User Guide Functional Overview Requirements Architecture System Installation NetEye Additional Components Installation Setup The neteye Command Director NetEye Self Monitoring Tornado Business Service Monitoring IT Operation Analytics - Telemetry Geo Maps NagVis Audit Log Shutdown Manager Reporting ntopng Visual Monitoring with Alyvix Elastic Stack IT Operations (Command Orchestrator) Asset Management Service Level Management Cyber Threat Intelligence - SATAYO NetEye.Cloud Strategy Monitoring SOC System Administrator SOC Attacker Centric Cyber Threat Intelligence - SATAYO NetEye Update & Upgrade Backup and Restore How To NetEye Extension Packs Troubleshooting Security Policy Glossary
module icon NetEye.Cloud Strategy
NetEye.Cloud as a SaaS solution Accessing NetEye.Cloud
NetEye.Cloud Strategy Monitoring SOC System Administrator SOC Attacker Centric Cyber Threat Intelligence - SATAYO Introduction to NetEye Monitoring Business Service Monitoring IT Operation Analytics Visualization Network Visibility Log Management & Security Orchestrated Datacenter Shutdown Application Performance Monitoring User Experience Service Management Service Level Management & Reporting Requirements for a Node Cluster Requirements and Best Practices NetEye Satellite Requirements TCP and UDP Ports Requirements Additional Software Installation Introduction Single Node Cluster NetEye Master Master-Satellite Architecture Underlying Operating System Acquiring NetEye ISO Image Installing ISO Image Single Nodes and Satellites Cluster Nodes Configuration of Tenants Satellite Nodes Only Nodes behind a Proxy Additional NetEye Components Single Node Cluster Node Satellites Nodes only Verify if a module is running correctly Accessing the New Module Cluster Satellite Security Backup and Restore Identity and Access Management External Identity Providers Configure federated LDAP/AD Emergency Reset of Keycloak Configuration Advanced Configuration Roles Single Page Application in NetEye Module Permissions and Single Sign On Within NetEye Importing User Federation Groups inside another Group Importing OIDC IdP Groups inside another Group Resources Tuning Advanced Topics Basic Concepts & Usage Advanced Topics Monitoring Environment Templates Monitored Objects Import Monitored Objects Data Fields Deployment Icinga 2 Agents Configuration Baskets Dashboard Monitoring Status Icinga2 Features VMD Permissions Notifications Jobs API Configuring Icinga Monitoring Retention Policy NetEye Self Monitoring Concepts Collecting Events Add a Filter Node WHERE Conditions Iterating over Event fields Retrieving Payload of an Event Extract Variables Create a Rule Tornado Actions Test your Configuration Export and Import Configuration Example Under the hood Development Retry Strategy Configuration Thread Pool Configuration API Reference Configure a new Business Process Create your first Business Process Node Importing Processes Operators The ITOA Module Configuring User Permissions Telegraf Metrics in NetEye Telegraf Configuration Telegraf on Monitored Hosts Visualizing Dashboards Customizing Grafana The NetEye Geo Map Visualizer Map Viewer Configuring Geo Maps NagVis Audit Log Overview Shutdown Manager user Shutdown Manager GUI Shutdown Commands Advanced Topics Overview User Role Management Cube Use Cases ntopng and NetEye Integration Permissions Retention Advanced Topics Overview User Roles Nodes RDP Client Building Tools Editor: Interface Overview Editor: Script Building Editor: Managing Scripts Designer: Interface Overview Designer: Interface Options Designer: Component Tree Selector: Interface Overview Test Case Management Dashboard Use Cases Overview Architecture Authorization Kibana Elasticsearch Cluster Elasticsearch Configuration Replicas on a Single Node Elasticsearch Performance tuning Overview Enabling El Proxy Sending custom logs to El Proxy Configuration files Commands Elasticsearch Templates and Retentions El Proxy DLQ Blockchain Verification Handling Blockchain Corruptions El Proxy Metrics El Proxy Security El Proxy REST Endpoints Agents Logstash Elastic APM Elastic RUM Elastic XDR Log Manager - Deprecated Overview Authorization in the Command Orchestrator Module Configuring CLI Commands Executing Commands Overview Permissions Installation Single Tenancy Multitenancy Communication through a Satellite Asset collection methods Display asset information in monitoring host page Overview Customers Availability Event Adjustment Outages Resource Advanced Topics Introduction The Intelligence We Produce Mitre Attack Coverage Getting Started Settings SATAYO Items Intelligence Requirements Managed Service Request Form FAQ Changelog SATAYO Community NetEye.Cloud as a SaaS solution Accessing NetEye.Cloud Monitoring with NetEye.Cloud Monitoring Environment Business Service Monitoring VMD SOC System Administrator (AdS) Access to NetEye and Elastic Elastic Dashboards Elastic Discover Elastic Alerts Elastic Rules Introduction to SOC Attacker Centric Service Description NetEye SIEM About SATAYO Threat Intelligence and Security Operations Before you start Update Procedure Single Node Upgrade from 4.46 to 4.47 Cluster Upgrade from 4.46 to 4.47 Satellite Upgrade from 4.46 to 4.47 DPO machine Upgrade from 4.46 to 4.47 Create a mirror of the RPM repository Sprint Releases Feature Troubleshooting Backup and Restore Tornado Networking Service Management - Incident Response IT Operation Analytics - Telemetry Identity Provider (IdP) Configuration NetEye Cluster on Microsoft Azure Introduction to NEP Getting Started with NEPs Online Resources Obtaining NEP Insights Available Packages Advanced Topics Upgrade to NetEye 4.31 Setup Configure swappiness Restarting Stopped Services Enable stack traces in web UI How to access standard logs Director does not deploy when services assigned to a host have the same name How to enable/disable debug logging Activate Debug Logging for Tornado Modules/Services do not start Sync Rule fails when trying to recreate Icinga object How to disable InfluxDB query logging Managing an Elasticsearch Cluster with a Full Disk Some logs are not indexed in Elasticsearch Elasticsearch is not functioning properly Reporting: Error when opening a report Debugging Logstash file input filter Bugfix Policy Reporting Vulnerabilities Glossary

Accessing NetEye.Cloud

This chapter explains how to access the cloud solution for customers who have an active subscription to one or more cloud services.

It provides guidance on reaching the login page and authenticating with your credentials.

NetEye.Cloud Subscription

In the cloud environment, access to NetEye.Cloud services is provided through subscriptions. Each subscription grants the right to use a specific set of services and features, tailored to your organization’s needs.

Unlike the traditional on-premises installation, where individual feature modules are to be installed and maintained separately, the Cloud solution delivers services directly through your subscription.

There’s no need to manage or deploy feature modules yourself, subscribed services are ready to use as soon as they are activated.

Due to a cross-module approach, because services run seamlessly in the cloud, you can take advantage of a fully integrated environment where features work smoothly across modules without extra setup. The contract grants access to the services you require today, and following your needs it can be expanded later, as your needs grow.

Authentication via IdP

The Cloud platform supports authentication through external Identity Providers (IdPs). An Identity Provider is a system responsible for verifying user identities and issuing authentication tokens that grant access to NetEye.Cloud services. The platform is designed to support multiple Identity Providers.

The NetEye.Cloud platform does not directly manage user passwords. Authentication is delegated to your configured Identity Provider.

During login, you should access the NetEye.Cloud Login Page and provide your email address in the authentication prompt. Based on the email domain, the platform automatically identifies the appropriate Identity Provider and redirects the authentication request accordingly.

The authentication itself takes place entirely within your Identity Provider environment. Once authentication is successfully completed, the IdP issues a token that is validated by the NetEye.Cloud platform.

Before the first login you must:

  • Configure your Identity Provider to allow authentication with the NetEye.Cloud platform.

  • Provide the necessary configuration parameters to the NetEye.Cloud Team.

  • Allow the NetEye.Cloud Team to complete the Identity Provider setup within the Cloud environment.

This configuration activity is typically performed once during the onboarding phase. After the integration is completed, you can authenticate using corporate credentials without any additional NetEye.Cloud-specific passwords.

Authentication via Microsoft Entra ID

The NetEye.Cloud solution uses Entra ID as one of the identity providers for user authentication.

To enable login using Microsoft Entra ID, you must create a dedicated App Registration within your Azure subscription.

This App Registration is used by the NetEye.Cloud solution to authenticate users and retrieve identity information during the login process. As part of the configuration, you must define specific Optional Claims in the access or ID token issued by Entra ID. These claims allow the NetEye.Cloud solution to obtain relevant details about the account that is logging in (such as user identity attributes required for access and authorization).

Group Claims for Authorization Management

As an optional configuration step, you may include Group Claims in the token generated by Entra ID.

When Group Claims are included:

  • The NetEye.Cloud solution receives information about the groups the user belongs to.

  • You can autonomously manage user authorization by assigning or removing users from Entra ID groups.

If Group Claims are not included:

  • User authorization is managed by the NetEye.Cloud team.

  • Any changes to user or access permissions must be requested by opening a Jira Ticket.

Note

Including Group Claims is recommended for customers who want full control over authorization management without operational dependency on the NetEye.Cloud team.

Configure EntraID on Azure

It is required to create a dedicated Azure App Registration within your own Azure subscription.

The purpose of this App Registration is to allow the NetEye.Cloud solution to trust Microsoft Entra ID as an identity provider and to retrieve the necessary identity information during user authentication. Below you will find all required steps to follow.

Note

Make sure NetEye.Cloud Team provided you with the NetEye Cloud Redirect URI. If not, you should request it.

Create a dedicated App Registration

  1. Open Azure Admin Portal (usually, go to this page)

  2. Search and open App Registration Service

    ../../_images/app-registration.png
  3. Create a new registration by clicking on New registration

    ../../_images/new-registration.png
  4. Provide basic information:

    1. Provide a Name for the new Application (suggested: Wuerth-IT NetEye Cloud).

    2. Select the most appropriate Account Type that is allowed to logon (if you are unsure, use Account in this organizational directory only as is the most restrictive).

    3. As Redirect URI, select Web as Platform Type and insert the Redirect URI provided by NetEye Cloud Team.

    4. Then, click on Register to save the new App registration

      ../../_images/new-app-registered.png
  5. From the App Registration Overview, copy the Application (client) ID and provide it to Neteye Cloud Team.

  6. Open the list of Endpoints by clicking on Endpoint

    ../../_images/endpoints1.png
  7. From the list of Endpoints, take note of the OpenID Connect metadata document URLs and provide it to NetEye Cloud Team.

Add Claims to EntraID Token

Warning

Optional Claims are used to map a User-friendly Attribute as the Account’s Username on NetEye.Cloud. You need to map your Email to allow Login via Email.

Note

Groups Claim is used to fully delegate Authorization to EntraID: by doing this, you can decide on your own the Access Level each Person has when logging into NetEye.Cloud by changing Group Membership on its own Identity Service. If not configured, Authorization and Access Level will be managed by Würth-IT on your behalf. In this case, changes must be requested using a Jira Ticket.

  1. Open Azure Admin Portal (usually, go to Microsoft Azure)

  2. Search and open App Registration Service

  3. Go to All applications tab, search for Registration Wuerth-IT NetEye Cloud and open it

    ../../_images/all-apps.png
  4. On the Left Menu, expand Manage and select Token configuration

    ../../_images/token-config.png
  5. Click on Add optional claim

  6. Select Token type ID, then flag email in the next list; confirm by clicking on Add

    ../../_images/optional-claim-form.png
  7. If requested, turn on the Microsoft Graph permission.

Add Optional Groups Claim

Note

You should only consider this step in case you prefer to manage Authorization on NetEye.Cloud on your own. By enabling this option, all membership of the Authenticated Account are forwarded to NetEye.Cloud.

  1. Click on Add groups claim

    ../../_images/add-group-claim.png
  2. Select Security groups, then select sAMAccountName for all Group types, then confirm by clicking on Add

    ../../_images/security-groups.png
  3. If requested, turn on the Microsoft Graph permission.

Generate Credential

Warning

The generated Credential has a Life Span. Make sure to take note of it because, when it expires, you will not be able to Login into NetEye.Cloud using your EntraID anymore.

Note

Secret’s Attributes are visible only immediately after creation. If you go to another page, you will not be able to see them anymore, so take note of them just after the creation. If you forget, just destroy and recreate the Credential.

  1. Open Azure Admin Portal (usually, go to this page)

  2. Search and open App Registration Service

  3. Go to All applications tab, search for Registration Wuerth-IT NetEye Cloud and open it

    ../../_images/all-apps.png
  4. On the Left Menu, expand Manage and select Certificates & secrets

    ../../_images/secret.png
  5. Move to Client secrets tab and create a New Client Secret by clinking on a corresponding button.

  6. Provide a description useful for remembering in the future (suggested: NetEye Cloud OiDC Credential) and a suitable expiration date, then click on Add to store it.

  7. Right after the Secret is created, copy Secret’s Value and provide it to NetEye.Cloud Team; Important! You will not be able to access it in the future, so take note immediately.

Final Information Review

Once the App Registration is created and configured, you must provide the NetEye.Cloud Team with the required parameters so that the identity provider can be properly configured in the NetEye.Cloud’s Keycloak instance.

At the end of this procedure, you have 4 different data that need to be provided to NetEye.Cloud Team:

  • Application (client) ID

  • OpenID Connect metadata document

  • Secret Value

  • Whether or not Groups claim will be included in the EntraID Token