Skip to main content
Version: 1.0.0

Business Overwatch Tasks

What are Business Overwatch Tasks?

Data Security Essentials Business Overwatch Tasks (BOTs) are configured to run regularly against the Data Security Essentials database to detect users’ unexpected behavior.

For example, BOTs can warn administrators when a user downloads hundreds of files or gains access to secure or sensitive information; they can also warn of hacking attacks when a user deletes important files, etc. When a BOT runs, it searches the database for a specified user activity and notifies administrators accordingly via email.

info

For BOTs to function properly, a Data Security Audit policy must exist that monitors your NAS Device and is configured to store users’ activity into the database.

How to access?

To access Business Overwatch Tasks configuration on the Start menu, navigate to Programs > Superna Data Security Essentials > Data Security Essentials BOT Configuration.

Defining or Editing a BOT

A BOT has the following main parameters:

  • Definition
  • Schedule
  • Actions
  • Notifications

Defining or Editing

To define a new BOT or edit an existing one, please perform the following steps:

  1. Access BOT Configuration

    • Access Data Security Essentials BOT Configuration.
    • Click the New BOT button OR File -> New BOT or select an existing BOT to edit from the list on the left panel.

    BOT Configuration Screen

  2. Define BOT and Set Scanning Period

    • On the Definition tab, specify the BOT name and use the Time Period Options to set the scanning period.

    Time Period Options

    info

    Set the Time Period to ‘Immediate Past’ if you wish to notify the user of all the matching operations that occurred in a past period. Set the Time Period to ‘Specific Period’ if you wish to notify the user of all the matching operations that occurred within a specific time period, ignoring any operations that occurred at any other time.

  3. Select Operations to Monitor

    • Use the Operations section to check the operations you want the BOT to monitor. You can either check all operations or select individual operations to monitor. You can also enable/disable the BOT by checking/unchecking the Enabled checkbox. A disabled BOT will not send notification emails or generate history.

    Operations Section

  4. Specify Scanning Time

    • Use the Hours section to specify the exact scanning time.

    Hours Section

  5. Set Additional Criteria

    • You can specify additional criteria for other operations details such as file extensions, the user who performed the operation, etc.

    Additional Criteria

    info
    • The ‘Minimum Operation Count’ defines the minimum number of operations that should match for the BOT to notify the user.

    • The ‘Minimum File Size’ defines the minimum file size that counts as an operation for the BOT.

    • The ‘User’ defines the full name of the user a BOT monitors.

      • Leave this field blank if you wish to search for all operations done by all users. This field does not accept account names and does not accept group names, only full names are accepted. Wildcards ("" and "?") can be used (e.g., you can enter “Mark”, which will match all users whose first name is Mark).
    • The ‘Client System name or IP’ defines the computer name/IP a BOT monitors.

      • Leave this field blank to monitor access from all computers. This field accepts only one computer name or one IP. Wildcards are used.
        • Examples:
          • To match a range of IPs, the IP can be entered as “10.20.2.*”, this will match any IP in the range 10.20.2.0 to 10.20.2.255.
          • To match only the range of IPs from 10.20.2.1 to 10.20.2.9, the filter “10.20.2.?” is used.
    • The ‘Path’ defines the path the BOT monitors. The BOT will only monitor operations on files or directories that reside on the specified path. Only one path is supported for each BOT. Wildcards are supported (e.g., “\vol\vol0\Users*” will match with any subdirectory of Users).

    • The ‘File or Directory Name’ defines a certain file or directory name to match. Only one file or directory name is allowed. Wildcards are supported (e.g., “Sales” will match all folders/files that contain the word Sales within it.)

    • The ‘Extension’ defines the extension the BOT monitors. The BOT will monitor operations on files with the specified extension. Only one extension is allowed. Wildcards are supported (e.g., “mp?” will match with file extensions as mp3 or mp4).

    • Supported wildcards are ‘*’: Zero or more characters, ‘?’: Exactly one character.

  6. Configure BOT Schedule

    • On the Schedule tab, select whether the BOT is to run only once or recurrently and select the BOT start time. If you selected the BOT to be recurring, select how often it should run. When the BOT runs, it will notify the administrator about any behavior that matches the BOT that occurred during the specified time period. The minimum recurring time is 5 minutes.

    Schedule Tab

  7. Define Actions for BOT Violations

    • From the Actions tab, you can determine which action(s) will be taken if a BOT violation is detected. You may select multiple actions if desired.

    Actions Tab

  8. Set Notification Preferences

    • From the Notifications tab, specify the email accounts to receive notifications when the BOT runs. The Selected Notifications Targets lists the recipients of notifications. The Notification Targets lists the available email accounts from which you can select. If you move an email from the Notification Targets list to the Selected Notification Targets list, the BOT will notify these users. You may add email accounts from the Add Email Target panel and specify when notifications should be sent by providing the target name and the email address and filling out the notification type section. Click the Add button.

    • Save changes You must save the changes before selecting another BOT from the existing BOTs list otherwise you will lose your changes. You may choose to close at any time.

    Notifications Tab

  9. Review BOT History

    • Use the History tab to check the scans done along with the matches that the BOT found with the Data Security Essentials database, if any.

    History Tab

    info

    The ‘Notify if matches found’ sends an email notification only if the criteria defined in BOT definition is met. The ‘Notify if matches not found’ sends an email notification only if the criteria defined in BOT Definition is not met. The ‘Notify if matches found or not’ sends an email notification every time the BOT executes.

Default BOTs

Data Security Essentials BOTs ship with a set of default BOTs; they provide examples of how Data Security Essentials BOTs are used. The user can also edit the default BOTs to satisfy their needs.

Default BOTs List

Example BOTs

BOT NameDescription
After Hours AccessThis BOT is used to discover any operations done after hours. It runs every day (by default at 8 am) and analyzes the data of the previous 14 hours to see if someone performed any operations.
Disgruntled EmployeeThis BOT discovers whether any user has deleted a large number of files in the last hour.
Financial Qtr RptsThis BOT is used for financial quarterly reports to discover all modifications done to the financial reports directory by any user in the last quarter.
HIPAA AuditingThis BOT discovers any suspicious behavior done to the folder that contains health information, ensuring compliance with HIPAA.
Large File AuditThis BOT notifies you when a user creates any file larger than 500MB in a specific directory.
Ownership Change AuditThis BOT notifies you when a user takes ownership of a file or changes the owner of a file.
Permission Change AuditThis BOT notifies you when a user changes the security of a file or a directory.
Ransomware IndicatorsThere are three BOTs that search for ransomware-associated behavior and issue warnings when detected.
Serial DeletesThis BOT discovers whether any user has deleted many files in the last hour.
Serial DownloadsThis BOT discovers whether any user has downloaded many files in the last hour.
Serial EditsThis BOT discovers whether any user has edited many files in the last hour.
WikileaksThis BOT discovers problems similar to the Wikileaks problem by detecting whether any user has performed a large number of file copies/downloads in the last 30 minutes.