Collecting Logs With An Agent - Juniper SECURITY THREAT RESPONSE MANAGER 2008.2 - ADAPTIVE LOG EXPORTER REV1 Manual

Strm adaptive log exporter
Table of Contents

Advertisement

Step 6
Step 7
Collecting Logs
With an Agent
In the Windows Event Log Configuration area, enter values for the parameters:
Application Log — Select the check box if you wish the device to monitor the
application log.
Security Log — Select the check box if you wish the device to monitor the
security log.
System Log — Select the check box if you wish the device to monitor the
system log.
In the Windows Event Log Remote System Configuration, enter values for the
parameters:
Remote Machine— Select the check box for the device to retrieve the logs
from a remote machine. Enter the desired Universal Naming Convention (UNC)
name. The entered string can be up to 255 characters in length. For example,
\\tango123.
Poll Interval — Specify the remote poll interval enter a value, in milliseconds.
The default is 5000 milliseconds.
To collect logs with an agent, you must install the Adaptive Log Exporter on each
monitored host in your network. The Adaptive Log Exporter then reports, using
syslog, to your STRM system. The agent reads the individual Windows event logs
and passes information to STRM using syslog.
Note: For more information on the Adaptive Log Exporter, see the STRM Adaptive
Log Exporter Users Guide.
STRM Adaptive Log Exporter

Collecting Logs With an Agent

67

Advertisement

Table of Contents
loading

This manual is also suitable for:

Security threat response manager

Table of Contents