Spirion (Identity Finder) - Guide to the Administrative Console
Note: Spirion (Identity Finder) console access is reserved for campus information technology administrators and not campus end users. If you are interested in deploying Spirion and are not an IT administrator, contact cybersecurity@cio.wisc.edu to learn about your options.
For a shorter guide to the Spirion console, see the "Getting Started" KB article here: https://kb.wisc.edu/page.php?id=49577. This document is strongly recommended for first-time users, as it is a concise overview of the tool.
Note:Screenshots were taken with Spirion 11. The steps are the same in Spirion 12, but the naming convention has changed. Text reflects the correct tag naming.
Accessing the Console
The Spirion console is hosted by Cybersecurity at datadiscovery.cybersecurity.wisc.edu. The console can only be accessed if you are on UW-Madison IP space. If you would like to log into the console from an off-campus location you must use the WiscVPN (or other UW-Madison VPN) to access the console successfully.Use your desired web browser to navigate to datadiscovery.cybersecurity.wisc.edu. You should be prompted with a login screen.
Enter the credentials provided to you by Cybersecurity and click the Login button.
Note: If you do not yet have credentials to access the console, follow the steps in the kb article here to request access.You should now be logged into the console, typically the first page you will see will be the Spyglass page, which provides aggregated information about the endpoints you manage. If you encounter any further issues logging into the console, please contact us at cybersecurity@cio.wisc.edu.
Creating and Managing Tags
Tags are a means of grouping endpoint assets within the Spirion console. Tags are especially useful when applying policies to your endpoints, as you can apply a policy to all the endpoints within a tag rather than individually selecting endpoints. You can also have different policies apply to different tags (e.g.: having a special tag for administrative computers with more personally identifiable information (PII) that scans more frequently and searches for more data types). Endpoints should automatically appear within your department's "top tag" upon running the installer provided to you by Cybersecurity; you are free to create and manage nested tags stemming from this "top tag" to suit your environment.
Note:
- It is important to note that if the machine name is changed locally on the endpoint the endpoint name within the console remains the same (doesn't change to the new name). It is recommended that you update the machine name in the Spirion console, as shown below. Right-click on the endpoint (old name) and select Update Host Name.
Viewing your tags
Log into the Spirion console at datadiscovery.cybersecurity.wisc.edu, navigate to the Results tab, and expand the Simple Tags dropdown. Tags are also visible on the Status tab.
Click on the Simple Tags dropdown to see the tags you’ve been provisioned within the console. Click the tag dropdown to show the machines within the tag. The tag name should be related to the department(s) you manage (e.g. Chemistry, WSOB, etc).
Endpoints should appear within your top tag soon after you run the Spirion installer provided to you by Cybersecurity on those endpoints. If you don’t have an installer, follow the steps in the KB article here to obtain one.
Creating new tags
Important: Top Tags in Spirion 12 follow a strict naming convention that isn't shown in the screenshots. Top Tags are created by Cybersecurity, in form <UDDS> - <DepartmentName>. The tag name precisely matches the group names used in Amp, which is necessary to track security data quickly in the event of an incident. This is why we ask department staff not to create Top Tags, or if it is absolutely necessary, to contact Cybersecurity for the correct form.Log into the Spirion console at datadiscovery.cybersecurity.wisc.edu, navigate to the Results tab, and expand the Simple Tags dropdown.
To create a nested tag within your tag, right-click your tag name within the Simple Tags dropdown, hover your mouse over the Tags option and select Create Nested Tag.
Name your new nested tag and click OK.
-
-
Moving endpoints to and from tags
Log into the Spirion console at datadiscovery.cybersecurity.wisc.edu, navigate to the Results tab, and expand the Simple Tags dropdown.
To move machines from the top tag to a new tag, select the machines you wish to move. Right-click one of the machine names, hover your mouse over Endpoint and select the Move to Tag option.
Select the tags you wish to move the endpoints to, and click the Move button.
The endpoints should now appear within the tag.
-
Managing Scan Results
Viewing and analyzing scan results is the primary reason for the Spirion console's existence. On the Results tab you can view the results of scans for endpoints or tags you manage and take various actions on the results.
Creating and Managing Scan Policies
Spirion policies allow you to configure virtually everything about the Spirion endpoint client. Items like filepaths to scan, data types to look for, what data to send to the console, types of scans to run, and more can all be adjusted in the policy settings. Cybersecurity manages baseline policies that have been configured optimally for searching for SSNs and credit card numbers, which you may choose to apply to your endpoints.
Overview
Because of the large number of configuration options available, policies are an extremely flexible way to manage many endpoints from a single source. At the same time, it is easy to overlook important settings and can be quite time consuming to create a policy from scratch. Because of this, Cybersecurity has created a standard policy that provides a complete, optimized configuration for scanning of Social Security numbers and credit card numbers, which are two very common forms of restricted data. It is called CYBERSECURITY_RECOMMENDED_DEFAULT. Departmental IT administrators are welcome to use this policy for configuring endpoints and will only need to setup a scan schedule.
NOTE: This guide will not attempt to explain every policy setting that can be configured. Settings that have been deemed critical to the function of the Spirion client and those that are non-critical but used commonly will be discussed. Administrators are encouraged to explore the available options using the Console's built-in help window. When viewing a policy's settings, the help window for a particular setting can be accessed by double-clicking the setting name and navigating to the "Explain" tab.
- Spirion 12 has only a single default Policy, _3_CYBERSECURITY_RECOMMENDED_DEFAULT. It was developed based on the most commonly used and effective settings tested in earlier versions of the tool.
Scheduling scans with the recommended default policy.
To help provide a higher degree of flexibility to each department, the default policy not define any sort of scan schedule. Below is a step-by-step guide to creating a Scheduled Task policy that can be used in conjunction with the default policy to do automated scanning of your endpoints.Log into the Spirion console at datadiscovery.cybersecurity.wisc.edu and navigate to the Policies tab.
Click the Policy drop down button in the top bar, right-click the default policy, and select the Clone option.
You will be taken to the "Policy" tab of the Policy Wizard. Specify a name for your policy, add an optional description, and choose the policy type. While descriptions are optional, it is good practice to include a brief description of the policy's intent for other administrators who may view it in the future. To base your policy on the default, you have cloned a system policy, which will come up as another system policy by default. Do not forget to change the policy type to Scheduled Task as the policy type! Uncheck the "Specify settings to be used during the tasks specified in this policy" check box. Once you're ready to continue, click the Next button.
Cybersecurity recommends you use the "TagName - Policy Title" format when naming your policy. Remember to include the UDDS code. While you may only see the Cybersecurity baseline policies in your policy list, there are in fact dozens--if not hundreds--of policies in the Policy List, all hidden from your Console Role. Because of this, simply naming your policy "Automated Scan every 6 mo." or "2023 One-time scan" does not provide sufficient information for identifying which policies belong to who and what policies are still in use. Cybersecurity will periodically remove policies which do not provide sufficient identification information in their titles without warning if there are no means of identifying the owner of the policy.On the Schedule tab, click the Add button in the top ribbon to set up a scheduled task.
Pick a frequency and time for the scan to occur, and adjust scan options according to your preference and environment. Click OK once you're done creating the scheduled task and click Next to move on to the Endpoints tab. Additional information on scan options is below.
The Endpoints tab allows you to select one or more tags to which this policy will be applied. Select the checkboxes next to the tags you wish to apply the scheduled task to. You can also apply your policy to individual machines by expanding the tag groups with the triangle button and selecting the checkboxes next to the machines you wish to apply the scan to. You may also choose not to immediately specify tags and edit the policy to assign tags at a later time.
Once you're done configuring all of the tabs in the scheduled task policy, click the finish button to apply the scheduled task to the endpoints and tags you selected.
Creating a custom policy
Some administrators prefer to have more autonomy over the policy configurations applied to their endpoints. Admnistrators may choose not to apply the default policy, instead opting to create custom policies of their own. For help with creating a custom policy, refer to the KB article here: https://kb.wisc.edu/internal/page.php?id=92740.
Creating and Managing Reports
Spirion allows for custom report building and reporting, which can be very useful for gathering insights into your environment.