Current ThreatQ Version Filter
 

ThreatQ on Your Own Device (BYOD)

ThreatQuotient supports bring your own device (BYOD) installations of ThreatQ.  We provide the following warnings to ensure the success of these installations and optimize your use of the application:

After you install ThreatQ, it must be treated as an appliance. As such, you should not enable custom repos, install custom packages, or manually upgrade packages to unsupported versions since these changes may have a negative impact on performance.

Using repositories other than ThreatQ's to install or upgrade your instance is not supported and may result in package conflicts during the install/upgrade process. ThreatQuotient recommends that you disable all repositories other than ThreatQ.

For the ThreatQ platform to function optimally, EFI should be disabled because it is not supported.

BYOD Prerequisites

  • A functional CentOS/RHEL 7.2 or later minimal install (7.2 to 7.9 minimal)
  • Whitelisting of the following repository servers for software upgrades and system updates:
    • rpm.threatq.com
    • system-updates.threatq.com
  • ThreatQuotient Version 5 install script (tqadmin)
  • System time standard set to UTC.

Amazon Web Services (AWS) Guidelines

If you are using AWS for your installation, we recommend using an r5 instance family of at least a size matching the Virtual and BYOD System Requirements table found in the ThreatQ System Requirements chapter.  

Throughout this document, $ identifies commands that can be run as any user, and # identifies commands that must be run as root.

BYOD Partitioning

For BYOD installations, we recommend the following partitioning scheme to attain the best ThreatQ experience:

Filesystem Size Used Available Use % Mounted on
/dev/mapper/Vol
Group00-LogVol00
1.9T 66G 1.8T 4% /
devtmpfs 63G 0 63G 0% /dev
tmpfs 63G 0 63G 0% /dev/shm
tmpfs 63G 17M 63G 1% /run
tmpfs 63G 0 63G 0% /sys/fs/cgroup
/dev/sda1 244M 164M 80M 68% /boot
tmpfs 13G 0 13G 0% /run/user/1002

BYOD Pre-installation

Before running the installation script, double-check the following system Timezone and SELinux configuration settings:

Timezone

The system time standard must be set to UTC.

$ ls -l /etc/localtime -> /usr/share/zoneinfo/UTC

If not, change where the /etc/localtime symlink points.

# unlink /etc/localtime

# ln -s /usr/share/zoneinfo/UTC /etc/localtime

SELinux

SELinux must be enabled. You can check this with the sestatus command.

$ sestatus
SELinux status: enabled
SELinuxfs mount: /sys/fs/selinux
SELinux root directory: /etc/selinux
Loaded policy name: targeted
Current mode: permissive
Mode from config file: disabled
Policy MLS status: enabled
Policy deny_unknown status: allowed
Max kernel policy version: 28

If SELinux is not enabled, enable it by editing the config file in the SELinux root directory as output by sestatus.

You are not required to change the SELINUX=line in the configuration file to SELINUX=permissive.  However, the install process changes this value to permissive and resets it to the original value during the first boot process.

After this configuration change, you must reboot the system.