You are here: Docs>Sheriff Web>WebChanges (16 Oct 2020, SiteAdmin)Edit Attach

50 recent changes in Sheriff Web retrieved at 13:20 (GMT)

DeletingTheAssets
UpPrevious Next Sheriff CSM™ Deleting the Assets To delete asset(s) 1 Go to Environment Assets Groups Assets. 1 Select the asset(s) you want to delet...
AssetListView
UpPrevious Next Sheriff CSM™ Asset List View The Asset List view, Environment Assets Groups Assets, provides a centralized view of your assets. For fiel...
SheriffCSMDashboardConfiguration
UpPrevious Next Sheriff CSM™ Sheriff CSM Dashboard Configuration Within the dashboard view, you can see multiple tabs displaying various visual representations of...
SheriffCSMDashboards
UpPrevious Next Sheriff CSM™ Sheriff CSM Dashboards %TWISTY{ showlink="Table of Contents" hidelink="Table of Contents" start="show" showimgleft="" hideimglef...
VerifyingSheriffCSMOperation
UpPrevious Next Sheriff CSM™ Verifying Sheriff CSM Operation Once the basic installation and configuration of your Sheriff CSM system is completed (as described i...
BackUpAndRestoreNetFlowData
UpPrevious Next Sheriff CSM™ Back Up and Restore NetFlow Data NetFlow is a protocol designed and published by Cisco Systems that has become the accepted industry ...
EnablePluginsFromTheDeputyConfiguration
UpPrevious Next Sheriff CSM™ Enable Plugins from the Sensor (Deputy) Configuration You can enable up to 100 plugins on a Sheriff CSM Sensor from the Sheriff CSM w...
EnablePluginsOnAssets
UpPrevious Next Sheriff CSM™ Enable Plugins on Assets After you run a scan of your network to discover assets, the discovered assets are saved in the Sheriff CSM ...
ConfiguringSheriffNIDS
UpPrevious Next Sheriff CSM™ Configuring Sheriff NIDS Sheriff CSM comes with Sheriff NIDS already enabled, but you need to perform the steps below in order to mo...
WorkingWithSheriffHIDSRules
UpPrevious Next Sheriff CSM™ Working with Sheriff HIDS Rules Sheriff HIDS expands from the open source project, OSSEC, by providing additional rules that are esse...
LimitUserVisibilityWithEntities
UpPrevious Next Sheriff CSM™ Limit User Visibility with Entities %TWISTY{ showlink="Table of Contents" hidelink="Table of Contents" start="show" showimgleft="...
UserAdministrationInSheriffCSM
UpPrevious Next Sheriff CSM™ User Administration in Sheriff CSM %TWISTY{ showlink="Table of Contents" hidelink="Table of Contents" start="show" showimgleft="...
ListOfSheriffCSMReports
UpPrevious Next Sheriff CSM™ List of Sheriff CSM Reports Sheriff updates the Sheriff CSM reports on an on going basis. The following table lists the reports in a...
ViewingTheScanResultsInExcel
UpPrevious Next Sheriff CSM™ Viewing the Scan Results in Excel When you export a report in an Excel file, you can see the name of the portal branding. This infor...
SystemSettingsForAuthenticatedScans
UpPrevious Next Sheriff CSM™ System Settings for Authenticated Scans An authenticated scan is a vulnerability testing measure performed from the vantage of a logg...
PolicyOrderAndGrouping
UpPrevious Next Sheriff CSM™ Policy Order and Grouping Policy Order Importance Policies consist of numbered rules that Sheriff CSM applies in descending order wh...
ThePolicyView
UpPrevious Next Sheriff CSM™ The Policy View %TWISTY{ showlink="Table of Contents" hidelink="Table of Contents" start="show" showimgleft="" hideimgleft="" }...
AlarmDetailsColumnsAndFields
UpPrevious Next Sheriff CSM™ Alarm Details — Columns and Fields Alarm Details field descriptions Column/Field Name Description Status Whether or not t...
AlarmsListFields
UpPrevious Next Sheriff CSM™ Alarms List — Fields Alarms list fields Column/Field Name Description Date Date and time Sheriff CSM completed alarm corr...
ManagingNetworkGroups
UpPrevious Next Sheriff CSM™ Managing Network Groups You manage network groups from the Network Group List view. Creating Network Groups To create a network grou...
EditingTheAssets
UpPrevious Next Sheriff CSM™ Editing the Assets You can edit your assets once they are in Sheriff CSM. For example, you can add a description or a location for y...
RunningAssetScans
UpPrevious Next Sheriff CSM™ Running Asset Scans You can run an asset scan on individual assets. This is useful, for example, if you want to find out if anything ...
SheriffCSMEventProcessingWorkflow
UpPrevious Next Sheriff CSM™ Sheriff CSM Event Processing Workflow After Sheriff CSM is installed in your environment, events start flowing through the Sheriff ...
WhatExpectationsShouldIHaveOfSecurityMonitoring
UpPrevious Next Sheriff CSM™ What Expectations Should I Have of Security Monitoring? Security monitoring is often about monitoring often overlooked things such as...
SheriffCSMNetworkSecurityBestPractices
UpPrevious Next Sheriff CSM™ Sheriff CSM Network Security Best Practices Providing strong and effective security for an organization’s network, IT infrastructure,...
ReplaceDiskDrivesOrPowerSupplies
UpPrevious Next Sheriff CSM™ Replace Disk Drives or Power Supplies You may need to replace a power supply or hard disk drive on an Sheriff CSM hardware should ei...
SupportedFormatsByTheNormalizeDateFunction
UpPrevious Next Sheriff CSM™ Supported Formats by the normalize_date() Function When the Sheriff CSM plugins parse logs received from various devices, they use a...
CustomizeAndDevelopNewPlugins
UpPrevious Next Sheriff CSM™ Customize and Develop New Plugins Sheriff provides a large number of plugins as part of its default installation. In most environmen...
SheriffNIDS
UpPrevious Next Sheriff CSM™ Sheriff NIDS %TWISTY{ showlink="Table of Contents" hidelink="Table of Contents" start="show" showimgleft="" hideimgleft="" }% ...
ConfigureSheriffCSMToUseAProxy
UpPrevious Next Sheriff CSM™ Configure Sheriff CSM to Use a Proxy By default, Sheriff CSM does not need to go through any proxy server, so proxy configuration is...
CorrelationContexts
UpPrevious Next Sheriff CSM™ Correlation Contexts Sheriff CSM uses Correlation Contexts to allow overlapping networks. A Sheriff CSM Server can handle overlappin...
SheriffCSMEventProcessingWorkflowEM
UpPrevious Next Sheriff CSM™ Sheriff CSM Event Processing Workflow After Sheriff CSM is installed in your environment, events start flowing through the Sheriff C...
ExportingTheAssets
UpPrevious Next Sheriff CSM™ Exporting the Assets To export assets 1 Go to Environment Assets Groups Assets. 1 Select the asset(s) you want to export...
RestoreSheriffCSMFromAUSBDrive
UpPrevious Next Sheriff CSM™ Restore Sheriff CSM from a USB Drive Prerequisite * Burn the corresponding ISO image to a USB drive. * Change the boot sequenc...
ChangingTheBootSequenceOfASheriffCSMHardware
UpPrevious Next Sheriff CSM™ Changing the Boot Sequence of a Sheriff CSM Hardware By default, the Sheriff CSM hardware appliance boots from its hard disk. When tr...
RestoreSoftwareOnASheriffCSMHardware
UpPrevious Next Sheriff CSM™ Restore Software on a Sheriff CSM Hardware %TWISTY{ showlink="Table of Contents" hidelink="Table of Contents" start="show" showimg...
ResetTheSheriffAPIKey
UpPrevious Next Sheriff CSM™ Reset the Sheriff API Key Starting from version 5.2.5, Sheriff CSM and Sheriff Vigilante® offer the option to reset the Sheriff API ...
CustomizeExistingPluginsYourself
UpPrevious Next Sheriff CSM™ Customize Existing Plugins Yourself %TWISTY{ showlink="Table of Contents" hidelink="Table of Contents" start="show" showimgleft=...
ConfigurePlugins
UpPrevious Next Sheriff CSM™ Configure Plugins Most of the plugins in Sheriff CSM do not require additional configuration after they are enabled, especially if y...
DuplicatingFirewallRulesInSheriffCSMStandardDeputies
UpPrevious Next Sheriff CSM™ Duplicating Firewall Rules in Sheriff CSM Standard Sensors (Deputies) Whenever you add one or more Sheriff CSM Standard Sensors to t...
DisablingAVPNConfiguration
UpPrevious Next Sheriff CSM™ Disabling a VPN Configuration When you disable a VPN tunnel, it does not remove the configuration files and system generated certific...
FirewallPermissions
UpPrevious Next Sheriff CSM™ Firewall Permissions Sheriff CSM components must use particular URLs, protocols, and ports to function correctly. Note: If deploying ...
CustomizeSheriffNIDSRules
UpPrevious Next Sheriff CSM™ Customize Sheriff NIDS Rules Occasionally you may want to customize the Sheriff NIDS rules or enable a rule that is disabled by defa...
UsingSheriffCSMForPCICompliance
UpPrevious Next Sheriff CSM™ Using Sheriff CSM for PCI Compliance The purpose of this topic is to assist customers in utilizing Sheriff CSM to help achieve Paymen...
ResetPasswordForUserAccounts
UpPrevious Next Sheriff CSM™ Reset Password for User Accounts Sheriff CSM has specific procedures and permissions for resetting passwords for different user accou...
ModifyAUserAccount
UpPrevious Next Sheriff CSM™ Modify a User Account Use this procedure when you want to make modifications to an existing user account. To modify an existing user...
DuplicateAUserAccount
UpPrevious Next Sheriff CSM™ Duplicate a User Account Duplicating an existing user account can save time when you want to create a new user and the new user shoul...
UserAuthorization
UpPrevious Next Sheriff CSM™ User Authorization %TWISTY{ showlink="Table of Contents" hidelink="Table of Contents" start="show" showimgleft="" hideimgleft=""...
UserAuthentication
UpPrevious Next Sheriff CSM™ User Authentication %TWISTY{ showlink="Table of Contents" hidelink="Table of Contents" start="show" showimgleft="" hideimgleft="...
ViewingTheScanResultsInPDF
UpPrevious Next Sheriff CSM™ Viewing the Scan Results in PDF When you export a report in a PDF file, you can see a logo and the name of the portal branding. This...
Number of topics: 50
< Previous Page 7 of 10 Next >

See also: rss-small RSS feed, recent changes with 50, 100, 200, 500, 1000 topics, all changes
Topic revision: r1 - 16 Oct 2020, SiteAdmin
Copyright 2020 Sheriff Cyber Security, LLC. All rights reserved.