Configuring DSMs
130
IBM
Where
<IP address>
is the IP address of the SIEM system.
Step 4
Save and exit the file.
Step 5
Restart syslog:
refresh -s syslogd
For example, a typical /etc/syslog.conf file can resemble the following:
##### begin /etc/syslog.conf
mail.debug /var/adm/maillog
mail.none /var/adm/maillog
auth.notice /var/adm/authlog
lpr.debug /var/adm/lpd-errs
kern.debug /var/adm/messages
*.emerg;*.alert;*.crit;*.warning;*.err;*.notice;*.info
/var/adm/messages
auth.info@<IP address>
##### end /etc/syslog.conf
NOTE
If you are using IBM AIX v5.2 and above, you must start the AIX syslog service
using the -n option. This option prevents the syslog service from pre-pending
anything to the log message. For example, when you use the -n option, the output
resembles the following: <$PRI>$DATE $MESSAGE.
Step 6
You are now ready to configure the log source in SIEM.
To configure SIEM to receive events from an IBM AIX server:
From the
Log Source Type
drop-down list box, select the
IBM AIX Server
option.
For more information on configuring log sources, see the
Log Sources User Guide
.
Configuring IBM AIX
Using the Log File
Protocol
A log file protocol source allows SIEM to retrieve archived audit log files from a
remote host. The IBM AIX DSM supports the bulk loading of log files using the log
file protocol source. When configuring your IBM DB2 to use the log file protocol,
make sure the log file protocol is reading the archived audit log.
You are now ready to configure the log source and protocol in SIEM:
Step 1
To configure SIEM to receive events from an IBM DB2, from the
Log Source Type
drop-down list box, select
IBM AIX Server
.
Step 2
To configure the log file protocol, from the
Protocol Configuration
drop-down list
box, select
Log File
.
Step 3
We recommend that you use a secure protocol for transferring files, such as
Secure File Transfer Protocol (SFTP).
Summary of Contents for Security Information and Event Manager
Page 2: ......
Page 8: ......
Page 20: ......
Page 22: ......
Page 24: ......
Page 26: ......
Page 32: ......
Page 34: ......
Page 36: ......
Page 38: ......
Page 44: ......
Page 58: ......
Page 90: ......
Page 92: ......
Page 94: ......
Page 114: ......
Page 116: ......
Page 122: ......
Page 124: ......
Page 126: ...Configuring DSMs 110 FIREEYE...
Page 128: ......
Page 130: ......
Page 132: ......
Page 136: ......
Page 140: ......
Page 144: ......
Page 172: ......
Page 176: ...Configuring DSMs 160 ISC BIND...
Page 180: ......
Page 182: ......
Page 184: ......
Page 204: ......
Page 224: ......
Page 246: ......
Page 250: ......
Page 256: ......
Page 260: ......
Page 276: ......
Page 282: ......
Page 284: ......
Page 306: ......
Page 308: ......
Page 318: ......
Page 322: ......
Page 324: ......
Page 346: ......
Page 356: ......
Page 366: ......
Page 384: ......
Page 392: ......
Page 394: ......
Page 396: ......
Page 398: ......
Page 404: ......
Page 426: ......