This topic provides an overview of the end-to-end sequential configuration procedure for Log Collection with links to each of the configuration steps.
Configuration steps for Log Collector must occur in the specific sequence listed in the table below. When these steps are complete, the Log Collector is operational, and the only additional configuration required would be due to updates to your system or software.
Note: The steps in this list are in the order in which you must complete them.
Step 2. Configure Settings (Lockbox Security Settings and Certificates)