Log Collection Config: Step 3. Configure Event Sources in Security Analytics

Document created by RSA Information Design and Development on Nov 22, 2016Last modified by RSA Information Design and Development on May 4, 2017
Version 10Show Document
  • View in full screen mode
  

Collection Protocol Configuration Guides

Return to Procedures

Use these guides to configure the collection protocols for the event sources you have in your enterprise network.

  • AWS (CloudTrail) Collection Configuration Guide
  • Check Point Collection Configuration Guide
  • File Configuration Guide
  • Netflow Collection Configuration Guide
  • ODBC Collection Configuration Guide
  • SDEE Collection Configuration Guide
  • SNMP Collection Configuration Guide
  • Configure Syslog Event Sources for the Remote Collector
  • Configure Syslog Event Filters for the Remote Collector
  • VMware Collection Configuration Guide
  • Windows Collection Configuration Guide
  • Windows Legacy and NetApp Configuration Guide
  • Supported Event Sources

 

Previous Topic:Configure Certificates
You are here
Table of Contents > Log Collection Configuration Guide > Procedures > Step 3. Configure Event Sources in Security Analytics

Attachments

    Outcomes