Configuring DSMs
64
C
ISCO
•
Log Name
- Type a log name.
•
File Name
- Use the default configuration value.
•
Maximum File Size
- Use the default configuration value.
•
Log Level
- Select
Information
(Default).
•
Retrieval Method
- Select
Syslog Push
.
•
Hostname
- Type the IP address or server name of your SIEM system.
•
Protocol
- Select
UDP
.
•
Facility
- Use the default configuration value. This value depends on the
configured Log Type.
Step 5
Save the subscription.
Step 6
You are now ready to configure the log source in SIEM.
To configure SIEM to receive events from a Cisco IronPort device:
From the
Log Source Type
drop-down list box, select the
Cisco IronPort
option.
For more information on configuring devices, see the
Log Sources User Guide
.
For more information about your server, see your vendor documentation.
IronPort Web Content
Filter
A SIEM Cisco IronPort DSM retrieves web content filtering events in W3C format
from a remote source using the log file protocol. Your system must be running the
latest version of log file protocol to integrate with a Cisco IronPort device. To
configure your Cisco IronPort device to push web content filter events, you must
configure a log subscription for the web content filter using the W3C format. For
more information on configuring a log subscription, see your Cisco IronPort
documentation.
You are now ready to configure the log source and protocol SIEM.
Step 1
From the
Log Source Type
drop-down list box, select
Cisco IronPort
.
Step 2
From the
Protocol Configuration
drop-down list box, select
Log File
protocol
option.
Step 3
Select
W3C
as the
Event Generator
used to process the web content filter log
files.
Step 4
The
FTP File Pattern
parameter must use a regular expression that matches the
log files generated by the web content filter logs.
For more information on configuring devices, see the
Log Sources User Guide
.
Cisco NAC
A SIEM Cisco NAC DSM accepts events using syslog. SIEM records all relevant
audit, error, and failure events as well as quarantine and infected system events.
Summary of Contents for Security Information and Event Manager
Page 2: ......
Page 8: ......
Page 20: ......
Page 22: ......
Page 24: ......
Page 26: ......
Page 32: ......
Page 34: ......
Page 36: ......
Page 38: ......
Page 44: ......
Page 58: ......
Page 90: ......
Page 92: ......
Page 94: ......
Page 114: ......
Page 116: ......
Page 122: ......
Page 124: ......
Page 126: ...Configuring DSMs 110 FIREEYE...
Page 128: ......
Page 130: ......
Page 132: ......
Page 136: ......
Page 140: ......
Page 144: ......
Page 172: ......
Page 176: ...Configuring DSMs 160 ISC BIND...
Page 180: ......
Page 182: ......
Page 184: ......
Page 204: ......
Page 224: ......
Page 246: ......
Page 250: ......
Page 256: ......
Page 260: ......
Page 276: ......
Page 282: ......
Page 284: ......
Page 306: ......
Page 308: ......
Page 318: ......
Page 322: ......
Page 324: ......
Page 346: ......
Page 356: ......
Page 366: ......
Page 384: ......
Page 392: ......
Page 394: ......
Page 396: ......
Page 398: ......
Page 404: ......
Page 426: ......