UpPrevious Next Sheriff CSM™ Microsoft SQL Server through NXLog When you configure Microsoft SQL Server to send log data to Sheriff CSM, you can use the MSSQL Se...
UpPrevious Next Sheriff CSM™ Microsoft Sysmon through NXLog When you configure Microsoft System Monitor (Sysmon) to send log data to Sheriff CSM, you can use the...
UpPrevious Next Sheriff CSM™ Microsoft Windows Event Logs through NXLog When you configure NXLog to send log data to Sheriff CSM, you can use the Nxlog plugin to...
UpPrevious Next Sheriff CSM™ Microsoft Windows Firewall through NXLog When you configure Microsoft Windows Firewall to send log data to Sheriff CSM, you can use ...
UpPrevious Next Sheriff CSM™ Migrate Your Sheriff CSM Deployment In some scenarios, such as disaster recovery, upgrades, or platform changes, you may choose to m...
UpPrevious Next Sheriff CSM™ MikroTik Router When you configure MikroTik Router to send log data to Sheriff CSM, you can use the MikroTik Router plugin to transl...
UpPrevious Next Sheriff CSM™ Modify a Built in Cross Correlation Rule Similar to correlation directives, you can customize cross correlation rules as well. Import...
UpPrevious Next Sheriff CSM™ Modify a User Account Use this procedure when you want to make modifications to an existing user account. To modify an existing user...
UpPrevious Next Sheriff CSM™ Modify an Existing Policy You can modify any existing policy as needed. To modify an existing policy 1 From Configuration Threa...
UpPrevious Next Sheriff CSM™ Modifying a Custom Scan Profile To modify a custom profile for vulnerability scans 1 Go to Environment Vulnerabilities Overvi...
UpPrevious Next Sheriff CSM™ Monitor User Activities Every Sheriff CSM user, regardless of role, has access to the following information: * My Profile Includ...
UpPrevious Next Sheriff CSM™ Motorola RFS 4000 When you configure Motorola RFS 4000 to send log data to Sheriff CSM, you can use the Motorola RFS 4000 plugin to ...
UpPrevious Next Sheriff CSM™ NBS System Naxsi When you configure NBS System Naxsi to send log data to Sheriff CSM, you can use the NBS System Naxsi plugin to tra...
UpPrevious Next Sheriff CSM™ NETGEAR Switch When you configure NETGEAR Switch to send log data to Sheriff CSM, you can use the NETGEAR Switch plugin to translate ...
UpPrevious Next Sheriff CSM™ NXLog Plugins Microsoft Windows includes different categories of logs (Security, System, or Application event logs) to record importa...
UpPrevious Next Sheriff CSM™ NetFlow Event Controls You are able to configure Sheriff CSM All In One to create events when anomalous bandwidth usage is detected i...
UpPrevious Next Sheriff CSM™ NetFlow Monitoring Configuration Many external NetFlow sources (such as routers and switches) have NetFlow capabilities already defi...
UpPrevious Next Sheriff CSM™ NetFlow Troubleshooting If flow data from various NetFlow sources does not appear after a reasonable amount of time, you need to vali...
UpPrevious Next Sheriff CSM™ NetMotion Mobility When you configure NetMotion Mobility to send log data to Sheriff CSM, you can use the NetMotion Mobility plugin ...
UpPrevious Next Sheriff CSM™ Network Administration This section covers the following subtopics: * Network List View * Creating a Network * Viewing Netwo...
Network Field Descriptions Network field descriptions Column/Field NameRequired or OptionalDescription Name Required Name of the network. CIDR Required CID...
UpPrevious Next Sheriff CSM™ Network Group Administration This section covers the following subtopics: * Network Group List View * Managing Network Groups
UpPrevious Next Sheriff CSM™ Network Group List View From the Network Group List view (Environment Assets Groups Network Groups), you can create and manage...
UpPrevious Next Sheriff CSM™ Network List View Sheriff CSM provides a centralized view for managing your networks. It has a similar look and feel to the Asset Li...
UpPrevious Next Sheriff CSM™ Netwrix Auditor through NXLog When you configure Netwrix Auditor to send log data to Sheriff CSM, you can use the Netwrix Auditor pl...
OSX Indicators Information provided with OSX pulse updates that provide actionable intelligence and steps to detect the latest threats in your environment.
UpPrevious Next Sheriff CSM™ ObserveIT through NXLog When you configure ObserveIT to send log data to Sheriff CSM, you can use the ObserveIT NXLog plugin to tran...
UpPrevious Next Sheriff CSM™ Open Threat Exchange® and Sheriff CSM %TWISTY{ showlink="Table of Contents" hidelink="Table of Contents" start="show" showimgleft...
UpPrevious Next Sheriff CSM™ Operating System Upgrade in Version 5.8.0 Sheriff CSM version 5.8.0 includes an operating system (OS) upgrade to improve the performa...
UpPrevious Next Sheriff CSM™ Oracle JD Edwards EnterpriseOne When you configure Oracle JD Edwards EnterpriseOne to send log data to Sheriff CSM, you can use the ...
UpPrevious Next Sheriff CSM™ Oracle through NXLog When you configure Oracle Database to send log data to Sheriff CSM, you can use the Oracle NXLog plugin to tran...
UpPrevious Next Sheriff CSM™ Oracle WebLogic Server When you configure Oracle WebLogic Server to send log data to Sheriff CSM, you can use the Oracle WebLogic Se...
UpPrevious Next Sheriff CSM™ PCI DSS 3.2 Requirement 1: Install and Maintain a Firewall Configuration to Protect Cardholder Data Testing Procedure How Sher...
UpPrevious Next Sheriff CSM™ PCI DSS 3.2 Requirement 10: Track and Monitor Access to All Network Resources and Cardholder Data Testing Procedure How Sherif...
UpPrevious Next Sheriff CSM™ PCI DSS 3.2 Requirement 11: Regularly Test Security Systems and Processes Testing Procedure How Sheriff CSM Delivers Sherif...
UpPrevious Next Sheriff CSM™ PCI DSS 3.2 Requirement 2: Do Not Use Vendor Supplied Defaults for System Passwords and Other Security Parameters Testing Procedur...
UpPrevious Next Sheriff CSM™ PCI DSS 3.2 Requirement 4: Encrypt Transmission of Cardholder Data Across Open, Public Networks Testing Procedure How Sheriff C...
UpPrevious Next Sheriff CSM™ PCI DSS 3.2 Requirement 5: Protect All Systems Against Malware and Regularly Update Anti Virus Software or Programs Testing Proc...
UpPrevious Next Sheriff CSM™ PCI DSS 3.2 Requirement 6: Develop and Maintain Secure Systems and Applications Testing Procedure How Sheriff CSM Delivers S...
UpPrevious Next Sheriff CSM™ PCI DSS 3.2 Requirement 7: Restrict Access to Cardholder Data by Business Need to Know Testing Procedure How Sheriff CSM Deliv...
UpPrevious Next Sheriff CSM™ PCI DSS 3.2 Requirement 8: Identify and Authenticate Access to System Components Testing Procedure How Sheriff CSM Delivers S...
UpPrevious Next Sheriff CSM™ PacketFence When you configure PacketFence to send log data to Sheriff CSM, you can use the PacketFence plugin to translate raw log ...