Go to the table of contents Go to the previous page Go to the next page
TRITON RiskVision System Management : Managing RiskVision traffic capture and analysis
Managing RiskVision traffic capture and analysis
System Management | TRITON RiskVision | 02-June-2016
Use the System > Analytics tab in the Local Manager to start and stop traffic capture, configure and test the connection to a file analysis platform, and monitor database status for Local Analysis.
Traffic capture
In order for RiskVision to monitor and analyze live traffic in your network, all of the following are required:
1.
2.
3.
4.
Enable and disable traffic capture via the Traffic Capture toggle at the top of the Analytics tab. By default, traffic capture is ON.
When the Traffic Capture switch is off:
*
*
When the Capture service is stopped, the Traffic Capture switch is disabled. In this case, to enable traffic capture:
1.
2.
When the Capture service is running, check the Analytics tab to make sure traffic capture has started. If it does not start automatically, switch the toggle to ON.
Advanced file analysis
In addition to Local Analysis, RiskVision can be configured to use either of 2 remote (off-box) file analysis platforms:
*
The File Sandboxing cloud service, enabled by default, uses ThreatScope™ technology to analyze potentially malicious files in a sandbox environment, then provides detailed forensic reporting about file behavior.
*
Threat Protection Appliance offers advanced files analysis and behavioral sandboxing.
Customers who purchase Threat Protection Appliance can optionally configure RiskVision to communicate with the Threat Protection Controller instead of the File Sandboxing cloud service.
Configure file analysis
If you are using the File Sandboxing cloud service, no configuration is needed on the Analytics tab. File Sandboxing is enabled by default.
*
*
The connection to the File Sandboxing service is tested automatically every 5 minutes.
To instead connect to Threat Protection Appliance:
1.
Click Configure analysis platform.
2.
3.
Enter the IP address for the prod1 interface of the Threat Protection Controller.
4.
If you have configured RiskVision to use a proxy to connect to the Internet, but do not want communication with the Threat Protection appliance to go through the proxy, mark Ignore proxy settings.
5.
RiskVision attempts to connect to the Threat Protection Controller, then reports whether the connection succeeded or failed.
To test communication with the Threat Protection Controller manually, click Test Connection.
If you select Threat Protection Appliance as your file analysis platform, and later want to return to using the File Sandboxing cloud service:
1.
Click Configure analysis platform.
2.
3.
RiskVision attempts to connect to the File Sandboxing cloud service, then reports whether the connection succeeded or failed.
How does advanced file analysis work?
When you use the File Sandboxing cloud service, Local Analysis uses the following criteria to determine whether to send a file for further analysis:
*
*
*
When RiskVision is configured to communicate with Threat Protection Appliance, Local Analysis uses the following criteria to determine whether to send a file for further analysis:
*
*
The file types and maximum file size for files sent to Threat Protection Appliance can be configured in the /opt/websense/config/ccaplugin.config file on the RiskVision appliance.
When a file is flagged for additional analysis, RiskVision first sends a file hash to determine whether the file analysis platform has already analyzed the file.
*
*
Local analytic status
The analytics that make up RiskVision Local Analysis use databases to help them identify suspicious and malicious traffic.
Use the Local Analytics section of the page to enable or disable automatic database updates for Local Analysis. Automatic database updates are enabled by default, and should remain enabled as a best practice.
The table under the toggle switch shows:
*
*
*
*
*
After installation, Local Analysis may not occur until the analytics have downloaded a database. Use the table to make sure that all of the analytic engines have succeeded in performing a database download.
If the analytics are not running because they have not been able to download a database:
1.
2.

Go to the table of contents Go to the previous page Go to the next page
TRITON RiskVision System Management : Managing RiskVision traffic capture and analysis
Copyright 2016 Forcepoint LLC. All rights reserved.