Configuring DSMs
358
S
YMANTEC
Step 10
On the
Admin
tab, click
Deploy Changes
.
SIEMFor information on configuring the JDBC protocol, see the
Log Sources User
Guide.
Symantec Data
Loss Prevention
(DLP)
A SIEM Symantec Data Loss Protection (DLP) DSM accepts events from a
Symantec DLP appliance using syslog. Before configuring SIEM, you must
configure response rules on your Symantec DLP. The response rule allows the
Symantec DLP appliance to forward syslog events to SIEM when a data loss policy
violation occurs. Integrating Symantec DLP requires you to create two protocol
response rules (SMTP and None of SMTP) for SIEM. These protocol response
rules create an action to forward the event information, using syslog, when an
incident is triggered.
To configure Symantec DLP with SIEM, you must:
1 Create an SMTP response rule. For more information, see
Creating an SMTP
Response Rule
.
2 Create a None of SMTP response rule. For more information, see
Creating a None
Of SMTP Response Rule
.
3 Configure SIEM. For more information, see
Configuring SIEM with Symantec DLP
.
Creating an SMTP
Response Rule
To configure an SMTP response rule in Symantec DLP:
Step 1
Log in to your Symantec DLP user interface.
Step 2
From the menu, select the
Manage > Policies > Response Rules
.
Step 3
Click
Add Response Rule
.
The New Response Rule panel is displayed.
Step 4
Select one of the following response rule types:
•
Automated Response
- Automated response rules are triggered automatically
as incidents occur. This is the default value.
•
Smart Response
- Smart response rules are added to the Incident Command
screen and handled by an authorized Symantec DLP user.
Step 5
Click
Next
.
The Configure Response Rule panel is displayed.
Step 6
Configure the following values:
a
Rule Name
- Type a name for the rule you are creating. This name should be
descriptive enough for policy authors to identify the rule. For example,
SIEM
Syslog SMTP
.
b
Description
- Optional. Type a description for the rule you are creating.
Step 7
Click
Add Condition
.
Summary of Contents for Security Information and Event Manager
Page 2: ......
Page 8: ......
Page 20: ......
Page 22: ......
Page 24: ......
Page 26: ......
Page 32: ......
Page 34: ......
Page 36: ......
Page 38: ......
Page 44: ......
Page 58: ......
Page 90: ......
Page 92: ......
Page 94: ......
Page 114: ......
Page 116: ......
Page 122: ......
Page 124: ......
Page 126: ...Configuring DSMs 110 FIREEYE...
Page 128: ......
Page 130: ......
Page 132: ......
Page 136: ......
Page 140: ......
Page 144: ......
Page 172: ......
Page 176: ...Configuring DSMs 160 ISC BIND...
Page 180: ......
Page 182: ......
Page 184: ......
Page 204: ......
Page 224: ......
Page 246: ......
Page 250: ......
Page 256: ......
Page 260: ......
Page 276: ......
Page 282: ......
Page 284: ......
Page 306: ......
Page 308: ......
Page 318: ......
Page 322: ......
Page 324: ......
Page 346: ......
Page 356: ......
Page 366: ......
Page 384: ......
Page 392: ......
Page 394: ......
Page 396: ......
Page 398: ......
Page 404: ......
Page 426: ......