Log Collection: Certificates Configuration Parameters

Document created by RSA Information Design and Development on Jul 29, 2016
Version 1Show Document
  • View in full screen mode
 

This topic describes the Certificates configuration parameters.

To access the Certificates configuration parameters:

  1. In the Security Analytics menu, select Administration >Services.
  2. In the Services grid, select a Log Collector service.
  3. Click Actions menu cropped under Actions and select View > Config.
  4. Click the Settings tab.
  5. In the options panel, select Certificates to add or delete certificates.

SettingsCert.png

Features

The Certificates view in the Settings tab has one section: Certificates.

Certificates

You manage certificates by creating trust stores on the Log Collector. The Log Collector refers to these trust stores to determine whether or not the event sources are trusted.

                                   
FieldDescription
Icon-Add.png Opens the Add Cert dialog in which you can add a certificate and password.
icon-edit.png Deletes the selected certificates.
Checkbox.png Selects certificates.
Trust Store Name Displays the name of the trust store.
Certificate Distinguished NameFor Check Point event source only, displays the distinguished name for the certificate.
Certificate Password NameFor Check Point event source only, displays the password name for the certificate.

Add Cert Dialog

These are the fields in the Add Cert dialog.

                                
FieldDescription
Trust Store NameEnter a trust store name.
FileClick Browse to select a certificate (*.PEM file) file from your network
PasswordSpecify the password for this certificate. 
Close Closes the dialog without adding a certificate.
SavesAdds the certificate.

Attachments

    Outcomes