Configuring DSMs
130
IBM
Where
<IP address>
is the IP address of the SIEM system.
Step 4
Save and exit the file.
Step 5
Restart syslog:
refresh -s syslogd
For example, a typical /etc/syslog.conf file can resemble the following:
##### begin /etc/syslog.conf
mail.debug /var/adm/maillog
mail.none /var/adm/maillog
auth.notice /var/adm/authlog
lpr.debug /var/adm/lpd-errs
kern.debug /var/adm/messages
*.emerg;*.alert;*.crit;*.warning;*.err;*.notice;*.info
/var/adm/messages
auth.info@<IP address>
##### end /etc/syslog.conf
NOTE
If you are using IBM AIX v5.2 and above, you must start the AIX syslog service
using the -n option. This option prevents the syslog service from pre-pending
anything to the log message. For example, when you use the -n option, the output
resembles the following: <$PRI>$DATE $MESSAGE.
Step 6
You are now ready to configure the log source in SIEM.
To configure SIEM to receive events from an IBM AIX server:
From the
Log Source Type
drop-down list box, select the
IBM AIX Server
option.
For more information on configuring log sources, see the
Log Sources User Guide
.
Configuring IBM AIX
Using the Log File
Protocol
A log file protocol source allows SIEM to retrieve archived audit log files from a
remote host. The IBM AIX DSM supports the bulk loading of log files using the log
file protocol source. When configuring your IBM DB2 to use the log file protocol,
make sure the log file protocol is reading the archived audit log.
You are now ready to configure the log source and protocol in SIEM:
Step 1
To configure SIEM to receive events from an IBM DB2, from the
Log Source Type
drop-down list box, select
IBM AIX Server
.
Step 2
To configure the log file protocol, from the
Protocol Configuration
drop-down list
box, select
Log File
.
Step 3
We recommend that you use a secure protocol for transferring files, such as
Secure File Transfer Protocol (SFTP).
Содержание Security Information and Event Manager
Страница 1: ...Enterasys Security Information and Event Manager SIEM Configuring DSMs Release 7 7 0 P N 9034592 05...
Страница 2: ......
Страница 8: ......
Страница 20: ......
Страница 22: ......
Страница 24: ......
Страница 26: ......
Страница 32: ......
Страница 34: ......
Страница 36: ......
Страница 38: ......
Страница 44: ......
Страница 58: ......
Страница 90: ......
Страница 92: ......
Страница 94: ......
Страница 114: ......
Страница 116: ......
Страница 122: ......
Страница 124: ......
Страница 126: ...Configuring DSMs 110 FIREEYE...
Страница 128: ......
Страница 130: ......
Страница 132: ......
Страница 136: ......
Страница 140: ......
Страница 144: ......
Страница 172: ......
Страница 176: ...Configuring DSMs 160 ISC BIND...
Страница 180: ......
Страница 182: ......
Страница 184: ......
Страница 204: ......
Страница 224: ......
Страница 246: ......
Страница 250: ......
Страница 256: ......
Страница 260: ......
Страница 276: ......
Страница 282: ......
Страница 284: ......
Страница 306: ......
Страница 308: ......
Страница 318: ......
Страница 322: ......
Страница 324: ......
Страница 346: ......
Страница 356: ......
Страница 366: ......
Страница 384: ......
Страница 392: ......
Страница 394: ......
Страница 396: ......
Страница 398: ......
Страница 404: ......
Страница 426: ......