Log Collection Config: Procedures

Document created by RSA Information Design and Development on Mar 23, 2017Last modified by RSA Information Design and Development on May 4, 2017
Version 4Show Document
  • View in full screen mode
  

This topic provides an overview of the end-to-end sequential configuration procedure for Log Collection with links to each of the configuration steps.

Configuration steps for Log Collector must occur in the specific sequence listed in the table below. When these steps are complete, the Log Collector is operational, and the only additional configuration required would be due to updates to your system or software.

Configuration Checklist

Note: The steps in this list are in the order in which you must complete them.

                                   
Previous Topic:The Basics
You are here
Table of Contents > Log Collection Configuration Guide > Procedures

Attachments

    Outcomes