Configuring DSMs
IBM Informix Audit
151
IBM Informix Audit
The IBM Informix Audit DSM allows you to integrate IBM Informix audit logs into
SIEM for analysis. SIEM retrieves the IBM Informix archived audit log files from a
remote host using the Log File protocol configuration. SIEM records all configured
IBM Informix Audit events.
For more information about IBM Informix auditing configuration, see your IBM
Informix documentation at the following website:
http://publib.boulder.ibm.com/infocenter/idshelp/v10/index.jsp?topic=/com.ibm.tfg.
doc/tfg26.htm
When configuring your IBM Informix to use the log file protocol, make sure the
hostname or IP address configured in the IBM Informix is the same as configured
in the Remote Host parameter in the Log File protocol configuration.
You are now ready to configure the log source and protocol in SIEM:
Step 1
To configure SIEM to receive events from an IBM Informix device, you must select
the
IBM Informix Audit
option from the
Log Source Type
drop-down list box.
Step 2
To configure the log file protocol, you must select the
Log File
option from the
Protocol Configuration
drop-down list box.
Step 3
We recommend that you use a secure protocol for transferring files, such as
Secure File Transfer Protocol (SFTP).
For more information on configuring log sources and protocols, see the
Log
Sources User Guide
.
IBM IMS
The IBM Information Management System (IMS) DSM allows you to use an IBM
mainframe to collect events and audit IMS database transactions. SIEM retrieves
archived log files from a remote host using the log file protocol and records all
relevant information from the event.
To integrate IBM IMS events into SIEM:
Step 1
The IBM mainframe records all security events as Service Management
Framework (SMF) records in a live repository.
Step 2
The IBM IMS data is extracted from the live repository using the SMF dump utility.
The SMF file contains all of the events and fields from the previous day in raw SMF
format.
Step 3
The
qeximsloadlib.trs
program pulls data from the SMF formatted file. The
qeximsloadlib.trs
program only pulls the relevant events and fields for SIEM
and writes that information in a condensed format for SIEM compatibility. The
information is saved in a location accessible by SIEM.
Step 4
SIEM uses the log file protocol source to retrieve the output file information for
SIEM on a scheduled basis. SIEM then imports and processes this file.
Содержание Security Information and Event Manager
Страница 1: ...Enterasys Security Information and Event Manager SIEM Configuring DSMs Release 7 7 0 P N 9034592 05...
Страница 2: ......
Страница 8: ......
Страница 20: ......
Страница 22: ......
Страница 24: ......
Страница 26: ......
Страница 32: ......
Страница 34: ......
Страница 36: ......
Страница 38: ......
Страница 44: ......
Страница 58: ......
Страница 90: ......
Страница 92: ......
Страница 94: ......
Страница 114: ......
Страница 116: ......
Страница 122: ......
Страница 124: ......
Страница 126: ...Configuring DSMs 110 FIREEYE...
Страница 128: ......
Страница 130: ......
Страница 132: ......
Страница 136: ......
Страница 140: ......
Страница 144: ......
Страница 172: ......
Страница 176: ...Configuring DSMs 160 ISC BIND...
Страница 180: ......
Страница 182: ......
Страница 184: ......
Страница 204: ......
Страница 224: ......
Страница 246: ......
Страница 250: ......
Страница 256: ......
Страница 260: ......
Страница 276: ......
Страница 282: ......
Страница 284: ......
Страница 306: ......
Страница 308: ......
Страница 318: ......
Страница 322: ......
Страница 324: ......
Страница 346: ......
Страница 356: ......
Страница 366: ......
Страница 384: ......
Страница 392: ......
Страница 394: ......
Страница 396: ......
Страница 398: ......
Страница 404: ......
Страница 426: ......