Windows Legacy Collection: Procedures

Document created by RSA Information Design and Development on Jul 23, 2016Last modified by RSA Information Design and Development on Sep 14, 2016
Version 4Show Document
  • View in full screen mode

This topic provides an overview of the end-to-end sequential configuration procedure for Windows Legacy Collection protocol with a checklist that contains each configuration step.

Configuration steps for the Log Collector must occur in the specific sequence listed in the table below.

Windows Legacy and NetApp Configuration Checklist

Note: You install the Security Analytics Windows Legacy Collector on a physical or virtual Windows 2008 R2 SP1 64-Bit server using the SALegacyWindowsCollector-version-number.exe. You download the SALegacyWindowsCollector-version-number.exe from SCOL [please refer to the SA-v10.6 Legacy Windows Upgrade and Installation Instructions on SCOL  (].

The steps in this list are in the order in which you must complete them.





Set up your Windows Legacy collector.



Configure Windows Legacy Event Sources in Security Analytics.



Start service for configured Windows Legacy protocol.



Verify that Windows Legacy Collection is working.

You are here: Windows Legacy and NetApp Collection Configuration Guide > Windows Legacy Collection: Procedures