Log Collection Config: Procedures

Document created by RSA Information Design and Development on Jul 29, 2016
Version 1Show Document
  • View in full screen mode
 

Configuration steps for Log Collector must occur in the specific sequence listed in the table below. When these steps are complete, the Log Collector is operational, and the only additional configuration required would be due to updates to your system or software.

Configuration Checklist

Note: The steps in this list are in the order in which you must complete them.

                                 

Step

Description

checkmark.PNG
1

Download the latest Log Collection content from LIVE.

 
2

Configure Settings (Lockbox Security Settings and Certificates).

 

3

Configure event sources in Security Analytics.

 

4

Configure event sources to send events to Security Analytics.

 

5

Start and Stop services for configured collection protocols.

 

6

Verify that Log Collection is working.

 
You are here: Log Collection Configuration Guide > Log Collection Config: Procedures

Attachments

    Outcomes