Configuring DSMs
194
M
C
A
FEE
b
If you are using a version of McAfee Intrushield that has patches applied from
3.x and above, type the following to customize the message string:
|$IV_ALERT_ID$|$IV_ALERT_TYPE$|$IV_ATTACK_TIME$|"$IV_ATTACK_
NAME$"|$IV_ATTACK_ID$|$IV_ATTACK_SEVERITY$|$IV_ATTACK_
SIGNATURE$|$IV_ATTACK_CONFIDENCE$|$IV_ADMIN_DOMAIN$|$IV_
SENSOR_NAME$|$IV_INTERFACE$|$IV_SOURCE_IP$|$IV_SOURCE_PORT$|
$IV_DESTINATION_IP$|$IV_DESTINATION_PORT$|
The custom message string must be entered as a single line, no carriage
returns. Versions of McAfee Intrushield with patches applied use custom
message strings that begin with
$IV
. If you are unsure what string type to use,
contact McAfee Customer Support.
Step 8
You are now ready to configure the log source in SIEM.
To configure SIEM to receive events from a McAfee IntruShield device:
From the
Log Source Type
drop-down list box, select
McAfee IntruShield
Network IPS Appliance
.
For more information on configuring log sources, see the
Log Sources User Guide
.
For more information on McAfee Intrushield, see your vendor documentation.
McAfee ePolicy
Orchestrator
A SIEM McAfee ePolicy Orchestrator (ePO) DSM accepts events using Java
Database Connectivity (JDBC) or Simple Network Management Protocol
(SNMPv2, and SNMPv3). SIEM records all relevant ePO anti-virus events from
JDBC or SNMP. You can configure McAfee ePolicy Orchestrator to integrate with
SIEM using one of the following methods:
•
Configuring SIEM to Receive Events Using the JDBC Protocol
•
Configuring ePO to Forward SNMP Events
Configuring SIEM to
Receive Events
Using the JDBC
Protocol
To configure SIEM to access the ePO database using the JDBC protocol:
Step 1
Click the
Admin
tab.
Step 2
In the navigation menu, click
Data Sources
.
The Data Sources panel is displayed.
Step 3
Click the
Log Sources
icon.
The Log Sources window is displayed.
Step 4
Click
Add
.
The Add a log source window is displayed.
Step 5
Select the
McAfee ePolicy Orchestrator
option from the
Log Source Type
drop-down list box.
Summary of Contents for Security Information and Event Manager
Page 2: ......
Page 8: ......
Page 20: ......
Page 22: ......
Page 24: ......
Page 26: ......
Page 32: ......
Page 34: ......
Page 36: ......
Page 38: ......
Page 44: ......
Page 58: ......
Page 90: ......
Page 92: ......
Page 94: ......
Page 114: ......
Page 116: ......
Page 122: ......
Page 124: ......
Page 126: ...Configuring DSMs 110 FIREEYE...
Page 128: ......
Page 130: ......
Page 132: ......
Page 136: ......
Page 140: ......
Page 144: ......
Page 172: ......
Page 176: ...Configuring DSMs 160 ISC BIND...
Page 180: ......
Page 182: ......
Page 184: ......
Page 204: ......
Page 224: ......
Page 246: ......
Page 250: ......
Page 256: ......
Page 260: ......
Page 276: ......
Page 282: ......
Page 284: ......
Page 306: ......
Page 308: ......
Page 318: ......
Page 322: ......
Page 324: ......
Page 346: ......
Page 356: ......
Page 366: ......
Page 384: ......
Page 392: ......
Page 394: ......
Page 396: ......
Page 398: ......
Page 404: ......
Page 426: ......