• Sec/User Mgmt: Step 5. (Optional) Use Custom Server Certificate

      By default Security Analytics server uses a web server certificate generated by Security Analytics for HTTPS connection. Security Analytics also allows you to configure custom web server certificate to be ...
    RSA Information Design and Development
    last modified by RSA Product Team
  • AWS Deployment for Version 10.6.4 - Table of Contents

    View PDF       AWS Deployment Instance Configuration Recommendations  ChecklistStep 1. Establish AWS Public Cloud Environment Step 2. FindSecurity Analytics (SA) AMIs Step 3. Launch...
    RSA Information Design and Development
    last modified by Shree Kulkarni
  • AWS Deployment Guide for Version 10.6.4

    10.6.4admin administration documentation english  getting_started netwitness logs and packets administrator netwitness logs and packets  toc expanding netwitness ...
    Scott Marcus
    last modified by Suresh Babu
  • AWS Instance Configuration Recommendations

      Note: For a description of terms and abbreviations used in this topic, refer to Abbreviations and Other Terminology Used in this Guide. This topic contains the minimum AWS instance configuration settings r...
    RSA Information Design and Development
    last modified by Shree Kulkarni
  • System Configuration - Table of Contents

    View PDF    System Configuration Overview  Standard ProceduresAccess System Settings  Configure Notification ServersNotification Servers Overview Configure the Email Settings as Notification Server...
    RSA Information Design and Development
    last modified by RSA Link Admin
  • System Maintenance Guide for Version 10.6.4 - Table of Contents

    View PDF    Best Practices Activate or Deactivate FIPS Back Up and Restore Data for Hosts and Services Change IP Address or Hostname of a Host  DISA STIG Hardening GuideIntroduction  ProceduresConf...
    RSA Information Design and Development
    last modified by RSA Link Admin
  • System Security and User Management Guide for Version 10.6.4 - Table of Contents

    View PDF    System Security and User Management  How Role-Based Access Control WorksRole Permissions  Set Up System SecurityStep 1. Configure Password Complexity Step 2. Change the Default admin P...
    RSA Information Design and Development
    last modified by RSA Link Admin
  • Sys Maintenance: Procedures

        Follow one of the following two STIG Hardening configuration procedures:  Configure STIG hardening for a newly-installed Security Analytics 10.6 deployment. Config...
  • Sys Maintenance: Configure STIG Hardening for 10.6 Updated from Earlier Version

        These instructions describe how to configure Security Analytics hosts that were updated to 10.6 from an earlier version.  Read Before You Run the STIG Script Please read the following c...
  • Sys Maintenance: Monitor Health and Wellness Using SNMP Alerts

        You can monitor a Security Analytics component to proactively alert using Simple Network Management Protocol (SNMP) based on the thresholds or system failures. You can monitor the following for Securi...
  • Sys Maintenance: Health and Wellness

        The Health and Wellness settings allow you to set and view alarms, monitor events, and view policies and system statistics. For more details on each of these, see the following topics: Alarms View ...
  • Sys Maintenance: Add Statistics to a Gauge or Chart

        In the Services Stats view, you can customize the monitored statistics for individual services. The Chart Stats Tray lists all available statistics for the service. The number of statistics varies acco...
  • Sys Maintenance: Filter Event Sources

        You can choose a filter to display: Events belonging to a particular event source Events belonging to particular event source types Events collected from a particular log Collector Events list arr...
  • Sys Maintenance: Reporting Engine Details View

        The Reporting Engine Details view provides information for the Reporting Engine, such as the version information, number of active requests, or number of enabled alerts.  The following figur...
  • Sys Maintenance: Core Hosts Backup and Recovery

      The host that you want to back up may have a number of services running, so you must back up all the services and restore them. For example, if a Log Decoder has the Log Collector and Warehouse Connector s...
  • Sys Maintenance: Manage Policies

        Policies are either user-defined or supplied by RSA. A policy defines: Services and hosts to which the policy applies. Rules that specify statistical thresholds that govern alarms. W...
  • Sys Maintenance: Host Details View

        The Host Details view provides information about a host. The following figure depicts the Host Details view. The options panel on the left displays the host and the services installed on...
  • Sys Maintenance: Troubleshoot Security Analytics

        For information about troubleshooting Security Analytics, see the following topics: Debugging Information Error Notification Miscellaneous Tips NwLogPlayer Troubleshoot Feeds Previou...
  • Sys Maintenance: Monitor Host Details

        You can view the details of the host, its memory and CPU usage, system information, the physical drive, logical drive and file system details to further investigate if you encounter some problem with t...
  • Sys Maintenance: Health and Wellness Settings Tab - Event Sources

        Note: This tab is being deprecated. To manage Event Sources, see About Event Source Management in the RSA Security Analytics Event Source Management Guide. The Event Source Monitoring view consis...