Log Collection Config: Procedures

Document created by RSA Information Design and Development on Nov 22, 2016Last modified by RSA Information Design and Development on May 4, 2017
Version 10Show Document
  • View in full screen mode

This topic provides an overview of the end-to-end sequential configuration procedure for Log Collection with links to each of the configuration steps.

Configuration steps for Log Collector must occur in the specific sequence listed in the table below. When these steps are complete, the Log Collector is operational, and the only additional configuration required would be due to updates to your system or software.

Configuration Checklist

Note: The steps in this list are in the order in which you must complete them.

Previous Topic:The Basics
You are here
Table of Contents > Log Collection Configuration Guide > Procedures