Betting Sites Not On Gamstop UK 2025
NSS Group logo

nSecure nPatrol IDS

Brief product description
nPatrol is a network based Intrusion Detection System that helps in protecting the misuse of assets from external as well as internal users. nPatrol applies multiple techniques to detect intrusions such as signature analysis, protocol analysis, network security policy based management and anomaly detection. It is designed to perform on high speed networks without packet loss.

Architecture
nPatrol is a network based IDS.

nPatrol consists of the Agents and Management Server. The agents can be Internal Agents to monitor the internal network segments, external agents to manage outside the Firewall and anomaly agents for anomaly detection on a network segment. If the Servers like Web Servers, Mail Servers etc. are installed in the DMZ zone then the Internal agent should be installed on that subnet

The nPatrol Management Server consists of two parts, the notification engine and the management console. The notification engine acts as a middle tier between the agents and the Management Console. This also has the alert logging facility (if the Management Console is down) and notification sub systems like Mailing, SMS and SNMP. Management console enables to view the alerts raised by the agents and also as a centralised configuration, monitoring and distribution tool. The notification engine and the management console can further reside on separate nodes.

At what layer of the protocol stack is the product working?
Network Layer

Documentation�
User Guide
Installation Guide
Quick Installation Steps
Signature Document
The above documents are available in the online format. Printed versions are planned shortly.
Appropriate help for the alert raised and short remedy with the CVE reference number (wherever available) is built within the application

What are the minimum/recommended console OS and hardware requirements? Is a dedicated machine required/recommended? Will it work on Windows 2000?
Linux Kernel 2.2 or 2.4

Minimum Configuration:
Pentium III 500 MHz, 128 MB RAM,�
1 GB space for Management Server Installation
1 NIC Card

Recommended Configuration:
Pentium III 866 MHz, 256 MB RAM,
4 GB space for Management Server Installation
1 NIC Card

The Management Server consists of the Management Console and Notification Engine. The Notification Engine (with interface to SNMP based Management Servers, Mail Management Systems etc. ) works on Linux. The Management Console will work on Windows 2000.�

It is recommended to have dedicated system depending on the network traffic

What are the minimum/recommended agent OS and hardware requirements? Is a dedicated machine required/recommended? Will it work on Windows 2000?
Linux Kernel 2.2 or 2.4

For the Network Agents
Minimum Configuration:
Pentium III 500 MHz, 128 MB RAM,�
10 MB space for Network Agent installation
1 NIC Card

Recommended Configuration:
Pentium III 866 MHz, 128 MB RAM,
10 MB space for Network Agent installation
2 NIC Cards

For Anomaly Agents
Minimum Configuration:
Pentium III 500 MHz, 128 MB RAM,�
100 MB space for Anomaly Agent installation
1 NIC Card

Recommended Configuration:
Pentium III 866 MHz, 128 MB RAM,
100 MB space for Anomaly Agent installation
2 NIC Cards

It is recommended to have dedicated system depending on the network traffic

What components are installed on a detector
It can work as a Linux daemon or as an application.

Which network types are supported (10/100 Ethernet, Gigabit Ethernet, Token Ring).
10/100 Mbps Ethernet

Any specific recommendations for monitoring Gigabit networks with your product?
Although nPatrol is designed for high speed support, it is not yet tested for Gigabit support.

Which OS platforms are actively monitored?
It is OS independent as it manages at the network layer.

Can sensors/detectors be deployed and configured initially from a central console?
Not possible

Once deployed and configured, can sensors/detectors be managed from a central console?
Yes

Authentication between console and engines � Is it available? What algorithm/key lengths?
Yes. Blowfish encryption 448 bit key length.

Secure logon for policy management?
Yes. nPatrol provides extensive user management facility whereby users can be given feature based access.

How are policies distributed to engines?
Automatically from the Management Server without having to shut down operations.

How are policy changes handled? Will the central console detect which agents are using a changed policy and redeploy automatically, or does the administrator have to do this manually?
The policies are deployed automatically by the Management Server

How many attack signatures?
nPatrol has support for 835 attack signatures. Apart from this it has support for many more backdoors and trojans through its network policy based detection module. It has the ability to detect new modes of attack based on the network policy based detection module and the anomaly agents.

Can the administrator define custom attack signatures?
Yes.

How are new attack signatures obtained and deployed?�
The signature update files are provided to the clients through mail or download from site. They are applied in the Management Server and distributed to the different Agents�

If the Signatures are downloaded from the web site, gets deployed to the agents automatically. If the Signatures are obtained through the Mail, currently Management Server needs to be restarted. Mechanism to upload the signature without bringing the Management Server down is currently under development

Frequency of signature updates? Provide dates of all updates in the last year.
Planned every 6 weeks or based on the vulnerabilities uncovered.

What infrastructure do you have behind the signature update process
A dedicated team of engineers who are part of the development team.

Can one signature update file be downloaded to the local network and used to update all IDS engines from a central location, or is it necessary to initiate a live connection to the Internet download server for each engine?
Only one signature file needs to be downloaded

Can signature updates be scheduled and fully automated?
Currently signature update is on demand by the user.

What network protocols are analysed?
The following protocols are analysed IP, TCP, UDP, ICMP

What application-level protocols are analysed?
N/A

Can the product perform protocol decodes?
nPatrol performs extensive packet analysis and packet reassembly

Can the product perform session recording on suspect sessions?
No

Block/tear down session?
nPatrol can terminate the connection which violates the defined policy and also will be able to terminate the session if an exploit is detected. Users selectively terminate based on the services defined, be it on different systems or on the same one

Ability to monitor user-defined connections (i.e. report on an FTP connection to a specific server?)
This is managed using the nPatrol Policy Manager. The nPatrol Policy Manager implements the network security policy forming a virtual firewall within the internal network. It compliments the firewall and acts as a second layer of defence if the firewall is compromised, circumvented or misconfigured.

Monitor changes in critical system files?
N/A

Monitor changes in user-defined files?
N/A

Monitor changes in Registry?
N/A

Monitor unauthorised access to files?
Yes, over the network through custom signatures

Monitor administrator activity (creation of new users, etc)?
N/A

Monitor excessive failed logins?
N/A

List any other resources/locations that are monitored.
N/A

Track successful logins, monitoring subsequent file activity, etc?
N/A

Detect network-level packet based attacks?
Yes

Detect all types of port scans (full connect, SYN stealth, FIN stealth, UDP)?
Yes

Detect and report on nmap OS fingerprinting?
Yes but reports as port scan (Syn Scan)

Perform packet reassembly? Resistance to known IDS evasion techniques?
Yes. Conforms to all known IDS evasion techniques using tools such as fragrouter, whisker, and IDS DoS tools like stick, hailstorm etc.

Reconfigure firewall? If so, which firewall(s) and how?
N/A. The network policies are implemented within nPatrol acting as a second layer of defence for external traffic and as a virtual firewall within internal networks.

Option to record everything for �forensic� investigation? Where is this data stored? How is it secured from tampering?
Yes. The data can be stored in relational databases such as ORACLE, Sybase, SQL Server and mysql.

Reporting from engine to console - range of action/alert options
The actions can be in terms of reporting on the nPatrol Alert Console, sending SNMP Alerts to Network Management Systems, sending email and SMS based alerts.

The alerts are categorised as policy violations (internal and external), signature attacks, protocol misuse attacks, consolidated alerts (scans) and anomalies.

What provision is made for temporary communications interruption between detector and console? Where are alerts stored? Is the repository secure?
The agents (sensors) continue to function but the alerts are not stored locally.

Can alerts be reported to the central console in real time without the use of third party software? How easy is it to filter and extract individual events?
The alerts are reported on the Management Console in real-time without the use of any third party software. The nPatrol Query Manager and the nPatrol Report Manager can be used as filters to view in more detail.

Does the software offer advice on preventative action to ensure the attack does not happen again?
The online help on the alert gives direction to the user on the preventive measures to be taken to avoid such intrusions in future.

Integration with other scanning/IDS products?
No

Log file maintenance � automatic rotation, archiving, reporting from archived logs, etc.
If the database is not running/offline/not used, then the alerts are stored in the logfile. This can be synchronized with the database at any time by the mechanism built in within the Management Server. The reporting mechanism works only with the database. Logfiles are stored for the user configurable number of days, after this logfiles get deleted

Management reporting � range of reports/custom reports/how easy is it to filter and extract detail? Different reports for technicians and management/end users?
The nPatrol Report Manager will provide management reporting and the nPatrol Query Manager will provide for technical reports.

Each of them provide extensive parameter based reporting. The reports through the Report Manager can be viewed in brief or in detail.

Report management � can they be scheduled for automatic production? Can they be e-mailed to administrators or published straight to a Web site?
Not at present

What are the limitations and restrictions on enterprise-wide alerting and reporting? Can reports consolidate output from every 1) server, 2) detector
The alerting is centralised. The details of the sensor are available in the database for further analysis by the sensors.�

The reports can be taken for individual nodes, segments (based on sensors) or for the entire system.

Define custom reports?
The nPatrol Query Manager and the nPatrol Report Manager provide flexibility of reporting. It provides a framework for reporting using the nPatrol Report Manager and further flexibility to produce reports using the nPatrol Query Manager. Since the alerts are stored in the database, any reporting tools such as crystal report can be used for the custom reports.

How is it licensed? How is the license enforced?
The software is licensed based on the number of agents. The licensing is based on the IP Address and the number of agents purchased by the clients. There is however no restriction on the number of nodes within each network segment.

Any other unique selling points?
nPatrol is designed for high speed networks without packet loss.

nPatrol is designed for the Linux platform and to scale. The support for Linux on clusters, multi-processor systems, IBM, Sun and Compaq platform gives further processing power to scale for gigabit networks.

nPatrol employs multiple intrusion detection techniques such as signature analysis, protocol misuse, network policy based monitoring and anomaly detection.

The techniques employed by nPatrol enables it to detect and prevent new modes of attacks.

End user pricing information�
USD 7,500 for the base system (1 Agent and the Management Server)
USD 5,000 for additional internal Agents
(Discounts apply for purchase of more than 5 agents)

Ongoing cost of maintenance/updates
1 year warranty included as part of the cost
Maintenance Contract at 20% annually from year 2.

Click here to return to the nPatrol Review
Click here to return to nPatrol Results
Click here to return to the IDS Index Section

Send mail to [email protected] with
questions or comments about this web site.
Copyright � 1991-2001 The NSS Group.
All rights reserved.