Configuring DSMs
McAfee ePolicy Orchestrator
195
Step 6
Using the
Protocol Configuration
drop-down list box, select
JDBC
.
The JDBC protocol parameters are displayed.
NOTE
You must refer to the Configure Database Settings on your ePO Management
Console to configure the McAfee ePolicy Orchestrator DSM in SIEM.
Step 7
Configure the following values:
Table 39-2
McAfee ePO JDBC Parameters
Parameter
Description
Log Source
Identifier
Type the identifier for the log source. The log source identifier must
be added in the following format:
<McAfee ePO Database>@<McAfee ePO Database Server
IP or Host Name>
Where:
<McAfee ePO Database>
is the database name, as entered in
the Database Name parameter.
<McAfee ePO Database Server IP or Host Name>
is the
hostname or IP address for this log source, as entered in the IP or
Hostname parameter.
When defining a name for your log source identifier, you must use
the values of the McAfee ePO Database and Database Server IP
address or hostname from the ePO Management Console.
Database Type
From the drop-down list box, select
MSDE
.
Database Name
Type the exact name of the McAfee ePolicy Orchestrator
database.
IP or Hostname
Type the IP address or host name of the McAfee ePolicy
Orchestrator SQL Server.
Port
Type the port number used by the database server. The default
port for MSDE is 1433.
The JDBC configuration port must match the listener port of the
McAfee ePolicy Orchestrator database. The McAfee ePolicy
Orchestrator database must have incoming TCP connections
enabled to communicate with SIEM.
Note: If you define a Database Instance when using MSDE as the
database type, you must leave the Port parameter blank in your
SIEM configuration.
Username
Type the username required to access the database.
Password
Type the password required to access the database.
The password can be up to 255 characters in length.
Confirm
Password
Confirm the password required to access the database. The
confirmation password must be identical to the password entered
in the Password parameter.
Summary of Contents for Security Information and Event Manager
Page 2: ......
Page 8: ......
Page 20: ......
Page 22: ......
Page 24: ......
Page 26: ......
Page 32: ......
Page 34: ......
Page 36: ......
Page 38: ......
Page 44: ......
Page 58: ......
Page 90: ......
Page 92: ......
Page 94: ......
Page 114: ......
Page 116: ......
Page 122: ......
Page 124: ......
Page 126: ...Configuring DSMs 110 FIREEYE...
Page 128: ......
Page 130: ......
Page 132: ......
Page 136: ......
Page 140: ......
Page 144: ......
Page 172: ......
Page 176: ...Configuring DSMs 160 ISC BIND...
Page 180: ......
Page 182: ......
Page 184: ......
Page 204: ......
Page 224: ......
Page 246: ......
Page 250: ......
Page 256: ......
Page 260: ......
Page 276: ......
Page 282: ......
Page 284: ......
Page 306: ......
Page 308: ......
Page 318: ......
Page 322: ......
Page 324: ......
Page 346: ......
Page 356: ......
Page 366: ......
Page 384: ......
Page 392: ......
Page 394: ......
Page 396: ......
Page 398: ......
Page 404: ......
Page 426: ......