Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

...

...

...

...

...

...

...

Snare installation


Image Modified

  • An appropriate Solaris Distribution
  • Enterprise customers may download the SnareSolaris package from the Snare Secure Area at https://www.intersectalliance.com.
  • Solaris version 10 only: A Solaris installation does not normally activate the utilities necessary to activate the auditing subsystem. As such, it must be separately activated on the Solaris host, before the Snare agent will work in collecting and filtering events. The auditing subsystem may be activated using the '/etc/security/bsmconv' script.


Image Modified

Install Snare for Solaris package.

  1. Logon as root user, i.e. at the command prompt enter the command /bin/su and enter the root password when prompted. Issue the command, as root as per your distribution: >pkgadd -d SnareSolaris-supp-4.0.0-i386-S11.pkg
  2. This will install Snare for Solaris and restart the audit daemon (auditd).


Image Modified

Remove Snare for Solaris package (if required).

  1. Query the database to ensure Snare is installed

    >pkginfo -l SnareSolaris
  2. Remove the Snare for Solaris package
    >pkgrm SnareSolaris

Running Snare

To view the Snare Remote Control Interface enter the URL http://localhost:6161 or http://hostname:6161 where "hostname" is the DNS name or IP address of the target machine.
After installation the auditd daemon will be running. This daemon must be running if the events are to be passed to a remote host.

Image Modified

Restart the auditd daemon either:

  1. By issuing the command: > svcadm restart system/auditd
  2. Via the Remote Control Interface:
    From the menu on the right hand side select Apply the Latest Audit Configuration to restart the daemon.

Audit configuration

The Snare configuration is stored as /etc/security/snare.conf. This file contains all the details required by Snare to configure the audit subsystem to successfully execute.
The configuration of /etc/security/snare.conf can be changed either:

...

The Remote Control Interface is the most effective and simplest way to configure snare.conf and operates completely in memory, with no reliance on any external files. The Remote Control Interface can be access locally via the URL http://localhost:6161 or remotely via http://hostname:6161 where "hostname" is the DNS name or IP address of the target machine.

Image Modified

Remote Audit Monitoring
The Remote Control Interface can be turned off by editing the default /etc/security/snare.conf file. You can either edit the snare.conf file directly, commenting (using #) the allow=1 line under the [Remote] section, or by setting this value to 0. Save the file.
To ensure any changes to the snare.conf are applied, the agent must be restarted to active the new configuration. This restart process is shown as follows (execute as the root user): >ps -ef

grep auditd
It should return something like:
root 17608 17595 0 13:50:56 pts/1 0:00 grep auditd
root 17606 1 33 13:47:52 ? 2:48 /usr/sbin/auditd
To restart:
>svcadm restart system/auditd
To check that the processes have restarted ensure the processes have new Ids:
>ps -ef

grep auditd
root 17633 1 32 14:12:40 ? 3:14 /usr/sbin/auditd
root 17637 17595 0 14:16:23 pts/1 0:00 grep auditd

Note: For administrators, the system log files will be updated whenever settings are applied to the snare.conf, for example, /var/log/messages. This information may assist you when you require it. Any errors in the configuration file will also be logged.