Log Collection ODBC: Procedures

Document created by RSA Information Design and Development on Jul 29, 2016
Version 1Show Document
  • View in full screen mode
 

This topic provides an overview of the end-to-end sequential configuration procedure for the ODBC Collection protocol with a checklist that contains each configuration step.

Configuration steps for the ODBC collection protocol must occur in the specific sequence listed in the table below.

ODBC Collection Configuration Checklist

Note: The steps in this list are in the order in which you must complete them.

                         

Step

Description

checkmark.PNG
1

Configure ODBC Event Sources in Security Analytics.

 
2

Configure ODBC Event Sources to Send Events to Security Analytics.

 

3

Start service for configured ODBC collection protocol.

 

4

Verify that ODBC Collection is working.

 
You are here: ODBC Collection Configuration Guide > Log Collection ODBC: Procedures

Attachments

    Outcomes