The purpose of this section is to discuss the makeup of the configuration items in the registry. The Snare configuration registry key is located at HKEY_LOCAL_MACHINE\SOFTWARE\Intersect Alliance\SnareMSSQL, and this location may not be changed. If the configuration key does not exist, the SnareMSSQL service will create it during installation, but will not actively audit events until a correctly formatted audit policy is present.
SNARE can be configured in several different ways, namely:
- Via the remote control interface (Recommended).
- By manually editing the registry (NOT Recommended).
The format of the audit configuration registry subkeys is discussed below.
|
|
AgentLog | This value is of type |
CachePath | This is the disk cache path where the agent will temporarily save all unsent events if the agent needs to restart. Agent will read and send the events on next start. |
|
|
| REG_SZ
If no value has been set, "hostname" command output will be displayed.
Must be no more than 100 chars, otherwise will truncate. |
|
|
|
|
|
|
|
|
FileSize | This is the maximum generated size of an output file receiving events. The file is rotated upon reaching this maximum. |
HeartBeat | REG_DWORD The frequency, in minutes, with which the agent will
send out a heartbeat message. A value of zero (0) will disable this
feature. |
HeartBeatFileExport | This value determines whether heartbeats are logged to a file. Set this value to 0 for no, or 1 for Yes. |
HeartBeatOutputPath | This is the path where the heartbeat messages are exported to, if selected. |
HostGUID |
|
HostIP |
|
LookupTimeout |
|
MemCheckLimit |
|
MemCheckTimeout |
|
MSSQLPortNumbers |
|
TLS13Minimum | REG_DWORD When disabled (0), Snare Agent supports TLS 1.2 and TLS 1.3 for web connections. When enabled (1), TLS 1.2 is explicitly disabled; browsers connecting to the agent website must support at least TLS 1.3 for ssl connections. |
|
|
|
|
|
|
UnencryptedObj | REG_DWORD If set to one it will store the audit policy in plain text in the registry, otherwise if set to zero, the |
UpgradePath |
|
UseHostIP | If set it resolves the machines IP address from the first wired adapter. It will not resolve wireless IP's at present. Set this value to 0 for no, or 1 for Yes. If set, ClientName will be ignored. |
|
|
|
|
|
|
|
|
|
|
|
|
CheckTime | Number of seconds the agent will internally reload its settings,
drop and reestablish network connection. Minimum set time is 300 seconds
(5 minutes), maximum is 3600 seconds (1 hour). |
|
|
Destination1Format | This value is of type REG_DWORD and is the format in which the events are sent to the destination: Snare (0), SYSLOG RFC3164 (1), SYSLOG Alt (2), CEF (3) , LEEF (4), SYSLOG RFC5424 (5), SNARE V2 (6), SYSLOG JSON (7). DEVO (8), DEVO JSON (9). |
Destination1Host | This value is of type REG_SZ and is the IP or hostname of the destination server/SIEM. |
| This value is of type REG_SZ and is the ID of the client's certificate. Client will present the certificate in mutual TLS communication to prove its identify to the server in communication. |
|
|
Destination1SocketType |
|
Destination1TLSAuthKey | This value is of type REG_SZ and is used when |
FileOutput1Delimiter | This
value ranges from 1 to 255. It includes the path of the files where the
events will be stored per format (e.g. Snare, SYSLOG) |
FileOutput1FileName | The path and location of the file the events are sent to. Multiple files may be set. |
FileOutput1Format | The format to write to the log file. Available formats are: Snare (0), |
|
|
|
|
| This
value is of type REG_DWORD, and determines the upper limit for events
per second (EPS) that the agent will send to server. This feature only
appears in supported agents. |
SyslogFacility | This value represents the SYSLOG facility for SYSLOG format |
|
|
|
|
| REG_DWORD
Determines the availability of the remote control feature. If not set
or out of bounds, will default to 0/NO (ie; not able to be remote
controlled). |
LockTime | This value is of type REG_DWORD and is used to determine the lock duration in minutes after maximum failed login attempts. |
MaxFailAttempt | This value is of type REG_DWORD and is used to determine the maximum number of failed login attempts that will be accepted before the agent will be locked for a duration (Duration is defined in LockTime). |
| REG_DWORD Determines whether the remote users should be restricted via IP address or not. 0 = no restrictions. |
| This is of type REG_SZ and is the IP address set from above. |
|
|
| Stores the Snare Agent Manager settings |
SAM1AuthKey | Key used by the agent to communicate with the Snare Agent Manager. |
SAM1IP | The IP/hostname of where SAM is installed, that will communicate with the agent. |
SAM1Port | The port number the agent uses to communicate with SAM, port 6262. |
SAM1Token | Token provided by SAM to the agent. |
| |
|
|
AgentLocked | This value is of type REG_DWORD and is set to either 0 or 1 to indicate whether the agent is locked or not due to reaching maximum failed login attempts. |
AgentLockEndTime | This is of type REG_SZ and is used to store the time when the agent will be back to normal after it has been locked due to reaching maximum failed login attempts. |
LoginAttempts | This value is of type REG_DWORD and is used to determine the number of consecutive failed login attempts. |