CIDR Classless Inter Domain Routing, which provides a method for allocating IP addresses, routing Internet protocol packets, and subdividing networks. CIDR notifi...
UpPrevious Next Sheriff CSM™ Capture and Examine Packets Sheriff CSM integrated packet capture functionality allows you to capture traffic on your network for off...
UpPrevious Next Sheriff CSM™ Change the Default Time Zone The default time zone for Sheriff CSM is Pacific Time (UTC 7h). If you are not operating in that time z...
UpPrevious Next Sheriff CSM™ Changing Other Vulnerability Scanner Options You can modify the default vulnerability scanner settings to optimize the scanner for y...
UpPrevious Next Sheriff CSM™ Changing the Boot Sequence of a Sheriff CSM Hardware By default, the Sheriff CSM hardware appliance boots from its hard disk. When tr...
UpPrevious Next Changing the Boot Sequence on HPE Hardware If the rear view of your Sheriff CSM hardware looks similar to the below, it is built on an HPE ProLia...
UpPrevious Next Changing the Boot Sequence on Supermicro Hardware If the rear view of your Sheriff CSM hardware looks similar to the below, it is built on a Supe...
UpPrevious Next Sheriff CSM™ Changing the Vulnerability Ticket Threshold As discussed in the Vulnerability Risk Factors, Sheriff CSM sets a threshold for vulnera...
UpPrevious Next Sheriff CSM™ Check Point Firewall When you configure Check Point Firewall 1 to send log data to Sheriff CSM, you can use the Check Point Firewall...
UpPrevious Next Sheriff CSM™ Check Point MEPP When you configure Check Point Media Encryption and Port Protection (MEPP) to send log data to Sheriff CSM, you can ...
UpPrevious Next Sheriff CSM™ Cisco ACS When you configure Cisco ACS to send log data to Sheriff CSM, you can use the Cisco ACS plugin to translate raw log data i...
UpPrevious Next Sheriff CSM™ Cisco ASA When you configure Cisco ASA to send log data to Sheriff CSM, you can use the Cisco ASA plugin to translate raw log data i...
UpPrevious Next Sheriff CSM™ Cisco Meraki When you configure Cisco Meraki to send log data to Sheriff CSM, you can use the Cisco Meraki plugin to translate raw l...
UpPrevious Next Sheriff CSM™ Cisco PIX When you configure Cisco PIX to send log data to Sheriff CSM, you can use the Cisco PIX plugin to translate raw log data i...
UpPrevious Next Sheriff CSM™ Cisco RV When you configure Cisco RV Series VPN Router to send log data to Sheriff CSM, you can use the Cisco rv plugin to translate...
UpPrevious Next Sheriff CSM™ Cisco Unified Communications Manager When you configure Cisco Unified Communications Manager to send log data to Sheriff CSM, you can...
UpPrevious Next Sheriff CSM™ Cisco WLC When you configure Cisco Wireless LAN Controller (WLC) to send log data to Sheriff CSM, you can use the Cisco WLC plugin t...
UpPrevious Next Sheriff CSM™ Citrix NetScaler When you configure Citrix NetScaler to send log data to Sheriff CSM, you can use the Citrix NetScaler plugin to tran...
UpPrevious Next Sheriff CSM™ Clear All Events from the SIEM Database Sheriff CSM backs up events every day and purges them after a threshold (Event Backup Config...
UpPrevious Next Sheriff CSM™ Click Studios Passwordstate When you configure Click Studios Passwordstate to send log data to Sheriff CSM, you can use the Passwords...
UpPrevious Next Comodo Antivirus When you configure Comodo Antivirus to send log data to Sheriff CSM, you can use the Comodo Antivirus plugin to translate raw log...
UpPrevious Next Sheriff CSM™ Comparing the Results from Two Scans The Sheriff CSM web interface can display a comparison of the results in both text and graphica...
UpPrevious Next Complete the VPN Client Configuration If the VPN client you are configuring is a Sheriff CSM Deputy, you need to finish the configuration by perf...
Policies Sheriff CSM configuration that allows you to configure how Sheriff CSM processes events. Defines one or more conditions that are evaluated for each incom...
UpPrevious Next Sheriff CSM™ Configure a Hostname for Sheriff CSM You should always configure a hostname for Sheriff CSM. This helps you identify each one unique...
UpPrevious Next Sheriff CSM™ Configure a VPN Between Sheriff CSM Systems To set up a VPN between two Sheriff CSM components, for example, between a Sheriff CSM Al...
UpPrevious Next Sheriff CSM™ Configure Custom HTTPS Certificates in Sheriff CSM You can secure Sheriff CSM by providing your own SSL certificates from a Certific...
UpPrevious Next Sheriff CSM™ Configure Database Plugins Database plugins extract data from an external database and turn them into Events. Sheriff CSM supports M...
UpPrevious Next Sheriff CSM™ Configure LDAP in Sheriff CSM This topic shows you how to configure Sheriff CSM to allow user authentication using LDAP, such as Mic...
UpPrevious Next Sheriff CSM™ Configure Log Forwarding on Commonly Used Data Sources Sheriff CSM plugins process data collected from many different data sources, ...
UpPrevious Next Sheriff CSM™ Configure Mail Relay in Sheriff CSM You can configure to receive emails from Sheriff CSM. For example, if you want to receive an ema...
UpPrevious Next Sheriff CSM™ Configure Network Interfaces Sheriff CSM All in One comes with six network interfaces, numbered eth0 to eth5. Sheriff CSM uses these ...
UpPrevious Next Sheriff CSM™ Configure Plugins Most of the plugins in Sheriff CSM do not require additional configuration after they are enabled, especially if y...
UpPrevious Next Sheriff CSM™ Configure SDEE Plugins Cisco Systems IPS Sensor 5.0 uses the Security Device Event Exchange (SDEE) protocol to specify the format of...
UpPrevious Next Sheriff CSM™ Configure Sheriff CSM to Recognize Your Local Keyboard Follow this procedure if your keyboard does not use a United States key layou...
UpPrevious Next Sheriff CSM™ Configure Sheriff CSM to Use a DNS Use of a Domain Name Service (DNS) helps Sheriff CSM to resolve host names against IP addresses. ...
UpPrevious Next Sheriff CSM™ Configure Sheriff CSM to Use a Proxy By default, Sheriff CSM does not need to go through any proxy server, so proxy configuration is...
UpPrevious Next Sheriff CSM™ Configure Synchronization with an NTP Server Use of an NTP server in your network helps ensure that all system components are correc...
UpPrevious Next Sheriff CSM™ Configure the Search Domain For DNS (Domain Name System) lookup and reverse DNS resolution to work correctly, Sheriff CSM requires th...
UpPrevious Next Sheriff CSM™ Configure the Sheriff CSM Sensor (Deputy) after Deployment You'll want to set up and configure the Sheriff CSM Server first. If you ...
UpPrevious Next Sheriff CSM™ Configure the Sheriff CSM Enterprise Server and Enterprise Database The Sheriff CSM Enterprise Server component is hardware only, and...
UpPrevious Next Sheriff CSM™ Configure the Sheriff CSM Hardware You can manage the Sheriff CSM hardware either locally or remotely, through the IPMI or HPE iLO i...
UpPrevious Next Sheriff CSM™ Configure WMI Plugins Windows Management Instrumentation (WMI) plugins collect Microsoft Windows events and data remotely. These plu...
UpPrevious Next Sheriff CSM™ Configure Availability Monitoring Availability monitoring in Sheriff CSM runs from the server, and can be used to monitor availabili...
UpPrevious Next Sheriff CSM™ Configuring High Availability for Sheriff CSM Standard Sensors (Deputies) This process has three tasks you perform in the following ...
UpPrevious Next Sheriff CSM™ Configuring High Availability for Sheriff CSM Standard Servers The Sheriff CSM Standard Server is the first Sheriff CSM component th...
UpPrevious Next Sheriff CSM™ Configuring High Availability in Sheriff CSM Enterprise Systems Unlike the Sheriff CSM Standard Server topology, the Sheriff CSM Ent...
UpPrevious Next Sheriff CSM™ Configuring High Availability in Sheriff CSM Standard Systems This section covers the following subtopics: * Configuring High Avai...
UpPrevious Next Sheriff CSM™ Configuring Network Interfaces Applies to Product: Sheriff CSM™ Sheriff Vigilante® A Sheriff CSM All in One comes with six n...
UpPrevious Next Sheriff CSM™ Configuring Network Interfaces A Sheriff CSM All in One comes with six network interfaces, numbered eth0 to eth5. Sheriff CSM uses t...