Sensor and console post-deployment checklist
After you deploy an ExtraHop sensor or console, log in to the Administration settings on the ExtraHop system through https://<extrahop-hostname-or-IP-address>/admin and configure the following settings. Refer to the section of the ExtraHop Admin UI Guide specified in each action below, except where noted.
You must complete these procedures to fully deploy your ExtraHop system.
- DNS
-
DNS enables domain name resolution. Verify that you have set DNS servers. Access the CLI interface with a terminal or go to the Admin > Connectivity page to change or set DNS IP addresses. You can set DNS IP addresses with the front panel or iDRAC iDRAC interface on physical appliances.
- System hostname
-
Set a unique system hostname so the ExtraHop console can re-establish connectivity if the IP address changes. If the A Record is "hq-eda01.acme.org" then your hostname should be "hq-eda01."
- Password
-
Maintain system security after the evaluation period. Change the default password. For more information, see the Default User Accounts FAQ. We recommend that you create a secondary administrator account with separate credentials as a backup in case the primary administrator credentials are lost.
- NTP and time zone
-
Time is critical in the ExtraHop system, particularly when doing event correlation with time-based metrics and logs. Verify that the NTP settings are correct for your infrastructure, test settings, and sync NTP. The correct time zone is critical to run scheduled reports at the correct time. Ensure the ExtraHop system has the correct time zone. For more information, see Configure the system time.
- Apply license
-
You must apply a product key to activate and register your appliance.
- Cloud Services
- Connect to ExtraHop Cloud Services to enable Detections and Remote Access. For more information, see Connect to ExtraHop Cloud Services.
- Firmware Update
- The ExtraHop firmware is updated often with enhancements and resolved defects. Verify that you have the current firmware. For more information, see Upgrade the firmware on your ExtraHop system.
- Connect Appliances
- Connect the console and sensors to all packetstores and recordstores. For more information, see Connect the EXA 5200 to the ExtraHop system and Connect a packetstore to RevealX Enterprise.
We recommend that you complete these procedures to optimize the performance of your ExtraHop system.
- TLS Certificate
- Each ExtraHop system ships with a self-signed certificate. If you have a PKI deployment, generate your own certificate and upload it to each ExtraHop system. For more information, see the TLS Certificate section.
- DNS A Record
- It is easier to access an ExtraHop system by hostname than by IP address. Create an A record in your DNS root ("exa.yourdomain.local") for each ExtraHop system in your deployment. Refer to your DNS administration manual.
- Remote Authentication and Access
- Set up remote authentication. The ExtraHop appliance integrates with SAML (preferred for the console), LDAP, RADIUS, and TACACS+. Restrict remote access from the public internet with a corporate VPN, identity-aware proxy (IAP), or other method.
- Audit Logging
- The ExtraHop system can send events to a remote syslog collector. For more information, see the Send audit log data to a remote syslog server.
- System Notifications
- The ExtraHop system can send email when it detects problems. Create an email group to receive notifications. For more information, see Configure an email notification group.
- Disk Encryption
- Enable security on storage drives to provide encryption on virtual disks. For more information, see Configure self-encrypting disks (SEDs).
- Network Localities
- Classify non-RFC1918 IP addresses as part of your internal network. For more information, see Specify a network locality.
- Tuning Parameters
- Help improve the quality and accuracy of rules-based detections by adding tuning parameters. For more information, see Specify tuning parameters for detections and metrics.
- Advanced Analysis
- Target specific device groups or activity groups for Advanced Analysis as needed, based on their importance to your network. For more information, see Analysis priorities.
- Configure Domain Controller Decryption
-
The ExtraHop system can be configured to retrieve and store domain keys from one or more domain controllers. When the system observes encrypted traffic that matches the cached keys, all of the Kerberos-encrypted traffic in the domain is decrypted for supported protocols. For more information, see Decrypt domain traffic with a Windows domain controller.
- Customizations and Datastore Backup
- Create a system backup prior to upgrading firmware, or before making a major change in your environment. For more information, see Back up a sensor or console.
- iDRAC
- Each physical ExtraHop appliance has an iDRAC port, similar to iLO or KVM over Ethernet. Connect and configure the iDRAC port. For more information, see Configure the iDRAC Remote Access Console.
- Decrypt TLS Traffic with Secret Sharing
-
Decrypt TLS traffic from your Linux and Windows servers. For more information, see Install the ExtraHop session key forwarder on a Linux server and Install the ExtraHop session key forwarder on a Windows server. Alternatively, you can share session keys with your ExtraHop system through your existing Session key forwarding from an F5 LTM with Perfect Forward Secrecy (PFS).
Optional procedures
Consider completing these procedures if you want to further customize your ExtraHop system.
- Enable Precision Packet Capture (PPCAP) disk drive
-
Packet capture enables you to collect, store, and retrieve data packets from your network traffic. If you have a precision packet capture disk, see Configure packet capture.
- SMTP
- The ExtraHop system can email alerts and system-health notifications. Set up and test notifications. For more information, see Configure email settings for notifications.
- Enable Precision Packet Capture (PPCAP) disk drive
-
Packet capture enables you to collect, store, and retrieve data packets from your network traffic. If you have a precision packet capture disk, see Configure packet capture.
- Threat Intelligence
-
Configure threat intelligence settings to identify indicators of compromise on your network. For more information, see Threat intelligence.
- Decrypt TLS Traffic with RSA Private Keys
-
Decrypt forwarded TLS traffic by uploading the private key and server certificate associated with that traffic. For more information, see Decrypt TLS traffic with certificates and private keys.
- Configure SNMP
-
You can set SNMP traps and Configure SNMP settings to notify you of certain network events.
Thank you for your feedback. Can we contact you to ask follow up questions?