Configuring DSMs
Microsoft SQL Server
221
For more information about your server, see your vendor documentation.
Microsoft SQL
Server
A SIEM Microsoft SQL Server DSM accepts SQL audit events using syslog. You
can integrate Microsoft SQL Server with SIEM using the Adaptive Log Exporter.
For more information on the Adaptive Log Exporter, see the
Adaptive Log Exporter
Users Guide
.
You are now ready to configure the log source in SIEM.
To configure SIEM to receive events from a Microsoft SQL Server:
From the
Log Source Type
drop-down list box,select the
Microsoft SQL
Server
option.
For more information on configuring devices, see the
Log Sources User Guide
.
For more information about your server, see your vendor documentation.
Microsoft Windows
Security Event Log
A SIEM Microsoft Windows Security Event Log DSM accepts events using syslog
from relevant authentication and authorization events.
After you have completed the
Before You Begin
section, you can integrate Window
Microsoft Security Event Log with SIEM using one of the following methods:
•
Use the SIEM Adaptive Log Exporter. For more information on the Adaptive Log
Exporter, see the
Adaptive Log Exporter Users Guide
.
•
Use the Microsoft Security Event Log protocol. For more information, see the
Log Sources User Guide.
•
Set-up the Snare Agent to forward Microsoft Windows Security Event Logs to
SIEM. See
Using the Snare Agent
Before You Begin
Before you install the Windows Security Event Log protocol, you must configure
your system DCOM settings for each host you want to monitor. Ensure the
following is configured for each host:
•
Make sure you have appropriate administrative permissions. For this process,
you must be a member of the Administrators group on the remote computer.
•
Make sure you have Windows 2000, Windows 2003, Windows 2008, XP, or
Vista software, or Windows 7 installed. The Windows Event Log Protocol
supports 32 or 64-bit systems.
•
Configure DCOM and enable the host.
•
Enable Windows Management Instrumentation on the host.
•
Activate the remote registry service.
•
If a firewall is installed on the host (for example, Windows firewall) or is located
between the host and SIEM (such as a hardware or other intermediary firewall),
Summary of Contents for Security Information and Event Manager
Page 2: ......
Page 8: ......
Page 20: ......
Page 22: ......
Page 24: ......
Page 26: ......
Page 32: ......
Page 34: ......
Page 36: ......
Page 38: ......
Page 44: ......
Page 58: ......
Page 90: ......
Page 92: ......
Page 94: ......
Page 114: ......
Page 116: ......
Page 122: ......
Page 124: ......
Page 126: ...Configuring DSMs 110 FIREEYE...
Page 128: ......
Page 130: ......
Page 132: ......
Page 136: ......
Page 140: ......
Page 144: ......
Page 172: ......
Page 176: ...Configuring DSMs 160 ISC BIND...
Page 180: ......
Page 182: ......
Page 184: ......
Page 204: ......
Page 224: ......
Page 246: ......
Page 250: ......
Page 256: ......
Page 260: ......
Page 276: ......
Page 282: ......
Page 284: ......
Page 306: ......
Page 308: ......
Page 318: ......
Page 322: ......
Page 324: ......
Page 346: ......
Page 356: ......
Page 366: ......
Page 384: ......
Page 392: ......
Page 394: ......
Page 396: ......
Page 398: ......
Page 404: ......
Page 426: ......