Detailed topic list for Sheriff Web

Results from Sheriff web retrieved at 09:08 (GMT)

SheriffCSMDashboards
UpPrevious Next Sheriff CSM™ Sheriff CSM Dashboards %TWISTY{ showlink="Table of Contents" hidelink="Table of Contents" start="show" showimgleft="" hideimglef...
SheriffCSMDeploymentRequirements
UpPrevious Next Sheriff CSM™ Sheriff CSM Deployment Requirements Sheriff CSM has the following general deployment requirements. Minimum Hardware Requirements fo...
SheriffCSMDeploymentTypes
UpPrevious Next Sheriff CSM™ Sheriff CSM Deployment Types This section introduces the various Sheriff CSM components and explains the different deployment types....
SheriffCSMDeployments
UpPrevious Next Sheriff CSM™ Sheriff CSM Deployments %TWISTY{ showlink="Table of Contents" hidelink="Table of Contents" start="show" showimgleft="" hideimgl...
SheriffCSMDocumentation
Sheriff CSM Documentation Deployment Guide User Guide Test test2 Vigilante Limitations: Because Vigilante® includes a subset of Sheriff CSM's capabili...
SheriffCSMEventProcessingWorkflow
UpPrevious Next Sheriff CSM™ Sheriff CSM Event Processing Workflow After Sheriff CSM is installed in your environment, events start flowing through the Sheriff ...
SheriffCSMEventProcessingWorkflowEM
UpPrevious Next Sheriff CSM™ Sheriff CSM Event Processing Workflow After Sheriff CSM is installed in your environment, events start flowing through the Sheriff C...
SheriffCSMEventTaxonomy
UpPrevious Next Sheriff CSM™ Sheriff CSM Event Taxonomy Sheriff event taxonomy is a classification system for security events. It provides the Sheriff CSM correla...
SheriffCSMExceptedDataTypes
UpPrevious Next Sheriff CSM Excepted Data Types Device CategoriesDevice Types for Network Device Network Device: Bridge Network Device: Broadband Router Net...
SheriffCSMInitialSetup
UpPrevious Next Sheriff CSM™ Sheriff CSM Initial Setup %TWISTY{ showlink="Table of Contents" hidelink="Table of Contents" start="show" showimgleft="" hideim...
SheriffCSMNetworkSecurityBestPractices
UpPrevious Next Sheriff CSM™ Sheriff CSM Network Security Best Practices Providing strong and effective security for an organization’s network, IT infrastructure,...
SheriffCSMNetworkSecurityConceptsAndTerminology
UpPrevious Next Sheriff CSM™ Sheriff CSM Network Security Concepts and Terminology When working with Sheriff CSM and using the Sheriff CSM web UI to perform netw...
SheriffCSMReports
UpPrevious Next Sheriff CSM™ Sheriff CSM Reports %TWISTY{ showlink="Table of Contents" hidelink="Table of Contents" start="show" showimgleft="" hideimgleft=...
SheriffCSMSecurityMonitoringAndAnalysis
UpPrevious Next Sheriff CSM™ Sheriff CSM Security Monitoring and Analysis This section provides an overview of Sheriff CSM web UI main menu and submenu options an...
SheriffCSMUpdates
UpPrevious Next Sheriff CSM™ Sheriff CSM Updates %TWISTY{ showlink="Table of Contents" hidelink="Table of Contents" start="show" showimgleft="" hideimgleft=...
SheriffCSMUserAccounts
UpPrevious Next Sheriff CSM™ Sheriff CSM User Accounts Sheriff CSM has different levels of user accounts for administration and management: * Root user — Crea...
SheriffConsole
Sheriff Console SSH management interface used to perform setup and configuration tasks for Sheriff CSM with the options from the Sheriff Setup menu.
SheriffConsoleDefinition
Sheriff Console SSH management interface used to perform setup and configuration tasks for Sheriff CSM with options from the Sheriff Setup menu.
SheriffHIDS
UpPrevious Next Sheriff CSM™ Sheriff HIDS %TWISTY{ showlink="Table of Contents" hidelink="Table of Contents" start="show" showimgleft="" hideimgleft="" }% ...
SheriffHIDSDefinition
Sheriff HIDS A Sheriff CSM feature and data source for intrusion detection that enables host based log collection, file integrity monitoring, and, on Windows host...
SheriffHIDSDescription
Sheriff HIDS Description A Sheriff CSM feature and data source for intrusion detection that enables the host based log collection, file integrity monitoring, and,...
SheriffNIDS
UpPrevious Next Sheriff CSM™ Sheriff NIDS %TWISTY{ showlink="Table of Contents" hidelink="Table of Contents" start="show" showimgleft="" hideimgleft="" }% ...
SheriffNIDSDefinition
Sheriff NIDS A Sheriff CSM feature and data source for intrusion detection that monitors network traffic and attacks malicious events. In conjunction with event c...
SheriffVigilanteInstallationProcess
UpPrevious Next Sheriff CSM™ Sheriff Vigilante® Installation Process Download Sheriff Vigilante The free, open source Sheriff Vigilante® ISO file can be found o...
SheriffVigilanteReportType
UpPrevious Next Sheriff CSM™ Sheriff Vigilante Report Types Sheriff Vigilante Reports Sheriff Vigilante provides a set of simplified versions of the reports fou...
ShorewallFirewall
UpPrevious Next Sheriff CSM™ Shorewall Firewall When you configure Shorewall Firewall to send log data to Sheriff CSM, you can use the Sharewall Firewall plugin ...
SophosAntivirus
UpPrevious Next Sheriff CSM™ Sophos Antivirus When you configure Sophos Antivirus to send log data to Sheriff CSM, you can use the Sophos Antivirus plugin to tra...
SophosCentral
UpPrevious Next Sheriff CSM™ Sophos Central When you configure Sophos Central to send log data to Sheriff CSM, you can use the sophos central plugin to translate ...
SophosEnterpriseConsoleThroughNXLog
UpPrevious Next Sheriff CSM™ Sophos Enterprise Console through NXLog When you configure Sophos Enterprise Console (SEC) to send log data to Sheriff CSM, you can ...
SophosXGFirewall
UpPrevious Next Sheriff CSM™ Sophos XG Firewall When you configure Sophos XG Firewall to send log data to Sheriff CSM, you can use the Sophos XG plugin to transla...
SupportedFormatsByTheNormalizeDateFunction
UpPrevious Next Sheriff CSM™ Supported Formats by the normalize_date() Function When the Sheriff CSM plugins parse logs received from various devices, they use a...
SymantecATP
UpPrevious Next Sheriff CSM™ Symantec ATP When you configure Symantec ATP to send log data to Sheriff CSM, you can use the Symantec atp plugin to translate raw lo...
SymantecEPM
UpPrevious Next Sheriff CSM™ Symantec EPM When you configure Symantec EPM to send log data to Sheriff CSM, you can use the Symantec EPM plugin to translate raw l...
SystemComponents
Main.SheriffCyberSecurity 20 Oct 2020
SystemMaintenanceAndRemoteSupport
UpPrevious Next Sheriff CSM™ System Maintenance and Remote Support Sheriff CSM uses the Message Center to centralize all in system errors, warnings, and messages...
SystemOverview
UpPrevious Next Sheriff CSM™ System Overview This is a basic overview of Sheriff CSM as it is deployed and used in your environment. Individual subjects covered ...
SystemSettingsForAuthenticatedScans
UpPrevious Next Sheriff CSM™ System Settings for Authenticated Scans An authenticated scan is a vulnerability testing measure performed from the vantage of a logg...
TakingOwnershipOfAnAlarm
UpPrevious Next Sheriff CSM™ Taking Ownership of an Alarm As part of an alarm remediation response, you should take ownership of an alarm you want to work on. Th...
Task2AddALevel1RuleToDetectTheEvent
UpPrevious Next Task 2: Add a Level 1 Rule to Detect the Event This task adds a level 1 rule for the directive created in Task 1. In this rule, we try to match o...
Task3AddALevel2RuleToDetectTheSameEventWith100Occurrences
UpPrevious Next Task 3: Add a Level 2 Rule to Detect the Same Event with 100 Occurrences In this task, we try to match the same events selected in Task 2. We wan...
Task4AddALevel3RuleToDetectTheSameEventWith1000Occurrences
UpPrevious Next Task 4: Add a Level 3 Rule to Detect the Same Event with 1000 Occurrences This task is a repeat of Task 3. You can repeat this task as many times...
Task5ReloadDirectives
UpPrevious Next Task 5: Reload Directives To apply all the changes made 1 Click Reload Directives. The text displays in red, suggesting an action. 1 Clic...
Test
Examine Alarms and Security Events In this procedure, we describe the first and most straightforward method of investigating the trigger for a specific alarm. To ...
Test2
To search the Threat Database for available plugins 1 Go to Environment Vulnerabilities Threat Database. Sheriff CSM displays the threat families with the ...
ThePolicyView
UpPrevious Next Sheriff CSM™ The Policy View %TWISTY{ showlink="Table of Contents" hidelink="Table of Contents" start="show" showimgleft="" hideimgleft="" }...
TheSheriffCSMWebUserInterface
UpPrevious Next Sheriff CSM™ The Sheriff CSM Web User Interface The Sheriff CSM web user interface (or web UI) provides access to all the tools and capabilities ...
ThycoticSoftwareSecretServer
UpPrevious Next Sheriff CSM™ Thycotic Software Secret Server When you configure Thycotic Software Secret Server to send log data to Sheriff CSM, you can use the T...
TicketManagement
UpPrevious Next Sheriff CSM™ Ticket Management %TWISTY{ showlink="Ticket Management" hidelink="Ticket Management" start="show" showimgleft="" hideimgleft="" ...
TimeRangeConditions
UpPrevious Next Time Range Time Range sets a period of time in which to match events. When configured, only events that occur during the specified time range are...
TimeZones
Africa/Abidjan Africa/Accra Africa/Addis_Ababa Africa/Algiers Africa/Asmara Africa/Asmera Africa/Bamako Africa/Bangui Africa/Banjul Africa/Bissau Africa/Blantyre ...
Number of topics: 50
< Previous Page 8 of 10 Next >

See also the faster WebTopicList

This topic: Sheriff > WebHome > WebIndex
Topic revision: 16 Oct 2020, SiteAdmin
Copyright 2020 Sheriff Cyber Security, LLC. All rights reserved.