UpPrevious Next Sheriff CSM™ A10 Thunder Web Application Firewall (WAF) When you configure A10 Thunder WAF to send log data to Sheriff CSM, you can use the A10 Th...
UpPrevious Next Sheriff CSM™ ASUSTeK Router When you configure ASUSTeK Router to send log data to Sheriff CSM, you can use the ASUSTeK Router plugin to translate ...
UpPrevious Next Sheriff CSM™ About Sheriff CSM %TWISTY{ showlink="table of Contents" hidelink="Table of Contents" start="show" showimgleft="" hideimgleft=""...
UpPrevious Next Sheriff CSM™ About Sheriff CSM Components The following diagram provides a high level view of the overall Sheriff CSM architecture. Sheriff CSM h...
UpPrevious Next Sheriff CSM™ About Sheriff CSM Network Security Capabilities Sheriff CSM is designed primarily to help mid size organizations effectively defend t...
UpPrevious Next Sheriff CSM™ About Sheriff CSM System Architecture and Components As a unified security platform, Sheriff CSM combines several critical security ...
UpPrevious Next Sheriff CSM™ Addendum Notice Regarding Scanning Leased or Public Address Space Sheriff CSM and Sheriff Vigilante® contain a number of built in too...
UpPrevious Next Sheriff CSM™ Adding Assets Sheriff CSM provides different ways to add your assets: Note: The Sheriff CSM system inserts new assets automatically ...
Advanced Options for Asset Scans Advanced OptionsSuboptionDescription Scan Type Ping Sends a ping to each asset. Fast Scan (Default) Scans the most commo...
UpPrevious Next Sheriff CSM™ Agentless Monitoring Sheriff HIDS allows you to run integrity checking without agents installed on hosts, network devices, routers, f...
UpPrevious Next Sheriff CSM™ Alarm Details — Columns and Fields Alarm Details field descriptions Column/Field Name Description Status Whether or not t...
UpPrevious Next Sheriff CSM™ Alarms List — Fields Alarms list fields Column/Field Name Description Date Date and time Sheriff CSM completed alarm corr...
UpPrevious Next Sheriff CSM™ Analyzing Alarms, Events, Logs, and Tickets You will likely spend the most time reviewing and analyzing the network security of your...
UpPrevious Next Sheriff CSM™ Arpalert When you configure Arpalert to send log data to Sheriff CSM, you can use the Arpalert plugin to translate raw log data into...
UpPrevious Next Sheriff CSM™ Array Networks Secure Access Gateway When you configure Array Networks Secure Access Gateway to send log data to Sheriff CSM, you ca...
UpPrevious Next Sheriff CSM™ Artillery Honeypot When you configure Binary Defense Artillery Hfoneypot to send log data to Sheriff CSM, you can use the Artillery ...
UpPrevious Next Sheriff CSM™ Asset Administration Managing assets occurs in Sheriff CSM in the Asset List View. This section covers the following subtopics: *...
Asset Details View Tab Description TabInformation Shown Vulnerabilities Vulnerabilities related to this asset. Alarms Alarms related to this asset. Event...
UpPrevious Next Sheriff CSM™ Asset Group Administration This section covers the following subtopics: * Asset Group List View * Creating an Asset Group *...
UpPrevious Next Sheriff CSM™ Asset Group List View An asset group is an administratively created object that pools similar assets used for specific purposes. Sher...
UpPrevious Next Sheriff CSM™ Asset List View The Asset List view, Environment Assets Groups Assets, provides a centralized view of your assets. For fiel...
UpPrevious Next Sheriff CSM™ Assets and Groups It is important for security practitioners to know what assets are connected on the company network and how the de...
UpPrevious Next Sheriff CSM™ Atomic Software HoneyBOT When you configure Atomic Software HoneyBOT to send log data to Sheriff CSM, you can use the HoneyBOT plugi...
UpPrevious Next Sheriff CSM™ Avaya Media Gateway When you configure Avaya Media Gateway to send log data to Sheriff CSM, you can use the Avaya Media Gateway plug...
UpPrevious Next Sheriff CSM™ Avaya Wireless LAN When you configure Avaya Wireless LAN to send log data to Sheriff CSM, you can use the Avaya Wireless LAN plugin ...
UpPrevious Next Sheriff CSM™ Back Up and Restore Alarms By default, Sheriff CSM stores alarms in the database until you delete them manually. To save disk space,...
UpPrevious Next Sheriff CSM™ Back Up and Restore Alarms By default, Sheriff CSM stores alarms in the database until you delete them manually. To save disk space,...
UpPrevious Next Sheriff CSM™ Back Up and Restore Events Sheriff CSM uses internal caches to ensure that communication interruptions between the Sheriff CSM Senso...
UpPrevious Next Sheriff CSM™ Back Up and Restore Events Sheriff CSM uses internal caches to ensure that communication interruptions between the Sheriff CSM Senso...
UpPrevious Next Sheriff CSM™ Back Up and Restore MongoDB MongoDB is a cross platform and open source document oriented database, a kind of NoSQL database. As a No...
UpPrevious Next Sheriff CSM™ Back Up and Restore NetFlow Data NetFlow is a protocol designed and published by Cisco Systems that has become the accepted industry ...
UpPrevious Next Sheriff CSM™ Back Up and Restore System Configuration %TWISTY{ showlink="Table of Contents" hidelink="Table of Contents" start="show" showimgl...
UpPrevious Next Sheriff CSM™ Back up and Restoration Sheriff CSM does not offer a tool to back up or restore the entire system collectively. However, you can bac...
UpPrevious Next Sheriff CSM™ Barracuda NextGen Firewalls When you configure Barracuda NextGen Firewalls to send log data to Sheriff CSM, you can use the Barracuda...
UpPrevious Next Sheriff CSM™ Blackboard Learn When you configure Blackboard Learn to send log data to Sheriff CSM, you can use the Blackboard Learn plugin to tra...
UpPrevious Next Sheriff CSM™ Blue Coat ProxySG When you configure Symantec (formerly Blue Coat) ProxySG to send log data to Sheriff CSM, you can use the Blue Coa...
UpPrevious Next Sheriff CSM™ Brocade Router/Switch When you configure Brocade Router/Switch to send log data to Sheriff CSM, you can use the Brocade Router/Switc...
UpPrevious Next Build a VPN Tunnel This task builds a tunnel between the configured VPN server and the node intended to act as the VPN client. To build a tunnel...
UpPrevious Next Sheriff CSM™ Building a VPN Tunnel Without a Client Server Connection If there is no connection between the VPN server and the client, which is o...
UpPrevious Next Sheriff CSM™ Burn the Sheriff CSM ISO Image to a USB Drive This procedure is a prerequisite to updating Sheriff CSM offline or restoring the soft...