RSA NetWitness Logs. Cisco IronPort Web Security Appliance (WSA) Event Source Log Configuration Guide. Last Modified: Tuesday, January 9, 2018

Similar documents
RSA NetWitness Logs. Cisco IronPort Security Appliance. Event Source Log Configuration Guide. Last Modified: Thursday, January 19, 2017

RSA NetWitness Logs. EMC Data Domain. Event Source Log Configuration Guide

RSA NetWitness Logs. Cisco Adaptive Security Appliance Last Modified: Wednesday, November 8, Event Source Log Configuration Guide

RSA NetWitness Logs. Cisco Meraki. Event Source Log Configuration Guide. Last Modified: Monday, November 13, 2017

RSA NetWitness Logs. Citrix Access Gateway Last Modified: Thursday, May 11, Event Source Log Configuration Guide

RSA NetWitness Logs. EMC Isilon. Event Source Log Configuration Guide. Last Modified: Tuesday, October 31, 2017

RSA NetWitness Logs. F5 Big-IP Application Security Manager. Event Source Log Configuration Guide. Last Modified: Friday, May 12, 2017

RSA NetWitness Logs. Juniper Networks NetScreen Firewall Last Modified: Monday, October 9, Event Source Log Configuration Guide

RSA NetWitness Logs. Tripwire Enterprise. Event Source Log Configuration Guide. Last Modified: Friday, November 3, 2017

RSA NetWitness Logs. Imperva SecureSphere. Event Source Log Configuration Guide. Last Modified: Monday, May 22, 2017

RSA NetWitness Logs. DenyAll Web Application Firewall. Event Source Log Configuration Guide. Last Modified: Thursday, November 2, 2017

RSA NetWitness Logs. Juniper Networks NetScreen ScreenOS Last Modified: Wednesday, November 8, Event Source Log Configuration Guide

RSA NetWitness Logs. IBM WebSphere DataPower. Event Source Log Configuration Guide. Last Modified: Friday, January 5, 2018

RSA NetWitness Logs. F5 Big-IP Access Policy Manager. Event Source Log Configuration Guide. Last Modified: Friday, May 12, 2017

RSA NetWitness Logs. Bit9 Security Platform. Event Source Log Configuration Guide. Last Modified: Friday, May 05, 2017

RSA NetWitness Logs. Juniper Networks NetScreen-Security Manager Last Modified: Thursday, May 25, Event Source Log Configuration Guide

RSA NetWitness Platform

RSA NetWitness Logs. RSA Web Threat Detection. Event Source Log Configuration Guide. Last Modified: Friday, April 14, 2017

RSA NetWitness Logs. Trend Micro InterScan Messaging Security Suite. Event Source Log Configuration Guide. Last Modified: Tuesday, April 25, 2017

RSA NetWitness Logs. Airtight Management Console. Event Source Log Configuration Guide. Last Modified: Thursday, May 04, 2017

RSA NetWitness Logs. Extreme Networks Switch Last Modified: Thursday, July 20, Event Source Log Configuration Guide

RSA NetWitness Logs. Cisco Wireless LAN Controller. Event Source Log Configuration Guide

RSA NetWitness Platform

RSA NetWitness Platform

RSA NetWitness Logs. Oracle Directory Server. Event Source Log Configuration Guide. Last Modified: Thursday, June 29, 2017

RSA NetWitness Logs. EMC Symmetrix Solutions Enabler. Event Source Log Configuration Guide. Last Modified: Friday, April 21, 2017

RSA NetWitness Logs. Bind DNS. Event Source Log Configuration Guide. Last Modified: Thursday, October 19, 2017

Aruba Networks Mobility Controller

RSA NetWitness Logs. Apache HTTP Server. Event Source Log Configuration Guide. Last Modified: Friday, November 3, 2017

RSA NetWitness Logs. Tenable Nessus. Event Source Log Configuration Guide. Last Modified: Wednesday, August 09, 2017

RSA NetWitness Logs. McAfee Web Gateway. Event Source Log Configuration Guide. Last Modified: Wednesday, October 11, 2017

RSA NetWitness Logs. Symantec DLP Last Modified: Thursday, April 12, Event Source Log Configuration Guide

RSA NetWitness Logs. F5 Big-IP Advanced Firewall Manager. Event Source Log Configuration Guide. Last Modified: Friday, May 12, 2017

RSA NetWitness Logs. Trend Micro OfficeScan and Control Manager. Event Source Log Configuration Guide. Last Modified: Thursday, November 30, 2017

RSA NetWitness Logs. Apache Tomcat Server. Event Source Log Configuration Guide. Last Modified: Friday, November 3, 2017

RSA NetWitness Logs. GlobalSCAPE Enhanced File Transfer (EFT) Server. Event Source Log Configuration Guide. Last Modified: Thursday, May 25, 2017

RSA NetWitness Logs SQUID. Event Source Log Configuration Guide. Last Modified: Thursday, October 12, 2017

RSA NetWitness Logs. F5 Big-IP Local Traffic Manager. Event Source Log Configuration Guide. Last Modified: Friday, May 12, 2017

Configure WSA to Upload Log Files to CTA System

RSA NetWitness Platform

RSA NetWitness Logs. Oracle Audit Vault and Database Firewall. Event Source Log Configuration Guide

RSA NetWitness Logs. Radiator Radius Server. Event Source Log Configuration Guide. Last Modified: Thursday, November 2, 2017

RSA NetWitness Platform

RSA NetWitness Logs. Linux. Event Source Log Configuration Guide. Last Modified: Thursday, October 12, 2017

Configure WSA to Upload Log Files to CTA System

RSA NetWitness Logs. VMware NSX. Event Source Log Configuration Guide. Last Modified: Thursday, November 30, 2017

RSA NetWitness Logs. McAfee Data Loss Prevention Endpoint. Event Source Log Configuration Guide. Last Modified: Thursday, May 25, 2017

RSA NetWitness Logs. VMware ESX/ESXi. Event Source Log Configuration Guide. Last Modified: Tuesday, November 7, 2017

RSA NetWitness Logs. McAfee Endpoint Encryption. Event Source Log Configuration Guide. Last Modified: Friday, June 02, 2017

RSA NetWitness Logs. Citrix XenApp. Event Source Log Configuration Guide

RSA NetWitness Logs. IBM AIX Last Modified: Thursday, November 2, Event Source Log Configuration Guide

RSA NetWitness Logs. EMC Ionix Unified Infrastructure Manager. Event Source Log Configuration Guide

RSA NetWitness Logs. Microsoft Windows. Event Source Log Configuration Guide. Last Modified: Thursday, October 5, 2017

RSA NetWitness Logs. VMware vcenter Server. Event Source Log Configuration Guide. Last Modified: Thursday, November 30, 2017

Cisco Stealthwatch. Proxy Log Configuration Guide 7.0

RSA NetWitness Logs. Microsoft Network Access Protection. Event Source Log Configuration Guide. Last Modified: Thursday, May 18, 2017

RSA NetWitness Logs. Oracle iplanet Web Server. Event Source Log Configuration Guide. Last Modified: Tuesday, May 09, 2017

RSA NetWitness Logs. Citrix XenMobile EMM Suite Last Modified: Wednesday, January 25, Event Source Log Configuration Guide

RSA NetWitness Logs. Microsoft Network Policy Server. Event Source Log Configuration Guide. Last Modified: Thursday, June 08, 2017

RSA NetWitness Logs IBM DB2. Event Source Log Configuration Guide. Last Modified: Friday, November 17, 2017

RSA NetWitness Logs. ManageEngine NetFlow Analyzer. Event Source Log Configuration Guide. Last Modified: Monday, March 06, 2017

RSA NetWitness Logs. MySQL Enterprise. Event Source Log Configuration Guide. Last Modified: Wednesday, November 15, 2017

Proxy Log Configuration

RSA NetWitness Logs. IBM Domino. Event Source Log Configuration Guide. Last Modified: Thursday, October 19, 2017

RSA NetWitness Logs. Microsoft Forefront Endpoint Protection. Event Source Log Configuration Guide. Last Modified: Monday, November 13, 2017

RSA NetWitness Logs. Microsoft System Center Configuration Manager. Event Source Log Configuration Guide. Last Modified: Thursday, June 08, 2017

RSA NetWitness Logs. Microsoft SharePoint Server. Event Source Log Configuration Guide. Last Modified: Friday, June 02, 2017

RSA NetWitness Logs. IBM ISS SiteProtector. Event Source Log Configuration Guide. Last Modified: Monday, May 22, 2017

RSA NetWitness Logs. Symantec Critical Systems Protection. Event Source Log Configuration Guide

RSA NetWitness Logs. IBM Tivoli Identity Manager. Event Source Log Configuration Guide. Last Modified: Monday, March 06, 2017

RSA NetWitness Platform

Proxy Log Configuration

RSA NetWitness Logs. Microsoft Exchange Server. Event Source Log Configuration Guide. Last Modified: Thursday, November 2, 2017

RSA NetWitness Platform

RSA NetWitness Logs. Event Source Log Configuration Guide

RSA NetWitness Logs. Sybase Adaptive Server Enterprise. Event Source Log Configuration Guide. Last Modified: Wednesday, November 29, 2017

RSA NetWitness Logs. Sophos Enterprise Console Last Modified: Friday, July 21, Event Source Log Configuration Guide

RSA NetWitness Logs. McAfee Network Security Platform. Event Source Log Configuration Guide. Last Modified: Thursday, March 8, 2018

RSA NetWitness Platform

RSA NetWitness Logs. Microsoft Azure NSG (Flow Logs) Event Source Log Configuration Guide. Last Modified: Monday, February 26, 2018

RSA SIEM Partner Guide. Revision: H2CY10

RSA NetWitness Logs. Salesforce. Event Source Log Configuration Guide. Last Modified: Wednesday, February 14, 2018

Trademarks. License Agreement. Third-Party Licenses. Note on Encryption Technologies. Distribution

Integrate Cisco IronPort Security Appliance (ESA)

RSA NetWitness Logs. IBM iseries Last Modified: Monday, May 22, Event Source Log Configuration Guide

<Partner Name> <Partner Product> NETWITNESS Logs Implementation Guide. Imperva Counter Breach 11.5

ForeScout CounterACT. Configuration Guide. Version 4.1

akkadian Provisioning Manager Express

Intrusion Detection and Prevention IDP 4.1r4 Release Notes

ForeScout CounterACT. Configuration Guide. Version 1.2

Forescout. Configuration Guide. Version 4.2

How to Configure ASA 5500-X Series Firewall to send logs to EventTracker. EventTracker

Monitor System Activity Through Logs

Forescout. Configuration Guide. Version 3.5

Deploying the Cisco Tetration Analytics Virtual Appliance in Microsoft Azure

Micro Focus Security ArcSight Connectors. SmartConnector for Microsoft IIS Multiple Site File. Configuration Guide

JIRA Integration Guide

<Partner Name> RSA NETWITNESS Security Operations Implementation Guide. Swimlane 2.x. <Partner Product>

Aspera Connect Windows XP, 2003, Vista, 2008, 7. Document Version: 1

Microsoft Dynamics CRM Integration with Bomgar Remote Support

Transcription:

RSA NetWitness Logs Event Source Log Configuration Guide Cisco IronPort Web Security Appliance (WSA) Last Modified: Tuesday, January 9, 2018 Event Source Product Information: Vendor: Cisco Event Source: Web Security Appliance (WSA) Versions: 5.7.0, 6.3, 7.x, 8.x, 9.x Additional Download: ciscoiportwsa_custom_fields.txt RSA Product Information: Supported On: NetWitness Suite 10.0 and later Event Source Log Parser: ciscoiportwsa Collection Method: File, Syslog (7.5.x and higher) Event Source Class.Subclass: Host.Web Logs

Configure Cisco IronPort WSA To configure Cisco IronPort WSA, you must complete one of the following tasks: Configure File Collection for Cisco IronPort WSA, or Configure Syslog for Cisco IronPort WSA RSA supports log collection through File collection or syslog for Cisco IronPort WSA. Syslog is only supported on version 7.5.x and higher for this event source. Note: RSA recommends that you only use File collection for Cisco IronPort WSA. Syslog messages greater than 1024 bytes are truncated, and thus the Log Decoder cannot parse them. Configure File Collection for Cisco IronPort WSA To configure File for Cisco IronPort WSA, you must complete the following tasks: I. Configure NetWitness Suite for File Collection Optional (for Cisco IronPort WSA version 9.x): Configure NetWitness Suite for SCP Configure the Log Collector for File collection II. Configure Logs on Cisco IronPort WSA Configure Cisco IronPort WSA 2

Configure RSA NetWitness Log Collector for SCP Protocol On 10.6.x Log Collectors, the SELinux environment prevents the SCP protocol from working with the default configuration. The following steps allow the SCP protocol to function. Log Collector versions 10.6.2 and Later The Log Collector configures SELinux to run Enforcing mode. This is required for the plugin collection protocol. If you have AWS Cloudtrail or Microsoft Azure event sources on a Log Collector, SELinux must remain in Enforcing mode. The recommendation is to use a separate VLC for the File collection event sources using SCP. On this VLC, disable SELinux as mentioned below for Log Collector 10.6.0 and Later. This step MUST be performed whenever the Log Collector RPM is updated on this VLC. Log Collector versions 10.6.0 and Later By default, SELinux runs in Permissive mode. Disabling SELinux resolves the problem. To configure RSA version 10.6.0 and Later Log Collectors: 1. Log into the Log Collector appliance. 2. Edit the /etc/selinux/config file. Change the line from SELINUX=permissive or SELINUX=enforcing to SELINUX=disabled 3. Save the file. 4. Reboot the system. 5. Confirm that SELinux is disabled by running the command sestatus. The command should return the following text: SELinux status: disabled Configure the Log Collector for File Collection Perform the following steps to configure the Log Collector for File collection. 3 Configure RSA NetWitness Log Collector for SCP Protocol

To configure the Log Collector for file collection: 1. In the NetWitness menu, select Administration > Services. 2. In the Services grid, select a Log Collector, and from the Actions menu, choose View > Config > Event Sources. 3. Select File/Config from the drop-down menu. The Event Categories panel displays the File event sources that are configured, if any. 4. In the Event Categories panel toolbar, click +. The Available Event Source Types dialog is displayed. 5. Select the correct type from the list, and click OK. Select cisco_ironport_wsa from the Available Event Source Types dialog. 6. Select the new type in the Event Categories panel and click + in the Sources panel toolbar. The Add Source dialog is displayed. Configure the Log Collector for File Collection 4

7. Add a File Directory name, modify any other parameters that require changes, and click OK. Remember the value you enter in the File Directory field. You will need to enter the same value later for the Directory value when you configure the Cisco IronPort WSA event source. For example, if you enter ciscowsa for File Directory in this dialog box, make sure to set your Directory parameter to /home/upload/eventsources/cisco_ironport_wsa/ciscowsa. Note: The file directory gets created in the following location on the Log Collector, "/var/netwitness/logcollector/upload/cisco_ironport_wsa/ciscowsa". Make sure that the user upload has persmissions to write data to the directory. 8. To add the SSH key, click Advanced to display the advanced settings, and then copy your SSH key into the Eventsource SSH Key field. Note: You need to perform the steps in Configure Logs on Cisco IronPort WSA, generate the SSH key there, and then return to this step to enter the SSH key. 9. Stop and Restart File Collection. After you add a new event source that uses file collection, you must stop and restart the RSA NetWitness Suite File Collection service. This is necessary to add the key to the new event source. 5 Configure the Log Collector for File Collection

Configure Logs on Cisco IronPort WSA Note: All logs are optional, however, the RSA NetWitness Suite parses only the logs that are configured as follows. Logs can be accessed in either Apache or Squid format. To configure Cisco IronPort WSA: 1. Log on to the IronPort web interface. 2. Select System Administration > Log Subscriptions. 3. To configure Access Logs in Apache format, complete these tasks: a. Click Add Log Subscription. b. For Log Type, select Access Logs and use the following settings. Setting Rollover by Time Rollover every Log Style Custom Fields Custom Time Interval 5m Apache For IronPort WSA 5.7.0 and 6.3: %k %p %u %XF For IronPort WSA 7.x and higher: Copy the Apache custom field string from the ciscoiportwsa_custom_fields.txt additional file. You can download the Cisco IronPort WSA additional file from RSA Link here: https://community.rsa.com/docs/doc-45501 Note: Ensure the string is in key= %string key= %string format when you paste the string in the Custom Fields. Any difference in this format can lead to unknown messages. Retrieval Method Max Time Interval SCP on Remote Server This field is optional. Recommended value is 180 Note: For sites that generate a lot of traffic, try lowering this value to 60 seconds to reduce the number of Events Per Second (EPS) generated. Configure Logs on Cisco IronPort WSA 6

Setting Protocol SCP Host SSH2 IP address of the RSA NetWitness Suite Log Collector. SCP Port 22 Directory Username /home/upload/eventsources/cisco_ironport_wsa/userfolder, where userfolder is the name you specify. Note that userfolder must match the File Directory name that you specified when you configured the Log Collector for file collection earlier. upload c. Click Submit. d. Copy the generated SSH Key into RSA NetWitness Suite. See the details in Step 8 of the Configure the Log Collector for File Collection section. Note: The entire key must be on a single line. Also, remove any spaces from the key. IronPort creates the same SSH Key for all log subscriptions. The key only needs to be saved once. e. Commit your changes. 4. To configure Access Logs in Squid format, complete these tasks: Note: Access Logs in Squid format only works with Cisco IronPort WSA 7.x and higher. a. Click Add Log Subscription. b. For Log Type, select Access Logs and use the following settings. Setting Rollover by Time Rollover every Log Style Custom Time Interval 5m Squid 7 Configure Logs on Cisco IronPort WSA

Setting Custom Fields Retrieval Method Max Time Interval Protocol SCP Host Copy the Apache custom field string from the ciscoiportwsa_custom_fields.txt additional file. You can download the Cisco IronPort WSA additional file from RSA Link here: https://community.rsa.com/docs/doc-45501 SCP on Remote Server This field is optional. Recommended value is 180 Note: For sites that generate a lot of traffic, try lowering this value to 60 seconds to reduce the number of Events Per Second (EPS) generated. SSH2 IP address of the RSA NetWitness Suite Log Collector. SCP Port 22 Directory Username /home/upload/eventsources/cisco_ironport_wsa/userfolder, where userfolder is the name you specify. Note that userfolder must match the File Directory name that you specified when you configured the Log Collector for file collection earlier. upload c. Click Submit. d. Copy the generated SSH Key into RSA NetWitness Suite. See the details in Step 8 of the Configure the Log Collector for File Collection section. Note: The entire key must be on a single line. Also, remove any spaces from the key. IronPort creates the same SSH Key for all log subscriptions. The key only needs to be saved once. e. Commit your changes. 5. To configure W3C Logs, complete these tasks: Note: W3C Logs are not supported for IronPort WSA 7.x or higher. Configure Logs on Cisco IronPort WSA 8

a. Select W3C Logs and use the following settings: Setting Selected Log Fields Retrieval Method Max Time Interval Protocol SCP Host Note: The Selected Log Fields must be in this exact order. timestamp x- elapsed-time c-ip s-ip s-port x-resultcode-httpstatus sc-bytes cs-method cs-url cs-username x-hierarchy-origin cs-mime-type x-acltag x-result-code cs(user Agent) x-webcat-code-full sc-httpstatus cs(referer) cs(cookie) s-computername s-hostname sc-result-code cs-version cs-auth-group SCP on Remote Server 180 SSH2 IP address of the RSA NetWitness Suite Log Collector. SCP Port 22 Directory /home/upload/eventsources/cisco_ironport_wsa/userfolder, where userfolder is the name you specify. Note that userfolder must 9 Configure Logs on Cisco IronPort WSA

Setting match the File Directory name that you specified when you configured the Log Collector for file collection earlier. Username upload b. Click Submit. The generated SSH Key will be identical to the one initially generated. Note: IronPort creates the same SSH Key for all log subscriptions. The key only needs to be saved the first time. 6. To configure CLI Audit Logs, complete these tasks: a. Select CLI Audit Logs and use the following settings: Setting Retrieval Method Max Time Interval Protocol SCP Host SCP on Remote Server 180 SSH2 IP address of the RSA NetWitness Suite Log Collector. SCP Port 22 Directory Username /home/upload/eventsources/cisco_ironport_wsa/userfolder, where userfolder is the name you specify. Note that userfolder must match the File Directory name that you specified when you configured the Log Collector for file collection earlier. upload b. Click Submit. The generated SSH Key will be identical to the one initially generated. Note: IronPort creates the same SSH Key for all log subscriptions. The key only needs to be saved the first time. 7. To configure IDS Data Loss Logs, complete these tasks: Configure Logs on Cisco IronPort WSA 10

a. Select IDS Data Loss Logs and use the following settings: Setting Retrieval Method Max Time Interval Protocol SCP Host SCP on Remote Server 180 SSH2 IP address of the RSA NetWitness Suite Log Collector. SCP Port 22 Directory Username /home/upload/eventsources/cisco_ironport_wsa/userfolder, where userfolder is the name you specify. Note that userfolder must match the File Directory name that you specify when you configure the Log Collector for file collection later. upload b. Click Submit. The generated SSH Key will be identical to the one initially generated. Note: IronPort creates the same SSH Key for all log subscriptions. The key only needs to be saved the first time. 8. Click Commit Changes. 9. Click Commit Changes. 11 Configure Logs on Cisco IronPort WSA

Configure Syslog Collection for Cisco IronPort WSA Note: RSA recommends that you only use File collection for Cisco IronPort WSA. Syslog messages greater than 1024 bytes are truncated, and thus the Log Decoder cannot parse them. To configure File for Cisco IronPort WSA, you must complete the following tasks: I. Configure Logs on Cisco IronPort WSA II. Configure Syslog on RSA NetWitness Suite Configure Logs on Cisco IronPort WSA 1. Log on to Cisco IronPort WSA with administrator credentials. 2. Select System Administration > Log Subscriptions. 3. To configure Access Logs in Apache format, complete these tasks: a. Click Add Log Subscription. b. For Log Type, select Access Logs and use the following settings. Rollover by Time = Custom Time Interval Rollover every = 5m Log Style = Apache Custom Fields = Copy the Apache custom field string from the ciscoiportwsa_custom_ fields.txt additional file. You can download the Cisco IronPort WSA additional file from RSA Link, in the Event Source Additional Downloads space here: https://community.rsa.com/docs/doc-45501. Note: Ensure the string is in key= %string key= %string format when you paste the string in the Custom Fields. Any difference in this format can lead to unknown messages. Retrieval Method = Syslog Push Complete the following fields: Configure Syslog Collection for Cisco IronPort WSA 12

Field Hostname Protocol Facility Enter the IP address of your RSA NetWitness Suite Log Decoder or Remote Log Collector UDP local0 c. Click Submit. d. Commit changes. 4. To configure Access Logs in Squid format, complete these tasks: a. Click Add Log Subscription. b. For Log Type, select Access Logs and use the following settings. Rollover by Time = Custom Time Interval Rollover every = 5m Log Style = Squid Custom Fields = Copy the Squid custom field string from the ciscoiportwsa_custom_fields.txt additional file. You can download the Cisco IronPort WSA additional file from RSA SecurCare Online. Retrieval Method = Syslog Push Complete the following fields: Field Hostname Protocol Facility Enter the IP address of your RSA NetWitness Suite Log Decoder or RSA NetWitness SuiteRemote Log Collector UDP local0 c. Click Submit. d. Commit changes. 13 Configure Logs on Cisco IronPort WSA

Configure RSA NetWitness Suite for Syslog Perform the following steps in RSA NetWitness Suite: Ensure the required parser is enabled Configure Syslog Collection Ensure the Required Parser is Enabled If you do not see your parser in the list while performing this procedure, you need to download it in RSA NetWitness Suite Live. Ensure that the parser for your event source is enabled: 1. In the NetWitness menu, select Administration > Services. 2. In the Services grid, select a Log Decoder, and from the Actions menu, choose View > Config. 3. In the Service Parsers Configuration panel, search for your event source, and ensure that the Config field for your event source is selected. Note: The required parser is ciscoiportwsa. Configure RSA NetWitness Suite for Syslog Collection Note: You only need to configure Syslog collection the first time that you set up an event source that uses Syslog to send its output to NetWitness. You should configure either the Log Decoder or the Remote Log Collector for Syslog. You do not need to configure both. To configure the Log Decoder for Syslog collection: 1. In the NetWitness menu, select Administration > Services. 2. In the Services grid, select a Log Decoder, and from the Actions menu, choose View > System. 3. Depending on the icon you see, do one of the following: Configure RSA NetWitness Suite for Syslog 14

If you see, click the icon to start capturing Syslog. If you see, you do not need to do anything; this Log Decoder is already capturing Syslog. To configure the Remote Log Collector for Syslog collection: 1. In the NetWitness menu, select Administration > Services. 2. In the Services grid, select a Remote Log Collector, and from the Actions menu, choose View > Config > Event Sources. 3. Select Syslog/Config from the drop-down menu. The Event Categories panel displays the Syslog event sources that are configured, if any. 4. In the Event Categories panel toolbar, click +. The Available Event Source Types dialog is displayed. 5. Select either syslog-tcp or syslog-udp. You can set up either or both, depending on the needs of your organization. 6. Select the new type in the Event Categories panel and click + in the Sources panel toolbar. The Add Source dialog is displayed. 7. Enter 514 for the port, and select Enabled. Optionally, configure any of the Advanced parameters as necessary. Click OK to accept your changes and close the dialog box. Once you configure one or both syslog types, the Log Decoder or Remote Log Collector collects those types of messages from all available event sources. So, you can continue to add Syslog event sources to your system without needing to do any further configuration in NetWitness. 15 Configure RSA NetWitness Suite for Syslog Collection

Copyright 2017 EMC Corporation. All Rights Reserved. Trademarks RSA, the RSA Logo and EMC are either registered trademarks or trademarks of EMC Corporation in the United States and/or other countries. All other trademarks used herein are the property of their respective owners. Configure RSA NetWitness Suite for Syslog Collection 16