UpPrevious Next Sheriff CSM™ Burn the Sheriff CSM ISO Image to a USB Drive This procedure is a prerequisite to updating Sheriff CSM offline or restoring the soft...
UpPrevious Next Sheriff CSM™ Configuring High Availability for Sheriff CSM Standard Servers The Sheriff CSM Standard Server is the first Sheriff CSM component th...
UpPrevious Next Sheriff CSM™ Configuring High Availability in Sheriff CSM Enterprise Systems Unlike the Sheriff CSM Standard Server topology, the Sheriff CSM Ent...
UpPrevious Next Sheriff CSM™ Configuring High Availability in Sheriff CSM Standard Systems This section covers the following subtopics: * Configuring High Avai...
UpPrevious Next Sheriff CSM™ Configuring Sheriff NIDS Sheriff CSM comes with Sheriff NIDS already enabled, but you need to perform the steps below in order to mo...
UpPrevious Next Sheriff CSM™ Create a New Cross Correlation Rule In this example, we explain how to create a cross correlation rule to detect a MySQL authenticati...
UpPrevious Next Sheriff CSM™ Customize Sheriff NIDS Rules Occasionally you may want to customize the Sheriff NIDS rules or enable a rule that is disabled by defa...
UpPrevious Next Sheriff CSM™ Disabling High Availability About Disabling HA in Network Nodes You must disable HA components in the following order: Sheriff CS...
UpPrevious Next Sheriff CSM™ Download a Sheriff CSM ISO Image In order to perform an offline update or software restoration on Sheriff CSM, you first need to dow...
UpPrevious Next Sheriff CSM™ Enable Plugins Sheriff provides more than one way to enable plugins in Sheriff CSM. First, you can enable plugins on specific discov...
UpPrevious Next Sheriff CSM™ Error Codes When Updating from Version 5.8.0 to Version 5.8.x To ensure that your deployment meets AT T Cybersecurity's requirements...
UpPrevious Next Sheriff CSM™ High Availability Prerequisites and Restrictions Before you start, review the prerequisites and restrictions in setting up a high av...
UpPrevious Next Sheriff CSM™ Operating System Upgrade in Version 5.8.0 Sheriff CSM version 5.8.0 includes an operating system (OS) upgrade to improve the performa...
UpPrevious Next Sheriff CSM™ PCI DSS 3.2 Requirement 1: Install and Maintain a Firewall Configuration to Protect Cardholder Data Testing Procedure How Sher...
UpPrevious Next Sheriff CSM™ PCI DSS 3.2 Requirement 11: Regularly Test Security Systems and Processes Testing Procedure How Sheriff CSM Delivers Sherif...
UpPrevious Next Sheriff CSM™ PCI DSS 3.2 Requirement 4: Encrypt Transmission of Cardholder Data Across Open, Public Networks Testing Procedure How Sheriff C...
UpPrevious Next Sheriff CSM™ Review Event Details Event Details identifies all information Sheriff CSM collected about this event. It also displays the number of ...
Sheriff NIDS A Sheriff CSM feature and data source for intrusion detection that monitors network traffic and attacks malicious events. In conjunction with event c...
UpPrevious Next Sheriff CSM™ Tutorial: Create a Policy to Discard Events As part of your efforts to reduce the amount of events triggered by non problematic, non...
UpPrevious Next Sheriff CSM™ Update Sheriff CSM Online You need to update Sheriff CSM manually after a release becomes available. You can perform the update eithe...
UpPrevious Next Sheriff CSM™ Updating Sheriff NIDS Rules and Signatures The AT T Alien Labs™ Security Research Team provides threat intelligence updates, such as ...
UpPrevious Next Sheriff CSM™ Upgrading a Sheriff CSM Deployment Configured for High Availability Prerequisites To upgrade Sheriff CSM to a new version, you must...
UpPrevious Next Sheriff CSM™ Viewing Sheriff NIDS Events You can view Sheriff NIDS events the same way as you do any other security events. For reference, see Se...