Manage

The Manage tab provides a single, common interface for managing various aspects of the software, application environment, and users. These features are only available to users with the proper administrative permissions. The following sections describe each capability in more detail.

Users

Users are created by the default  “admin” user or other users who are in the Administrator's group or have create user permission. The following describes the purpose and usage of the admin user, as well as the steps to create and manage locally created users.

Default Admin User

SAINT Security Suite provides a default admin user account that has permission to all product features and content. This account is provided to perform system-level activities such as installing and configuring the product; setting up the license key; managing the update process; and performing other high-level actions such as creating users, groups, and managing permissions. Both SAINT Security Suite and SAINTCloud provide support for granular user access control and auditing user activity within the application through assigning individual users to object-based permissions. Therefore, it is recommended that the admin account for your SAINT installation (or SAINTCloud account) should not be shared by other users and used as a common login, thus eliminating the ability to track and manage individual user activity. If multiple users with full control of the system are required, those users can be added to the built-in Administrator's group. (See groups for more information about groups).

Create a User

  1. Click the Users and Groups menu option from the Manage tab to display the current list of users as shown in the following example:



     

  2.  Click Create User from the Grid Actions dropdown or select User from the global (+ Create) option at the top right of the page to display the Create User page:


     

  3. Enter a unique Username (login ID) for the new user (* required field).

  4. Optional – select the Authentication type. The default authentication type, local, stores password hashes in the database, and the password is managed through the Manage-Users page.  Alternatively, if Active Directory is selected, then the user will need to authenticate using his or her Windows domain password. The login name must exactly match the Windows domain login name in order for this option to work. (Note: If the Active Directory option does not appear in the drop-down menu, then the system has not yet been configured for Active Directory authentication on the Configuration screen. See Authentication.)

  5. If local authentication was selected above, enter a password string for the user account. (* required field).
    The user will login with these credentials. If the Force Password Change box is checked, then the user will be required to change the password after logging in for the first time.

  6. Optional – Enable the desired mode of two-step verification for additional security on the account. See Two-Step Verification for more information. The user’s cell phone number must be specified when using this option.

  7. Click Save.


The new user account will be created. Use the grid’s refresh button to view the new user in the User display grid.

Edit a User

Once a user account has been created, you can now perform routine account updates like changing their passwords or updating their e-mail account, as well as assigning the user to groups or granting them any needed global permissions, and enter individual target hosts (by IP address, subnet, etc.) to further control access to the host environment.

  1. Navigate to the Users and Groups page to display the current user list.

  2. Navigate to the User or use the search and sort features to locate the user in a large list.

  3. Open the Edit User dialog by selecting the user and clicking the Edit User (pencil) action on the selected row to display the user management screen, as shown below..


     

Edit User Information

  1. Edit general information about the user from the User Info tab.

  2. Click the Change Password button to expand the form field and expose the Password and Confirm New Password fields.

  3. Click Save once all changes have been made.

Change Group Assignments

Groups allow you to create a set of users to whom the same permissions can be granted. (See Groups for more information). Click on the Group Assignments tab to find out which groups the user is in or to change the group assignments, as shown below:


To remove the user from a group, from the Group Assignments tab, click the Remove From Group (X) icon beside the group. To add the user to a group, click the Add a Group (+) icon at the bottom of the grid, highlight the desired group, and click OK.

Assign Targets to Users

This tab provides the capability to grant user access to specific hosts in the target environment. Leaving this tab blank grants access to any target and leaves target management up to other security mechanisms, like Target Groups. This feature can best be described as a “white list” feature where individual target access is explicitly stated rather than implied. These decisions can be made by individual host IP addresses, space, comma or line-separated lists, target ranges, subnets, CIDR addresses, or even Domain. For example:  192.*, 1.1.1.0-1.1.1.56, 10.0.0.0/24.

  

  1. To create the target assignments, manually enter or copy/paste the target list in the text box provided in the Target Assignments tab.


     

  2. Click the Assign button once the list is complete.

  3. The system will refresh to display the “Target Assignments Saved” message.

  4. Close the dialog box to return to the User management main page.


The user will now have access to the specified targets to execute actions in the system as specified by the assigned Role(s).

Assign Permissions to Users

To grant the user the ability to perform certain actions on the system, or the ability to modify specified configuration settings, click on the Permissions tab. (Note that object-based permissions, such as allowing the user to modify a target group or to view a report, are applied per object, and therefore don't appear here. See Object-based Access Controls for more information.)

Global Permissions

Global permissions give users the ability to perform certain actions system-wide. To grant a global permission, check the corresponding box and click on Save Changes.

 

 

Global permissions include:

Configuration Permissions

Click on the Configuration Permissions bar to expand the Configuration Permissions panel. These permissions allow a user to modify the values contained in the corresponding configuration setting categories, either globally or per scan. If the checkbox in the “modify globally” column is checked, then the user is allowed to change the global default values, which will be applied in every scan job for which the corresponding setting hasn’t been overridden. (See Configuration.) If a checkbox exists in the “override per scan” column and it is checked, then the user is allowed to override the default values when creating scan jobs. (See Advanced – Step 4.) The bold categories are top-level categories which include the categories below it. Click on Save Changes at the bottom of the panel to save your changes.

Assign Features to Users

To specify which screens, functions, and options in the web interface are available to the user, click on the Features tab. This allows you to choose a feature set which is appropriate for the user. You can choose one of the pre-defined feature sets or define a custom feature set.

 

 

Note that the feature set is intended to simplify the user experience by hiding unused options, not to be an access control feature. The feature set only affects the user’s web session, not the API. To properly prevent users from gaining unauthorized access to manager objects, use SAINT’s access control features instead of a feature set. See Access Controls and Assign Permissions to Users for more information.

 

Feature selections do not override permissions or license restrictions. That is, checking a feature only shows the feature if the user has permission and the feature is licensed.

Pre-defined Feature Sets

The pre-defined feature sets are as follows:

To choose one of the pre-defined feature sets, select it from the drop-down menu and click on the Save button.

Custom Feature Sets

If none of the pre-defined feature sets are appropriate for the user, you can create a custom feature set by enabling or disabling individual features.  The individual features are organized into five feature groups:

To create a custom feature set:

  1. Optional. Choose one of the pre-defined feature sets to use as a starting point.

  2. Expand any of the feature groups.

  3. To enable all features in the feature group, check the no restrictions box. To enable only certain features in the feature group, uncheck the no restrictions box and check the desired features. (Unchecking all boxes is equivalent to checking the no restrictions box.)

  4. Repeat steps 2-3 as desired for other feature groups.

  5. Click on the Save button.

Feature Priority

In cases where a user and their group(s) have a different feature set, restricted sets in a given feature group take priority over unrestricted sets in the same group.  For example, if a user has “no menu restrictions” checked but the user’s group has some menu options selected, the user will see only the selected menu options. If a user has the default “no restrictions” feature set but the user’s group has the “common features” feature set, then the user will have the “common features” feature set.

If the user and group both have restricted feature sets, then the feature sets are merged.  For example, if a user has the “Scan Jobs” menu option enabled, and the user’s group has the “Reports” menu option enabled, then the user will see both the “Scan Jobs” and “Reports” menu options.

Groups

A group is a set of users to which permissions can be granted as a single unit. There are several benefits to using groups. Firstly, granting permission to a group only involves a single step, whereas granting the same permission to multiple users individually involves more effort. Secondly, groups allow new users, or users who change job functions, to be granted an existing set of permissions simply by adding the user to an existing group which already has the appropriate permissions for that user’s job function.

Built-in Groups

Even before you create any groups, there are three default groups:

Create a Group

  1. Click the Groups menu option from the Users and Group  tab to display the current list of groups as shown in the following example:


     

  2. Click the New Group (+) option at the bottom of the grid to display the Create Group page:


     

  3. Enter a unique Group ID and Group Name.

  4. Use the remaining fields to enter any other information you wish to store to identify the group.

  5. Click Save.

Edit a Group

Once a group has been created, you can change the group’s information or add members to the group as follows:

  1. Click the Groups tab in the Users and Groups page to display the current group list.

  2. Navigate to the desired group, or use the grid’s search and sort features to locate the group in a large list.

  3. Open the Edit Group dialog by selecting the row and clicking on the pencil icon on the row or at the bottom of the grid.


 

The Group Info tab can be used to edit the group’s name and identifying information. The Permissions tab can be used to edit the group’s global permissions and configuration setting permissions. (See Assign Permissions to Users for more information). The Target Assignments tab can be used to assign target ranges which group members are allowed to scan. (See Assign Targets to Users for more information).The Features tab can be used to define a feature set for the group.  (See Assign Features to Users for more information.)

 

Note that groups can be members of other groups. In that case, members of that group inherit not only the permissions of that group, but also the permissions of any groups of which that group is a member. This allows creation of groups in a multi-level hierarchy. The Group Assignments tab can be used to add the group to other groups. (See Change Group Assignments for more information.)

 

User Groups can also have their own License Key. This license key design can be optimal for organizations that have disparate operating budgets, license type requirements (metered versus per IP), or for managed service organizations that license the product for multi-tenant deployments.

Adding Members to a Group

To add members to a group, click on the Members tab, and then click on the Add a Member (+) icon at the bottom of the grid. Use the paging buttons, sort buttons, and search boxes to locate the desired users and groups if necessary, and check the box beside those users and groups.  Then click OK.

Note: members can also be added to or removed from groups by editing the member rather than editing the group. See Change Group Assignments for more information.

Removing Members from a Group

To remove members from a group, click on the Members tab; locate the users and groups to be removed, and either click on the Remove From Group (X) icon on each row you wish to remove, or select multiple rows and then click the Remove From Group (X) icon at the bottom of the grid to remove multiple members at once. Click OK at the prompt to confirm.

Assets

The capabilities in the asset management module enable users to view, search, sort, tag, assess and report on hosts scanned by SAINT’s scanner(s). As shown below, asset management is segregated into three main collections of data:  Assets; Asset Tags; and Target Groups.

 

 

You can sort this list, perform column searches, see detailed information about a record in the display, or take other actions such as adding/removing columns, refreshing the display to dynamically update the content with any new content since you entered the grid, and take other actions related to creating, editing, and deleting content. The following describes these features in more detail.

 

Assets included in this data grid represent hosts that have been discovered and/or assessed by the scanning engine. By default, post scan processes create system tags for the following system-provided Tag Names:

 

AWS Asset Tagging – If the SAINT Agent is installed on an AWS asset, then its metadata will be collected and stored as asset tags. This data includes aws-vpc, aws-subnet, aws-size, aws-id, and aws-zone.

 

Edit Assets

Certain information about the assets is intended to be edited by the user, such as the asset's criticality, whether it stores sensitive data, and whether it is an Internet facing asset.  These properties are among the risk factors used to calculate risk scores for the asset's vulnerabilities. To edit this information, click on the Edit Asset button (pencil icon) in the Action column of the grid.  Alternatively, select one or more assets and then choose Edit Assets from the Grid Actions menu.  This will open a dialog box:

 

 

To change the properties of the selected asset(s), change them on this form and click Save.  For each property which can be changed, there is also a checkbox labeled Allow Rules to Override.  This box is checked by default, allowing asset rules to change the value of the property.  (See Asset Rules) Uncheck the box if you want to lock the value of the property, so it won't be modified by rules.

Add Asset Tags to Assets

Scanned hosts stored in the database can be ‘tagged’ with descriptive values to enhance the effectiveness of viewing, analyzing, assessing and managing these hosts as business assets. Asset Tags are based on a Key-Value pair concept. For example, each tag will have both a Key (example: Location) and at least one Value (example: Dallas). The following are examples to better illustrate this concept:

 

Tag a Single Asset

The following example illustrates how a single asset can be tagged with pre-existing asset tags or creating new one’s dynamically as they are being associated with the asset:

  1. Navigate to the Assets tab under the Assets page in the Manage menu.

  2. Click on the Edit Tags action button for the asset to be tagged.
    An Asset Tag Assignment dialog will be displayed, as shown in this example. This dialog will display existing Tag Names and Values (example: IP Address=10.8.39.188), and the Data Type associated with the tag (default: String) as well as a few blank rows to dynamically apply other existing tags or create and tag the asset with new tags without having to navigate to the Asset Tags data grid and create them first. Note that some asset tags (for example: Node, Hostname, ID Address, OS Class and OS Type) are generated by the scanner when they are scanned and are “read only.”



    Apply an existing Tag:
    I. Select a Tag Name in a blank Tag Name drop-down menu. (Example: Location)
    II. Select a Tag Value in the Tag Value(s) drop down menu for this Tag Name. (Example: Baltimore)

    To create a new Tag Name and Value and apply it to the Asset:
    I. Enter the Tag Name directly in a blank row under the Tag Name. (Example: Owner)
    II. Select the Data Type applicable to the tag. (default: String)
    III. Enter a Tag Value to be associated with the Tag. (Example: SOC)

    Remove a Tag:
    I. Click on the down arrow for the Tag Name or Tag Value that you wish to remove.
    II. Select the blank row in the drop down menu list.
     

  3. Save the change to tag the asset and new tags into the Asset Tag table.

  4. Close the assignment dialog to see:

 

Tag Multiple Assets from a Single Operation

Adding Tags in Bulk

Multiple assets can be tagged through a single operation by clicking the Asset grid's Grid Actions > Assign Asset Tags option. The following describes how to apply tags in bulk through this operation:

  1. Navigate to the Assets tab on the Assets page.

  2. Click on the Grid Actions > Assign Asset Tags option. The following Bulk Asset Tag Assignment dialog will be displayed:


     

  3. First, select the Tag Name(s) and Tag Value(s) you wish to assign to the collection of assets. This can be done by clicking on each Tag Name and Tag Value drop-down lists to select existing Tags; or by manually entering new Tag Name(s) or Tag Value(s) directly in-line in a blank row, if the required tag has not yet been created.

  4. Ensure the “Apply to” action is shown in the cell above the Save button.

  5. Enter the asset information in the Assets field to identify assets to be tagged.
    i. Use the Help (?) option to the right of the Assets field for assistance on acceptable identifiers, to include, but not limited to: IP, Hostnames, IP ranges, CIDR blocks, Subnets, etc.
    ii. Use the “Open Asset Filter” option to select existing assets based on system-defined and custom tags. In the following example, we will use this feature to identify three hosts, by IP address, that we wish to tag as being owned by the Security Operations Center (SOC). Click OK to add the assets and close this dialog.
    iii. There is an option to assign asset tags to newly discovered assets. This means that any time a new asset is discovered which meets the criteria (set by using the input field to the right of the checkbox), the asset tags will automatically be applied to it.

    iv. Clicking on the “Newly Discovered Asset Tag Assignments” link will bring up a grid showing all the assignments that have been saved, as shown below.

    From this grid, the newly discovered asset tag settings can be viewed and removed. Removing a tag from this grid will not remove the asset tag from the database, but only remove it from being automatically assigned to the targets specified in the criteria.


     

  6. Verify the Asset list and Tag Assignment values and Click OK to assign all tags to the collection of assets.

  7. Close the dialog and view the resulting tags in the Assets table.

These tags will now be applied to the asset and available for tracking for existing and future scan results.

Removing Tags in Bulk

Just as tags can be assigned in this bulk assignment process, they can also be removed in the same manner. Use the steps defined in the Adding Tags in Bulk section, except you will change “Apply to” to “Remove from” in Step four. This operation will use the Tag and Asset criteria defined in the Bulk Asset Tag Assignment dialog to execute the task in a single operation, as opposed to manually removing tags individually at the Asset row level by clicking on each Asset Tag’s X (delete) option.

Asset Tags

The Asset Tag data grid, as shown below, provides a complete list of all tags in the system, as well as a count of the total number of assets currently tagged with each value.
 

Add Asset Tag

New asset tags can be created by navigating to Grid Actions > Create Asset Tag option from the Asset Tags tab to display the Asset Tags creation form:.

 




As shown in the dialog, you can add a completed new 'Tag Name-Tag Value' combination, or you can select an existing Tag Name and add additional values to it. The following example includes adding a New Tag Name: Function, as a Data Type=String, and add 3 values, as well as adding a Tag for Business Availability. Note this can be done directly “in line” in each cell (as shown in these examples) OR you can upload a text file with the values listed in a line separated list. A text file list can save a lot of time, for example, if you have hundreds of values, as in the case of asset owners or locations.


 

  1. Click Add Row if you wish to add additional tags before saving.

  2. Click Save to save your tags.

  3. Close the dialog window to view the new Asset Tags.

Edit Asset Tag

  1. Navigate to the Asset Tags tab under Manage Assets.

  2. Click on the Edit (pencil) action button on an Asset Tag.

  3. You will have the option to edit the Tag Name or Tag Value for the selected tag.

  4. Edit the Name(s) and Tag Value(s) as needed.

  5. Click Save.

  6. Close the dialog window to save your changes.

Delete Asset Tag

A user can choose to delete the entire Name-Value collection by choosing to delete a Tag Name or choose to delete just the record associated with a Tag Name’s Value.

  1. Navigate to the Asset Tags tab under Assets.

  2. Click on the Delete (trash can) action button on an Asset Tag.

  3. You will have the option to Delete the Tag Name or Tag Value for the selected tag.

  4. The system will display a message to confirm the delete action.

  5. Click OK to accept and delete the selected tag. Click Cancel to exit the process and retain the tag.


Note: Deleting an asset tag does not impact current or future scan results. However, tag values will be removed from reference to any associated scan Jobs or results. For example, if a previous scan contained assets associated with Location=Dallas and the Location tag is removed, then scan results will no longer be associated with this location. Also, if a Scan Job was configured based on the tag that is being deleted, then that Job will no longer be associated with a Tag or their associated assets. Those jobs will need to be edited, as needed, if the intent is to reuse/re-run them in the future. A recommended BEST PRACTICE is to retain Asset Tags (not delete them) once they have been associated with scan Jobs and scan Results, unless the tags, jobs and results have no future value. This will ensure existing Jobs work as configured and any scan results continue to be associated with the tag(s), even if they are historic in nature.

 

Asset Rules

Note: the features described in this section are only available to customers who have the SAINT VRM module enabled in their license key.

Asset Rules allow you to automatically set risk factors and tags on scanned assets based on the scan policy, IP address, or scan findings. Each rule may set one or more of the following:

 

 

Rule sets are applied at scan time if selected in the job (see Create New Job), or can be applied on demand to existing assets. When the rule set is applied, asset tags will be assigned from all matching rules, and each risk factor will be set from the first matching rule which sets that risk factor.

To create, modify, delete, or appy rule sets, choose Manage -> Assets from the top menu and choose the Asset Rules tab.

Default Asset Rule Set

SAINT Security Suite has one built-in asset rule set called SAINT Default.  This is designed to be a general rule set which sets the risk factors and some asset tags based on common scan findings.  It is available to all users and cannot be modified.  If you try to modify it, you’ll be prompted to copy it to a new rule set.

 

Create Asset Rule Set

To create a new asset rule set, click on the Create Rule Set (plus icon) button beside the Asset Rule Set drop-down menu.  This will prompt you to enter a name for your custom rule set, and then it will create an empty rule set.  If you’d rather initialize your custom rule set using an existing rule set, select the rule set from the Asset Rule Set drop-down menu, and then click on the Copy Rule Set button and enter a name for the rule set.

 

Delete Asset Rule Set

To delete an asset rule set, select the rule set from the Asset Rule Set drop-down menu, and then click on the Delete Rule Set (trash can icon) button beside the drop-down menu.  Note that the SAINT Default rule set cannot be deleted.

 

Apply Asset Rule Set

Asset rule sets can be applied either during scan processing or on demand.  To apply a rule set during scan processing, select the rule set when creating or editing the scan job. (See Create New Job)

 

There are two ways to apply a rule set on demand.  The first way is to select the rule set from the Asset Rule Set drop-down menu, and then click the Apply Rule Set (triangle icon) button.  Then click the Apply button in the resulting dialog.  This will apply the asset rule set to all existing assets to which the logged-in user has permission, which could take several minutes.  You can click on the Cancel button at any time to stop applying the rule set.

 

The second way to apply a rule set on demand is from the Assets tab.  Optionally, select one or more assets.  Then choose Apply Asset Rules from the Grid Actions menu.  This will open a dialog allowing you to select the asset rule set to apply, and the assets it will be applied to.  Click Apply to begin applying the rule set.

Create Asset Rule

To create an asset rule, choose Create Asset Rule from the Grid Actions menu.  This will open a dialog allowing you to create an asset rule.  (If the SAINT Default rule set is selected, you will first be prompted to enter a name for the modified rule set.).  Set the fields of the asset rules as follows:

 

 

 

View Asset Rule

To view an asset rule, click on the Details (i icon) button in the Actions column of the Asset Rules grid.  This will display all available information about the rule.

 

Edit Asset Rule

To edit an asset rule, click on the Edit (pencil icon) button in the Actions column of the Asset Rules grid.  This will open a dialog allowing you to edit the asset rule.  (If the SAINT Default rule set is selected, you will first be prompted to enter a name for the modified rule set.)

 

 

See Create Asset Rule above for a description of each of the inputs in this dialog.

Delete Asset Rule

To delete an asset rule, click on the Delete (trash can icon) button in the Actions column of the Asset Rules grid.  The rule will be deleted, and the priority of the rules below it will be decremented to close the gap.

Reorder Asset Rules

To reorder the rules in an asset rule set, click on a rule and drag the rule up or down to the desired position while holding the mouse button.  The priority values of the rules between the old and new positions will be renumbered accordingly.  Lower numbered rules take priority if more than one rule matches an asset and tries to set the same risk factor.  Note that reordering rules is only possible when the rule set is unfiltered.

 

Agent History

SAINT Agents allow us to track what has changed on the asset, such as its IP, hostname, MAC address, etc.

 

 

To view all agent history, navigate to Manage > Assets and click on the Agent History tab. When a change occurs, the time is noted in the Date Changed column. The old value is highlighted in blue and the new in green. Unchanged fields are left in white. To view the history of a single asset, use the filter tool bar at the top of each column, or go to Manage > Agents and use the history button in the Actions column.

Agents

SAINT Agent Overview

Note: The features described in this section require Agents to be enabled in your license key, and the Agent Server to be enabled in the System Options.

The SAINT Agent is a client-side service which is used to assess a system and report vulnerabilities, configuration issues, and information back to SAINT Security Suite. The collected data can then be analyzed and used within the application the same way it would be when performing remote scans. Some of the benefits of the SAINT Agent are:

  1. No credential management or authentication issues

  2. Asset tracking

  3. Targets can be scanned the moment they connect within a given assessment duration


The SAINT Agent is currently supported on the following operating systems:

* Indicates that earlier versions can be used if the python version on the target is >= 3

Managing Agents

From the Manage -> Agents tab, SAINT Agents can be monitored, configured, and troubleshooted. This is also where SAINT Agent installers are available for download.


 

The agents grid will display all scan agents that have connected to the server at least once. The grid displays information about assets such as their SAINT Agent name, hostname, IP, external IP, system type, as well as each Agent's connection status and registration status.

 

The following actions are available from the grid’s Actions column.

 

  1. View – Lists all the information associated with the Agent.

  2. Edit – Allows you to change the name, registration status, and attach a comment to the Agent.

  3. History – Brings up a list of everything that has changed on the system such as the IP, hostname, MAC address, etc.

  4. Log – If connected, the scanning and update log from the Agent can be downloaded.

  5. Remote Configure – From here, the remote logging level and max processes can be set on the Agent. This can be done in bulk from the Grid Actions menu as well. Agents do not have to be connected when these are set -- they will be set the next time a connection is made.

  6. Permissions – Control who has access to the Agent.

Agent Naming Rules

 

Agents are named using their hostname by default. Rules can be specified to change this behavior. Rules are created by using assignment criteria such as IP, hostname, system type, and asset tags. By clicking on Apply All Naming Rules from the Grid Actions dropdown, each rule is applied to matching agents based on the application method:

 The default names can be restored by clicking on Reset Agent Names to Hostname from the Grid Actions dropdown.

Agent Installers

The Agent Installers tab contains the various installers for different platforms. Note that it is important to download the installer with the correct architecture for Windows, as installing the 32-bit version on a 64-bit machine will cause certain checks to run improperly.

Agent Groups and Permissions

 

 

Agent groups can be used to specify the location which an agent resides. This field is configurable at agent installation time and may also be set through the GUI after an agent connects. For example, if you have a set of agents at client A and client B, this field could be used to distinguish them and make searching much easier.

 

Agent groups also make permission handling much easier. All permissions assigned to a given agent group, also apply to all the agents in that group.

Agent Registration

The number of agents currently registered can be found at the bottom of the UI.

 

 

The usage can be decreased by using the edit button and setting the Agent to Retired. Agents can be unretired by using the edit button and setting the Agent to Active. Only agents that are in the Active state can connect and perform scans.

Scanner Nodes

Every installation comes bundled with at least one scanning engine, called a 'scanner node’. The default scanner node connected to the Manager, and part of the default installation, is called “Local Node”, as shown below. Scanning capability can also be extended for scanning remote locations or large-scale environments by connecting multiple scanner nodes to the manager. For example, deploying scanners inside of multiple subnets, assigning scanning permissions to groups of users to individual scanners, and enterprise-level scalability and performance by directing scan jobs across multiple scanners (e.g., load balanced scans).
 

 

The following describes the various aspects of deploying and connecting scanner nodes, and managing node information via the Node management user interface.

View Nodes

Scanner node information is provided through a grid interface to assist in tracking licensed scanners, as well as providing ease of use in sorting, searching and updating scanners as the size of your organization grows, even scaling to hundreds of distributed scanners. Note that some information can be edited to meet local needs (see Edit a Node Record), while other information is created and managed internally by the system. The following describes information generated at node connection time and managed by the system:

Installing a Distributed Node

Installing a distributed node is done in much the same manner as a typical installation. However, the start-up process provides steps to configure the installation to be run only as a scanning engine, managed by a separate installation, acting as the central manager. See the Administrator’s Guide – Start-Up Options for details on installation and setup of a distributed node.

Edit a Node Record

Editing node information via the node grid is supported by two methods:

 

1) In-line field editing by clicking in an editable field

2) Clicking on the edit icon (pencil) on a node record to display an edit node dialog window.

 

The following fields are editable through these methods:

Restarting and Updating

When software updates are available, the remote/distributed (non-local) scanner nodes should be restarted in order to obtain those updates. You can restart an individual node by selecting the Restart Scannode icon ( ), or select multiple nodes via the checkboxes, then choose Restart Selected Scanner Nodes from the Grid Actions dropdown menu. The Restart Scannernode permission is assigned on a per-node basis.

IMPORTANT – Restarting the local node also restarts the manager. As a result, granting a user permission to restart the local node also grants permission for the user to restart the manager as well.

Package Dependencies

When SAINT is first installed, either as a manager or a node, it checks that all of the software packages required for running SAINT are installed on the system. However, new package dependencies may arise over time as new functionality is added to the product. If one or more remote scanner nodes are missing packages, an alert is shown in the header bar of the web interface, and the scanner nodes with missing packages are indicated with a red background in the Missing Packages column of the scan nodes grid.

 

When a remote scanner node has missing packages, there are three ways to resolve them:

 

Note that the package dependencies on the local node do not need to be managed as described above, since the local node is part of the manager. Package dependencies for the manager can be checked and resolved on the System Status page.

Configure System Updates

Configure License Key

When installing Security Suite for the first time, one of the first steps is to generate a license key and configure the key in the product. This process also automatically adds the necessary credentials to configure the key credentials, and configures the update process for auto-updates. The License Key page displays the form where you can enter your key into the text box, and displays the current status of your key once it is in place. If you do not already have a key, refer to the Administrator’s Guide’s section on How to Obtain a key.

Note that this process does require Administrator permissions, as well as the Account credentials provided by SAINT when your account was created.

System Maintenance

System maintenance features are found by selecting the Manage tab's System Maintenance option. These features enable administrators to perform such actions as data backup/archiving; viewing various system logs; facilitating lower level troubleshooting with SAINT’s technical support by enabling debugging to support additional error handling and messaging; transmitting logs and content securely to support, if needed; and viewing system messages directly through the user interface. Each of these features is described in more detail below.


 

Backup Database and Logs

The backup DB and logs feature provides one-click support for creating a dump file of the current database, any files referenced by the database, and all scan and system log files and relevant operating system information. A list of prior backups is displayed in the table (as shown above). This capability serves two primary purposes:

 

1) enables you to store periodic snapshots of your database for archiving in the event of a system failure, or use in an external system

2) provides a quick mechanism to create a snapshot of the database in the event you are working with the support team on an issue that requires investigation of the data results.

 

There is also an option to backup just the log files and operating system information without the database, which may be helpful if the database is very large.

 

 Note: Only the admin user and members of the Administrators group can download the backup files.

Restore

The backup files described in the previous section can be used to restore the SAINT database to the state it was in when the backup was taken. This may be useful in the event of data corruption, accidental deletion of data, or migration to a new platform.

 

There are two ways to restore the SAINT database from backups:

 

  1. Click on the Restore button on the desired row of the backups table. This method is useful for restoring the system to a previous backup point on the same system.

  2. Click on the Restore DB button at the top of the page. This method is useful for restoring the system onto a new platform. Clicking on this button opens a dialog which prompts you to upload two files.  The first should be a gzipped SQL command file downloaded from the DB File column of the backup table, with a filename ending in .sql.gz.  The second file should be the gzipped TAR file downloaded from the Filesystem File column on the same row of the backup table.

 

Regardless of which method is chosen, a browser dialog will warn you that restoring the database will entirely delete the current database and confirm that you want to proceed.  Then a dialog will inform you that the system needs to be restarted. Click the button to restart the system. It may then take anywhere from a minute to several hours for the system to come back up, since this is when the restoration is taking place.  If the restoration fails, the system will usually come up unchanged, depending on where the failure occurred.  You can then see the reason for the failure in the manager logs.  (See System Logs.)  If the restoration succeeds, SAINT will automatically download the database update files needed to make the database schema and static data compatible with the installed software version.

Note: only the admin user and users in the Administrators group may use the restore function.

Delete

Click the Delete button in a row of the backups table to delete the files listed in that row.

Transmit Files to Support

Each row of the backup table provides buttons to transmit the files to the SAINT support team. There is also a Transmit File button at the top of the page which allows you to transmit any file from the manager’s file system. These functions may help the support team resolve your support tickets faster. Please use these functions only if instructed by the SAINT support team.

Restart in Debug Mode

Restarting Security Suite in Debug Mode should only be done upon request from the SAINT support team. This action restarts the manager and turns on debugging/logging actions to capture detailed information about potential system problems that standard logging does not capture. This step is typically requested and monitored when in contact with a support engineer, and is used while reproducing the actions and steps previously taken that resulted in a problem. Once these actions have been completed, the support team will request that you restart the product again, without debugging turned on, by clicking on the Remote Debug Mode button displayed while the system is running with debug enabled.

System Logs

This system maintenance feature provides a tool for monitoring the health of the system and troubleshooting issues when they arise. Note that his log information does not automatically constitute system problems or errors in the execution of scans, analysis or reporting. This information may contain a variety of administrative events, regardless of the source. Please provide the messages in this log to SAINT Technical Support, upon request.

 

 

As shown above, the System Logs are broken out into seven different types, each available in the dropdown list at the top left of the grid:

Messages

This capability also provides a quick message search button to display internal system messages, separate from the various logs. As with the log messages, content in this view does not always constitute an error or problem with the operations of the software. However, like the log content, can be a useful tool for the support team to review when investigating an issue.

System Status

The System Status provides an overall summary of the state of the system, from product version number, to the current license information, status of the automated update process (SAINTexpress) and an active status of activity; as well as additional options applicable to system management, such as restarting the system or scan daemon to accept system-level configuration changes.

 

 

The admin user can use this page to quickly see the state of the application, such as the product version number, licensing information and key expiration date.

System Information

This section provides current information about the installation, such as product and content version, license information and status, date of the latest updates, and activity on the system (active users and active jobs). This information can be important for troubleshooting issues as well as determining what will be affected by performing actions such as restarting the system and updating the system as a result of global configuration changes or getting the latest vulnerability checks, exploits and content from SAINT.

System Actions

The System Actions section provides options for checking and validating the status of system dependencies; one-click toggle button to change enable or disable the automated update process; and shortcuts to obtaining system updates or performing manual updates.