Windows Legacy Collection: Procedures

Document created by RSA Information Design and Development on Nov 22, 2016Last modified by RSA Information Design and Development on May 4, 2017
Version 10Show Document
  • View in full screen mode
  

This topic provides an overview of the end-to-end sequential configuration procedure for Windows Legacy Collection protocol with a checklist that contains each configuration step.

Configuration steps for the Log Collector must occur in the specific sequence listed in the table below.

Windows Legacy and NetApp Configuration Checklist

Note: You install the Security Analytics Windows Legacy Collector on a physical or virtual Windows 2008 R2 SP1 64-Bit server using the SALegacyWindowsCollector-version-number.exe. You download the SALegacyWindowsCollector-version-number.exe from SCOL [please refer to the SA-v10.6 Legacy Windows Upgrade and Installation Instructions on SCOL  (https://knowledge.rsasecurity.com/)].

The steps in this list are in the order in which you must complete them.

                                 

Step

Description

1

Set up your Windows Legacy collector.

 

2

Configure Windows Legacy Event Sources in Security Analytics.

 

3

Start service for configured Windows Legacy protocol.

 

4

Verify that Windows Legacy Collection is working.

 
Previous Topic:The Basics
You are here
Table of Contents > Windows Legacy and NetApp Collection Configuration Guide > Procedures

Attachments

    Outcomes