Log Collection Config: Step 3. Configure Event Sources in Security Analytics

Document created by RSA Information Design and Development on Jul 23, 2016Last modified by RSA Information Design and Development on Sep 14, 2016
Version 4Show Document
  • View in full screen mode
 

Collection Protocol Configuration Guides

Return to Procedures

Use these guides to configure the collection protocols for the event sources you have in your enterprise network.

  • AWS (CloudTrail) Collection Configuration Guide
  • Check Point Collection Configuration Guide
  • File Configuration Guide
  • Netflow Collection Configuration Guide
  • ODBC Collection Configuration Guide
  • SDEE Collection Configuration Guide
  • SNMP Collection Configuration Guide
  • Configure Syslog Event Sources for the Remote Collector
  • Configure Syslog Event Filters for the Remote Collector
  • VMware Collection Configuration Guide
  • Windows Collection Configuration Guide
  • Windows Legacy and NetApp Configuration Guide
  • Supported Event Sources

 

You are here: Log Collection Configuration Guide > Procedures > Log Collection Config: Step 3. Configure Event Sources in Security Analytics

Attachments

    Outcomes