Configuring DSMs
Microsoft Operations Manager
223
You are now ready to configure the log source in SIEM:
Step 1
To configure SIEM to receive events from Windows security event logs, you must
select the
Microsoft Windows Security Event Log
option from the
Log Source
Type
drop-down list box.
Step 2
To configure the Windows Event Log protocol, you must select the
Microsoft
Security Event Log
option from the
Protocol Configuration
drop-down list box.
Your system must be running the latest version of the Windows Event Log protocol
to retrieve File Replication and Directory Service log types:
For more information on configuring devices, see the
Log Sources User Guide
.
For more information about your server, see your vendor documentation.
Microsoft
Operations
Manager
A SIEM Microsoft Operations Manager DSM accepts Microsoft Operations
Manager (MOM) events by polling the OnePoint database allowing SIEM to record
the relevant events.
Before you configure SIEM to integrate with the Microsoft Operations Manager,
you must ensure a database user account is configured with appropriate
permissions to access the MOM OnePoint SQL Server database. Access to the
OnePoint database SDK views is managed through the MOM SDK View User
database role. For more information, please see your Microsoft Operations
Manager documentation.
NOTE
Make sure that no firewall rules are blocking the communication between SIEM
and the SQL Server database associated with MOM. For MOM installations that
use a separate, dedicated computer for the SQL Server database, the
SDKEventView view is queried on the database system, not the system running
MOM.
To configure SIEM to receive MOM events:
Step 1
Click the
Admin
tab.
Step 2
On the navigation menu, click
Data Sources
.
The Data Sources panel is displayed.
Step 3
Click the
Log Sources
icon.
The Log Sources window is displayed.
Step 4
From the
Log Source Type
drop-down list box, select
Microsoft Operations
Manager
.
Step 5
From the
Protocol Configuration
drop-down list box, select
JDBC
.
The JDBC protocol parameters appear.
Step 6
Configure the following values:
Summary of Contents for Security Information and Event Manager
Page 2: ......
Page 8: ......
Page 20: ......
Page 22: ......
Page 24: ......
Page 26: ......
Page 32: ......
Page 34: ......
Page 36: ......
Page 38: ......
Page 44: ......
Page 58: ......
Page 90: ......
Page 92: ......
Page 94: ......
Page 114: ......
Page 116: ......
Page 122: ......
Page 124: ......
Page 126: ...Configuring DSMs 110 FIREEYE...
Page 128: ......
Page 130: ......
Page 132: ......
Page 136: ......
Page 140: ......
Page 144: ......
Page 172: ......
Page 176: ...Configuring DSMs 160 ISC BIND...
Page 180: ......
Page 182: ......
Page 184: ......
Page 204: ......
Page 224: ......
Page 246: ......
Page 250: ......
Page 256: ......
Page 260: ......
Page 276: ......
Page 282: ......
Page 284: ......
Page 306: ......
Page 308: ......
Page 318: ......
Page 322: ......
Page 324: ......
Page 346: ......
Page 356: ......
Page 366: ......
Page 384: ......
Page 392: ......
Page 394: ......
Page 396: ......
Page 398: ......
Page 404: ......
Page 426: ......