After you initialize a new USM Anywhere Sensor, you must configure it using the Setup Wizard. As you configure the AWS sensor, USM Anywhere performs specific actions, like running an asset discovery scan or collecting security events from a predefined cloud storage location.
About Accessing the Setup Wizard
The Setup Wizard is accessible under the following circumstances:
- When you first log into the USM Anywhere web UI and see the WELCOME TO USM ANYWHERE page, click Get Started.
If you registered a first sensor, but did not complete the setup and then logged out, the USM ANYWHERE SENSOR CONFIGURATION page launches automatically at your next login to remind you to finalize configuration of the Sensor.
Click Configure to launch the Setup Wizard and complete the Sensor configuration.
If you registered an additional Sensor, but did not complete the setup, the Sensors page displays the Error () icon in the CONFIGURED column.
Click the Configure () icon on the right to launch the Setup Wizard and complete the Sensor configuration.
Configuring the Sensor in the Setup Wizard
The first time you log in from the WELCOME TO USM ANYWHERE web page, the Setup Wizard prompts you to complete the configuration of the first deployed Sensor. Thereafter, you can use the Sensors page to configure an additional Sensor or to change the configuration options for a deployed Sensor.
The AMAZON WEB SERVICES CONFIGURATION page provides information about the asset discovery that occurs upon the initial deployment of the USM Anywhere Sensor, summarizing the number of instances, instance types, and regions in your environment.
Click Next to proceed with the Setup Wizard and complete additional configuration on each page.
USM Anywhere automatically discovers a number of out-of-box logs as long as you have enabled them within your AWS subscription. For more information about these logs and how they function within the AWS environment, see AWS Log Discovery and Collection in USM Anywhere.
Enable the AWS S3 and CloudWatch out-of-box log collection jobs.
Locate the jobs you want to enable and click the disabled icon ( ). This turns the icon green ( ).
Note: You can also enable CloudTrail, ELB Access, and other security logs. However, make sure you've enabled these first on your AWS account.
- Click Next.
On the LOG MANAGEMENT page, you see syslog port numbers. (These ports are the same for all USM Anywhere Sensors.)
USM Anywhere collects third-party device, system, and application data through syslogAn industry standard message logging system that is used on many devices and platforms. over UDP on port 514 and over TCP on port 601 by default. It collects TLS-encryptedTransport layer security. Successor to Secure Sockets Layer (SSL) protocol. Provides security for communication over the Internet between client and server applications. data through TCP on port 6514 by default. To configure any third-party devices to send data to USM Anywhere, you must provide the IP address of your USM Anywhere Sensor and the port number.
Make sure that you've granted the necessary permissions for your operating system to allow USM Anywhere to access its logs. You can also integrate a wide variety of data sources to send log data over syslog to the USM Anywhere Sensor.
To find out how to configure your operating systems and supported third-party devices to forward syslog log data, see the following related topics
- Log collection (UDP, TCP, and TLS-encrypted TCP) from rsyslog — The Syslog Server Sensor App
- Log collection from a Linux System — Collecting Linux System Logs
- Log collection from a Windows System — Collecting Windows System Logs
- Log collection integrations for various data sources — Supported USM Anywhere Plugins for Common Data Sources
Note: Because the log scan can take some time, you might not see all the automatically discovered log sources immediately after deploying the first sensor.
When you've finished the log collection setup and integrated any needed plugins, verify that the data transfer is occurring.
Click Next when this step is complete.
AlienVault Open Threat Exchange® (OTX™) is an open information-sharing and analysis network providing users with the ability to collaborate, research, and receive alerts on emerging threats and indicators of compromise (IoC) such as IPs, file hashes, and domains.
You must have an OTX account to receive alerts based on threats identified in OTX. This account is separate from your USM Anywhere account. Go to The World’s First Truly Open Threat Intelligence Community page to create an OTX account.
Note: If you do not already have an OTX account, click the Sign up link. This opens another browser tab or window that displays the OTX signup page. After you confirm your email address, you can log into OTX and retrieve the unique API key for your account.
For more information about OTX integration in USM Anywhere, see Open Threat Exchange® and USM Anywhere.
- Log into OTX and open the API page (https://otx.alienvault.com/api/).
In the DirectConnect API Usage panel, click the Copy () icon to copy your unique OTX connection key.
Return to the Threat Intelligence page of the USM Anywhere Sensor setup wizard and paste the value in the OTX Key text box.
Click Validate OTX Key.
With a successful validation of the key, the status at the top of the page changes to Valid OTX key.
Click Next when this task is complete.
The Congratulations! page summarizes the status of your configuration.
Click Start Using USM Anywhere, which takes you to the Overview dashboard.
Now's a great time to run a vulnerability scan. For detailed information about running a vulnerability scan, go to Vulnerability Assessment.