UpPrevious Next Sheriff CSM™ HAProxy When you configure HAProxy to send log data to Sheriff CSM, you can use the plugin full name as appeared in product web UI p...
HIDS Intrusion Detection System that monitors the behavior and state of a computer system, as well as the network packets that the system sends and receives.
UpPrevious Next Sheriff CSM™ HP BladeSystem Chassis When you configure HP BladeSystem to send log data to Sheriff CSM, you can use the HP BladeSystem Chassis plu...
UpPrevious Next Sheriff CSM™ HP MSM Integrated Controller When you configure HP MSM Integrated Controller to send log data to Sheriff CSM, you can use the HP MSM...
High Availability (HA) Sheriff CSM supports high availability by allowing you to switch over from an active (primary) Sheriff CSM instance to a passive (secondary...
UpPrevious Next Sheriff CSM™ High Availability Configuration %TWISTY{ showlink="Table of Contents" hidelink="Table of Contents" start="show" showimgleft="" h...
UpPrevious Next Sheriff CSM™ High Availability Prerequisites and Restrictions Before you start, review the prerequisites and restrictions in setting up a high av...
UpPrevious Next Sheriff CSM™ How Do I Discover a Possibly Larger Attack in Progress? Most day to day security monitoring work involves detecting where security c...
UpPrevious Next Sheriff CSM™ How to Run Reports You can find all the Sheriff CSM reports on Reports All Reports. All Reports ' width='665' / For field descri...
UpPrevious Next Sheriff CSM™ How to Submit a Security Issue to Sheriff We are always working to improve the security of our products. You, the Sheriff Cyber Secur...
UpPrevious Next Sheriff CSM™ Huawei IPS Module When you configure Huawei IPS Module to send log data to Sheriff CSM, you can use the Huawei IPS Module plugin to ...
IPMI Intelligent Platform Management Interface. In Sheriff CSM, interface to provide remote management and configuration of the Sheriff CSM Supermicro hardware.
UpPrevious Next Sheriff CSM™ Imperva SecureSphere When you configure Imperva SecureSphere to send log data to Sheriff CSM, you can use the Imperva securesphere p...
UpPrevious Next Sheriff CSM™ Importing Scan Results This option allows you to import results from external scanners to create reports or perform cross correlatio...
UpPrevious Next Sheriff CSM™ Introduction to Sheriff CSM This guide provides information for users of the Sheriff CSM system, that are responsible for monitoring...
UpPrevious Next Sheriff CSM™ Juniper SRX When you configure Juniper SRX to send log data to Sheriff CSM, you can use the Juniper SRX plugin to translate raw log ...
UpPrevious Next Sheriff CSM™ Kaspersky Security Center When you configure Kaspersky Security Center to send log data to Sheriff CSM, you can use the kaspersky sc ...
UpPrevious Next Sheriff CSM™ Kaspersky Security Center DataBase When you configure Kaspersky Security Center to send log data to Sheriff CSM, you can use the Kas...
UpPrevious Next Sheriff CSM™ Kerio Connect When you configure Kerio Connect to send log data to Sheriff CSM, you can use the plugin full name as appeared in prod...
UpPrevious Next Sheriff CSM™ Knowledge DB Some built in correlation directives also include a link that points to a document in the Sheriff Knowledge Base (Confi...
UpPrevious Next Sheriff CSM™ LOGbinder for SharePoint When you configure LOGbinder for SharePoint to send log data to Sheriff CSM, you can use the LOGbinder for ...
UpPrevious Next Sheriff CSM™ Labeling the Assets You can use labels to further classify your assets and later use them when Searching for Assets. To label your as...
UpPrevious Next Sheriff CSM™ Limit User Visibility with Entities %TWISTY{ showlink="Table of Contents" hidelink="Table of Contents" start="show" showimgleft="...
UpPrevious Next Sheriff CSM™ List of Sheriff CSM Reports Sheriff updates the Sheriff CSM reports on an on going basis. The following table lists the reports in a...
UpPrevious Next Sheriff CSM™ Locate the Sheriff License and System ID When contacting Sheriff Technical Support, you are often asked to provide the Sheriff licen...
UpPrevious Next Sheriff CSM™ Log Collection and Normalization in Sheriff CSM The Sheriff CSM plugins process data collected from different data sources, parse and...
UpPrevious Next Sheriff CSM™ ManageEngine ADAudit Plus When you configure ManageEngine ADAudit Plus to send log data to Sheriff CSM, you can use the ADAudit Plus ...
UpPrevious Next Sheriff CSM™ Manage User Accounts %TWISTY{ showlink="Table of Contents" hidelink="Table of Contents" start="show" showimgleft="" hideimgleft=...
UpPrevious Next Sheriff CSM™ Managing Network Groups You manage network groups from the Network Group List view. Creating Network Groups To create a network grou...
UpPrevious Next Sheriff CSM™ Managing the Sheriff CSM Environment In addition to monitoring and analyzing events and alarms, there are other aspects of security ...
UpPrevious Next Sheriff CSM™ McAfee AntiSpam When you configure McAfee AntiSpam to send log data to Sheriff CSM, you can use the McAfee AntiSpam plugin to transla...
UpPrevious Next Sheriff CSM™ McAfeeWeb Gateway When you configure McAfeeWeb Gateway to send log data to Sheriff CSM, you can use the McAfeeWeb Gateway (mwg) plug...
Meaning of the Symbols when Labeling Assets Meaning of the symbols when labeling assets Symbol Meaning Some of the selected assets currently use this ...
UpPrevious Next Sheriff CSM™ Message Center Sheriff CSM uses the Message Center to centralize all in system errors, warnings, and messages. They also include exte...
Message Center Inbox in the Sheriff CSM web UI which lists messages publicizing availability of various Sheriff Cyber Security, LLC product updates, plus other me...
UpPrevious Next Sheriff CSM™ Microsoft ATA When you configure Microsoft Advanced Threat Analytics (ATA) to send log data to Sheriff CSM, you can use the Microsoft...
UpPrevious Next Sheriff CSM™ Microsoft DHCP Server through NXLog When you configure Microsoft DHCP Server to send log data to Sheriff CSM, you can use the DHCP C...
UpPrevious Next Sheriff CSM™ Microsoft DNS Server through NXLog When you configure Microsoft DNS Server to send log data to Sheriff CSM, you can use the Microsof...
UpPrevious Next Sheriff CSM™ Microsoft Exchange Server through NXLog When you configure Microsoft Exchange Server to send log data to Sheriff CSM, you can use th...
UpPrevious Next Sheriff CSM™ Microsoft IIS FTP Server through NXLog The Microsoft Internet Information Services (IIS) Management Pack includes a FTP Server that ...
UpPrevious Next Sheriff CSM™ Microsoft IIS SMTP Server through NXLog When you configure Microsoft IIS SMTP Server to send log data to Sheriff CSM, you can use th...
UpPrevious Next Sheriff CSM™ Microsoft IIS through NXLog When you configure Microsoft Internet Information Services (IIS) to send log data to Sheriff CSM, you ca...
UpPrevious Next Sheriff CSM™ Microsoft NPS through NXLog When you configure Microsoft Network Policy Server (NPS) to send log data to Sheriff CSM, you can use th...
UpPrevious Next Sheriff CSM™ Microsoft Office 365 Cloud App Security When you configure Office 365 Cloud App Security (formerly named Office 365 Advanced Security...
UpPrevious Next Sheriff CSM™ Microsoft SCOM through NXLog When you configure Microsoft System Center Operations Manager (SCOM) to send log data to Sheriff CSM, y...