<?xml version="1.0" encoding="utf-8"?>
<feed xmlns="http://www.w3.org/2005/Atom"><title>Docs's Sheriff web</title>
<subtitle>The Sheriff web of Docs. Sheriff Cyber Security Documentation</subtitle>
<link rel="self" type="application/atom+xml" href="https://sheriffcybersecurity.com/docs/Sheriff/WebAtom"/>
<id>https://sheriffcybersecurity.com/docs/Sheriff</id>
<rights>Copyright 2026 by contributing authors</rights>
&lt;updated&gt;2022-07-06T20:17:31Z&lt;/updated&gt;
<entry>
 <title>MicrosoftIISFTPServerThroughNXLog</title>
 <link rel="alternate" type="text/html" href="https://sheriffcybersecurity.com/docs/Sheriff/MicrosoftIISFTPServerThroughNXLog?t=2022-07-06T20:17:31Z"/>
 <id>https://sheriffcybersecurity.com/docs/Sheriff/MicrosoftIISFTPServerThroughNXLog</id>
 <updated>2022-07-06T20:17:31Z</updated>
 <summary>UpPrevious Next Sheriff CSM™ Microsoft IIS FTP Server through NXLog The Microsoft Internet Information Services (IIS) Management Pack includes a FTP Server that ... (last changed by SheriffCyberSecurity)</summary>
 <author>
  <name>SheriffCyberSecurity</name></author>
</entry>
<entry>
 <title>MicrosoftDNSServerThroughNXLog</title>
 <link rel="alternate" type="text/html" href="https://sheriffcybersecurity.com/docs/Sheriff/MicrosoftDNSServerThroughNXLog?t=2022-07-06T19:51:34Z"/>
 <id>https://sheriffcybersecurity.com/docs/Sheriff/MicrosoftDNSServerThroughNXLog</id>
 <updated>2022-07-06T19:51:34Z</updated>
 <summary>UpPrevious Next Sheriff CSM™ Microsoft DNS Server through NXLog When you configure Microsoft DNS Server to send log data to Sheriff CSM, you can use the Microsof... (last changed by SheriffCyberSecurity)</summary>
 <author>
  <name>SheriffCyberSecurity</name></author>
</entry>
<entry>
 <title>MikroTikRouter</title>
 <link rel="alternate" type="text/html" href="https://sheriffcybersecurity.com/docs/Sheriff/MikroTikRouter?t=2022-07-06T18:45:41Z"/>
 <id>https://sheriffcybersecurity.com/docs/Sheriff/MikroTikRouter</id>
 <updated>2022-07-06T18:45:41Z</updated>
 <summary>UpPrevious Next Sheriff CSM™ MikroTik Router When you configure MikroTik Router to send log data to Sheriff CSM, you can use the MikroTik Router plugin to transl... (last changed by SheriffCyberSecurity)</summary>
 <author>
  <name>SheriffCyberSecurity</name></author>
</entry>
<entry>
 <title>MicrosoftOffice365CloudAppSecurity</title>
 <link rel="alternate" type="text/html" href="https://sheriffcybersecurity.com/docs/Sheriff/MicrosoftOffice365CloudAppSecurity?t=2022-07-06T18:44:06Z"/>
 <id>https://sheriffcybersecurity.com/docs/Sheriff/MicrosoftOffice365CloudAppSecurity</id>
 <updated>2022-07-06T18:44:06Z</updated>
 <summary>UpPrevious Next Sheriff CSM™ Microsoft Office 365 Cloud App Security When you configure Office 365 Cloud App Security (formerly named Office 365 Advanced Security... (last changed by SheriffCyberSecurity)</summary>
 <author>
  <name>SheriffCyberSecurity</name></author>
</entry>
<entry>
 <title>KerioConnect</title>
 <link rel="alternate" type="text/html" href="https://sheriffcybersecurity.com/docs/Sheriff/KerioConnect?t=2022-07-06T18:22:54Z"/>
 <id>https://sheriffcybersecurity.com/docs/Sheriff/KerioConnect</id>
 <updated>2022-07-06T18:22:54Z</updated>
 <summary>UpPrevious Next Sheriff CSM™ Kerio Connect When you configure Kerio Connect to send log data to Sheriff CSM, you can use the plugin full name as appeared in prod... (last changed by SheriffCyberSecurity)</summary>
 <author>
  <name>SheriffCyberSecurity</name></author>
</entry>
<entry>
 <title>KasperskySecurityCenterDatabase</title>
 <link rel="alternate" type="text/html" href="https://sheriffcybersecurity.com/docs/Sheriff/KasperskySecurityCenterDatabase?t=2022-07-06T18:19:38Z"/>
 <id>https://sheriffcybersecurity.com/docs/Sheriff/KasperskySecurityCenterDatabase</id>
 <updated>2022-07-06T18:19:38Z</updated>
 <summary>UpPrevious Next Sheriff CSM™ Kaspersky Security Center DataBase When you configure Kaspersky Security Center to send log data to Sheriff CSM, you can use the Kas... (last changed by SheriffCyberSecurity)</summary>
 <author>
  <name>SheriffCyberSecurity</name></author>
</entry>
<entry>
 <title>HPBladeSystemChassis</title>
 <link rel="alternate" type="text/html" href="https://sheriffcybersecurity.com/docs/Sheriff/HPBladeSystemChassis?t=2022-07-06T16:38:26Z"/>
 <id>https://sheriffcybersecurity.com/docs/Sheriff/HPBladeSystemChassis</id>
 <updated>2022-07-06T16:38:26Z</updated>
 <summary>UpPrevious Next Sheriff CSM™ HP BladeSystem Chassis When you configure HP BladeSystem to send log data to Sheriff CSM, you can use the HP BladeSystem Chassis plu... (last changed by SheriffCyberSecurity)</summary>
 <author>
  <name>SheriffCyberSecurity</name></author>
</entry>
<entry>
 <title>D-LinkWirelessController</title>
 <link rel="alternate" type="text/html" href="https://sheriffcybersecurity.com/docs/Sheriff/D-LinkWirelessController?t=2022-07-06T00:39:32Z"/>
 <id>https://sheriffcybersecurity.com/docs/Sheriff/D-LinkWirelessController</id>
 <updated>2022-07-06T00:39:32Z</updated>
 <summary>UpPrevious Next Sheriff CSM™ D Link Wireless Controller When you configure D Link Wireless Controller to send log data to Sheriff CSM, you can use the D Link Unif... (last changed by SheriffCyberSecurity)</summary>
 <author>
  <name>SheriffCyberSecurity</name></author>
</entry>
<entry>
 <title>CiscoRV</title>
 <link rel="alternate" type="text/html" href="https://sheriffcybersecurity.com/docs/Sheriff/CiscoRV?t=2022-07-05T19:00:11Z"/>
 <id>https://sheriffcybersecurity.com/docs/Sheriff/CiscoRV</id>
 <updated>2022-07-05T19:00:11Z</updated>
 <summary>UpPrevious Next Sheriff CSM™ Cisco RV When you configure Cisco RV Series VPN Router to send log data to Sheriff CSM, you can use the Cisco rv plugin to translate... (last changed by SheriffCyberSecurity)</summary>
 <author>
  <name>SheriffCyberSecurity</name></author>
</entry>
<entry>
 <title>CiscoMeraki</title>
 <link rel="alternate" type="text/html" href="https://sheriffcybersecurity.com/docs/Sheriff/CiscoMeraki?t=2022-07-05T18:26:44Z"/>
 <id>https://sheriffcybersecurity.com/docs/Sheriff/CiscoMeraki</id>
 <updated>2022-07-05T18:26:44Z</updated>
 <summary>UpPrevious Next Sheriff CSM™ Cisco Meraki When you configure Cisco Meraki to send log data to Sheriff CSM, you can use the Cisco Meraki plugin to translate raw l... (last changed by SheriffCyberSecurity)</summary>
 <author>
  <name>SheriffCyberSecurity</name></author>
</entry>
<entry>
 <title>A10ThunderWebApplicationFirewall</title>
 <link rel="alternate" type="text/html" href="https://sheriffcybersecurity.com/docs/Sheriff/A10ThunderWebApplicationFirewall?t=2022-07-05T03:50:55Z"/>
 <id>https://sheriffcybersecurity.com/docs/Sheriff/A10ThunderWebApplicationFirewall</id>
 <updated>2022-07-05T03:50:55Z</updated>
 <summary>UpPrevious Next Sheriff CSM™ A10 Thunder Web Application Firewall (WAF) When you configure A10 Thunder WAF to send log data to Sheriff CSM, you can use the A10 Th... (last changed by SheriffCyberSecurity)</summary>
 <author>
  <name>SheriffCyberSecurity</name></author>
</entry>
<entry>
 <title>PluginFundamentals</title>
 <link rel="alternate" type="text/html" href="https://sheriffcybersecurity.com/docs/Sheriff/PluginFundamentals?t=2022-07-04T21:48:58Z"/>
 <id>https://sheriffcybersecurity.com/docs/Sheriff/PluginFundamentals</id>
 <updated>2022-07-04T21:48:58Z</updated>
 <summary>UpPrevious Next Sheriff CSM™ Plugin Fundamentals %TWISTY{ showlink="Table of Contents" hidelink="Table of Contents" start="show" showimgleft="" hideimgleft=... (last changed by SheriffCyberSecurity)</summary>
 <author>
  <name>SheriffCyberSecurity</name></author>
</entry>
<entry>
 <title>ConfiguringHighAvailabilityForSheriffCSMStandardServers</title>
 <link rel="alternate" type="text/html" href="https://sheriffcybersecurity.com/docs/Sheriff/ConfiguringHighAvailabilityForSheriffCSMStandardServers?t=2022-07-04T21:23:56Z"/>
 <id>https://sheriffcybersecurity.com/docs/Sheriff/ConfiguringHighAvailabilityForSheriffCSMStandardServers</id>
 <updated>2022-07-04T21:23:56Z</updated>
 <summary>UpPrevious Next Sheriff CSM™ Configuring High Availability for Sheriff CSM Standard Servers The Sheriff CSM Standard Server is the first Sheriff CSM component th... (last changed by SheriffCyberSecurity)</summary>
 <author>
  <name>SheriffCyberSecurity</name></author>
</entry>
<entry>
 <title>MigrateYourSheriffCSMDeployment</title>
 <link rel="alternate" type="text/html" href="https://sheriffcybersecurity.com/docs/Sheriff/MigrateYourSheriffCSMDeployment?t=2022-07-01T17:32:23Z"/>
 <id>https://sheriffcybersecurity.com/docs/Sheriff/MigrateYourSheriffCSMDeployment</id>
 <updated>2022-07-01T17:32:23Z</updated>
 <summary>UpPrevious Next Sheriff CSM™ Migrate Your Sheriff CSM Deployment In some scenarios, such as disaster recovery, upgrades, or platform changes, you may choose to m... (last changed by SheriffCyberSecurity)</summary>
 <author>
  <name>SheriffCyberSecurity</name></author>
</entry>
<entry>
 <title>VMwareVCenter</title>
 <link rel="alternate" type="text/html" href="https://sheriffcybersecurity.com/docs/Sheriff/VMwareVCenter?t=2022-07-01T17:02:14Z"/>
 <id>https://sheriffcybersecurity.com/docs/Sheriff/VMwareVCenter</id>
 <updated>2022-07-01T17:02:14Z</updated>
 <summary>UpPrevious Next Sheriff CSM™ VMware vCenter When you configure VMware vCenter to send log data to Sheriff CSM, you can use the VMware vCenter plugin to translate... (last changed by SheriffCyberSecurity)</summary>
 <author>
  <name>SheriffCyberSecurity</name></author>
</entry>
<entry>
 <title>TrendMicroVulnerabilityProtection</title>
 <link rel="alternate" type="text/html" href="https://sheriffcybersecurity.com/docs/Sheriff/TrendMicroVulnerabilityProtection?t=2022-07-01T03:57:43Z"/>
 <id>https://sheriffcybersecurity.com/docs/Sheriff/TrendMicroVulnerabilityProtection</id>
 <updated>2022-07-01T03:57:43Z</updated>
 <summary>UpPrevious Next Sheriff CSM™ Trend Micro Vulnerability Protection When you configure Trend Micro Vulnerability Protection to send log data to Sheriff CSM, you can... (last changed by SheriffCyberSecurity)</summary>
 <author>
  <name>SheriffCyberSecurity</name></author>
</entry>
 <!-- <ul>
<li> Set SKIN = rssatom
</li> <li> Set COVER = rssatom
</li></ul> 
-->
</feed>