Other optional components

These components can be installed and work with Nuix Adaptive Security but are not required.

Kafka

Kafka is a widely-used open source event streaming platform. By configuring Nuix Adaptive Security to populate Kafka with events, the Nuix Adaptive Security data is streamed, collected, and analyzed along with your organization’s data.

If your organization is already using Kafka, see the Nuix Adaptive Security Administration Guide for information about configuring Nuix Adaptive Security to send events to Kafka.

If this is the first time your organization is using Kafka, we recommend installing the following:

Confluent Platform using Docker

Note: If the hostname of the machine that runs Kafka does not match its DNS name, add an entry to %SYSTEM32%\drivers\etc\hosts with the hostname and IP of the Kafka machine.

SSL with Kafka

SSL encryption is required for Kafka integration with Nuix Adaptive Security. You may need to modify the server properties on Kafka to accept SSL. Configure Kafka to have an SSL listener and provide the port of the SSL listener to Nuix Adaptive Security. Also provide the Kafka CA public certificate for the SSL listener.

Example

Note: The text in the example is commented out by default. You will need to uncomment the code to use it.

At the top of the config/server properties, enter the server name:

advertised.listeners=PLAINTEXT://<server name>:9092,SSL://<server name>:9093

At the bottom of config/server.properties:

Ensure the passwords and paths are correct for your environment.

Add the following line:

security.inter.broker.protocol=SSL

Splunk

Splunk helps to gather real-time data into a repository where it can be used to generate a visual representation of the data, such as graphs, reports, alerts, dashboards, and visualizations.

If your organization is already using Splunk, add Nuix Adaptive Security alerts to your Splunk feed to visualize Adaptive Security data in Splunk.

If you are using Splunk for the first time, use the following instructions to install Splunk and integrate it with Kafka:

https://docs.splunk.com/Documentation/Splunk/

See the Nuix Adaptive Security Administration for information about configuring Adaptive Security with Kafka.

Configure Splunk

Use the following steps to set up an instance of Splunk to test connectivity with Nuix Adaptive Security. Consult the Splunk documentation for more settings and configuration options.

Nuix Adaptive Security requires an HTTP Event Collector in Splunk.

To set up the HTTP Event Collector in Splunk:

Install Splunk Enterprise.

Browse to https://[splunk ip]:8000. Login with the admin account and password.

Go to Settings > Data inputs > Http Event Collector > Global Settings.

Verify SSL is enabled.

Verify the HTTP Port is 8088.

Create a new token.

Select HTTP Event Collector.

Enter a name like "Adaptive".

Ensure that Enable indexer acknowledgment is disabled.

Select Next.

Source type

Select Source Type Structured json_no_timestamp.

Create an index for every event type that will be forwarded. The indexes will be the base name and the view to be forwarded. See the following index list with the default base name of 'nuix_adaptive":

nuix_adaptive_alerts

nuix_adaptive_media

nuix_adaptive_file

nuix_adaptive_session

nuix_adaptive_print

nuix_adaptive_process

nuix_adaptive_keylog

nuix_adaptive_screenshot

nuix_adaptive_url

nuix_adaptive_clipboard

Add the created items to the Selected Item(s) box.

Review.

Submit.

Provide the token value and URL to Nuix Adaptive Security so it can forward events.

The Splunk URL should be "https://[splunk ip]:8088” if you followed the steps above.

To configure Splunk:

Configure the Splunk service on each Primary and Secondary server using the Nuix Adaptive Security web interface. Nuix Adaptive Security requires the following from Splunk:

Token value

URL and port in a format such https://nuix-splunk.customer.name:8088.

Picture 19

To search for Nuix alerts from Splunk:

Set index="nuix_adaptive_alerts"


‎