Windows Legacy Collection: Procedures

Document created by RSA Information Design and Development on May 9, 2016Last modified by RSA Information Design and Development on May 4, 2017
Version 6Show Document
  • View in full screen mode

This topic provides an overview of the end-to-end sequential configuration procedure for Windows Legacy Collection protocol with a checklist that contains each configuration step.

Configuration steps for the Log Collector must occur in the specific sequence listed in the table below.

Windows Legacy and NetApp Configuration Checklist

Note: You install the Security Analytics Windows Legacy Collector on a physical or virtual Windows 2008 R2 SP1 64-Bit server using the SALegacyWindowsCollector-version-number.exe. You download the SALegacyWindowsCollector-version-number.exe from SCOL [please refer to the SA-v10.6 Legacy Windows Upgrade and Installation Instructions on SCOL  (].

The steps in this list are in the order in which you must complete them.





Set up your Windows Legacy collector.



Configure Windows Legacy Event Sources in Security Analytics.



Start service for configured Windows Legacy protocol.



Verify that Windows Legacy Collection is working.

Previous Topic:The Basics
You are here
Table of Contents > Windows Legacy and NetApp Collection Configuration Guide > Procedures