• Sec/User Mgmt: Step 1. Configure Password Complexity

       This topic provides instructions to set system-wide Security Analytics password complexity requirements. Passwords are an important part of your network security strategy. They provide critic...
  • Sec/User Mgmt: Set Up System Security

       This topic introduces a set of end-to-end procedures for implementing system security. Each step in the following topics explains a system-wide setting. Follow the steps in order to set up...
  • Sec/User Mgmt: External Group Mapping Tab

       If you set up external user authentication, you can map Security Analytics user roles to an external group. The External Group Mapping tab provides information about each external group to which you...
  • Sec/User Mgmt: Disable PKI

       This topic describes the procedure to disable Public Key Infrastructure (PKI) authentication. For some reason if you (Security Analytics user or Administrator) are unable to access the Security An...
  • Sec/User Mgmt: Step 2. Map User Roles to External Groups

       See Step 5. (Optional) Map User Roles to External Groups for instructions on how to map user roles to external groups to provide necessary access. Next Step: Step 3. Import Server Certificate and Trus...
  • Sec/User Mgmt: Search for External Groups

       This topic provides instructions for searching for external groups that have Security Analytics user roles mapped to them. Prerequisites A method for external user authentication must be enabled. Proc...
  • Sec/User Mgmt: Step 4. (Optional) Configure External Authentication

       This topic introduces the external authentication methods that Security Analytics supports. External authentication allows users who do not have an internal Security Analytics user account to log on to...
  • Decoder and Log Decoder Configuration Guide for Version 10.6.3- Table of Contents

       Decoder and Log Decoder Configuration Guide Decoder and Log Decoder Basics  Required ProceduresStep 1. Verify System Configuration  Step 2. Configure Capture SettingsConfigure System-Level (BPF)...
    RSA Information Design and Development
    last modified by RSA Link Team
  • AWS Deployment Guide for Version 10.6.3 - Table of Contents

    View PDF    AWS Deployment Instance Configuration Recommendations  ChecklistStep 1. Establish AWS Public Cloud Environment Step 2. FindSecurity Analytics (SA) AMIs Step 3. Launch an Instance a...
    RSA Information Design and Development
    last modified by RSA Link Team
  • RSA Security Analytics System Configuration Guide for Version 10.6.3

    Sarala Sampath
    last modified by Sarala Sampath
  • System Configuration for Version 10.6.3- Table of Contents

       System Configuration Overview  Standard ProceduresAccess System Settings  Configure Notification ServersNotification Servers Overview Configure the Email Settings as Notification Server Configur...
    RSA Information Design and Development
    last modified by Sarala Sampath
  • SA Cfg: Define a Template for Global Audit Logging

       This topic provides instructions on how to define an audit logging template to use for Global Audit Logging. Before you configure Global Audit Logging, configure a Syslog notification server and select a...
  • SA Cfg: Configure the Email Settings as Notification Server

       This topic provides instructions to configure email server settings as a notification server to send alert notifications. Prerequisites Make sure that you have the email server settings that ...
  • SA Cfg: Investigation Configuration Panel

       This topic introduces the features of the System view > Investigation Configuration panel, which provides the user interface for Administrators to configure the system-wide settings tha...
  • SA Cfg: Delete a Template

      This topic provides instructions on how to to delete a template for notifications. You can delete a user-defined template. When you delete a template that is used in an ESA rule, the Event Stream Ana...
  • SA Cfg: Legacy Notifications Configuration Panel

       This topic introduces the Legacy Notifications Configuration panel. The Legacy Notifications Configuration panel provides the ability to configure syslog and SNMP notification settings. These c...
  • SA Cfg: Standard Procedures

       The topics in this section provide instructions for administrators who want to customize settings that apply across the system in Security Analytics. Although some of these settings have default values, ...
  • SA Cfg: Edit a Global Audit Logging Configuration

      This topic provides instructions on how to edit a global audit logging configuration. You can edit a global audit logging configuration to change the destination of the global audit logs for your user audits b...
  • SA Cfg: Configure Script as a Notification

       This topic provides instructions to define the Script and configure it as a notification output. ESA allows you to run scripts in response to ESA alerts. You need to define the script using the Adminis...
  • SA Cfg: Notification Outputs Overview

       This topic provides an overview of notification outputs. These notification outputs are required when defining an ESA rule. You configure notification outputs in the Administration System view ...