Best Practices and System Design Guidance
Your success is very important, both to you and to us. The following best practices help ensure your success with Stellar Cyber:
Deployment Best Practices
When you deploy Stellar Cyber you need:
- HTTPS access to the user interface
- Firewall (or proxy) configurations
- To get data from network and security sensors
- To communicate with and get updates from Stellar Cyber
In your deployment we strongly recommend:
- Configure an Active Directory connector. This provides user profile details for our User Behavior Analytics.
- Install a Windows agent or network sensors with coverage of:
- Your domain controller. This enriches data with IP addresses for users.
- Your DHCP server. This provides IP addresses for host names, so we can track assets when IP addresses change.
- Configure a playbook to get notifications about:
- Sensor ingestion problems (no new data from a sensor for 15 minutes)
- No alerts (no new security events for 15 minutes)
- No ingestion (no new raw events for 15 minutes)
- When there is no clear need for session de-duplication (one sensor per a network segment in general), disable the data de-duplication on DA to eliminate performance impacts.
Upgrade Best Practices
Upgrade procedures are documented in the release notes.
To prepare for the upgrade:
- Back up the data and configuration
- Make sure the sensors are up and running
- Take note of the ingestion rate
- Take note of the number of alerts
- Make sure the system health indicator shows
- Run the pre-upgrade check
New features, updated ML algorithms, and enhanced configurations may change ingestion and detection patterns. We recommend the following to ensure a smooth upgrade:
- Upgrade security sensors before network sensors, because network sensors send data to security sensors for additional processing.
- Upgrade sensors in batches instead of all at once.
- For agent sensors:
- Upgrade a small set of sensors that cover non-critical assets.
- After 24 hours, ensure that your ingestion is as expected, then upgrade a larger set.
- After 24 hours, ensure that your ingestion is as expected, then upgrade the remaining agent sensors.
To verify that the upgrade was successful:
- Check the Current Software Version on the Admin | Software Upgrade page.
- Make sure the sensors are up and running.
- Check the ingestion rate and make sure it is as expected.
- Check the number of alerts and make sure it is as expected.
- Check the system health indicator:
- indicates a perfectly healthy system.
- indicates minor issues. Monitor the system for 30 minutes. If the issues remain, investigate further.
- indicates major issues. Contact Technical Support.
Disaster Recovery Best Practices
Your data is important to you, and it's also important to us. We take every precaution to avoid data loss with our solutions. However, data loss can still occur for a variety of reasons, such as:
- When the system is running at maximum capacity
- When the network connection is down for an unexpected period of time
- If the system is misconfigured
- It the system has a defect
Following are our recommended best practices to prevent, minimize, or recover from data loss.
- Configure cold standby on a 2nd appliance.
- In a cluster, configure data replication, which stores multiple copies of the data on different appliances in real time.
-
The performance of the Data Lake is reduced by up to 30% while the backup is in progress. Always schedule your backups during periods of low traffic.
- Create separate backups for Configuration and for Data. This enables a more rapid backup of Configuration prior to performing an upgrade.
- Schedule a daily data backup if you have a cluster without a data replica. If you do have a data replica but want additional disaster recovery, schedule a daily or weekly data backup.
- Back up data manually, as needed. For example, before an upgrade.
In the event of an emergency, Stellar Cyber also maintains automatic daily configuration backups for the last four days on the local DL-Master. Refer to Automatic Local Configuration Backups for details.