Configuring DSMs
52
C
HECK
P
OINT
The name you type must be different than the name used in
Step 2
.
Step 7
From the Host drop-down menu, select the SIEM host object that you just created.
Step 8
From
Application Properties
, select
User Defined
as the Vendor type.
Step 9
From
Client Entries
, select
LEA
.
Step 10
Configure the Secure Internal Communication (SIC) certificate, click
Communication
and enter an activation key.
Step 11
Select
OK
and then
Close
.
Step 12
To install the Policy on your firewall, select
Policy > Install > OK
.
Configuring the Check Point Log Source
To configure SIEM to receive events from a Check Point Provider-1 device:
Step 1
From the
Log Source Type
drop-down list box, select
Check Point Firewall-1
.
Step 2
From the
Protocol Configuration
drop-down list box, select
OPSEC/LEA
.
For more information on configuring OPSEC/LEA, see the
Log Sources User
Guide
.
Summary of Contents for Security Information and Event Manager
Page 2: ......
Page 8: ......
Page 20: ......
Page 22: ......
Page 24: ......
Page 26: ......
Page 32: ......
Page 34: ......
Page 36: ......
Page 38: ......
Page 44: ......
Page 58: ......
Page 90: ......
Page 92: ......
Page 94: ......
Page 114: ......
Page 116: ......
Page 122: ......
Page 124: ......
Page 126: ...Configuring DSMs 110 FIREEYE...
Page 128: ......
Page 130: ......
Page 132: ......
Page 136: ......
Page 140: ......
Page 144: ......
Page 172: ......
Page 176: ...Configuring DSMs 160 ISC BIND...
Page 180: ......
Page 182: ......
Page 184: ......
Page 204: ......
Page 224: ......
Page 246: ......
Page 250: ......
Page 256: ......
Page 260: ......
Page 276: ......
Page 282: ......
Page 284: ......
Page 306: ......
Page 308: ......
Page 318: ......
Page 322: ......
Page 324: ......
Page 346: ......
Page 356: ......
Page 366: ......
Page 384: ......
Page 392: ......
Page 394: ......
Page 396: ......
Page 398: ......
Page 404: ......
Page 426: ......