Snare Central provides a dynamic, application-style point-and-click user interface, directly from your web browser. Each of the three section buttons displayed in the top-right corner of your browser (Agent Management, Reports, Status, System) corresponds to a range of capabilities, as discussed below.
Agent Management
Image Added
This section allows you to manage the configuration of Snare Agents that report to the Snare Central. In the Agent Management section, you will find functions to: - retrieve Retrieve system data, such as Users and Groups, from the Snare Agents reporting to the Snare Central.
- Modify system configuration settings such as IP address, DNS servers, and time zones.
- Display log files that may help the Snare Central support team to provide you with assistance.
- Update the Snare Central with new software, patch existing applications, or install new objectives.
- Manage users, and internal Snare Central settingsView and manage configuration on your agents provides a remote management interface .
- Connect to the Snare Agent Manager (SAM) to manage and license your agents.
Snare Agents provides the ability to It also provides a remote management interface for viewing and managing configuration on your agents in a central place. More details on the objectives available in the System section Agent Management of this document.
| Image Removed Image Added
|
Reports 
Additional objectives can be: - Created by Snare Central users, either from scratch, or by cloning and modifying an existing objective.
- Downloaded from the InterSect Alliance web site.
By default, the reports area will contain objectives relating to: Active Scanning
- Example: Scan the local network, and conduct a network vulnerability analysis on hosts that are found.
- Example: Connect to the organisational border router and download the current configuration settings. Compare these settings to an authorised baseline configuration, and highlight any changes that have been made.
Application Audit
- Example: Display a list of inappropriate material that has been accessed through the organisational proxy server.
- Example: List users who have utilised the UNIX 'SUDO' command.
Network
- Example: Display a geographic map of IP addresses that have been denied access by the organisational Checkpoint Firewall.
- Example: Report on the top ten hosts that have initiated a port scan against the organisation, as reported by the gateway network intrusion detection system.
Operating Systems
- Example: Generate a real-time alert when a user outside an authorised list, attempts to access a sensitive file on a Windows file server.
- Example: Send a daily email to security administrators, if the list of users in the Domain Administrators group changes.
Snare Central
- Example: Display a report that shows users who have modified the configuration of any Snare Central objectives.
User and Group Snapshots
- Example: Based on the information provided by the Snare Agent for Solaris, produce a report showing any unauthorised members of the 'sensitivedata' UNIX group.
|  |
...