Backlinks to Assets in Sheriff Web (Search all webs)

Results from Sheriff web retrieved at 04:52 (GMT)

AboutSheriffCSM
UpPrevious Next Sheriff CSM™ About Sheriff CSM %TWISTY{ showlink="table of Contents" hidelink="Table of Contents" start="show" showimgleft="" hideimgleft=""...
AboutSheriffCSMNetworkSecurityCapabilities
UpPrevious Next Sheriff CSM™ About Sheriff CSM Network Security Capabilities Sheriff CSM is designed primarily to help mid size organizations effectively defend t...
AboutSheriffCSMSystemArchitectureAndComponents
UpPrevious Next Sheriff CSM™ About Sheriff CSM System Architecture and Components As a unified security platform, Sheriff CSM combines several critical security ...
AddingAssets
UpPrevious Next Sheriff CSM™ Adding Assets Sheriff CSM provides different ways to add your assets: Note: The Sheriff CSM system inserts new assets automatically ...
AlarmDetailsColumnsAndFields
UpPrevious Next Sheriff CSM™ Alarm Details — Columns and Fields Alarm Details field descriptions Column/Field Name Description Status Whether or not t...
AssetAdministration
UpPrevious Next Sheriff CSM™ Asset Administration Managing assets occurs in Sheriff CSM in the Asset List View. This section covers the following subtopics: *...
AssetGroup
Asset Group Asset groups are administratively created objects that group similar assets for specific purposes.
AssetGroupListView
UpPrevious Next Sheriff CSM™ Asset Group List View An asset group is an administratively created object that pools similar assets used for specific purposes. Sher...
AssetListView
UpPrevious Next Sheriff CSM™ Asset List View The Asset List view, Environment Assets Groups Assets, provides a centralized view of your assets. For fiel...
AssetManagement
UpPrevious Next Sheriff CSM™ Asset Management %TWISTY{ showlink="Table of Contents" hidelink="Table of Contents" start="show" showimgleft="" hideimgleft="" ...
AssetValue
Asset Value Specifies an asset's importance or critically relative to other managed assets.
AssetsAndGroups
UpPrevious Next Sheriff CSM™ Assets and Groups It is important for security practitioners to know what assets are connected on the company network and how the de...
CIDR
CIDR Classless Inter Domain Routing, which provides a method for allocating IP addresses, routing Internet protocol packets, and subdividing networks. CIDR notifi...
CaptureAndExaminePackets
UpPrevious Next Sheriff CSM™ Capture and Examine Packets Sheriff CSM integrated packet capture functionality allows you to capture traffic on your network for off...
ConfigureNetworkInterfaces
UpPrevious Next Sheriff CSM™ Configure Network Interfaces Sheriff CSM All in One comes with six network interfaces, numbered eth0 to eth5. Sheriff CSM uses these ...
ConfigurePlugins
UpPrevious Next Sheriff CSM™ Configure Plugins Most of the plugins in Sheriff CSM do not require additional configuration after they are enabled, especially if y...
ConfigureSDEEPlugins
UpPrevious Next Sheriff CSM™ Configure SDEE Plugins Cisco Systems IPS Sensor 5.0 uses the Security Device Event Exchange (SDEE) protocol to specify the format of...
ConfigureSheriffCSMToUseADNS
UpPrevious Next Sheriff CSM™ Configure Sheriff CSM to Use a DNS Use of a Domain Name Service (DNS) helps Sheriff CSM to resolve host names against IP addresses. ...
ConfigureWMIPlugins
UpPrevious Next Sheriff CSM™ Configure WMI Plugins Windows Management Instrumentation (WMI) plugins collect Microsoft Windows events and data remotely. These plu...
ConfiguringAvailabilityMonitoring
UpPrevious Next Sheriff CSM™ Configure Availability Monitoring Availability monitoring in Sheriff CSM runs from the server, and can be used to monitor availabili...
ConfiguringNetworkInterfaces
UpPrevious Next Sheriff CSM™ Configuring Network Interfaces Applies to Product: Sheriff CSM™ Sheriff Vigilante® A Sheriff CSM All in One comes with six n...
ConfiguringNetworkInterfacesGSW
UpPrevious Next Sheriff CSM™ Configuring Network Interfaces A Sheriff CSM All in One comes with six network interfaces, numbered eth0 to eth5. Sheriff CSM uses t...
CorrelationRules
UpPrevious Next Sheriff CSM™ Correlation Rules A correlation rule defines a condition to match incoming events. Refer to How Does Correlation Work? for details. T...
CreateNewAccountsForLDAPUsers
UpPrevious Next Sheriff CSM™ Create New Accounts for LDAP Users Use this procedure to create new user accounts for LDAP users. For local users, see Create New Acc...
CreateNewAccountsForLocalUsers
UpPrevious Next Sheriff CSM™ Create New Accounts for Local Users Use this procedure to create new user accounts for local Sheriff CSM users. For LDAP users, see C...
CreateNewPluginsUsingThePluginBuilder
UpPrevious Next Sheriff CSM™ Create New Plugins Using the Plugin Builder In addition to the other methods described for customizing or creating new Sheriff CSM p...
CreatePolicyConditions
UpPrevious Next Sheriff CSM™ Create Policy Conditions This topic explains how to configure policy conditions for external event policies, using the Default Policy...
CreatingANetwork
UpPrevious Next Sheriff CSM™ Creating a Network In Sheriff CSM, you can create a network either manually or by importing a CSV file. Creating a Network by Import...
CreatingAnAssetGroup
UpPrevious Next Sheriff CSM™ Creating an Asset Group In Sheriff CSM, you can create an asset group in the following ways: * From the Asset List View, select a...
CreatingVulnerabilityScanJobs
UpPrevious Next Sheriff CSM™ Creating Vulnerability Scan Jobs By default, Sheriff CSM runs vulnerability scan jobs without any authentication. They are less thor...
DeletingTheAssets
UpPrevious Next Sheriff CSM™ Deleting the Assets To delete asset(s) 1 Go to Environment Assets Groups Assets. 1 Select the asset(s) you want to delet...
DeployingHIDSAgents
UpPrevious Next Sheriff CSM™ Deploying HIDS Agents In this section, you will learn about deploying HIDS agents from the asset list view: * Deploying HIDS Agen...
DeployingHIDSToServers
UpPrevious Next Sheriff CSM™ Deploying HIDS to Servers We recommend deploying a host based intrusion detection system (HIDS) to enable * File integrity monito...
DiscoveringAssetsInYourNetwork
UpPrevious Next Sheriff CSM™ Discovering Assets in Your Network Understanding what is in your environment is a critical step towards identifying threats and vuln...
DuplicateAUserAccount
UpPrevious Next Sheriff CSM™ Duplicate a User Account Duplicating an existing user account can save time when you want to create a new user and the new user shoul...
EditingTheAssets
UpPrevious Next Sheriff CSM™ Editing the Assets You can edit your assets once they are in Sheriff CSM. For example, you can add a description or a location for y...
EnablePlugins
UpPrevious Next Sheriff CSM™ Enable Plugins Sheriff provides more than one way to enable plugins in Sheriff CSM. First, you can enable plugins on specific discov...
EnablePluginsFromTheDeputyConfiguration
UpPrevious Next Sheriff CSM™ Enable Plugins from the Sensor (Deputy) Configuration You can enable up to 100 plugins on a Sheriff CSM Sensor from the Sheriff CSM w...
EnablePluginsOnAssets
UpPrevious Next Sheriff CSM™ Enable Plugins on Assets After you run a scan of your network to discover assets, the discovered assets are saved in the Sheriff CSM ...
EntitiesAndAssetsStructureTreeFields
UpPrevious Next Sheriff CSM™ Entities and Assets Structure Tree Fields Use the Entities and Assets Structure tree to create, modify, and delete correlation contex...
EnvironmentStatusColorsAndMeaningsForAssetGroups
Environment Status Colors and Meanings for Asset Groups Environment StatusColorMeaning HIDS Green All the assets in this group have HIDS agents deployed and ...
EventCollectionProcessingAndCorrelationWorkflow
UpPrevious Next Sheriff CSM™ Event Collection, Processing, and Correlation Workflow All Sheriff CSM's security monitoring and management capabilities stem from i...
EventCorrelation
UpPrevious Next Sheriff CSM™ Event Correlation %TWISTY{ showlink="Table of Contents" hidelink="Table of Contents" start="show" showimgleft="" hideimgleft="" ...
EventManagement
UpPrevious Next Sheriff CSM™ Event Management %TWISTY{ showlink="Table of Contents" hidelink="Table of Contents" start="show" showimgleft="" hideimgleft="" ...
ExcludingAssetsInAnAssetScan
UpPrevious Next Excluding Assets in an Asset Scan Occasionally you may want to exclude certain assets such as a printer or a switch when scanning a network. In S...
ExportingTheAssets
UpPrevious Next Sheriff CSM™ Exporting the Assets To export assets 1 Go to Environment Assets Groups Assets. 1 Select the asset(s) you want to export...
FQDN
FQDN Fully qualified domain name. Sometimes, also referred to as an absolute domain name.
FieldDescriptions
Field Descriptions for Asset Scan Results Column/Field NameDescription Check box to select hosts. Host The IP address that identifies the host. Hostname...
FilteringAlarmsInListView
UpPrevious Next Sheriff CSM™ Filtering Alarms in List View Both a high level overview and a detailed look at individual alarm types, the List View lets you filte...
FirewallPermissions
UpPrevious Next Sheriff CSM™ Firewall Permissions Sheriff CSM components must use particular URLs, protocols, and ports to function correctly. Note: If deploying ...
GTAFirewall
UpPrevious Next Sheriff CSM™ GTA Firewall When you configure GTA Firewall to send log data to Sheriff CSM, you can use the GTA Firewall plugin to translate raw l...
GettingStartedWizard
UpPrevious Next Sheriff CSM™ Getting Started Wizard %TWISTY{ showlink="Table of Contents" hidelink="Table of Contents" start="show" showimgleft="" hideimgle...
HighAvailabilityConfiguration
UpPrevious Next Sheriff CSM™ High Availability Configuration %TWISTY{ showlink="Table of Contents" hidelink="Table of Contents" start="show" showimgleft="" h...
HowToRunReports
UpPrevious Next Sheriff CSM™ How to Run Reports You can find all the Sheriff CSM reports on Reports All Reports. All Reports ' width='665' / For field descri...
ImportingScanResults
UpPrevious Next Sheriff CSM™ Importing Scan Results This option allows you to import results from external scanners to create reports or perform cross correlatio...
IntroductionToSheriffCSM
UpPrevious Next Sheriff CSM™ Introduction to Sheriff CSM This guide provides information for users of the Sheriff CSM system, that are responsible for monitoring...
KasperskySecurityCenterDatabase
UpPrevious Next Sheriff CSM™ Kaspersky Security Center DataBase When you configure Kaspersky Security Center to send log data to Sheriff CSM, you can use the Kas...
LabelingTheAssets
UpPrevious Next Sheriff CSM™ Labeling the Assets You can use labels to further classify your assets and later use them when Searching for Assets. To label your as...
LimitUserVisibilityWithEntities
UpPrevious Next Sheriff CSM™ Limit User Visibility with Entities %TWISTY{ showlink="Table of Contents" hidelink="Table of Contents" start="show" showimgleft="...
ListOfSheriffCSMReports
UpPrevious Next Sheriff CSM™ List of Sheriff CSM Reports Sheriff updates the Sheriff CSM reports on an on going basis. The following table lists the reports in a...
ManagingNetworkGroups
UpPrevious Next Sheriff CSM™ Managing Network Groups You manage network groups from the Network Group List view. Creating Network Groups To create a network grou...
ManagingTheSheriffCSMEnvironment
UpPrevious Next Sheriff CSM™ Managing the Sheriff CSM Environment In addition to monitoring and analyzing events and alarms, there are other aspects of security ...
MeaningOfTheSymbolsWhenLabelingAssets
Meaning of the Symbols when Labeling Assets Meaning of the symbols when labeling assets Symbol Meaning Some of the selected assets currently use this ...
MicrosoftDHCPServerThroughNXLog
UpPrevious Next Sheriff CSM™ Microsoft DHCP Server through NXLog When you configure Microsoft DHCP Server to send log data to Sheriff CSM, you can use the DHCP C...
MicrosoftDNSServerThroughNXLog
UpPrevious Next Sheriff CSM™ Microsoft DNS Server through NXLog When you configure Microsoft DNS Server to send log data to Sheriff CSM, you can use the Microsof...
MicrosoftExchangeServerThroughNXLog
UpPrevious Next Sheriff CSM™ Microsoft Exchange Server through NXLog When you configure Microsoft Exchange Server to send log data to Sheriff CSM, you can use th...
MicrosoftIISFTPServerThroughNXLog
UpPrevious Next Sheriff CSM™ Microsoft IIS FTP Server through NXLog The Microsoft Internet Information Services (IIS) Management Pack includes a FTP Server that ...
MicrosoftIISSMTPServerThroughNXLog
UpPrevious Next Sheriff CSM™ Microsoft IIS SMTP Server through NXLog When you configure Microsoft IIS SMTP Server to send log data to Sheriff CSM, you can use th...
MicrosoftIISThroughNXLog
UpPrevious Next Sheriff CSM™ Microsoft IIS through NXLog When you configure Microsoft Internet Information Services (IIS) to send log data to Sheriff CSM, you ca...
MicrosoftNPSThroughNXLog
UpPrevious Next Sheriff CSM™ Microsoft NPS through NXLog When you configure Microsoft Network Policy Server (NPS) to send log data to Sheriff CSM, you can use th...
MicrosoftSCOMThroughNXLog
UpPrevious Next Sheriff CSM™ Microsoft SCOM through NXLog When you configure Microsoft System Center Operations Manager (SCOM) to send log data to Sheriff CSM, y...
MicrosoftSQLServerThroughNXLog
UpPrevious Next Sheriff CSM™ Microsoft SQL Server through NXLog When you configure Microsoft SQL Server to send log data to Sheriff CSM, you can use the MSSQL Se...
MicrosoftSysmonThroughNXLog
UpPrevious Next Sheriff CSM™ Microsoft Sysmon through NXLog When you configure Microsoft System Monitor (Sysmon) to send log data to Sheriff CSM, you can use the...
MicrosoftWindowsEventLogsThroughNXLog
UpPrevious Next Sheriff CSM™ Microsoft Windows Event Logs through NXLog When you configure NXLog to send log data to Sheriff CSM, you can use the Nxlog plugin to...
MicrosoftWindowsFirewallThroughNXLog
UpPrevious Next Sheriff CSM™ Microsoft Windows Firewall through NXLog When you configure Microsoft Windows Firewall to send log data to Sheriff CSM, you can use ...
ModifyingACustomScanProfile
UpPrevious Next Sheriff CSM™ Modifying a Custom Scan Profile To modify a custom profile for vulnerability scans 1 Go to Environment Vulnerabilities Overvi...
NetFlowEventControls
UpPrevious Next Sheriff CSM™ NetFlow Event Controls You are able to configure Sheriff CSM All In One to create events when anomalous bandwidth usage is detected i...
NetworkFieldDescriptions
Network Field Descriptions Network field descriptions Column/Field NameRequired or OptionalDescription Name Required Name of the network. CIDR Required CID...
NetworkGroupListView
UpPrevious Next Sheriff CSM™ Network Group List View From the Network Group List view (Environment Assets Groups Network Groups), you can create and manage...
NetworkListView
UpPrevious Next Sheriff CSM™ Network List View Sheriff CSM provides a centralized view for managing your networks. It has a similar look and feel to the Asset Li...
NetwrixAuditorThroughNXLog
UpPrevious Next Sheriff CSM™ Netwrix Auditor through NXLog When you configure Netwrix Auditor to send log data to Sheriff CSM, you can use the Netwrix Auditor pl...
ObserveITThroughNXLog
UpPrevious Next Sheriff CSM™ ObserveIT through NXLog When you configure ObserveIT to send log data to Sheriff CSM, you can use the ObserveIT NXLog plugin to tran...
OpenThreatExchangeAndSheriffCSM
UpPrevious Next Sheriff CSM™ Open Threat Exchange® and Sheriff CSM %TWISTY{ showlink="Table of Contents" hidelink="Table of Contents" start="show" showimgleft...
OracleThroughNXLog
UpPrevious Next Sheriff CSM™ Oracle through NXLog When you configure Oracle Database to send log data to Sheriff CSM, you can use the Oracle NXLog plugin to tran...
PCIDSS32Requirement11
UpPrevious Next Sheriff CSM™ PCI DSS 3.2 Requirement 11: Regularly Test Security Systems and Processes Testing Procedure How Sheriff CSM Delivers Sherif...
PCIDSS32Requirement2
UpPrevious Next Sheriff CSM™ PCI DSS 3.2 Requirement 2: Do Not Use Vendor Supplied Defaults for System Passwords and Other Security Parameters Testing Procedur...
PCIDSS32Requirement9
UpPrevious Next Sheriff CSM™ PCI DSS 3.2 Requirement 9: Restrict Physical Access to Cardholder Data Testing Procedure How Sheriff CSM Delivers Sheriff CS...
PluginFundamentals
UpPrevious Next Sheriff CSM™ Plugin Fundamentals %TWISTY{ showlink="Table of Contents" hidelink="Table of Contents" start="show" showimgleft="" hideimgleft=...
PluginManagement
UpPrevious Next Sheriff CSM™ Plugin Management %TWISTY{ showlink="Table of Contents" hidelink="Table of Contents" start="show" showimgleft="" hideimgleft=""...
PolicyConditions
UpPrevious Next Sheriff CSM™ Policy Conditions Set policy conditions to determine which elements of an incoming event Sheriff CSM will process. You set these con...
PolicyOrderAndGrouping
UpPrevious Next Sheriff CSM™ Policy Order and Grouping Policy Order Importance Policies consist of numbered rules that Sheriff CSM applies in descending order wh...
ReviewSecurityEvents
UpPrevious Next Sheriff CSM™ Review Security Events %TWISTY{ showlink="Table of Contents" hidelink="Table of Contents" start="show" showimgleft="" hideimglef...
ReviewingAlarmsAsAGroup
UpPrevious Next Sheriff CSM™ Reviewing Alarms as a Group This task helps you sort alarms in bulk as a group when you have many alarms that are similar. You can a...
ReviewingAlarmsAsAList
UpPrevious Next Sheriff CSM™ Reviewing Alarms as a List %TWISTY{ showlink="Table of Contents" hidelink="Table of Contents" start="show" showimgleft="" hidei...
RunningAScanForNewAssetsManually
UpPrevious Next Running a Scan for New Assets Manually To run a scan for new assets manually 1 Go to Environment Assets Groups Assets. 1 Click Add ...
RunningAssetScans
UpPrevious Next Sheriff CSM™ Running Asset Scans You can run an asset scan on individual assets. This is useful, for example, if you want to find out if anything ...
RunningVulnerabilityScansFromAssets
UpPrevious Next Sheriff CSM™ Running Vulnerability Scans from Assets You can run vulnerability scans on individual assets. The fewer assets to scan, the sooner th...
RunningVulnerabilityScansFromAssetsVulnerabilityAssessment
UpPrevious Next Sheriff CSM™ Running Vulnerability Scans from Assets You can run vulnerability scans on individual assets. The fewer assets to scan, the sooner t...
SchedulingAnAssetDiscoveryScan
UpPrevious Next Scheduling an Asset Discovery Scan You can schedule a scan to run at a set frequency. This is particularly useful on an active network. To schedul...
SearchingForAssets
UpPrevious Next Sheriff CSM™ Searching for Assets You can either search for or filter your assets by simply typing what you are looking for in the search box, in ...
SelectingAssetsInAssetListView
UpPrevious Next Sheriff CSM™ Selecting Assets in Asset List View To select a single asset * Select the check box to the left of the asset. To select multiple a...
SheriffCSMAdministrationAndConfiguration
UpPrevious Next Sheriff CSM™ Sheriff CSM Administration and Configuration During the course of using Sheriff CSM to manage and maintain network security in your ...
SheriffCSMDashboardConfiguration
UpPrevious Next Sheriff CSM™ Sheriff CSM Dashboard Configuration Within the dashboard view, you can see multiple tabs displaying various visual representations of...
SheriffCSMDashboards
UpPrevious Next Sheriff CSM™ Sheriff CSM Dashboards %TWISTY{ showlink="Table of Contents" hidelink="Table of Contents" start="show" showimgleft="" hideimglef...
SheriffCSMEventTaxonomy
UpPrevious Next Sheriff CSM™ Sheriff CSM Event Taxonomy Sheriff event taxonomy is a classification system for security events. It provides the Sheriff CSM correla...
SheriffCSMExceptedDataTypes
UpPrevious Next Sheriff CSM Excepted Data Types Device CategoriesDevice Types for Network Device Network Device: Bridge Network Device: Broadband Router Net...
SheriffCSMNetworkSecurityBestPractices
UpPrevious Next Sheriff CSM™ Sheriff CSM Network Security Best Practices Providing strong and effective security for an organization’s network, IT infrastructure,...
SheriffCSMNetworkSecurityConceptsAndTerminology
UpPrevious Next Sheriff CSM™ Sheriff CSM Network Security Concepts and Terminology When working with Sheriff CSM and using the Sheriff CSM web UI to perform netw...
SheriffCSMReports
UpPrevious Next Sheriff CSM™ Sheriff CSM Reports %TWISTY{ showlink="Table of Contents" hidelink="Table of Contents" start="show" showimgleft="" hideimgleft=...
SheriffVigilanteReportType
UpPrevious Next Sheriff CSM™ Sheriff Vigilante Report Types Sheriff Vigilante Reports Sheriff Vigilante provides a set of simplified versions of the reports fou...
SophosEnterpriseConsoleThroughNXLog
UpPrevious Next Sheriff CSM™ Sophos Enterprise Console through NXLog When you configure Sophos Enterprise Console (SEC) to send log data to Sheriff CSM, you can ...
Task2AddALevel1RuleToDetectTheEvent
UpPrevious Next Task 2: Add a Level 1 Rule to Detect the Event This task adds a level 1 rule for the directive created in Task 1. In this rule, we try to match o...
Test
Examine Alarms and Security Events In this procedure, we describe the first and most straightforward method of investigating the trigger for a specific alarm. To ...
TheSheriffCSMWebUserInterface
UpPrevious Next Sheriff CSM™ The Sheriff CSM Web User Interface The Sheriff CSM web user interface (or web UI) provides access to all the tools and capabilities ...
TutorialCreateANewDirectiveToDetectDoSAttack
UpPrevious Next Sheriff CSM™ Tutorial: Create a New Directive to Detect DoS Attack Sometimes, you may find that none of the built in directives work in your envir...
UserAdministrationInSheriffCSM
UpPrevious Next Sheriff CSM™ User Administration in Sheriff CSM %TWISTY{ showlink="Table of Contents" hidelink="Table of Contents" start="show" showimgleft="...
UserAuthorization
UpPrevious Next Sheriff CSM™ User Authorization %TWISTY{ showlink="Table of Contents" hidelink="Table of Contents" start="show" showimgleft="" hideimgleft=""...
UsingOTXInSheriffCSM
UpPrevious Next Sheriff CSM™ Using OTX in Sheriff CSM When you sign up for and connect your Open Threat Exchange® (OTX™) account to your Sheriff CSM instance, it...
VerifyingSheriffCSMOperation
UpPrevious Next Sheriff CSM™ Verifying Sheriff CSM Operation Once the basic installation and configuration of your Sheriff CSM system is completed (as described i...
ViewingAssetDetails
UpPrevious Next Sheriff CSM™ Viewing Asset Details To view asset details from the Asset List view, double click a specific asset or click the magnifying glass () ...
ViewingAssetGroupDetails
UpPrevious Next Sheriff CSM™ Viewing Asset Group Details From the Asset Group List view, when you double click a specific asset group, or click the magnifying gla...
ViewingNetworkDetails
UpPrevious Next Sheriff CSM™ Viewing Network Details From the Network List View, you can double click a specific network or click the view icon () at the end of t...
VulnerabilityAssessment
UpPrevious Next Sheriff CSM™ Vulnerability Assessment %TWISTY{ showlink="Table of Contents" hidelink="Table of Contents" start="show" showimgleft="" hideimg...
VulnerabilityScans
UpPrevious Next Sheriff CSM™ Vulnerability Scans %TWISTY{ showlink="Performing Vulnerability Scans" hidelink="Performing Vulnerability Scans" start="show" sh...
WebNotify
* .WikiGuest * .SheriffCyberSecurity: AddingAssetsByScanningForNewAssets CustomizeAndDevelopNewPlugins PolicyConsequences
WhatExpectationsShouldIHaveOfSecurityMonitoring
UpPrevious Next Sheriff CSM™ What Expectations Should I Have of Security Monitoring? Security monitoring is often about monitoring often overlooked things such as...
WhatIsTelemetryCollectionAndHowDoesItWork
UpPrevious Next Sheriff CSM™ What Is Telemetry Collection and How Does It Work At Sheriff Cyber Security, LLC, we are continually striving to improve Sheriff CSM...
WingFTPServerThroughNXLog
UpPrevious Next Sheriff CSM™ Wing FTP Server through NXLog When you configure Wing FTP Server to send log data to Sheriff CSM, you can use the Wing FTP Server pl...
Number of topics: 128
Copyright 2020 Sheriff Cyber Security, LLC. All rights reserved.