Suppressed False
3. Click Edit Filters if you want to modify the selected filters, and then Continue to Filters.
Do the modifications you need, and then click Edit Report.
4. Click the date field if you want to choose a different date range.
Choose Last Hour, Last 24 Hours, Last 7 Days, Last 30 Days, Last 90 Days, or Custom
Range to set a particular date range.
5. Under the Format section, select either CSV or PDF for the format of the report.
6. Select if you want to generate the report again, and choose Never, Daily, Weekly, Bi-
weekly, and Monthly.
7. Enter an email address to send the report. Select the Send to my Email Address option
to add your email automatically.
8. Select the Enable link expiration option. This link is delivered by email and expires in 14
days.
9. Click Next.
10. In the Report Name field, enter a name for the report. This name will be displayed in the
Saved Reports page.
11. (Optional.) Add a description that will be included.
12. Under the Number of records section, choose the maximum number of records to include
on the report: 20, 50, 100, 500, 1000, or 2500.
13. If you have chosen the PDF format, you will see the Graphs section, which you can use to
include additional views. You can add or remove graphs included in the report by clicking
the and the icons.
14. Select Save & Run if you wish to keep the report in your Saved Reports on USM Any-
where page and receive the report in the indicated email.
15. Click Run to run the report.
The report generated from this template provides a list of any changes, additions, or
deletions to any account that a root or administrator user has made. The following table
shows the event filters used by this template:
Field Values
Event Name "User added", "User removed", "User Account", "New user added", "User
added to group", "User deleted"
Suppressed False
3. Click Edit Filters if you want to modify the selected filters, and then Continue to Filters.
Do the modifications you need, and then click Edit Report.
4. Click the date field if you want to choose a different date range.
Choose Last Hour, Last 24 Hours, Last 7 Days, Last 30 Days, Last 90 Days, or Custom
Range to set a particular date range.
5. Under the Format section, select either CSV or PDF for the format of the report.
6. Select if you want to generate the report again, and choose Never, Daily, Weekly, Bi-
weekly, and Monthly.
7. Enter an email address to send the report. Select the Send to my Email Address option
to add your email automatically.
8. Select the Enable link expiration option. This link is delivered by email and expires in 14
days.
9. Click Next.
10. In the Report Name field, enter a name for the report. This name will be displayed in the
Saved Reports page.
11. (Optional.) Add a description that will be included.
12. Under the Number of records section, choose the maximum number of records to include
on the report: 20, 50, 100, 500, 1000, or 2500.
13. If you have chosen the PDF format, you will see the Graphs section, which you can use to
include additional views. You can add or remove graphs included in the report by clicking
the and the icons.
14. Select Save & Run if you wish to keep the report in your Saved Reports on USM Any-
where page and receive the report in the indicated email.
15. Click Run to run the report.
The report generated from this template provides a list of any changes, additions, or
deletions to any account that a root or administrator user has made. The following table
shows the event filters used by this template:
Field Values
Category "Security"
Field Values
Suppressed False
3. Click Edit Filters if you want to modify the selected filters, and then Continue to Filters.
Do the modifications you need, and then click Edit Report.
4. Click the date field if you want to choose a different date range.
Choose Last Hour, Last 24 Hours, Last 7 Days, Last 30 Days, Last 90 Days, or Custom
Range to set a particular date range.
5. Under the Format section, select either CSV or PDF for the format of the report.
6. Select if you want to generate the report again, and choose Never, Daily, Weekly, Bi-
weekly, and Monthly.
7. Enter an email address to send the report. Select the Send to my Email Address option
to add your email automatically.
8. Select the Enable link expiration option. This link is delivered by email and expires in 14
days.
9. Click Next.
10. In the Report Name field, enter a name for the report. This name will be displayed in the
Saved Reports page.
11. (Optional.) Add a description that will be included.
12. Under the Number of records section, choose the maximum number of records to include
on the report: 20, 50, 100, 500, 1000, or 2500.
13. If you have chosen the PDF format, you will see the Graphs section, which you can use to
include additional views. You can add or remove graphs included in the report by clicking
the and the icons.
14. Select Save & Run if you wish to keep the report in your Saved Reports on USM Any-
where page and receive the report in the indicated email.
15. Click Run to run the report.
This view provides a summary of USM Anywhere hot and cold storage, satisfying the
requirements for PCI DSS 10.7.a.
The View link goes to the My Subscription page (Settings > My Subscription). See
Subscription Management for more information.
The report generated from this template provides a view of the last 90 days of events that is
available for analysis, and satisfies the requirements for PCI DSS 10.7.c. The following table
shows the event filters used by this template:
Field Values
Suppressed False
3. Click Edit Filters if you want to modify the selected filters, and then Continue to Filters.
Do the modifications you need, and then click Edit Report.
4. Click the date field if you want to choose a different date range.
Choose Last Hour, Last 24 Hours, Last 7 Days, Last 30 Days, Last 90 Days, or Custom
Range to set a particular date range.
5. Under the Format section, select either CSV or PDF for the format of the report.
6. Select if you want to generate the report again, and choose Never, Daily, Weekly, Bi-
weekly, and Monthly.
7. Enter an email address to send the report. Select the Send to my Email Address option
to add your email automatically.
8. Select the Enable link expiration option. This link is delivered by email and expires in 14
days.
9. Click Next.
10. In the Report Name field, enter a name for the report. This name will be displayed in the
Saved Reports page.
11. (Optional.) Add a description that will be included.
12. Under the Number of records section, choose the maximum number of records to include
on the report: 20, 50, 100, 500, 1000, or 2500.
13. If you have chosen the PDF format, you will see the Graphs section, which you can use to
include additional views. You can add or remove graphs included in the report by clicking
the and the icons.
14. Select Save & Run if you wish to keep the report in your Saved Reports on USM Any-
where page and receive the report in the indicated email.
15. Click Run to run the report.
The report generated from this template provides a view of the file integrity monitoring (FIM)
events that the use of change-detection mechanism satisfies in PCI DSS 11.5.a - Linux. The
following table shows the event filters used by this template:
Field Values
Suppressed False
3. Click Edit Filters if you want to modify the selected filters, and then Continue to Filters.
Do the modifications you need, and then click Edit Report.
4. Click the date field if you want to choose a different date range.
Choose Last Hour, Last 24 Hours, Last 7 Days, Last 30 Days, Last 90 Days, or Custom
Range to set a particular date range.
5. Under the Format section, select either CSV or PDF for the format of the report.
6. Select if you want to generate the report again, and choose Never, Daily, Weekly, Bi-
weekly, and Monthly.
7. Enter an email address to send the report. Select the Send to my Email Address option
to add your email automatically.
8. Select the Enable link expiration option. This link is delivered by email and expires in 14
days.
9. Click Next.
10. In the Report Name field, enter a name for the report. This name will be displayed in the
Saved Reports page.
11. (Optional.) Add a description that will be included.
12. Under the Number of records section, choose the maximum number of records to include
on the report: 20, 50, 100, 500, 1000, or 2500.
13. If you have chosen the PDF format, you will see the Graphs section, which you can use to
include additional views. You can add or remove graphs included in the report by clicking
the and the icons.
14. Select Save & Run if you wish to keep the report in your Saved Reports on USM Any-
where page and receive the report in the indicated email.
15. Click Run to run the report.
The report generated from this template provides a view of the FIM events that the use of
change-detection mechanism satisfies in PCI DSS 11.5.a - Windows. The following table shows
the event filters used by this template:
Field Values
Event Name "File attributes modified", "File Updated", "File Accessed", "File Created", "File
Deleted", "File Moved From", "File Moved To", "File Opened", "Folder Event",
"Unmount"
Suppressed False
3. Click Edit Filters if you want to modify the selected filters, and then Continue to Filters.
Do the modifications you need, and then click Edit Report.
4. Click the date field if you want to choose a different date range.
Choose Last Hour, Last 24 Hours, Last 7 Days, Last 30 Days, Last 90 Days, or Custom
Range to set a particular date range.
5. Under the Format section, select either CSV or PDF for the format of the report.
6. Select if you want to generate the report again, and choose Never, Daily, Weekly, Bi-
weekly, and Monthly.
7. Enter an email address to send the report. Select the Send to my Email Address option
to add your email automatically.
8. Select the Enable link expiration option. This link is delivered by email and expires in 14
days.
9. Click Next.
10. In the Report Name field, enter a name for the report. This name will be displayed in the
Saved Reports page.
11. (Optional.) Add a description that will be included.
12. Under the Number of records section, choose the maximum number of records to include
on the report: 20, 50, 100, 500, 1000, or 2500.
13. If you have chosen the PDF format, you will see the Graphs section, which you can use to
include additional views. You can add or remove graphs included in the report by clicking
the and the icons.
14. Select Save & Run if you wish to keep the report in your Saved Reports on USM Any-
where page and receive the report in the indicated email.
15. Click Run to run the report.
The report generated from this template provides proof that threat assessments are being
performed on all systems set up for a vulnerability scan. This report may not be run if
vulnerability scans are not set up on all systems mentioned in PCI DSS 5.1.2. The following
table shows the event filters used by this template:
Field Values
3. Click Edit Filters if you want to modify the selected filters, and then Continue to Filters.
Do the modifications you need, and then click Edit Report.
4. Click the date field if you want to choose a different date range.
Choose Last Hour, Last 24 Hours, Last 7 Days, Last 30 Days, Last 90 Days, or Custom
Range to set a particular date range.
5. Under the Format section, select either CSV or PDF for the format of the report.
6. Select if you want to generate the report again, and choose Never, Daily, Weekly, Bi-
weekly, and Monthly.
7. Enter an email address to send the report. Select the Send to my Email Address option
to add your email automatically.
8. Select the Enable link expiration option. This link is delivered by email and expires in 14
days.
9. Click Next.
10. In the Report Name field, enter a name for the report. This name will be displayed in the
Saved Reports page.
11. (Optional.) Add a description that will be included.
12. Under the Number of records section, choose the maximum number of records to include
on the report: 20, 50, 100, 500, 1000, or 2500.
13. If you have chosen the PDF format, you will see the Graphs section, which you can use to
include additional views. You can add or remove graphs included in the report by clicking
the and the icons.
14. Select Save & Run if you wish to keep the report in your Saved Reports on USM Any-
where page and receive the report in the indicated email.
15. Click Run to run the report.
The report generated from this template provides a proof that vulnerabilities are being
assigned with a risk ranking in the severity field. The following table shows the event filters
used by this template:
Field Values
3. Click Edit Filters if you want to modify the selected filters, and then Continue to Filters.
Do the modifications you need, and then click Edit Report.
4. Click the date field if you want to choose a different date range.
Choose Last Hour, Last 24 Hours, Last 7 Days, Last 30 Days, Last 90 Days, or Custom
Range to set a particular date range.
5. Under the Format section, select either CSV or PDF for the format of the report.
6. Select if you want to generate the report again, and choose Never, Daily, Weekly, Bi-
weekly, and Monthly.
7. Enter an email address to send the report. Select the Send to my Email Address option
to add your email automatically.
8. Select the Enable link expiration option. This link is delivered by email and expires in 14
days.
9. Click Next.
10. In the Report Name field, enter a name for the report. This name will be displayed in the
Saved Reports page.
11. (Optional.) Add a description that will be included.
12. Under the Number of records section, choose the maximum number of records to include
on the report: 20, 50, 100, 500, 1000, or 2500.
13. If you have chosen the PDF format, you will see the Graphs section, which you can use to
include additional views. You can add or remove graphs included in the report by clicking
the and the icons.
14. Select Save & Run if you wish to keep the report in your Saved Reports on USM Any-
where page and receive the report in the indicated email.
15. Click Run to run the report.
The report generated from this template proves that account lockouts are taking place on
monitored devices. Note that this report is predefined for Microsoft Windows but can be
modified to include other devices as well. The following table shows the event filters used by
this template:
Field Values
Category "Security"
Suppressed False
3. Click Edit Filters if you want to modify the selected filters, and then Continue to Filters.
Do the modifications you need, and then click Edit Report.
4. Click the date field if you want to choose a different date range.
Choose Last Hour, Last 24 Hours, Last 7 Days, Last 30 Days, Last 90 Days, or Custom
Range to set a particular date range.
5. Under the Format section, select either CSV or PDF for the format of the report.
6. Select if you want to generate the report again, and choose Never, Daily, Weekly, Bi-
weekly, and Monthly.
7. Enter an email address to send the report. Select the Send to my Email Address option
to add your email automatically.
8. Select the Enable link expiration option. This link is delivered by email and expires in 14
days.
9. Click Next.
10. In the Report Name field, enter a name for the report. This name will be displayed in the
Saved Reports page.
11. (Optional.) Add a description that will be included.
12. Under the Number of records section, choose the maximum number of records to include
on the report: 20, 50, 100, 500, 1000, or 2500.
13. If you have chosen the PDF format, you will see the Graphs section, which you can use to
include additional views. You can add or remove graphs included in the report by clicking
the and the icons.
14. Select Save & Run if you wish to keep the report in your Saved Reports on USM Any-
where page and receive the report in the indicated email.
15. Click Run to run the report.
The report generated from this template provides instances of plain text passwords on the
network. The absence of these events satisfies the requirements. The following table shows
the event filters used by this template:
Field Values
Suppressed False
3. Click Edit Filters if you want to modify the selected filters, and then Continue to Filters.
Do the modifications you need, and then click Edit Report.
4. Click the date field if you want to choose a different date range.
Choose Last Hour, Last 24 Hours, Last 7 Days, Last 30 Days, Last 90 Days, or Custom
Range to set a particular date range.
5. Under the Format section, select either CSV or PDF for the format of the report.
6. Select if you want to generate the report again, and choose Never, Daily, Weekly, Bi-
weekly, and Monthly.
7. Enter an email address to send the report. Select the Send to my Email Address option
to add your email automatically.
8. Select the Enable link expiration option. This link is delivered by email and expires in 14
days.
9. Click Next.
10. In the Report Name field, enter a name for the report. This name will be displayed in the
Saved Reports page.
11. (Optional.) Add a description that will be included.
12. Under the Number of records section, choose the maximum number of records to include
on the report: 20, 50, 100, 500, 1000, or 2500.
13. If you have chosen the PDF format, you will see the Graphs section, which you can use to
include additional views. You can add or remove graphs included in the report by clicking
the and the icons.
14. Select Save & Run if you wish to keep the report in your Saved Reports on USM Any-
where page and receive the report in the indicated email.
15. Click Run to run the report.
This section includes the descriptions for NIST CSF compliance templates on USM Anywhere:
l NIST CSC Control PR.IP-12: A Vulnerability Management Plan is Developed and Imple-
mented
l NIST CSC Control PR.PT-1: Audit/Log Records Are Determined, Documented, Implemented,
and Reviewed in Accordance with Policy
l NIST CSF Control DE.AE-2: Detected Events Are Analyzed to Understand Attack Targets
and Methods
l NIST CSF Control DE.AE-3: Event Data Are Aggregated and Correlated from Multiple
Sources and Sensors
Information Protection Processes and Procedures (PR.IP): Security policies (that address
purpose, scope, roles, responsibilities, management commitment, and coordination among
organizational entities), processes, and procedures are maintained and used to manage
protection of information systems and assets. Note on Control: This report shows that
vulnerabilities are being identified, partially satisfying the control. An update policy would
need to be in place for this to be fully satisfied. Associated Frameworks: ISO/IEC 27001:2013
A.12.6.1, A.18.2.2, NIST SP 800-53 Rev. 4 RA-3, RA-5, SI-2.
The following table shows the event filters used by this template:
Filters Used by NIST CSC Control PR.IP-12: A Vulnerability Management Plan is Developed and
Implemented
Field Values
4. Click Edit Filters if you want to modify the selected filters, and then Continue to Filters.
Do the modifications you need, and then click Edit Report.
5. Click the date field if you want to choose a different date range.
Choose Last Hour, Last 24 Hours, Last 7 Days, Last 30 Days, Last 90 Days, or Custom
Range to set a particular date range.
6. Under the Format section, select either CSV or PDF for the format of the report.
7. Select if you want to generate the report again, and choose Never, Daily, Weekly, Bi-
weekly, and Monthly.
8. Enter an email address to send the report. Select the Send to my Email Address option
to add your email automatically.
9. Select the Enable link expiration option. This link is delivered by email and expires in 14
days.
10. Click Next.
11. In the Report Name field, enter a name for the report. This name will be displayed in the
Saved Reports page.
12. (Optional.) Add a description that will be included.
13. Under the Number of records section, choose the maximum number of records to include
on the report: 20, 50, 100, 500, 1000, or 2500.
14. If you have chosen the PDF format, you will see the Graphs section, which you can use to
include additional views. You can add or remove graphs included in the report by clicking
the and the icons.
15. Select Save & Run if you wish to keep the report in your Saved Reports on USM Any-
where page and receive the report in the indicated email.
16. Click Run to run the report.
Protective Technology (PR.PT): Technical security solutions are managed to ensure the
security and resilience of systems and assets, consistent with related policies, procedures,
and agreements. Note on Control: This Control can be partially satisfied by having logs
available in USM Anywhere for log review. The user is responsible for their own log review
process for the rest of the control. Associated Frameworks: CCS CSC 14, COBIT 5 APO11.04,
ISA 62443-2-1:2009 4.3.3.3.9, 4.3.3.5.8, 4.3.4.4.7, 4.4.2.1, 4.4.2.2, 4.4.2.4, ISA 62443-3-3:2013 SR 2.8,
SR 2.9, SR 2.10, SR 2.11, SR 2.12, ISO/IEC 27001:2013 A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, NIST
SP 800-53 Rev. 4 AU Family.
The following table shows the event filters used by this template:
Filters Used by NIST CSC Control PR.PT-1: Audit/Log Records Are Determined, Documented,
Implemented, and Reviewed in Accordance with Policy
Field Values
Suppressed False
4. Click Edit Filters if you want to modify the selected filters, and then Continue to Filters.
Do the modifications you need, and then click Edit Report.
5. Click the date field if you want to choose a different date range.
Choose Last Hour, Last 24 Hours, Last 7 Days, Last 30 Days, Last 90 Days, or Custom
Range to set a particular date range.
6. Under the Format section, select either CSV or PDF for the format of the report.
7. Select if you want to generate the report again, and choose Never, Daily, Weekly, Bi-
weekly, and Monthly.
8. Enter an email address to send the report. Select the Send to my Email Address option
to add your email automatically.
9. Select the Enable link expiration option. This link is delivered by email and expires in 14
days.
10. Click Next.
11. In the Report Name field, enter a name for the report. This name will be displayed in the
Saved Reports page.
12. (Optional.) Add a description that will be included.
13. Under the Number of records section, choose the maximum number of records to include
on the report: 20, 50, 100, 500, 1000, or 2500.
14. If you have chosen the PDF format, you will see the Graphs section, which you can use to
include additional views. You can add or remove graphs included in the report by clicking
the and the icons.
15. Select Save & Run if you wish to keep the report in your Saved Reports on USM Any-
where page and receive the report in the indicated email.
16. Click Run to run the report.
NIST CSF Control DE.AE-2: Detected Events Are Analyzed to Understand Attack
Targets and Methods
Anomalies and Events (DE.AE): Anomalous activity is detected in a timely manner and the
potential impact of events is understood. Note on Control: This control is partially satisfied by
alarms being available for investigation and response, but requires the user to have an
investigation and response policy utilizing the available logs. Associated Frameworks: ISA
62443-2-1:2009 4.3.4.5.6, 4.3.4.5.7, 4.3.4.5.8, ISA 62443-3-3:2013 SR 2.8, SR 2.9, SR 2.10, SR 2.11, SR
2.12, SR 3.9, SR 6.1, SR 6.2, ISO/IEC 27001:2013 A.16.1.1, A.16.1.4, NIST SP 800-53 Rev. 4 AU-6, CA-7,
IR-4, SI-4.
The following table shows the event filters used by this template:
Filters Used by NIST CSF Control DE.AE-2: Detected Events Are Analyzed to Understand Attack
Targets and Methods
Field Values
Suppressed False
4. Click Edit Filters if you want to modify the selected filters, and then Continue to Filters.
Do the modifications you need, and then click Edit Report.
5. Click the date field if you want to choose a different date range.
Choose Last Hour, Last 24 Hours, Last 7 Days, Last 30 Days, Last 90 Days, or Custom
Range to set a particular date range.
6. Under the Format section, select either CSV or PDF for the format of the report.
7. Select if you want to generate the report again, and choose Never, Daily, Weekly, Bi-
weekly, and Monthly.
8. Enter an email address to send the report. Select the Send to my Email Address option
to add your email automatically.
9. Select the Enable link expiration option. This link is delivered by email and expires in 14
days.
10. Click Next.
11. In the Report Name field, enter a name for the report. This name will be displayed in the
Saved Reports page.
12. (Optional.) Add a description that will be included.
13. Under the Number of records section, choose the maximum number of records to include
on the report: 20, 50, 100, 500, 1000, or 2500.
14. If you have chosen the PDF format, you will see the Graphs section, which you can use to
include additional views. You can add or remove graphs included in the report by clicking
the and the icons.
15. Select Save & Run if you wish to keep the report in your Saved Reports on USM Any-
where page and receive the report in the indicated email.
16. Click Run to run the report.
NIST CSF Control DE.AE-3: Event Data Are Aggregated and Correlated from Mul-
tiple Sources and Sensors
Anomalies and Events (DE.AE): Anomalous activity is detected in a timely manner and the
potential impact of events is understood. The Default Fields satisfy this control by showing
different sensors and hosts send events to USM Anywhere. Associated Frameworks: ISA
62443-3-3:2013 SR 6.1, NIST SP 800-53 Rev. 4 AU-6, CA-7, IR-4, IR-5, IR-8, SI-4.
The following table shows the event filters used by this template:
Filters Used by NIST CSF Control DE.AE-3: Event Data Are Aggregated and Correlated from Mul-
tiple Sources and Sensors
Field Values
Suppressed False
4. Click Edit Filters if you want to modify the selected filters, and then Continue to Filters.
Do the modifications you need, and then click Edit Report.
5. Click the date field if you want to choose a different date range.
Choose Last Hour, Last 24 Hours, Last 7 Days, Last 30 Days, Last 90 Days, or Custom
Range to set a particular date range.
6. Under the Format section, select either CSV or PDF for the format of the report.
7. Select if you want to generate the report again, and choose Never, Daily, Weekly, Bi-
weekly, and Monthly.
8. Enter an email address to send the report. Select the Send to my Email Address option
to add your email automatically.
9. Select the Enable link expiration option. This link is delivered by email and expires in 14
days.
10. Click Next.
11. In the Report Name field, enter a name for the report. This name will be displayed in the
Saved Reports page.
12. (Optional.) Add a description that will be included.
13. Under the Number of records section, choose the maximum number of records to include
on the report: 20, 50, 100, 500, 1000, or 2500.
14. If you have chosen the PDF format, you will see the Graphs section, which you can use to
include additional views. You can add or remove graphs included in the report by clicking
the and the icons.
15. Select Save & Run if you wish to keep the report in your Saved Reports on USM Any-
where page and receive the report in the indicated email.
16. Click Run to run the report.
Anomalies and Events (DE.AE): Anomalous activity is detected in a timely manner and the
potential impact of events is understood. Associated Frameworks: COBIT 5 APO12.06, ISA
62443-2-1:2009 4.2.3.10, NIST SP 800-53 Rev. 4 IR-4, IR-5, IR-8.
The View link goes to the orchestration rules page (Settings > Rules). See Rules
Management for more information.
Security Continuous Monitoring (DE.CM): The information system and assets are monitored
at discrete intervals to identify cybersecurity events and verify the effectiveness of
protective measures. Since all events could be attributed to user events, and all events are
run through the correlation engine, this control is satisfied by the default view. Associated
Frameworks: ISA 62443-3-3:2013 SR 6.2, ISO/IEC 27001:2013 A.12.4.1, NIST SP 800-53 Rev. 4 AC-
2, AU-12, AU-13, CA-7, CM-10, CM-11.
The following table shows the event filters used by this template:
Filters Used by NIST CSF Control DE.CM-3: Personnel Activity Is Monitored to Detect Potential
Cybersecurity Events
Field Values
Suppressed False
4. Click Edit Filters if you want to modify the selected filters, and then Continue to Filters.
Do the modifications you need, and then click Edit Report.
5. Click the date field if you want to choose a different date range.
Choose Last Hour, Last 24 Hours, Last 7 Days, Last 30 Days, Last 90 Days, or Custom
Range to set a particular date range.
6. Under the Format section, select either CSV or PDF for the format of the report.
7. Select if you want to generate the report again, and choose Never, Daily, Weekly, Bi-
weekly, and Monthly.
8. Enter an email address to send the report. Select the Send to my Email Address option
to add your email automatically.
9. Select the Enable link expiration option. This link is delivered by email and expires in 14
days.
10. Click Next.
11. In the Report Name field, enter a name for the report. This name will be displayed in the
Saved Reports page.
12. (Optional.) Add a description that will be included.
13. Under the Number of records section, choose the maximum number of records to include
on the report: 20, 50, 100, 500, 1000, or 2500.
14. If you have chosen the PDF format, you will see the Graphs section, which you can use to
include additional views. You can add or remove graphs included in the report by clicking
the and the icons.
15. Select Save & Run if you wish to keep the report in your Saved Reports on USM Any-
where page and receive the report in the indicated email.
16. Click Run to run the report.
Security Continuous Monitoring (DE.CM): The information system and assets are monitored
at discrete intervals to identify cybersecurity events and verify the effectiveness of
protective measures. Since all events could be attributed to user events, and all events are
run through the correlation engine, this control is satisfied by the default view. Associated
Frameworks: ISA 62443-3-3:2013 SR 6.2, ISO/IEC 27001:2013 A.12.4.1, NIST SP 800-53 Rev. 4 AC-
2, AU-12, AU-13, CA-7, CM-10, CM-11.
The following table shows the event filters used by this template:
Field Values
Suppressed False
4. Click Edit Filters if you want to modify the selected filters, and then Continue to Filters.
Do the modifications you need, and then click Edit Report.
5. Click the date field if you want to choose a different date range.
Choose Last Hour, Last 24 Hours, Last 7 Days, Last 30 Days, Last 90 Days, or Custom
Range to set a particular date range.
6. Under the Format section, select either CSV or PDF for the format of the report.
7. Select if you want to generate the report again, and choose Never, Daily, Weekly, Bi-
weekly, and Monthly.
8. Enter an email address to send the report. Select the Send to my Email Address option
to add your email automatically.
9. Select the Enable link expiration option. This link is delivered by email and expires in 14
days.
10. Click Next.
11. In the Report Name field, enter a name for the report. This name will be displayed in the
Saved Reports page.
12. (Optional.) Add a description that will be included.
13. Under the Number of records section, choose the maximum number of records to include
on the report: 20, 50, 100, 500, 1000, or 2500.
14. If you have chosen the PDF format, you will see the Graphs section, which you can use to
include additional views. You can add or remove graphs included in the report by clicking
the and the icons.
15. Select Save & Run if you wish to keep the report in your Saved Reports on USM Any-
where page and receive the report in the indicated email.
16. Click Run to run the report.
Security Continuous Monitoring (DE.CM): The information system and assets are monitored
at discrete intervals to identify cybersecurity events and verify the effectiveness of
protective measures. Unauthorized access to accounts will partially satisfy the control.
Associated Frameworks: NIST SP 800-53 Rev. 4 AU-12, CA-7, CM-3, CM-8, PE-3, PE-6, PE-20, SI-
4.
The following table shows the event filters used by this template:
Filters Used by NIST CSF Control DE.CM-7: Monitoring for Unauthorized Personnel, Connections,
Devices, and Software Is Performed
Field Values
Event Name "Admin login failed", "An account failed to log on", "An account failed to log
on.", "Login - Login Failure", "Login failed", "Multiple Windows Logon Failures",
"Multiple failed logins", "Secure Shell: LOGINFAIL", "Session 'Circular Kernel
Context Logger' failed to start with the following error", "Syslog connection
failed", "USER_Login: Failed", "User login failed", "UserLoginFailed", "Windows
DC Logon Failure", "event: LoginFailed", "load balancer: SSH Login failed",
"Account locked out", "Account locked-out"
Suppressed False
4. Click Edit Filters if you want to modify the selected filters, and then Continue to Filters.
Do the modifications you need, and then click Edit Report.
5. Click the date field if you want to choose a different date range.
Choose Last Hour, Last 24 Hours, Last 7 Days, Last 30 Days, Last 90 Days, or Custom
Range to set a particular date range.
6. Under the Format section, select either CSV or PDF for the format of the report.
7. Select if you want to generate the report again, and choose Never, Daily, Weekly, Bi-
weekly, and Monthly.
8. Enter an email address to send the report. Select the Send to my Email Address option
to add your email automatically.
9. Select the Enable link expiration option. This link is delivered by email and expires in 14
days.
10. Click Next.
11. In the Report Name field, enter a name for the report. This name will be displayed in the
Saved Reports page.
12. (Optional.) Add a description that will be included.
13. Under the Number of records section, choose the maximum number of records to include
on the report: 20, 50, 100, 500, 1000, or 2500.
14. If you have chosen the PDF format, you will see the Graphs section, which you can use to
include additional views. You can add or remove graphs included in the report by clicking
the and the icons.
15. Select Save & Run if you wish to keep the report in your Saved Reports on USM Any-
where page and receive the report in the indicated email.
16. Click Run to run the report.
Security Continuous Monitoring (DE.CM): The information system and assets are monitored
at discrete intervals to identify cybersecurity events and verify the effectiveness of
protective measures. The Authenticated vulnerability scan log in the linked view shows that
vulnerability scans are ran, and will satisfy this control. Associated Frameworks: COBIT 5
BAI03.10, ISA 62443-2-1:2009 4.2.3.1, 4.2.3.7, ISO/IEC 27001:2013 A.12.6.1, NIST SP 800-53 Rev. 4
RA-5.
The View link goes to the job scheduler of asset scans page (Settings > Scheduler > Asset
Scans). See Scheduling Asset Scans from the Job Scheduler Page for more information.
Detection Processes (DE.DP): Detection processes and procedures are maintained and tested
to ensure timely and adequate awareness of anomalous events. Within the user settings view,
the receive alarms notification checkbox satisfies this control. Associated Frameworks: COBIT
5 APO12.06, ISA 62443-2-1:2009 4.3.4.5.9, ISA 62443-3-3:2013 SR 6.1, ISO/IEC 27001:2013 A.16.1.2,
NIST SP 800-53 Rev. 4 AU-6, CA-2, CA-7, RA-5, SI-4.
The View link goes to the users list page (Settings > Users). See USM Anywhere User
Management for more information.
NIST CSF Control ID.AM-1: Physical Devices and Systems within the Organ-
ization Are Inventoried
Asset Management (ID.AM): The data, personnel, devices, systems, and facilities that enable
the organization to achieve business purposes are identified and managed consistent with
their relative importance to business objectives and the organization’s risk strategy. This can
partially satisfy the control by providing a list of network assets, or fully satisfy the control in
some cases. Associated Frameworks: CCS CSC 1, COBIT 5 BAI09.01, BAI09.02, ISA 62443-2-
1:2009 4.2.3.4, ISA 62443-3-3:2013 SR 7.8, ISO/IEC 27001:2013 A.8.1.1, A.8.1.2, NIST SP 800-53 Rev.
4 CM-8.
This report shows the assets list by using the "NIST CSF Control ID.AM-1: Physical Devices and
Systems within the Organization are Inventoried" view.
Note: This report doesn't have selected filters because it goes directly to an asset
inventory.
4. Click Edit Filters if you want to modify the selected filters, and then Continue to Filters.
Do the modifications you need, and then click Edit Report.
5. Click the date field if you want to choose a different date range.
Choose Last Hour, Last 24 Hours, Last 7 Days, Last 30 Days, Last 90 Days, or Custom
Range to set a particular date range.
6. Under the Format section, select either CSV or PDF for the format of the report.
7. Select if you want to generate the report again, and choose Never, Daily, Weekly, Bi-
weekly, and Monthly.
8. Enter an email address to send the report. Select the Send to my Email Address option
to add your email automatically.
9. Select the Enable link expiration option. This link is delivered by email and expires in 14
days.
10. Click Next.
11. In the Report Name field, enter a name for the report. This name will be displayed in the
Saved Reports page.
12. (Optional.) Add a description that will be included.
13. Under the Number of records section, choose the maximum number of records to include
on the report: 20, 50, 100, 500, 1000, or 2500.
14. If you have chosen the PDF format, you will see the Graphs section, which you can use to
include additional views. You can add or remove graphs included in the report by clicking
the and the icons.
15. Select Save & Run if you wish to keep the report in your Saved Reports on USM Any-
where page and receive the report in the indicated email.
16. Click Run to run the report.
NIST CSF Control ID.AM-5: Resources (E.G., Hardware, Devices, Data, and Soft-
ware) Are Prioritized Based on their Classification, Criticality, and Business
Value
Asset Management (ID.AM): The data, personnel, devices, systems, and facilities that enable
the organization to achieve business purposes are identified and managed consistent with
their relative importance to business objectives and the organization’s risk strategy.
Hardware and devices can be prioritized into asset groups, satisfying part of the control.
Associated Frameworks: COBIT 5 APO03.03, APO03.04, BAI09.02, ISA 62443-2-1:2009 4.2.3.6,
ISO/IEC 27001:2013 A.8.2.1, NIST SP 800-53 Rev. 4 CP-2, RA-2, SA-14.
This report shows the asset groups list by using the "NIST CSF Control ID.AM-5: Resources
(e.g., Hardware, Devices, Data, and Software) are Prioritized Based on their Classification,
Criticality, and Business Value" view.
4. Note: This report doesn't have selected filters because it goes directly to an asset
inventory.
5. Click Edit Filters if you want to modify the selected filters, and then Continue to Filters.
Do the modifications you need, and then click Edit Report.
6. Click the date field if you want to choose a different date range.
Choose Last Hour, Last 24 Hours, Last 7 Days, Last 30 Days, Last 90 Days, or Custom
Range to set a particular date range.
7. Under the Format section, select either CSV or PDF for the format of the report.
8. Select if you want to generate the report again, and choose Never, Daily, Weekly, Bi-
weekly, and Monthly.
9. Enter an email address to send the report. Select the Send to my Email Address option
to add your email automatically.
10. Select the Enable link expiration option. This link is delivered by email and expires in 14
days.
11. Click Next.
12. In the Report Name field, enter a name for the report. This name will be displayed in the
Saved Reports page.
13. (Optional.) Add a description that will be included.
14. Under the Number of records section, choose the maximum number of records to include
on the report: 20, 50, 100, 500, 1000, or 2500.
15. If you have chosen the PDF format, you will see the Graphs section, which you can use to
include additional views. You can add or remove graphs included in the report by clicking
the and the icons.
16. Select Save & Run if you wish to keep the report in your Saved Reports on USM Any-
where page and receive the report in the indicated email.
17. Click Run to run the report.
NIST CSF Control ID.RA-1: Asset Vulnerabilities Are Identified and Documented
The following table shows the event filters used by this template:
Filters Used by NIST CSF Control ID.RA-1: Asset Vulnerabilities Are Identified and Documented
Field Values
4. Click Edit Filters if you want to modify the selected filters, and then Continue to Filters.
Do the modifications you need, and then click Edit Report.
5. Click the date field if you want to choose a different date range.
Choose Last Hour, Last 24 Hours, Last 7 Days, Last 30 Days, Last 90 Days, or Custom
Range to set a particular date range.
6. Under the Format section, select either CSV or PDF for the format of the report.
7. Select if you want to generate the report again, and choose Never, Daily, Weekly, Bi-
weekly, and Monthly.
8. Enter an email address to send the report. Select the Send to my Email Address option
to add your email automatically.
9. Select the Enable link expiration option. This link is delivered by email and expires in 14
days.
10. Click Next.
11. In the Report Name field, enter a name for the report. This name will be displayed in the
Saved Reports page.
12. (Optional.) Add a description that will be included.
13. Under the Number of records section, choose the maximum number of records to include
on the report: 20, 50, 100, 500, 1000, or 2500.
14. If you have chosen the PDF format, you will see the Graphs section, which you can use to
include additional views. You can add or remove graphs included in the report by clicking
the and the icons.
15. Select Save & Run if you wish to keep the report in your Saved Reports on USM Any-
where page and receive the report in the indicated email.
16. Click Run to run the report.
NIST CSF Control ID.RA-2: Threat and Vulnerability Information is Received from
Information Sharing Forums and Sources
Control Description Access Control (ID.RA): Access to assets and associated facilities is limited
to authorized users, processes, or devices, and to authorized activities and transactions.
Associated Frameworks: ISA 62443-2-1:2009 4.2.3, 4.2.3.9, 4.2.3.12, ISO/IEC 27001:2013 A.6.1.4,
NIST SP 800-53 Rev. 4 PM- 15, PM- 16, SI-5.
The View link goes to the OTX dashboard page (Dashboard > Open Threat Exchange). See
Open Threat Exchange Dashboard for more information.
NIST CSF Control PR.AC-1: Identities and Credentials Are Managed for Author-
ized Devices and Users
Access Control (PR.AC): Access to assets and associated facilities is limited to authorized
users, processes, or devices, and to authorized activities and transactions. Note on Control:
Showing user login events will satisfy this control. Associated Frameworks: CCS CSC 16, COBIT
5 DSS05.04, DSS06.03, ISA 62443-2-1:2009 4.3.3.5.1, ISA 62443-3-3:2013 SR 1.1, SR 1.2, SR 1.3, SR
1.4, SR 1.5, SR 1.7, SR 1.8, SR 1.9, ISO/IEC 27001:2013 A.9.2.1, A.9.2.2, A.9.2.4, A.9.3.1, A.9.4.2, A.9.4.3,
NIST SP 800-53 Rev. 4 AC-2, IA Family.
The following table shows the event filters used by this template:
Filters Used by NIST CSF Control PR.AC-1: Identities and Credentials Are Managed for Author-
ized Devices and Users
Field Values
Event Name "A logon was attempted using explicit credentials", "AUTHN_LOGIN_EVENT",
"Admin - Change Password On Next Login", "Admin login", "Admin login failed",
"Admin login successful", "Agent login succeeded", "Attempt to login using a
non-existent user", "Audit Event Dispatcher: login message", "Console Login",
"Console user login", "FTP login", "LOGIN", "LOGON", "Login", "Login - Login
Challenge", "Login - Login Failure", "Login - Successful Login", "Login OK",
"Login Success", "Login attempt", "Login failed", "Login succeeded", "Login
success", "Login successful. Accepted password", "Logon", "Multiple Windows
Logon Failures", "Multiple failed logins", "Network Security Manager Login
succeeded", "PasswordLogonInitialAuthUsingPassword", "Secure Shell:
LOGINFAIL", "Special Logon", "Special privileges assigned to new logon",
"UNSUCCESSFUL_LOGIN", "USER_LOGIN", "USER_LOGINx", "USER_Login: Failed",
"User Logon", "User Logon Notification for Customer Experience Improvement
Program", "User login", "User login failed", "User login successful", "User logon
detected Account", "UserLoginFailed", "VPN zone remote user login allowed",
"Windows DC Logon Failure", "Windows Logon Success", "event: LoginFailed",
"load balancer: SSH Login failed", "load balancer: SSH login accepted", "login",
"login query"
Suppressed False
4. Click Edit Filters if you want to modify the selected filters, and then Continue to Filters.
Do the modifications you need, and then click Edit Report.
5. Click the date field if you want to choose a different date range.
Choose Last Hour, Last 24 Hours, Last 7 Days, Last 30 Days, Last 90 Days, or Custom
Range to set a particular date range.
6. Under the Format section, select either CSV or PDF for the format of the report.
7. Select if you want to generate the report again, and choose Never, Daily, Weekly, Bi-
weekly, and Monthly.
8. Enter an email address to send the report. Select the Send to my Email Address option
to add your email automatically.
9. Select the Enable link expiration option. This link is delivered by email and expires in 14
days.
10. Click Next.
11. In the Report Name field, enter a name for the report. This name will be displayed in the
Saved Reports page.
12. (Optional.) Add a description that will be included.
13. Under the Number of records section, choose the maximum number of records to include
on the report: 20, 50, 100, 500, 1000, or 2500.
14. If you have chosen the PDF format, you will see the Graphs section, which you can use to
include additional views. You can add or remove graphs included in the report by clicking
the and the icons.
15. Select Save & Run if you wish to keep the report in your Saved Reports on USM Any-
where page and receive the report in the indicated email.
16. Click Run to run the report.
Analysis (RS.AN): Analysis is conducted to ensure adequate response and support recovery
activities. Note on Control: Orchestration rules are available to automatically run forensics on
alarms and events. Having the output of these forensic scans available for reporting would
satisfy this control. Associated Frameworks: ISA 62443-3-3:2013 SR 2.8, SR 2.9, SR 2.10, SR 2.11,
SR 2.12, SR 3.9, SR 6.1, ISO/IEC 27001:2013 A.16.1.7, NIST SP 800-53 Rev. 4 AU-7, IR-4.
The View link goes to the orchestration rules page (Settings > Rules). See Rules
Management for more information.
The Health Insurance Portability and Accountability Act (HIPAA) sets the standard for
protecting sensitive patient data. Any company that deals with protected health information
(PHI) must ensure that all the required physical, network, and process security measures are
in place and followed. This includes covered entities, anyone who provides treatment,
payment and operations in healthcare, and business associates, anyone with access to
patient information and provides support in treatment, payment, or operations.
Subcontractors, or business associates of business associates, must also be in compliance.
This section includes the descriptions for HIPAA compliance templates on USM Anywhere:
The "HIPAA A03 §164.308(a)(1)(ii)(A) - Does your practice categorize its information systems
based on the potential impact to your practice should they become unavailable?" report
generated from this template provides a risk analysis that is the process of identifying the
risks to system security and determining the likelihood of occurrence, the resulting impact,
and the additional safeguards that mitigate this impact. Part of risk management and
synonymous with risk assessment. Consider whether your practice categorizes its
information systems as high, moderate or low impact systems. Consider that information
system categorization helps your practice to scope audits and prioritize investments for
security mitigation. Consider whether your practice’s risk analysis is designed to protect its
information systems and ePHI that it processes, stores, and transmits from unauthorized
access, use, disclosure, disruption, change, or damage. Consider whether your practice’s risk
analysis: Identifies threats. Identifies vulnerabilities inherent in its technology, processes,
workforce, and vendors. Contemplates the likelihood of occurrence. Estimates the potential
magnitude of harm.
This report shows the asset groups list by using the "HIPAA A03 §164.308(a)(1)(ii)(A) - Does
your practice categorize its information systems based on the potential impact to your
practice should they become unavailable?" view.
3. Click Edit Filters if you want to modify the selected filters, and then Continue to Filters.
Do the modifications you need, and then click Edit Report.
4. Click the date field if you want to choose a different date range.
Choose Last Hour, Last 24 Hours, Last 7 Days, Last 30 Days, Last 90 Days, or Custom
Range to set a particular date range.
5. Under the Format section, select either CSV or PDF for the format of the report.
6. Select if you want to generate the report again, and choose Never, Daily, Weekly, Bi-
weekly, and Monthly.
7. Enter an email address to send the report. Select the Send to my Email Address option
to add your email automatically.
8. Select the Enable link expiration option. This link is delivered by email and expires in 14
days.
9. Click Next.
10. In the Report Name field, enter a name for the report. This name will be displayed in the
Saved Reports page.
11. (Optional.) Add a description that will be included.
12. Under the Number of records section, choose the maximum number of records to include
on the report: 20, 50, 100, 500, 1000, or 2500.
13. If you have chosen the PDF format, you will see the Graphs section, which you can use to
include additional views. You can add or remove graphs included in the report by clicking
the and the icons.
14. Select Save & Run if you wish to keep the report in your Saved Reports on USM Any-
where page and receive the report in the indicated email.
15. Click Run to run the report.
The "HIPAA Control T03 §164.312 (a)(1) Does your practice analyze the activities performed by
all of its workforce and service providers to identify the extent to which each needs access to
ePHI?" report generated from this template considers that a “user” can be any entity that
accesses your practice’s ePHI, whether it is a person or a device. Consider whether your
practice: Defines roles and responsibilities in sufficient detail to demonstrate whether access
to ePHI is necessary. Determines whether remote access is necessary from physical
environments that are not under your practice’s control. If so, determine by whom, how (e.g.,
electronic device), and when.
The following table shows the event filters used by this template:
Field Values
Suppressed Flase
3. Click Edit Filters if you want to modify the selected filters, and then Continue to Filters.
Do the modifications you need, and then click Edit Report.
4. Click the date field if you want to choose a different date range.
Choose Last Hour, Last 24 Hours, Last 7 Days, Last 30 Days, Last 90 Days, or Custom
Range to set a particular date range.
5. Under the Format section, select either CSV or PDF for the format of the report.
6. Select if you want to generate the report again, and choose Never, Daily, Weekly, Bi-
weekly, and Monthly.
7. Enter an email address to send the report. Select the Send to my Email Address option
to add your email automatically.
8. Select the Enable link expiration option. This link is delivered by email and expires in 14
days.
9. Click Next.
10. In the Report Name field, enter a name for the report. This name will be displayed in the
Saved Reports page.
11. (Optional.) Add a description that will be included.
12. Under the Number of records section, choose the maximum number of records to include
on the report: 20, 50, 100, 500, 1000, or 2500.
13. If you have chosen the PDF format, you will see the Graphs section, which you can use to
include additional views. You can add or remove graphs included in the report by clicking
the and the icons.
14. Select Save & Run if you wish to keep the report in your Saved Reports on USM Any-
where page and receive the report in the indicated email.
15. Click Run to run the report.
The "HIPAA Control T30 §164.312(b) Does your practice have policies and procedures
establishing retention requirements for audit purposes?" report generated from this
template considers that written policies and procedures can drive the development of
processes and adoption of standards and controls, which reduce risk to ePHI. Can provide
essential information for privacy and security awareness and role-based training.
The View link goes to the My Subscription page (Settings > My Subscription). See
Subscription Management for more information.
3. Click Edit Filters if you want to modify the selected filters, and then Continue to Filters.
Do the modifications you need, and then click Edit Report.
4. Click the date field if you want to choose a different date range.
Choose Last Hour, Last 24 Hours, Last 7 Days, Last 30 Days, Last 90 Days, or Custom
Range to set a particular date range.
5. Under the Format section, select either CSV or PDF for the format of the report.
6. Select if you want to generate the report again, and choose Never, Daily, Weekly, Bi-
weekly, and Monthly.
7. Enter an email address to send the report. Select the Send to my Email Address option
to add your email automatically.
8. Select the Enable link expiration option. This link is delivered by email and expires in 14
days.
9. Click Next.
10. In the Report Name field, enter a name for the report. This name will be displayed in the
Saved Reports page.
11. (Optional.) Add a description that will be included.
12. Under the Number of records section, choose the maximum number of records to include
on the report: 20, 50, 100, 500, 1000, or 2500.
13. If you have chosen the PDF format, you will see the Graphs section, which you can use to
include additional views. You can add or remove graphs included in the report by clicking
the and the icons.
14. Select Save & Run if you wish to keep the report in your Saved Reports on USM Any-
where page and receive the report in the indicated email.
15. Click Run to run the report.
The "HIPAA Control T33 §164.312(c)(1) Does your practice have mechanisms to corroborate
that ePHI has not been altered, modified or destroyed in an unauthorized manner? - Linux"
report generated from this template considers whether your practice has data
authentication mechanisms and tools, such as checksum. Checksum is a computation that is
introduced when ePHI is transmitted or stored. The computation is checked at a later time
(such as when ePHI recalled or when it is received at the intended destination) to ascertain
whether the computations match. If the checksum matches, then it is less likely that the ePHI
was altered or modified. Also consider whether your practice relies on encryption validation
to authenticate ePHI.
The following table shows the event filters used by this template:
Field Values
Suppressed Flase
3. Click Edit Filters if you want to modify the selected filters, and then Continue to Filters.
Do the modifications you need, and then click Edit Report.
4. Click the date field if you want to choose a different date range.
Choose Last Hour, Last 24 Hours, Last 7 Days, Last 30 Days, Last 90 Days, or Custom
Range to set a particular date range.
5. Under the Format section, select either CSV or PDF for the format of the report.
6. Select if you want to generate the report again, and choose Never, Daily, Weekly, Bi-
weekly, and Monthly.
7. Enter an email address to send the report. Select the Send to my Email Address option
to add your email automatically.
8. Select the Enable link expiration option. This link is delivered by email and expires in 14
days.
9. Click Next.
10. In the Report Name field, enter a name for the report. This name will be displayed in the
Saved Reports page.
11. (Optional.) Add a description that will be included.
12. Under the Number of records section, choose the maximum number of records to include
on the report: 20, 50, 100, 500, 1000, or 2500.
13. If you have chosen the PDF format, you will see the Graphs section, which you can use to
include additional views. You can add or remove graphs included in the report by clicking
the and the icons.
14. Select Save & Run if you wish to keep the report in your Saved Reports on USM Any-
where page and receive the report in the indicated email.
15. Click Run to run the report.
The "HIPAA Control T33 §164.312(c)(1) Does your practice have mechanisms to corroborate
that ePHI has not been altered, modified or destroyed in an unauthorized manner? -
Windows" report generated from this template considers whether your practice has data
authentication mechanisms and tools, such as checksum. Checksum is a computation that is
introduced when ePHI is transmitted or stored. The computation is checked at a later time
(such as when ePHI recalled or when it is received at the intended destination) to ascertain
whether the computations match. If the checksum matches, then it is less likely that the ePHI
was altered or modified. Also consider whether your practice relies on encryption validation
to authenticate ePHI.
The following table shows the event filters used by this template:
Field Values
Suppressed Flase
3. Click Edit Filters if you want to modify the selected filters, and then Continue to Filters.
Do the modifications you need, and then click Edit Report.
4. Click the date field if you want to choose a different date range.
Choose Last Hour, Last 24 Hours, Last 7 Days, Last 30 Days, Last 90 Days, or Custom
Range to set a particular date range.
5. Under the Format section, select either CSV or PDF for the format of the report.
6. Select if you want to generate the report again, and choose Never, Daily, Weekly, Bi-
weekly, and Monthly.
7. Enter an email address to send the report. Select the Send to my Email Address option
to add your email automatically.
8. Select the Enable link expiration option. This link is delivered by email and expires in 14
days.
9. Click Next.
10. In the Report Name field, enter a name for the report. This name will be displayed in the
Saved Reports page.
11. (Optional.) Add a description that will be included.
12. Under the Number of records section, choose the maximum number of records to include
on the report: 20, 50, 100, 500, 1000, or 2500.
13. If you have chosen the PDF format, you will see the Graphs section, which you can use to
include additional views. You can add or remove graphs included in the report by clicking
the and the icons.
14. Select Save & Run if you wish to keep the report in your Saved Reports on USM Any-
where page and receive the report in the indicated email.
15. Click Run to run the report.
ISO/IEC 27001 provides guidance for implementing information security controls to achieve a
consistent and reliable security program. The International Organization for Standardization
(ISO) and the International Electrotechnical Commission (IEC) developed 27001 to provide
requirements for an information security management system (ISMS).
This section includes the descriptions for ISO 27001 compliance templates on USM Anywhere:
The "ISO 27001 A.6.1.4: Contact with Special Interest Groups" standard provides appropriate
contacts with special interest groups or other specialist security forums and professional
associations shall be maintained.
The View link goes to the OTX dashboard page (Dashboard > Open Threat Exchange). See
Open Threat Exchange Dashboard for more information.
The "ISO 27001 A.8.1.1: Inventory of Assets" report is related to the assets associated with
information and information processing facilities that shall be identified and an inventory of
these assets shall be drawn up and maintained.
This report shows the assets list by using the "ISO 27001 A.8.1.1: Inventory of Assets" view.
Note: This report doesn't have selected filters because it goes directly to an asset
inventory.
3. Click Edit Filters if you want to modify the selected filters, and then Continue to Filters.
Do the modifications you need, and then click Edit Report.
4. Click the date field if you want to choose a different date range.
Choose Last Hour, Last 24 Hours, Last 7 Days, Last 30 Days, Last 90 Days, or Custom
Range to set a particular date range.
5. Under the Format section, select either CSV or PDF for the format of the report.
6. Select if you want to generate the report again, and choose Never, Daily, Weekly, Bi-
weekly, and Monthly.
7. Enter an email address to send the report. Select the Send to my Email Address option
to add your email automatically.
8. Select the Enable link expiration option. This link is delivered by email and expires in 14
days.
9. Click Next.
10. In the Report Name field, enter a name for the report. This name will be displayed in the
Saved Reports page.
11. (Optional.) Add a description that will be included.
12. Under the Number of records section, choose the maximum number of records to include
on the report: 20, 50, 100, 500, 1000, or 2500.
13. If you have chosen the PDF format, you will see the Graphs section, which you can use to
include additional views. You can add or remove graphs included in the report by clicking
the and the icons.
14. Select Save & Run if you wish to keep the report in your Saved Reports on USM Any-
where page and receive the report in the indicated email.
15. Click Run to run the report.
The "ISO 27001 A.8.1.2: Ownership of Assets" report is related to the assets maintained in the
inventory that shall be owned.
This report shows the assets list by using the "ISO 27001 A.8.1.2: Ownership of Assets" view.
Note: This report doesn't have selected filters because it goes directly to an asset
inventory.
3. Click Edit Filters if you want to modify the selected filters, and then Continue to Filters.
Do the modifications you need, and then click Edit Report.
4. Click the date field if you want to choose a different date range.
Choose Last Hour, Last 24 Hours, Last 7 Days, Last 30 Days, Last 90 Days, or Custom
Range to set a particular date range.
5. Under the Format section, select either CSV or PDF for the format of the report.
6. Select if you want to generate the report again, and choose Never, Daily, Weekly, Bi-
weekly, and Monthly.
7. Enter an email address to send the report. Select the Send to my Email Address option
to add your email automatically.
8. Select the Enable link expiration option. This link is delivered by email and expires in 14
days.
9. Click Next.
10. In the Report Name field, enter a name for the report. This name will be displayed in the
Saved Reports page.
11. (Optional.) Add a description that will be included.
12. Under the Number of records section, choose the maximum number of records to include
on the report: 20, 50, 100, 500, 1000, or 2500.
13. If you have chosen the PDF format, you will see the Graphs section, which you can use to
include additional views. You can add or remove graphs included in the report by clicking
the and the icons.
14. Select Save & Run if you wish to keep the report in your Saved Reports on USM Any-
where page and receive the report in the indicated email.
15. Click Run to run the report.
The "ISO 27001 A.8.2.1: Classification of Information" report is related to the information that
shall be classified in terms of legal requirements, value, criticality and sensitivity to
unauthorized disclosure or modification.
This report shows the assets list by using the "ISO 27001 A.8.2.1: Classification of Information"
view.
Note: This report doesn't have selected filters because it goes directly to an asset
inventory.
3. Click Edit Filters if you want to modify the selected filters, and then Continue to Filters.
Do the modifications you need, and then click Edit Report.
4. Click the date field if you want to choose a different date range.
Choose Last Hour, Last 24 Hours, Last 7 Days, Last 30 Days, Last 90 Days, or Custom
Range to set a particular date range.
5. Under the Format section, select either CSV or PDF for the format of the report.
6. Select if you want to generate the report again, and choose Never, Daily, Weekly, Bi-
weekly, and Monthly.
7. Enter an email address to send the report. Select the Send to my Email Address option
to add your email automatically.
8. Select the Enable link expiration option. This link is delivered by email and expires in 14
days.
9. Click Next.
10. In the Report Name field, enter a name for the report. This name will be displayed in the
Saved Reports page.
11. (Optional.) Add a description that will be included.
12. Under the Number of records section, choose the maximum number of records to include
on the report: 20, 50, 100, 500, 1000, or 2500.
13. If you have chosen the PDF format, you will see the Graphs section, which you can use to
include additional views. You can add or remove graphs included in the report by clicking
the and the icons.
14. Select Save & Run if you wish to keep the report in your Saved Reports on USM Any-
where page and receive the report in the indicated email.
15. Click Run to run the report.
The "ISO 27001 A.8.2.2: Labeling of Information" report is related to an appropriate set of
procedures for information labeling that shall be developed and implemented in accordance
with the information classification scheme adopted by the organization.
This report shows the assets list by using the "ISO 27001 A.8.2.2: Labeling of Information" view.
Note: This report doesn't have selected filters because it goes directly to an asset
inventory.
3. Click Edit Filters if you want to modify the selected filters, and then Continue to Filters.
Do the modifications you need, and then click Edit Report.
4. Click the date field if you want to choose a different date range.
Choose Last Hour, Last 24 Hours, Last 7 Days, Last 30 Days, Last 90 Days, or Custom
Range to set a particular date range.
5. Under the Format section, select either CSV or PDF for the format of the report.
6. Select if you want to generate the report again, and choose Never, Daily, Weekly, Bi-
weekly, and Monthly.
7. Enter an email address to send the report. Select the Send to my Email Address option
to add your email automatically.
8. Select the Enable link expiration option. This link is delivered by email and expires in 14
days.
9. Click Next.
10. In the Report Name field, enter a name for the report. This name will be displayed in the
Saved Reports page.
11. (Optional.) Add a description that will be included.
12. Under the Number of records section, choose the maximum number of records to include
on the report: 20, 50, 100, 500, 1000, or 2500.
13. If you have chosen the PDF format, you will see the Graphs section, which you can use to
include additional views. You can add or remove graphs included in the report by clicking
the and the icons.
14. Select Save & Run if you wish to keep the report in your Saved Reports on USM Any-
where page and receive the report in the indicated email.
15. Click Run to run the report.
The "ISO 27001 A.11.2.6: Security of Equipment and Assets Off-Premises" report is related to
security that shall be applied to off-site assets taking into account the different risks of
working outside the organization’s premises.
This report shows the assets list by using the "ISO 27001 A.11.2.6: Security of Equipment and
Assets Off-Premises" view.
To generate the ISO 27001 A.11.2.6: Security of Equipment and Assets Off-Premises
report
Note: This report doesn't have selected filters because it goes directly to an asset
inventory.
3. Click Edit Filters if you want to modify the selected filters, and then Continue to Filters.
Do the modifications you need, and then click Edit Report.
4. Click the date field if you want to choose a different date range.
Choose Last Hour, Last 24 Hours, Last 7 Days, Last 30 Days, Last 90 Days, or Custom
Range to set a particular date range.
5. Under the Format section, select either CSV or PDF for the format of the report.
6. Select if you want to generate the report again, and choose Never, Daily, Weekly, Bi-
weekly, and Monthly.
7. Enter an email address to send the report. Select the Send to my Email Address option
to add your email automatically.
8. Select the Enable link expiration option. This link is delivered by email and expires in 14
days.
9. Click Next.
10. In the Report Name field, enter a name for the report. This name will be displayed in the
Saved Reports page.
14. Select Save & Run if you wish to keep the report in your Saved Reports on USM Any-
where page and receive the report in the indicated email.
15. Click Run to run the report.
The "ISO 27001 A.12.2.1: Controls Against Malware" report is related to detection, prevention
and recovery controls to protect against malware that shall be implemented, combined with
appropriate user awareness. This report shows the assets list by using the "ISO 27001 A.12.2.1:
Controls Against Malware" view.
The following table shows the event filters used by this template:
Field Values
Suppressed False
Note: This report doesn't have selected filters because it goes directly to an asset
inventory.
3. Click Edit Filters if you want to modify the selected filters, and then Continue to Filters.
Do the modifications you need, and then click Edit Report.
4. Click the date field if you want to choose a different date range.
Choose Last Hour, Last 24 Hours, Last 7 Days, Last 30 Days, Last 90 Days, or Custom
Range to set a particular date range.
5. Under the Format section, select either CSV or PDF for the format of the report.
6. Select if you want to generate the report again, and choose Never, Daily, Weekly, Bi-
weekly, and Monthly.
7. Enter an email address to send the report. Select the Send to my Email Address option
to add your email automatically.
8. Select the Enable link expiration option. This link is delivered by email and expires in 14
days.
9. Click Next.
10. In the Report Name field, enter a name for the report. This name will be displayed in the
Saved Reports page.
11. (Optional.) Add a description that will be included.
12. Under the Number of records section, choose the maximum number of records to include
on the report: 20, 50, 100, 500, 1000, or 2500.
13. If you have chosen the PDF format, you will see the Graphs section, which you can use to
include additional views. You can add or remove graphs included in the report by clicking
the and the icons.
14. Select Save & Run if you wish to keep the report in your Saved Reports on USM Any-
where page and receive the report in the indicated email.
15. Click Run to run the report.
The "ISO 27001 A.12.4.1: Event Logging" report is related to event logs recording user activities,
exceptions, faults and information security events that shall be produced, kept and regularly
reviewed. This report shows the assets list by using the "ISO 27001 A.12.4.1: Event Logging"
view.
The following table shows the event filters used by this template:
Field Values
Suppressed False
Note: This report doesn't have selected filters because it goes directly to an asset
inventory.
3. Click Edit Filters if you want to modify the selected filters, and then Continue to Filters.
Do the modifications you need, and then click Edit Report.
4. Click the date field if you want to choose a different date range.
Choose Last Hour, Last 24 Hours, Last 7 Days, Last 30 Days, Last 90 Days, or Custom
Range to set a particular date range.
5. Under the Format section, select either CSV or PDF for the format of the report.
6. Select if you want to generate the report again, and choose Never, Daily, Weekly, Bi-
weekly, and Monthly.
7. Enter an email address to send the report. Select the Send to my Email Address option
to add your email automatically.
8. Select the Enable link expiration option. This link is delivered by email and expires in 14
days.
9. Click Next.
10. In the Report Name field, enter a name for the report. This name will be displayed in the
Saved Reports page.
11. (Optional.) Add a description that will be included.
12. Under the Number of records section, choose the maximum number of records to include
on the report: 20, 50, 100, 500, 1000, or 2500.
13. If you have chosen the PDF format, you will see the Graphs section, which you can use to
include additional views. You can add or remove graphs included in the report by clicking
the and the icons.
14. Select Save & Run if you wish to keep the report in your Saved Reports on USM Any-
where page and receive the report in the indicated email.
15. Click Run to run the report.
The "ISO 27001 A.12.4.2 - Linux: Protection of Log Information" report is related to logging
facilities and log information that shall be protected against tampering and unauthorized
access. This report shows the assets list by using the "ISO 27001 A.12.4.2 - Linux: Protection of
Log Information" view.
The following table shows the event filters used by this template:
Field Values
Suppressed False
To generate the ISO 27001 A.12.4.2 - Linux: Protection of Log Information report
Note: This report doesn't have selected filters because it goes directly to an asset
inventory.
3. Click Edit Filters if you want to modify the selected filters, and then Continue to Filters.
Do the modifications you need, and then click Edit Report.
4. Click the date field if you want to choose a different date range.
Choose Last Hour, Last 24 Hours, Last 7 Days, Last 30 Days, Last 90 Days, or Custom
Range to set a particular date range.
5. Under the Format section, select either CSV or PDF for the format of the report.
6. Select if you want to generate the report again, and choose Never, Daily, Weekly, Bi-
weekly, and Monthly.
7. Enter an email address to send the report. Select the Send to my Email Address option
to add your email automatically.
8. Select the Enable link expiration option. This link is delivered by email and expires in 14
days.
9. Click Next.
10. In the Report Name field, enter a name for the report. This name will be displayed in the
Saved Reports page.
11. (Optional.) Add a description that will be included.
12. Under the Number of records section, choose the maximum number of records to include
on the report: 20, 50, 100, 500, 1000, or 2500.
13. If you have chosen the PDF format, you will see the Graphs section, which you can use to
include additional views. You can add or remove graphs included in the report by clicking
the and the icons.
14. Select Save & Run if you wish to keep the report in your Saved Reports on USM Any-
where page and receive the report in the indicated email.
15. Click Run to run the report.
The "ISO 27001 A.12.4.2 - Windows: Protection of Log Information" report is related to logging
facilities and log information that shall be protected against tampering and unauthorized
access. This report shows the assets list by using the "ISO 27001 A.12.4.2 - Windows: Protection
of Log Information" view.
The following table shows the event filters used by this template:
Field Values
Suppressed False
To generate the ISO 27001 A.12.4.2 - Windows: Protection of Log Information report
Note: This report doesn't have selected filters because it goes directly to an asset
inventory.
3. Click Edit Filters if you want to modify the selected filters, and then Continue to Filters.
Do the modifications you need, and then click Edit Report.
4. Click the date field if you want to choose a different date range.
Choose Last Hour, Last 24 Hours, Last 7 Days, Last 30 Days, Last 90 Days, or Custom
Range to set a particular date range.
5. Under the Format section, select either CSV or PDF for the format of the report.
6. Select if you want to generate the report again, and choose Never, Daily, Weekly, Bi-
weekly, and Monthly.
7. Enter an email address to send the report. Select the Send to my Email Address option
to add your email automatically.
8. Select the Enable link expiration option. This link is delivered by email and expires in 14
days.
9. Click Next.
10. In the Report Name field, enter a name for the report. This name will be displayed in the
Saved Reports page.
11. (Optional.) Add a description that will be included.
12. Under the Number of records section, choose the maximum number of records to include
on the report: 20, 50, 100, 500, 1000, or 2500.
13. If you have chosen the PDF format, you will see the Graphs section, which you can use to
include additional views. You can add or remove graphs included in the report by clicking
the and the icons.
14. Select Save & Run if you wish to keep the report in your Saved Reports on USM Any-
where page and receive the report in the indicated email.
15. Click Run to run the report.
The "ISO 27001 A.12.7.1: Information Systems Audit Controls" report is related to the audit
requirements and activities involving verification of operational systems that shall be
carefully planned and agreed to minimize disruptions to business processes.
This report shows the assets list by using the "ISO 27001 A.12.7.1: Information Systems Audit
Controls" view.
To generate the ISO 27001 A.12.7.1: Information Systems Audit Controls report
Note: This report doesn't have selected filters because it goes directly to an asset
inventory.
3. Click Edit Filters if you want to modify the selected filters, and then Continue to Filters.
Do the modifications you need, and then click Edit Report.
4. Click the date field if you want to choose a different date range.
Choose Last Hour, Last 24 Hours, Last 7 Days, Last 30 Days, Last 90 Days, or Custom
Range to set a particular date range.
5. Under the Format section, select either CSV or PDF for the format of the report.
6. Select if you want to generate the report again, and choose Never, Daily, Weekly, Bi-
weekly, and Monthly.
7. Enter an email address to send the report. Select the Send to my Email Address option
to add your email automatically.
8. Select the Enable link expiration option. This link is delivered by email and expires in 14
days.
9. Click Next.
10. In the Report Name field, enter a name for the report. This name will be displayed in the
Saved Reports page.
11. (Optional.) Add a description that will be included.
12. Under the Number of records section, choose the maximum number of records to include
on the report: 20, 50, 100, 500, 1000, or 2500.
13. If you have chosen the PDF format, you will see the Graphs section, which you can use to
include additional views. You can add or remove graphs included in the report by clicking
the and the icons.
14. Select Save & Run if you wish to keep the report in your Saved Reports on USM Any-
where page and receive the report in the indicated email.
15. Click Run to run the report.
The "ISO 27001 A.16.1.2: Reporting Information Security Events" report is related to the
information security events that shall be reported through appropriate management
channels as quickly as possible. This report shows the assets list by using the "ISO 27001
A.16.1.2: Reporting Information Security Events" view.
The following table shows the event filters used by this template:
Field Values
Suppressed False
To generate the ISO 27001 A.16.1.2: Reporting Information Security Events report
Note: This report doesn't have selected filters because it goes directly to an asset
inventory.
3. Click Edit Filters if you want to modify the selected filters, and then Continue to Filters.
Do the modifications you need, and then click Edit Report.
4. Click the date field if you want to choose a different date range.
Choose Last Hour, Last 24 Hours, Last 7 Days, Last 30 Days, Last 90 Days, or Custom
Range to set a particular date range.
5. Under the Format section, select either CSV or PDF for the format of the report.
6. Select if you want to generate the report again, and choose Never, Daily, Weekly, Bi-
weekly, and Monthly.
7. Enter an email address to send the report. Select the Send to my Email Address option
to add your email automatically.
8. Select the Enable link expiration option. This link is delivered by email and expires in 14
days.
9. Click Next.
10. In the Report Name field, enter a name for the report. This name will be displayed in the
Saved Reports page.
11. (Optional.) Add a description that will be included.
12. Under the Number of records section, choose the maximum number of records to include
on the report: 20, 50, 100, 500, 1000, or 2500.
13. If you have chosen the PDF format, you will see the Graphs section, which you can use to
include additional views. You can add or remove graphs included in the report by clicking
the and the icons.
14. Select Save & Run if you wish to keep the report in your Saved Reports on USM Any-
where page and receive the report in the indicated email.
15. Click Run to run the report.
The "ISO 27001 A.16.1.4: Assessment of and decision on information security events" report is
related to the information security events shall be assessed and it that shall be decided if they
are to be classified as information security incidents. This report shows the assets list by using
the ISO 27001 A.16.1.4: Assessment of and decision on information security events" view.
The following table shows the event filters used by this template:
Filters Used by ISO 27001 A.16.1.4: Assessment of and decision on information security events
Field Values
Suppressed False
To generate the ISO 27001 A.16.1.4: Assessment of and decision on information security
events report
Note: This report doesn't have selected filters because it goes directly to an asset
inventory.
3. Click Edit Filters if you want to modify the selected filters, and then Continue to Filters.
Do the modifications you need, and then click Edit Report.
4. Click the date field if you want to choose a different date range.
Choose Last Hour, Last 24 Hours, Last 7 Days, Last 30 Days, Last 90 Days, or Custom
Range to set a particular date range.
5. Under the Format section, select either CSV or PDF for the format of the report.
6. Select if you want to generate the report again, and choose Never, Daily, Weekly, Bi-
weekly, and Monthly.
7. Enter an email address to send the report. Select the Send to my Email Address option
to add your email automatically.
8. Select the Enable link expiration option. This link is delivered by email and expires in 14
days.
9. Click Next.
10. In the Report Name field, enter a name for the report. This name will be displayed in the
Saved Reports page.
11. (Optional.) Add a description that will be included.
12. Under the Number of records section, choose the maximum number of records to include
on the report: 20, 50, 100, 500, 1000, or 2500.
13. If you have chosen the PDF format, you will see the Graphs section, which you can use to
include additional views. You can add or remove graphs included in the report by clicking
the and the icons.
14. Select Save & Run if you wish to keep the report in your Saved Reports on USM Any-
where page and receive the report in the indicated email.
15. Click Run to run the report.
The "ISO 27001 A.18.2.2: Compliance with Security Policies and Standards" report is related to
the managers that shall regularly review the compliance of information processing and
procedures within their area of responsibility with the appropriate security policies, standards
and any other security requirements. This report shows the assets list by using the "ISO 27001
A.18.2.2: Compliance with Security Policies and Standards" view.
The following table shows the event filters used by this template:
Filters Used by ISO 27001 A.18.2.2: Compliance with Security Policies and Standards
Field Values
To generate the ISO 27001 A.18.2.2: Compliance with Security Policies and Standards
report
Note: This report doesn't have selected filters because it goes directly to an asset
inventory.
3. Click Edit Filters if you want to modify the selected filters, and then Continue to Filters.
Do the modifications you need, and then click Edit Report.
4. Click the date field if you want to choose a different date range.
Choose Last Hour, Last 24 Hours, Last 7 Days, Last 30 Days, Last 90 Days, or Custom
Range to set a particular date range.
5. Under the Format section, select either CSV or PDF for the format of the report.
6. Select if you want to generate the report again, and choose Never, Daily, Weekly, Bi-
weekly, and Monthly.
7. Enter an email address to send the report. Select the Send to my Email Address option
to add your email automatically.
8. Select the Enable link expiration option. This link is delivered by email and expires in 14
days.
9. Click Next.
10. In the Report Name field, enter a name for the report. This name will be displayed in the
Saved Reports page.
11. (Optional.) Add a description that will be included.
12. Under the Number of records section, choose the maximum number of records to include
on the report: 20, 50, 100, 500, 1000, or 2500.
13. If you have chosen the PDF format, you will see the Graphs section, which you can use to
include additional views. You can add or remove graphs included in the report by clicking
the and the icons.
14. Select Save & Run if you wish to keep the report in your Saved Reports on USM Any-
where page and receive the report in the indicated email.
15. Click Run to run the report.
The "ISO 27001 A.18.2.3: Technical Compliance Review" report is related to the information
systems that shall be regularly reviewed for compliance with the organization’s information
security policies and standards. This report shows the assets list by using the "ISO 27001
A.18.2.3: Technical Compliance Review" view.
The following table shows the event filters used by this template:
Field Values
Note: This report doesn't have selected filters because it goes directly to an asset
inventory.
3. Click Edit Filters if you want to modify the selected filters, and then Continue to Filters.
Do the modifications you need, and then click Edit Report.
4. Click the date field if you want to choose a different date range.
Choose Last Hour, Last 24 Hours, Last 7 Days, Last 30 Days, Last 90 Days, or Custom
Range to set a particular date range.
5. Under the Format section, select either CSV or PDF for the format of the report.
6. Select if you want to generate the report again, and choose Never, Daily, Weekly, Bi-
weekly, and Monthly.
7. Enter an email address to send the report. Select the Send to my Email Address option
to add your email automatically.
8. Select the Enable link expiration option. This link is delivered by email and expires in 14
days.
9. Click Next.
10. In the Report Name field, enter a name for the report. This name will be displayed in the
Saved Reports page.
11. (Optional.) Add a description that will be included.
12. Under the Number of records section, choose the maximum number of records to include
on the report: 20, 50, 100, 500, 1000, or 2500.
13. If you have chosen the PDF format, you will see the Graphs section, which you can use to
include additional views. You can add or remove graphs included in the report by clicking
the and the icons.
14. Select Save & Run if you wish to keep the report in your Saved Reports on USM Any-
where page and receive the report in the indicated email.
15. Click Run to run the report.
USM Anywhere includes a set of predefined templates based on the classification of event
data source types and based on data sources.
You can find these templates on Reports > Event Type Templates.
l Type of Data Source. Event Type Templates enable you to easily run a general firewall,
authentication, and other types of normalized queries that do not require you to build com-
plex filters based on specific data source or event types. USM Anywhere supports these
reports: Anomaly Detection, Antivirus, Application, Application Firewall, Authentication,
Authentication and DHCP, Cloud Application, Cloud Infrastructure, DNS Server, Data Pro-
tection, Database, Endpoint Protection, Endpoint Security, Firewall, IDS, Infrastructure Mon-
itoring, Intrusion Detection, Intrusion Prevention, Load Balancer, Mail Security, Mail Server,
Management Platform, Network Access Control, Operating System, Other Devices, Proxy,
Router, Router/Switch, Server, Switch, Unified Threat Management, VPN, Web Server, Wire-
less Security/Management.
l Data Sources. You can find templates based on the most commonly used data sources
including NIDS, AWS, Amazon DynamoDB, Amazon S3, AWS VPC Flow Logs, AWS Load Bal-
ancers, Azure, Cisco Umbrella, Cylance, FireEye, Fortigate, G Suite, McAfee ePO, Office 365,
Okta, Palo Alto, SonicWall, Sophos UTM, Watchguard, VMware, Windows, AlienVault Agent.
There is also a template for the AlienVault Generic Data Source.
Machine Learning
Machine learning extends the capabilities of your USM Anywhere and reduces false positives
by allowing it to learn patterns of normal behavior within your environment to better detect
anomalies. With machine learning, USM Anywhere can help you better identify abnormal and
potentially dangerous activity and enable you to better prioritize alarms generated from
events and user behavior. Machine learning enhances your USM Anywhere's ability to detect
and respond to compromised credentials, lateral movements, suspicious execution, data
exfiltration, and more.
Machine learning enhances your USM Anywhere, allowing it to identify anomalies in your
environment through data science and machine learning. Powered by specialized models, the
machine learning capabilities of USM Anywhere learn patterns of normal behavior within your
environment to better identify anomalous activity, enabling you to better prioritize alarms
generated from events and user behavior.
The machine learning process provides deeper detection capabilities, putting events specific
to your assets and users into the full context of your environment's behavioral patterns.
For example, USM Anywhere instances enhanced with machine learning enable security
analysts and incident responders to make informed decisions on how to respond to security
threats, validate the effectiveness of existing security controls, and detect policy violations.
Machine learning enhances the ability of your USM Anywhere to detect and respond to
compromised credentials, lateral movements, suspicious execution, and data exfiltration:
l Lateral Movement: Machine learning algorithms feed authentication logs from services
observed in lateral movement scenarios (such as Windows Remote Desktop Protocol
[RDP] or Kerberos), leverage context data, such as source and destination hostname or
active directory (AD) domain name, and are key to spotting these anomalies.
execution flags and arguments). User data is also compared across the organization to
examine binary prevalence.
l Data Exfiltration: Machine learning algorithms for data exfiltration are processed by USM
Anywhere using computed historic user data (such as the average number of files
processed per day) to apply a risk score to any given scenario. Integration with file storage
services enables early detection of anomalous file access. These models can evaluate a
wide range of frequencies to find anomalies, from minutes to weeks.
The models currently informing machine learning in USM Anywhere operate based on two
different types of activity: user login and file modification.
User Login
This suite of models all operate by identifying key features from distinct sources via specially
trained algorithms. The models in this suite are all able to identify potentially malicious login
activity.
l Google G Suite
l Cisco Duo
l Okta
l RDP
l Kerberos
File Modification
This suite of models all operate by analyzing file modification patterns across distinct sources
and are specially trained to identify potentially malicious file modifications.
l G Suite
This page of widgets displays information related to the machine learning activity in your
environment. Each widget displays event or alarm trends in your USM Anywhere related to
your environment's machine learning, as well as events and alarms by user, source, priority,
status, and more. By default, each widget displays the last 30 days' trends, but you can filter
any widget or the entire dashboard to display trends from a specific timeframe. See Machine
Learning for more information.
Widgets Description
ML Event Displays a count of events detected by machine learning per hour or per day
Trend
ML Alarm Displays a count of alarms detected by machine learning per hour or per day
Trend
ML Events By Displays users associated with the most events detected by machine learning
User
ML Alarms By Displays users associated with the most alarms detected by machine learning
User
ML Events By Displays sources associated with the most events detected by machine learning
Source
ML Alarms By Displays sources associated with the most alarms detected by machine learning
Source
From the machine learning dashboard, you can access a centralized view of the alarm and
event activity detected by the machine learning models in your environment.
See Machine Learning Models to read more about the models that power machine learning in
your environment.
2. Click on a widget in the machine learning dashboard to navigate to a list view of the activ-
ity shown in that widget.
See Machine Learning Dashboard for more information about the machine learning filters
available to you.
3. The Alarms and Events pages display information about your alarms and events:
l On the left side of the page are the search and filters options. By default, these options
are preconfigured to show you precisely the activity you selected on the machine
learning dashboard. However, you can use these filters to further delimit your search.
l The main part of the page lists the machine learning activities you have selected,
where each row describes an individual event or alarm. Click an event to open a
summary view.
If you want to analyze the data and see the additional columns without having to scroll
left and right, you can maximize the screen and hide the filter pane. Click the icon to
hide the filter pane. Click the icon to expand the filter pane.
See the Events List View, Alarms List View, or User List View for details about the options
and columns available to you in each of these views.
When the first user links to a newly-provisioned USM Anywhere environment, they configure
the password for the initial user account. This is the default user as defined in your
subscription, and this manager user account can only be deleted by another manager user.
The Settings > Users page provides tools to add, edit, and remove user accounts in the
system.
After 45 days of inactivity, a user account will become locked. Manager users can unlock
inactive accounts. Alternately, users can contact AT&T Cybersecurity support to have their
account unlocked.
If you want to protect your account, enable multifactor authentication (MFA) for your user
account. When this feature is activated, USM Anywhere displays the multifactor
authentication page for you to complete your MFA configuration. The displayed page
provides a unique QR code for your Authenticator app to retrieve a verification code. See
Using Multifactor Authentication for more information about this security configuration.
Note: AT&T Cybersecurity recommends that users enable MFA for their account. MFA
adds extra security by requiring multiple factors to authenticate a user, making it more
difficult for an unauthorized person to gain access to the account.
Users can access settings for their own account and log out of the system by clicking the
USM Anywhere collects information about when a user logs into the system and what the
user does. This information is available in USM Anywhere when you go to Settings > System
Events. USM Anywhere offers remote technical support for troubleshooting and diagnosis,
where the AT&T Cybersecurity Technical Support Engineers access your instance from their
computers.
Creating Users
Add a user account in your USM Anywhere environment for each member of your team that
needs access. USM Anywhere implements role-based access control (RBAC). See Role-Based
Access Control (RBAC) in USM Anywhere for more information.
To create a user
This is the email address used to verify the account and set the initial password.
4. Select the role you want to assign to the user. See Role-Based Access Control (RBAC) in
USM Anywhere for more information.
Typically, you should keep the default Enabled status for a new user account.
6. Click Save.
USM Anywhere sends an email to the email address that includes a link to set a password
and login.
The password reset link will be valid for the next 24 hours. If you do not click the reset link
within that period of time, USM Anywhere will display a message:
You need to click Send Link to receive a new email with a new password reset link.
USM Anywhere implements the role-based access control (RBAC), which provides users with
the following:
l The ability to restrict certain users from accessing administrative capabilities like adding
new users and sensors
l Predefined roles that range from read-only access to full administrative capabilities so
users can easily select the appropriate role for a new user
l Read-Only: You can access views and search the system, but you cannot make system
changes that impact other users.
l Investigator: You can access views, search the system, and generate reports, but you can-
not make system changes that impact other users.
l Analyst: You can view and search the system, schedule jobs, launch actions, configure
rules, and configure asset credentials. But you cannot add or modify sensor configurations;
configure credentials for AlienApp, notification apps, and threat intelligence integrations;
or add users.
l Manager: This role enables analyst permissions and enables you to add or modify sensor
configurations; configure credentials for AlienApps, notification apps, and threat intel-
ligence integrations; and add users.
You can view a user's role under the Users List by going to Settings > Users.
Note: Only users in the Manager role can view the Users page.
When the status of a user changes to Disabled, the role column of that user in the User List
will include Suspended.
All AT&T Cybersecurity documentation will tell you which roles can perform a specific set of
steps, using a table like the one below.
You can see the predefined roles in USM Anywhere in the following table:
Read-
Investigator Analyst Manager
Section Action Only
User User User
User
Create custom
dashboard
Upper Access:
Navigation documentation,
support, and forum
links
Profile settings
Read-
Investigator Analyst Manager
Section Action Only
User User User
User
Read-
Investigator Analyst Manager
Section Action Only
User User User
User
Configure filters
Asset drop-down
menu items: add to
current filter, find in
events, look up in
AT&T Alien Labs Open
Threat Exchange
OTX™
Manage columns
Generate report
Save views
Alarm details:
suppress alarm, apply
label, set a status, add
to investigation
Read-
Investigator Analyst Manager
Section Action Only
User User User
User
Configure filters
Generate report
Save views
Events details:
suppress event, add
to investigation
Read-
Investigator Analyst Manager
Section Action Only
User User User
User
Read-
Investigator Analyst Manager
Section Action Only
User User User
User
Configure filters
Read-
Investigator Analyst Manager
Section Action Only
User User User
User
Read-
Investigator Analyst Manager
Section Action Only
User User User
User
Read-
Investigator Analyst Manager
Section Action Only
User User User
User
Manage columns
Generate report
Save views
Read-
Investigator Analyst Manager
Section Action Only
User User User
User
Read-
Investigator Analyst Manager
Section Action Only
User User User
User
Configure filters
Generate report
Save views
Read-
Investigator Analyst Manager
Section Action Only
User User User
User
Generate report
Save views
Vulnerability labels:
apply, create, manage
New scan
Vulnerabilities details:
select action, apply
label
Read-
Investigator Analyst Manager
Section Action Only
User User User
User
Read-
Investigator Analyst Manager
Section Action Only
User User User
User
Configure filters
Generate report
Save view
Configuration issues
details, actions menu:
configure asset,
delete asset, add to
asset group, agent
query, asset scan,
authenticated scan,
assign credentials,
schedule scan job
Configuration issues
details: deploy an
agent, assign
credentials, schedule
a scan job
Read-
Investigator Analyst Manager
Section Action Only
User User User
User
Manage columns
Generate report
Generate reports
Read-
Investigator Analyst Manager
Section Action Only
User User User
User
Generate reports
Configure a sensor
Edit a sensor
Assign a sensor
Delete, redeploy a
sensor
Assign an agent
configuration profile
Read-
Investigator Analyst Manager
Section Action Only
User User User
User
Add a connector
Delete connector
Edit an investigation
Create a new
investigation
View investigations
details
Delete an
investigation
Add a note
Read-
Investigator Analyst Manager
Section Action Only
User User User
User
Create an
orchestration rule
Create a correlation
list
Enable required
multifactor
authentication
Read-
Investigator Analyst Manager
Section Action Only
User User User
User
Create a new
credential
Create a user
Edit a user
Delete a user
Purge data
Connect to USM
Central™
Editing Users
Assuming the Manager role, you can modify several items for the account of another user.
For example, if users are unable to log in because they forgot their password or no longer
have an authentication mobile device, you can perform a reset for their account.
1. Go to Settings > Users to open the page that displays the list of user accounts in your
USM Anywhere environment.
Note: Sometimes a displays in the Status column. This icon means that the user
account is locked for 30 minutes after 3 failed login attempts within 15 minutes. You
can unlock the account by sending the user a password reset email (see Send
Password Reset below).
If your own user account is locked, you can wait 30 minutes and try again or contact
AT&T Cybersecurity Technical Support for assistance.
Note: If you click the of your own user, the Profile page displays. See Managing
l Click Send Password Reset to reset the password for the user. When you do a pass-
word reset, the user receives an email with a link to set a new password for the
account.
l Click Reset Multi-Factor Authentication to reset the code used to pair a mobile
device with the account. See Using Multifactor Authentication for more information.
l Select Enable Multi-Factor Authentication to enable MFA. See Using Multifactor
Authentication for more information.
4. Click Save.
You can manage your own user account, which enables you to do the following:
1. At the bottom of the expanded pane of the USM Anywhere web user interface (UI), hover
over the profile settings options, and select Profile Settings.
USM Anywhere helps you meet the Payment Card Industry (PCI) standard by enforcing
password complexity, password expiration, and forbidding password reuse. See the USM
Anywhere Password Policy for details.
l
Manager: Go to Settings > Users and click the icon of your user.
Note: The date of the last update displays in front of the Update Password
button.
Enable MFA
If you want to protect your account, enable MFA for your user account. When this feature
is activated, USM Anywhere displays the multifactor authentication page for you to
complete your MFA configuration. The displayed page provides a unique QR code that is
used by the Authenticator app to retrieve a verification code. See Using Multifactor
Authentication for more information about this security configuration.
Note: AT&T Cybersecurity recommends that users enable MFA for their account.
MFA adds extra security because it requires multiple factors to authenticate a user,
making it more difficult for an unauthorized person to gain access to the account.
To enable MFA
l
Manager: Go to Settings > Users and click the icon of your user.
USM Anywhere gives you the option of selecting your default landing page after you have
logged in.
Important: You can also load the configured default landing page by clicking the
logo of USM Anywhere located in the upper-left corner of the page.
l
Manager: Go to Settings > Users and click the icon of your user.
3. Select the default home page you want to display after you have logged in. You have
these options:
l Dashboards: You can select a specific dashboard to use it as a landing page. The
list of dashboards is alphabetically ordered and also includes the custom dash-
boards you can create.
Note: Keep in mind that dashboard names that begin with a lowercase letter
are located at the end of the list.
Important: You have the option of selecting the views you have created. If
there is a selected view and you delete that view, when you log in, USM
Anywhere displays the main page related to that view. For example, if you
select a custom dashboard page to be your landing page and then you delete
that custom dashboard, USM Anywhere displays the dashboards page when
you log in.
4. Click Save.
Select the Time for Auto-Refreshing the Alarms and Dashboard Pages
If you want to configure the time that the alarms and dashboard pages refresh their
information, you can set an interval. These are the options:
l None: The page works as usual and displays the icon for manually updating the
page.
l Every 5 min: The page is reloaded every 5 minutes.
l Every 10 min: The page is reloaded every 10 minutes.
l Every 15 min: The page is reloaded every 15 minutes.
If you want notification on alarms generated by USM Anywhere, activate the notification
option for your user account. When this feature is activated, USM Anywhere sends an
email to provide real-time notification of critical security incidents.
Note: These notifications send emails using Simple Mail Transfer Protocol (SMTP).
There is a quota of 200 emails per day.
l
Manager: Go to Settings > Users and click the icon of your user.
Note: It can take up to one hour for the notifications to take effect.
Important: You will not receive email notifications for suppressed alarms.
4. Click Save.
1. At the bottom of the expanded pane of the USM Anywhere web user interface (UI), hover
over the profile settings options.
2. Select Logout.
API Clients
USM Anywhere offers a REST API framework that enables you to customize elements of data
in your environment. The APIs return JSON responses and any errors in those returns use
HTTP response codes. To access the API, you will need to create a client ID and secret code in
the USM Anywhere interface, and use that information to create a token. USM Anywhere uses
OAuth 2.0 to authenticate against the REST APIs.
Edition: The API is available in the Standard and Premium editions of USM Anywhere.
See the Affordable pricing to fit every budget page for more information about the
features and support provided by each of the USM Anywhere editions.
1. In the USM Anywhere web UI secondary menu, click the icon and select Profile Set-
tings.
3. Click New Client to create a new client. See the AlienVault APIs for more information.
1. In the USM Anywhere web UI secondary menu, click the icon and select Profile Set-
tings.
2. Select API Clients.
3. Locate the API client that you want to enable and click the icon. This turns the
icon green. To disable an already enabled API Client, toggle the icon to its original status.
1. In the USM Anywhere web UI secondary menu, click the icon and select Profile Set-
tings.
2. Select API Clients.
3. Locate the API client that you want to modify and click the icon to open a new win-
dow.
Deleting Users
You can delete a user account in your USM Anywhere whenever you need to.
l All dashboards created by the user are deleted (including any shared dashboards). See
Sharing your Custom Dashboard for more information.
l All views created by the user are deleted (including shared views). See Alarms Views,
Assets Views, Configuration Issues List View, Event Views, USM Anywhere System Events
List View, Viewing Vulnerabilities Details for more information.
l API clients created by the user are deleted. See API Clients for more information.
l All profile information are deleted (homepage, auto refresh, receiving notifications). See
Managing Your Profile Settings for more information.
Note: Despite deleting a user, all their saved generated reports, created or modified
rules, and created or modified investigations stays in your environment.
1. Go to Settings > Users to open the page that displays the list of user accounts in your
USM Anywhere environment.
USM Anywhere supports up to 20 concurrent sessions per user, including both USM Central
and USM Anywhere sessions. You can configure the length of time a session is inactive before
the system automatically logs you out of USM Anywhere. Concurrent API sessions are not
limited.
Important: GovCloud users are limited to two concurrent sessions for each user,
including USM Central, USM Anywhere, and API sessions.
3. Use the drop-down list to set the session timeout. It can be 15 minutes, 30 minutes, 1 hour,
or 2 hours.
The PCI DSS is made up of 12 requirements that businesses are expected to comply with.
These requirements consist of security policies, procedures, and guidelines for storage,
processing, and transmission of cardholder data.
USM Anywhere can play a crucial role for you by delivering the technologies necessary to
achieve PCI compliance. Many businesses do not have the tools, knowledge, or resources to
fulfill the requirements for PCI Compliance.
The Payment Card Industry Data Security Standards (PCI DSS) views in USM Anywhere have
pre-defined filters based on the PCI DSS Asset Group. This section provides instructions on
assigning assets to the asset group to populate the views with data.
Note: USM Anywhere generates PCI reports from the assets assigned to the PCI DSS
Asset Group. See USM Anywhere Compliance Templates for more information.
5. Click Save and the selected assets will join the PCI DSS Asset Group.
2. In the upper-left side of the page, click the Configure Filters link.
5. Click Apply.
6. In the left panel, scroll to the bottom to find the section for the PCI Asset filter.
7. Click Yes (n). The number in parentheses indicates the number of PCI Assets.
Using USM Anywhere, you can create investigations and organize the information from your
environment. This feature enables you to manage and coordinate incident response activities.
Use Investigations for linking alarms, events, notes, and other files to their responses, and you
will have a complete view of actions you have taken to address a particular threat.
The Investigations page provides a list of all of the investigations created in your
environment. Go to Investigations to open a centralized view of your investigations. Each
row describes an investigation.
The Investigations page includes navigation and filtering elements to help you locate the
investigations you want to review. When you go to Investigations, the page displays all of the
open and in-review items by default.
The following table lists the default columns in the investigations page.
Severity Severity of the investigation. Values are Low, Medium, High, and Critical.
Status The status applied to the investigation. It can be Open, In Review, and
Closed. See Viewing Investigations Details if you want to change the
status.
Created The date and time the investigation was created. The date displayed
depends on your computer's time zone.
Assignee Email of the person to whom the investigation has been assigned.
Last Updated The date and time that the Investigation page was last updated. The
date displayed depends on your computer's time zone.
Last Updated by Email of the last person who has updated the investigation.
Use the icon if you want to modify some information. See Editing Investigations for more
information.
Use the icon if you want to delete an investigation. See Deleting Investigations for more
information.
l Filter by Title or ID: Enter a search string for the name of the investigation or the invest-
igation ID to display only matching jobs.
l Severity: Select a value between Low, Medium, High, or Critical. You also have the option
All to display all of the severities that you have in your environment.
l Intents: Select a value of Delivery & Attack, Environmental Awareness, Exploitation &
Installation, Reconnaissance & Probing, or System Compromise.
l Assignee: Select the email of the person of whom you want to display its assigned invest-
igations.
l Open: Select this checkbox if you only want to display the investigations that are open.
l In Review: Select this checkbox if you only want to display the investigations that are in
review.
l Closed: Select this checkbox if you only want to display the investigations that are closed.
USM Anywhere enables you to create and manage your own investigations.
1. Go to Investigations.
2. In the upper right area of the page, click New Investigation to open a new window.
Field Meaning
Severity Severity of the investigation. Values are Low, Medium, High, and
Critical.
4. Click Save.
Note: USM Anywhere automatically assigns every new investigation to the user who
creates the investigation. See Editing Investigations to learn how to modify the
assigned user.
Editing Investigations
You can make changes to the investigations that you have created, such as changing the title,
intent, or status. If an investigation is no longer needed, you can delete it.
To edit an investigation
1. Go to Investigations.
2. Locate the investigation in the Investigations list.
3. In the row for the investigation, click the icon or the title of the investigation.
See Creating a New Investigation for more information about these options.
Note: USM Anywhere automatically assigns every new investigation to the user who
creates the investigation.
5. Click Save.
1. Go to Investigations.
On the upper left side of the page is the name of the investigation. Click the icon next
to the name if you want to make changes to the item. See Investigations List View for
more information about the fields.
Below the investigation name displays the ID of the investigation. There is also
information regarding the created and the last updated dates.
You can change the values displayed in the Assignee, Severity, Intent, and Status drop-
down lists. The modification is automatic, so once you change a value, it is updated.
l Activity on Investigations
l Notes on Investigations
l Evidence on Investigations
Activity on Investigations
This is an informative section, which enables you to see in chronological order every
modification of the investigation.
l Type of action that has been done. These actions can be:
Evidence unlinked An alarm or event has been unlinked from the investigation.
Notes on Investigations
To add a note
1. Go to Investigations.
2. Locate the investigation in the Investigations list.
3. Click the title of an investigation to display its details.
Note: There is a maximum length of 4000 characters, which is about 600 words.
6. Click Save.
To edit a note
1. Go to Investigations.
2. Locate the investigation in the Investigations list.
3. Click the title of an investigation to display its details.
4. Locate the note you want to edit and click the icon.
5. In the Edit Note dialog box, change the text for the note as needed.
6. Click Save.
To delete a note
1. Go to Investigations.
2. Locate the investigation in the Investigations list.
3. Click the title of an investigation to display its details.
4. Locate the note you want to delete and click the icon.
Evidence on Investigations
This section displays the alarms, events, and files associated with the investigation.
Important: You can link up to 100 alarms and 100 events to each investigation.
The asset name includes the icon if the asset is not in the system, or the icon if the
l Add to current filter: Use this option to add the asset name as a search filter. See Search-
ing Events for more information.
l Find in events: Use this option to execute a search of the asset name in the Events page.
See Searching Events for more information.
l Look up in OTX: This option searches the IP address of the source asset in the AT&T
Cybersecurity Alien Labs Open Threat Exchange® (OTX™) page. See Using OTX in USM Any-
where for more information.
l Add asset to system: Use this option to create the asset in the system. See Adding Assets
for more information.
l Add to Current Filter: Use this option to add the asset name as a search filter. See Search-
ing Events for more information.
l Find in Events: Use this option to execute a search of the asset name in the Events page.
See Searching Events for more information.
l Look up in OTX: This option searches the IP address of the asset in the OTX page. See
Using OTX in USM Anywhere for more information.
l Full Details: See Viewing Assets Details for more information.
l Assign Credentials: See Managing Credentials in USM Anywhere for more information.
l Authenticated Scan: This option displays depending on the USM Anywhere Sensor asso-
ciated with the asset. See Running Authenticated Asset Scans for more information.
l Scan with AlienApp: This option enables you to run an asset scan through an AlienApp.
See Running Asset Scans Using an AlienApp for more information.
l Configuration Issues: This option opens the Asset Details page. The Configuration Issues
tab is selected in the page. See Viewing Assets Details for more information.
l Vulnerabilities: This option opens the Asset Details page. The Vulnerabilities tab is selec-
ted in the page. See Viewing Assets Details for more information.
l Alarms: This option opens the Asset Details page. The Alarms tab is selected in the page.
See Viewing Assets Details for more information.
l Events: This option opens the Asset Details page. The Events tab is selected in the page.
See Viewing Assets Details for more information.
3. Click the icon and select an investigation. You can also create a new one. See Creating
4. Click Save.
3. Click Add to Investigation and select an investigation. You can also create a new one.
See Creating a New Investigation for more information.
4. Click Save.
3. Click the icon and select an investigation. You can also create a new one. See Creating
4. Click Save.
1. Go to Investigations.
2. Click the title of an investigation to display its details.
3. In the Evidence section, locate the alarm or the event that you want to remove from the
investigation and click the icon.
1. Go to Activity > Alarms or Activity > Events depending on if you want to remove an
alarm or an event.
2. Locate the alarm or event that you want to remove from the investigation and select it.
See Searching Events for assistance.
3. Click the icon located in the Investigation field.
4. Select the investigation from which you want to remove the link.
1. Go to Investigations.
2. Click the title of an investigation to display its details.
3. In the Evidence section, click Select the file from your desktop or drop your file in the
section.
Deleting Investigations
USM Anywhere enables you the option of deleting an investigation if is no longer needed.
To delete an investigation
1. Go to Investigations.
2. Click the title of an investigation to display its details.
USM Anywhere creates a default notification rule that sends an email notification when there
is a change to an investigation.
This is a system rule, and the allowed actions are Enable, Disable, and Edit. If you try to delete
it, the rule is restored during the next system update. Go to Settings > Rules to view this
notification rule.
Note: These rules use the event_severity field with the values low, medium, high, and
critical, and the event_action field with the values created, deleted, and updated.
Note: The destination email field includes the emails of the users created in the
environment as the role of Managers. See Role-Based Access Control (RBAC) in USM
Anywhere for more information.
The USM Anywhere web user interface (UI) enables you to view and modify some data related
to the configuration of your environment. These pages give you an overall view about the
configuration of your system, which is a useful way to have all the essential information.
These are the options:
l Check the status of your environment (see USM Anywhere System Monitor for more
information)
l Display the summary of your current network configuration. See USM Anywhere Network
System and Network Setup and Configuration for more information
l Display and modify your syslog configuration (see Enabling syslog Connections in an AWS
VPC for more information)
l Manage asset fields (see Managing Asset Fields for more information)
l Configure a session timeout (see Configuring Web UI Session Timeout for more inform-
ation)
The USM Anywhere Network System page enables the user whose role is Manager to display
a summary of the configured network.
The USM Anywhere System Monitor page enables the user whose role is manager to display
statistics of the data coming from sensors inside a time-frame. See Role-Based Access
Control (RBAC) in USM Anywhere for more information.
You can choose between the last 24 or 7 hours. If you have more than one sensor configured
in your environment, you need to select a sensor.
Go to Settings > System, and then click System Monitor in the left navigation panel. These
are the displayed data:
Field Description
Total Events Per Second Graph displaying the total events received per second. (You can see
the current and the filtered events.)
Fuzzied Events Graph displaying the total fuzzied events received per second. See
About the Was Fuzzied Filter for more information.
CPU Load Average Graph displaying the load average of the CPU.
Disk (Software) Graph displaying in percentages the total disk (software) used.
Field Description
Disk (Data) Graph displaying in percentages the total disk (data) used.
Note: See The Syslog Server Sensor App, Data Sources and Log Processing, and Enable
Connections in an AWS VPC for more information.
3. If you have more than one USM Anywhere Sensor deployed, use the drop-down menu to
select the sensor that you want to configure log collection.
Note: If the sensor is receiving syslog messages from your network, you will see
IP addresses listed under Device Sending Data. For performance reasons, this list
only includes devices sending logs in the last 15 minutes. The list refreshes every 30
seconds. After the sensor is updated or the syslog-ng server used by the sensor
restarts, the list is reset.
4. Click How do I configure my device? to see the instructions for your operating system:
l Windows: This is a link to the Collecting Windows System Logs page.
l Linux: This is a link to the Collecting Linux System Logs page.