File Collection: Procedures

Document created by RSA Information Design and Development on Jun 25, 2017Last modified by RSA Information Design and Development on Jul 28, 2017
Version 2Show Document
  • View in full screen mode
  

This topic provides an overview of the end-to-end sequential configuration procedure for the File Collection protocol with a checklist that contains each configuration step

Configuration steps for the File collection protocol must occur in the specific sequence listed in the table below.

File Collection Configuration Checklist

Note: The steps in this list are in the order in which you must complete them.

                                 

Step

Description

1

Configure File Event Sources in Security Analytics.

 
2

Configure File Event Sources to Send Events to Security Analytics.

 

3

Start service for configured File collection protocol.

 

4

Verify that File Collection is working.

 
Previous Topic:The Basics
You are here
Table of Contents > File Collection Protocol Configuration Guide > Procedures

Attachments

    Outcomes