Configuring DSMs
Microsoft SQL Server
221
For more information about your server, see your vendor documentation.
Microsoft SQL
Server
A SIEM Microsoft SQL Server DSM accepts SQL audit events using syslog. You
can integrate Microsoft SQL Server with SIEM using the Adaptive Log Exporter.
For more information on the Adaptive Log Exporter, see the
Adaptive Log Exporter
Users Guide
.
You are now ready to configure the log source in SIEM.
To configure SIEM to receive events from a Microsoft SQL Server:
From the
Log Source Type
drop-down list box,select the
Microsoft SQL
Server
option.
For more information on configuring devices, see the
Log Sources User Guide
.
For more information about your server, see your vendor documentation.
Microsoft Windows
Security Event Log
A SIEM Microsoft Windows Security Event Log DSM accepts events using syslog
from relevant authentication and authorization events.
After you have completed the
Before You Begin
section, you can integrate Window
Microsoft Security Event Log with SIEM using one of the following methods:
•
Use the SIEM Adaptive Log Exporter. For more information on the Adaptive Log
Exporter, see the
Adaptive Log Exporter Users Guide
.
•
Use the Microsoft Security Event Log protocol. For more information, see the
Log Sources User Guide.
•
Set-up the Snare Agent to forward Microsoft Windows Security Event Logs to
SIEM. See
Using the Snare Agent
Before You Begin
Before you install the Windows Security Event Log protocol, you must configure
your system DCOM settings for each host you want to monitor. Ensure the
following is configured for each host:
•
Make sure you have appropriate administrative permissions. For this process,
you must be a member of the Administrators group on the remote computer.
•
Make sure you have Windows 2000, Windows 2003, Windows 2008, XP, or
Vista software, or Windows 7 installed. The Windows Event Log Protocol
supports 32 or 64-bit systems.
•
Configure DCOM and enable the host.
•
Enable Windows Management Instrumentation on the host.
•
Activate the remote registry service.
•
If a firewall is installed on the host (for example, Windows firewall) or is located
between the host and SIEM (such as a hardware or other intermediary firewall),
Содержание Security Information and Event Manager
Страница 1: ...Enterasys Security Information and Event Manager SIEM Configuring DSMs Release 7 7 0 P N 9034592 05...
Страница 2: ......
Страница 8: ......
Страница 20: ......
Страница 22: ......
Страница 24: ......
Страница 26: ......
Страница 32: ......
Страница 34: ......
Страница 36: ......
Страница 38: ......
Страница 44: ......
Страница 58: ......
Страница 90: ......
Страница 92: ......
Страница 94: ......
Страница 114: ......
Страница 116: ......
Страница 122: ......
Страница 124: ......
Страница 126: ...Configuring DSMs 110 FIREEYE...
Страница 128: ......
Страница 130: ......
Страница 132: ......
Страница 136: ......
Страница 140: ......
Страница 144: ......
Страница 172: ......
Страница 176: ...Configuring DSMs 160 ISC BIND...
Страница 180: ......
Страница 182: ......
Страница 184: ......
Страница 204: ......
Страница 224: ......
Страница 246: ......
Страница 250: ......
Страница 256: ......
Страница 260: ......
Страница 276: ......
Страница 282: ......
Страница 284: ......
Страница 306: ......
Страница 308: ......
Страница 318: ......
Страница 322: ......
Страница 324: ......
Страница 346: ......
Страница 356: ......
Страница 366: ......
Страница 384: ......
Страница 392: ......
Страница 394: ......
Страница 396: ......
Страница 398: ......
Страница 404: ......
Страница 426: ......