Configuring DSMs
134
IBM
SIEM to read iSecurity events using the Log Enhanced Event Protocol (LEEF).
Before configuring your device in SIEM, you must:
1
Configure the Raz-Lee iSecurity user interface to forward syslog events to SIEM.
For more information, see
Configuring iSecurity to Forward Syslog Events
.
2
Configure the log source in SIEM. For more information, see
Configuring a Log
Source in SIEM
.
Configuring iSecurity to Forward Syslog Events
To integrate the device with SIEM:
Step 1
Log in to the IBM System i command line interface.
Step 2
Type the following command to access the audit menu options:
STRAUD
Step 3
From the Audit menu, select
81. System Configuration
.
The iSecurity/Base System Configuration window is displayed.
Step 4
From the iSecurity/Base System Configuration menu, select
31. SYSLOG
Definitions
.
The SYSLOG Definitions window is displayed.
Step 5
Configure the following parameters:
a
Send SYSLOG message
- Select
Yes
.
b
Destination address
- Type the IP address of SIEM.
c
“Facility” to use
- Type a facility level.
d
“Severity” range to auto send
- Type a severity level.
e
Message structure
- Type any additional message structure parameters
required for your syslog messages.
Step 6
You are now ready to configure the log source in SIEM.
Configuring a Log Source in SIEM
You are now ready to configure the log source in SIEM. SIEM automatically
detects syslog events from iSecurity on the System i. If you want to manually
configure SIEM to receive events from a System i device:
From the
Log Source Type
drop-down list box, select the
IBM iSecurity
option.
For more information on configuring log sources, see the
Log Sources User Guide
.
For more information about Raz-Lee iSecurity, see your vendor documentation.
IBM Lotus Domino
You can integrate an IBM Lotus Domino device with SIEM. An IBM Lotus Domino
device accepts events using SNMP. Before you configure SIEM to integrate with
an IBM Lotus Domino device, you must:
Summary of Contents for Security Information and Event Manager
Page 2: ......
Page 8: ......
Page 20: ......
Page 22: ......
Page 24: ......
Page 26: ......
Page 32: ......
Page 34: ......
Page 36: ......
Page 38: ......
Page 44: ......
Page 58: ......
Page 90: ......
Page 92: ......
Page 94: ......
Page 114: ......
Page 116: ......
Page 122: ......
Page 124: ......
Page 126: ...Configuring DSMs 110 FIREEYE...
Page 128: ......
Page 130: ......
Page 132: ......
Page 136: ......
Page 140: ......
Page 144: ......
Page 172: ......
Page 176: ...Configuring DSMs 160 ISC BIND...
Page 180: ......
Page 182: ......
Page 184: ......
Page 204: ......
Page 224: ......
Page 246: ......
Page 250: ......
Page 256: ......
Page 260: ......
Page 276: ......
Page 282: ......
Page 284: ......
Page 306: ......
Page 308: ......
Page 318: ......
Page 322: ......
Page 324: ......
Page 346: ......
Page 356: ......
Page 366: ......
Page 384: ......
Page 392: ......
Page 394: ......
Page 396: ......
Page 398: ......
Page 404: ......
Page 426: ......