UpPrevious Next Sheriff CSM™ Agentless Monitoring Sheriff HIDS allows you to run integrity checking without agents installed on hosts, network devices, routers, f...
UpPrevious Next Sheriff CSM™ Building a VPN Tunnel Without a Client Server Connection If there is no connection between the VPN server and the client, which is o...
UpPrevious Next Sheriff CSM™ Burn the Sheriff CSM ISO Image to a USB Drive This procedure is a prerequisite to updating Sheriff CSM offline or restoring the soft...
UpPrevious Next Sheriff CSM™ Configure a VPN Between Sheriff CSM Systems To set up a VPN between two Sheriff CSM components, for example, between a Sheriff CSM Al...
UpPrevious Next Sheriff CSM™ Configuring High Availability for Sheriff CSM Standard Servers The Sheriff CSM Standard Server is the first Sheriff CSM component th...
UpPrevious Next Sheriff CSM™ Configuring High Availability in Sheriff CSM Enterprise Systems Unlike the Sheriff CSM Standard Server topology, the Sheriff CSM Ent...
UpPrevious Next Sheriff CSM™ Configuring High Availability in Sheriff CSM Standard Systems This section covers the following subtopics: * Configuring High Avai...
UpPrevious Next Sheriff CSM™ Configuring Sheriff NIDS Sheriff CSM comes with Sheriff NIDS already enabled, but you need to perform the steps below in order to mo...
UpPrevious Next Sheriff CSM™ Customize Sheriff NIDS Rules Occasionally you may want to customize the Sheriff NIDS rules or enable a rule that is disabled by defa...
UpPrevious Next Sheriff CSM™ Deploy Sheriff HIDS Agents You can deploy a Sheriff HIDS agent to a host * Through the Getting Started Wizard This option suppor...
UpPrevious Next Sheriff CSM™ Deployment Guide This topic discusses the following subtopics: System Overview Sheriff CSM Deployments Set Up the Management Interfac...
UpPrevious Next Sheriff CSM™ Disabling a VPN Configuration When you disable a VPN tunnel, it does not remove the configuration files and system generated certific...
UpPrevious Next Sheriff CSM™ Disabling High Availability About Disabling HA in Network Nodes You must disable HA components in the following order: Sheriff CS...
UpPrevious Next Sheriff CSM™ Download a Sheriff CSM ISO Image In order to perform an offline update or software restoration on Sheriff CSM, you first need to dow...
UpPrevious Next Sheriff CSM™ Error Codes When Updating from Version 5.8.0 to Version 5.8.x To ensure that your deployment meets AT T Cybersecurity's requirements...
UpPrevious Next Sheriff CSM™ File Integrity Monitoring You can configure Sheriff HIDS to perform File Integrity Monitoring (FIM), which identifies changes in sys...
UpPrevious Next Sheriff CSM™ Getting Started Wizard %TWISTY{ showlink="Table of Contents" hidelink="Table of Contents" start="show" showimgleft="" hideimgle...
UpPrevious Next Sheriff CSM™ High Availability Prerequisites and Restrictions Before you start, review the prerequisites and restrictions in setting up a high av...
UpPrevious Next Sheriff CSM™ Operating System Upgrade in Version 5.8.0 Sheriff CSM version 5.8.0 includes an operating system (OS) upgrade to improve the performa...
UpPrevious Next Sheriff CSM™ USB Device Monitoring on Windows Systems In Sheriff CSM version 5.3, Host Intrusion Detection System (HIDS) rules and plugins have b...
UpPrevious Next Sheriff CSM™ Update Sheriff CSM Online You need to update Sheriff CSM manually after a release becomes available. You can perform the update eithe...
UpPrevious Next Sheriff CSM™ Upgrading a Sheriff CSM Deployment Configured for High Availability Prerequisites To upgrade Sheriff CSM to a new version, you must...
UpPrevious Next Sheriff CSM™ Verifying the VPN Connection To verify the VPN connection 1 Open a browser window, using the VPN server IP, and log into Sheriff C...
UpPrevious Next Sheriff CSM™ Viewing Sheriff NIDS Events You can view Sheriff NIDS events the same way as you do any other security events. For reference, see Se...
UpPrevious Next To change the settings on Windows 8 and 10 1 Go to Control Panel Folder. Options View 1 Deselect Use Sharing Wizard (Recommended). 1 G...
UpPrevious Next To change the settings on Windows Server 2003, 2008 R2, and 2012 R2 1 Go to Control Panel Windows Firewall Advanced Settings Inbound Rul...
UpPrevious Next Sheriff CSM™ Working with Sheriff HIDS Rules Sheriff HIDS expands from the open source project, OSSEC, by providing additional rules that are esse...