<?xml version="1.0" encoding="utf-8" ?><rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns="http://purl.org/rss/1.0/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:wiki="http://purl.org/rss/1.0/modules/wiki/" ><channel rdf:about="https://sheriffcybersecurity.com/docs/Sheriff">
<title>Docs's Sheriff web</title>
  <link>https://sheriffcybersecurity.com/docs/Sheriff</link>
  <description>The Sheriff web of Docs. Sheriff Cyber Security Documentation</description>
<image rdf:resource="/wp-content/uploads/2020/10/cropped-Main-logo.png" />
  <dc:language>en-us</dc:language>
  <dc:rights>Copyright 2026 by contributing authors</dc:rights>
  <dc:publisher>Wiki Administrator [foswiki@redsoleit.com]</dc:publisher>
  <dc:creator>The contributing authors of Docs</dc:creator>
  <dc:source>Docs</dc:source>
  <items>
    <rdf:Seq>
      <rdf:li rdf:resource="https://sheriffcybersecurity.com/docs/Sheriff/MicrosoftIISFTPServerThroughNXLog" />
      <rdf:li rdf:resource="https://sheriffcybersecurity.com/docs/Sheriff/MicrosoftDNSServerThroughNXLog" />
      <rdf:li rdf:resource="https://sheriffcybersecurity.com/docs/Sheriff/MikroTikRouter" />
      <rdf:li rdf:resource="https://sheriffcybersecurity.com/docs/Sheriff/MicrosoftOffice365CloudAppSecurity" />
      <rdf:li rdf:resource="https://sheriffcybersecurity.com/docs/Sheriff/KerioConnect" />
      <rdf:li rdf:resource="https://sheriffcybersecurity.com/docs/Sheriff/KasperskySecurityCenterDatabase" />
      <rdf:li rdf:resource="https://sheriffcybersecurity.com/docs/Sheriff/HPBladeSystemChassis" />
      <rdf:li rdf:resource="https://sheriffcybersecurity.com/docs/Sheriff/D-LinkWirelessController" />
      <rdf:li rdf:resource="https://sheriffcybersecurity.com/docs/Sheriff/CiscoRV" />
      <rdf:li rdf:resource="https://sheriffcybersecurity.com/docs/Sheriff/CiscoMeraki" />
      <rdf:li rdf:resource="https://sheriffcybersecurity.com/docs/Sheriff/A10ThunderWebApplicationFirewall" />
      <rdf:li rdf:resource="https://sheriffcybersecurity.com/docs/Sheriff/PluginFundamentals" />
      <rdf:li rdf:resource="https://sheriffcybersecurity.com/docs/Sheriff/ConfiguringHighAvailabilityForSheriffCSMStandardServers" />
      <rdf:li rdf:resource="https://sheriffcybersecurity.com/docs/Sheriff/MigrateYourSheriffCSMDeployment" />
      <rdf:li rdf:resource="https://sheriffcybersecurity.com/docs/Sheriff/VMwareVCenter" />
      <rdf:li rdf:resource="https://sheriffcybersecurity.com/docs/Sheriff/TrendMicroVulnerabilityProtection" />
    </rdf:Seq>
  </items>
</channel>
<image rdf:about="/wp-content/uploads/2020/10/cropped-Main-logo.png">
  <title>Sheriff Cyber Security Documentation.Sheriff</title>
  <link>https://sheriffcybersecurity.com/docs/Sheriff</link>
  <url>/wp-content/uploads/2020/10/cropped-Main-logo.png</url>
</image>
<item rdf:about="https://sheriffcybersecurity.com/docs/Sheriff/MicrosoftIISFTPServerThroughNXLog">
  <title>MicrosoftIISFTPServerThroughNXLog</title>
  <link>https://sheriffcybersecurity.com/docs/Sheriff/MicrosoftIISFTPServerThroughNXLog</link>
  <description>UpPrevious Next Sheriff CSM™ Microsoft IIS FTP Server through NXLog The Microsoft Internet Information Services (IIS) Management Pack includes a FTP Server that ... (last changed by SheriffCyberSecurity)</description>
  <dc:date>2022-07-06T20:17:31Z</dc:date>
  <dc:contributor>
    <rdf:Description link="https://sheriffcybersecurity.com/docs?topic=Main.SheriffCyberSecurity">
      <rdf:value>SheriffCyberSecurity</rdf:value>
    </rdf:Description>
  </dc:contributor>
</item>
<item rdf:about="https://sheriffcybersecurity.com/docs/Sheriff/MicrosoftDNSServerThroughNXLog">
  <title>MicrosoftDNSServerThroughNXLog</title>
  <link>https://sheriffcybersecurity.com/docs/Sheriff/MicrosoftDNSServerThroughNXLog</link>
  <description>UpPrevious Next Sheriff CSM™ Microsoft DNS Server through NXLog When you configure Microsoft DNS Server to send log data to Sheriff CSM, you can use the Microsof... (last changed by SheriffCyberSecurity)</description>
  <dc:date>2022-07-06T19:51:34Z</dc:date>
  <dc:contributor>
    <rdf:Description link="https://sheriffcybersecurity.com/docs?topic=Main.SheriffCyberSecurity">
      <rdf:value>SheriffCyberSecurity</rdf:value>
    </rdf:Description>
  </dc:contributor>
</item>
<item rdf:about="https://sheriffcybersecurity.com/docs/Sheriff/MikroTikRouter">
  <title>MikroTikRouter</title>
  <link>https://sheriffcybersecurity.com/docs/Sheriff/MikroTikRouter</link>
  <description>UpPrevious Next Sheriff CSM™ MikroTik Router When you configure MikroTik Router to send log data to Sheriff CSM, you can use the MikroTik Router plugin to transl... (last changed by SheriffCyberSecurity)</description>
  <dc:date>2022-07-06T18:45:41Z</dc:date>
  <dc:contributor>
    <rdf:Description link="https://sheriffcybersecurity.com/docs?topic=Main.SheriffCyberSecurity">
      <rdf:value>SheriffCyberSecurity</rdf:value>
    </rdf:Description>
  </dc:contributor>
</item>
<item rdf:about="https://sheriffcybersecurity.com/docs/Sheriff/MicrosoftOffice365CloudAppSecurity">
  <title>MicrosoftOffice365CloudAppSecurity</title>
  <link>https://sheriffcybersecurity.com/docs/Sheriff/MicrosoftOffice365CloudAppSecurity</link>
  <description>UpPrevious Next Sheriff CSM™ Microsoft Office 365 Cloud App Security When you configure Office 365 Cloud App Security (formerly named Office 365 Advanced Security... (last changed by SheriffCyberSecurity)</description>
  <dc:date>2022-07-06T18:44:06Z</dc:date>
  <dc:contributor>
    <rdf:Description link="https://sheriffcybersecurity.com/docs?topic=Main.SheriffCyberSecurity">
      <rdf:value>SheriffCyberSecurity</rdf:value>
    </rdf:Description>
  </dc:contributor>
</item>
<item rdf:about="https://sheriffcybersecurity.com/docs/Sheriff/KerioConnect">
  <title>KerioConnect</title>
  <link>https://sheriffcybersecurity.com/docs/Sheriff/KerioConnect</link>
  <description>UpPrevious Next Sheriff CSM™ Kerio Connect When you configure Kerio Connect to send log data to Sheriff CSM, you can use the plugin full name as appeared in prod... (last changed by SheriffCyberSecurity)</description>
  <dc:date>2022-07-06T18:22:54Z</dc:date>
  <dc:contributor>
    <rdf:Description link="https://sheriffcybersecurity.com/docs?topic=Main.SheriffCyberSecurity">
      <rdf:value>SheriffCyberSecurity</rdf:value>
    </rdf:Description>
  </dc:contributor>
</item>
<item rdf:about="https://sheriffcybersecurity.com/docs/Sheriff/KasperskySecurityCenterDatabase">
  <title>KasperskySecurityCenterDatabase</title>
  <link>https://sheriffcybersecurity.com/docs/Sheriff/KasperskySecurityCenterDatabase</link>
  <description>UpPrevious Next Sheriff CSM™ Kaspersky Security Center DataBase When you configure Kaspersky Security Center to send log data to Sheriff CSM, you can use the Kas... (last changed by SheriffCyberSecurity)</description>
  <dc:date>2022-07-06T18:19:38Z</dc:date>
  <dc:contributor>
    <rdf:Description link="https://sheriffcybersecurity.com/docs?topic=Main.SheriffCyberSecurity">
      <rdf:value>SheriffCyberSecurity</rdf:value>
    </rdf:Description>
  </dc:contributor>
</item>
<item rdf:about="https://sheriffcybersecurity.com/docs/Sheriff/HPBladeSystemChassis">
  <title>HPBladeSystemChassis</title>
  <link>https://sheriffcybersecurity.com/docs/Sheriff/HPBladeSystemChassis</link>
  <description>UpPrevious Next Sheriff CSM™ HP BladeSystem Chassis When you configure HP BladeSystem to send log data to Sheriff CSM, you can use the HP BladeSystem Chassis plu... (last changed by SheriffCyberSecurity)</description>
  <dc:date>2022-07-06T16:38:26Z</dc:date>
  <dc:contributor>
    <rdf:Description link="https://sheriffcybersecurity.com/docs?topic=Main.SheriffCyberSecurity">
      <rdf:value>SheriffCyberSecurity</rdf:value>
    </rdf:Description>
  </dc:contributor>
</item>
<item rdf:about="https://sheriffcybersecurity.com/docs/Sheriff/D-LinkWirelessController">
  <title>D-LinkWirelessController</title>
  <link>https://sheriffcybersecurity.com/docs/Sheriff/D-LinkWirelessController</link>
  <description>UpPrevious Next Sheriff CSM™ D Link Wireless Controller When you configure D Link Wireless Controller to send log data to Sheriff CSM, you can use the D Link Unif... (last changed by SheriffCyberSecurity)</description>
  <dc:date>2022-07-06T00:39:32Z</dc:date>
  <dc:contributor>
    <rdf:Description link="https://sheriffcybersecurity.com/docs?topic=Main.SheriffCyberSecurity">
      <rdf:value>SheriffCyberSecurity</rdf:value>
    </rdf:Description>
  </dc:contributor>
</item>
<item rdf:about="https://sheriffcybersecurity.com/docs/Sheriff/CiscoRV">
  <title>CiscoRV</title>
  <link>https://sheriffcybersecurity.com/docs/Sheriff/CiscoRV</link>
  <description>UpPrevious Next Sheriff CSM™ Cisco RV When you configure Cisco RV Series VPN Router to send log data to Sheriff CSM, you can use the Cisco rv plugin to translate... (last changed by SheriffCyberSecurity)</description>
  <dc:date>2022-07-05T19:00:11Z</dc:date>
  <dc:contributor>
    <rdf:Description link="https://sheriffcybersecurity.com/docs?topic=Main.SheriffCyberSecurity">
      <rdf:value>SheriffCyberSecurity</rdf:value>
    </rdf:Description>
  </dc:contributor>
</item>
<item rdf:about="https://sheriffcybersecurity.com/docs/Sheriff/CiscoMeraki">
  <title>CiscoMeraki</title>
  <link>https://sheriffcybersecurity.com/docs/Sheriff/CiscoMeraki</link>
  <description>UpPrevious Next Sheriff CSM™ Cisco Meraki When you configure Cisco Meraki to send log data to Sheriff CSM, you can use the Cisco Meraki plugin to translate raw l... (last changed by SheriffCyberSecurity)</description>
  <dc:date>2022-07-05T18:26:44Z</dc:date>
  <dc:contributor>
    <rdf:Description link="https://sheriffcybersecurity.com/docs?topic=Main.SheriffCyberSecurity">
      <rdf:value>SheriffCyberSecurity</rdf:value>
    </rdf:Description>
  </dc:contributor>
</item>
<item rdf:about="https://sheriffcybersecurity.com/docs/Sheriff/A10ThunderWebApplicationFirewall">
  <title>A10ThunderWebApplicationFirewall</title>
  <link>https://sheriffcybersecurity.com/docs/Sheriff/A10ThunderWebApplicationFirewall</link>
  <description>UpPrevious Next Sheriff CSM™ A10 Thunder Web Application Firewall (WAF) When you configure A10 Thunder WAF to send log data to Sheriff CSM, you can use the A10 Th... (last changed by SheriffCyberSecurity)</description>
  <dc:date>2022-07-05T03:50:55Z</dc:date>
  <dc:contributor>
    <rdf:Description link="https://sheriffcybersecurity.com/docs?topic=Main.SheriffCyberSecurity">
      <rdf:value>SheriffCyberSecurity</rdf:value>
    </rdf:Description>
  </dc:contributor>
</item>
<item rdf:about="https://sheriffcybersecurity.com/docs/Sheriff/PluginFundamentals">
  <title>PluginFundamentals</title>
  <link>https://sheriffcybersecurity.com/docs/Sheriff/PluginFundamentals</link>
  <description>UpPrevious Next Sheriff CSM™ Plugin Fundamentals %TWISTY{ showlink="Table of Contents" hidelink="Table of Contents" start="show" showimgleft="" hideimgleft=... (last changed by SheriffCyberSecurity)</description>
  <dc:date>2022-07-04T21:48:58Z</dc:date>
  <dc:contributor>
    <rdf:Description link="https://sheriffcybersecurity.com/docs?topic=Main.SheriffCyberSecurity">
      <rdf:value>SheriffCyberSecurity</rdf:value>
    </rdf:Description>
  </dc:contributor>
</item>
<item rdf:about="https://sheriffcybersecurity.com/docs/Sheriff/ConfiguringHighAvailabilityForSheriffCSMStandardServers">
  <title>ConfiguringHighAvailabilityForSheriffCSMStandardServers</title>
  <link>https://sheriffcybersecurity.com/docs/Sheriff/ConfiguringHighAvailabilityForSheriffCSMStandardServers</link>
  <description>UpPrevious Next Sheriff CSM™ Configuring High Availability for Sheriff CSM Standard Servers The Sheriff CSM Standard Server is the first Sheriff CSM component th... (last changed by SheriffCyberSecurity)</description>
  <dc:date>2022-07-04T21:23:56Z</dc:date>
  <dc:contributor>
    <rdf:Description link="https://sheriffcybersecurity.com/docs?topic=Main.SheriffCyberSecurity">
      <rdf:value>SheriffCyberSecurity</rdf:value>
    </rdf:Description>
  </dc:contributor>
</item>
<item rdf:about="https://sheriffcybersecurity.com/docs/Sheriff/MigrateYourSheriffCSMDeployment">
  <title>MigrateYourSheriffCSMDeployment</title>
  <link>https://sheriffcybersecurity.com/docs/Sheriff/MigrateYourSheriffCSMDeployment</link>
  <description>UpPrevious Next Sheriff CSM™ Migrate Your Sheriff CSM Deployment In some scenarios, such as disaster recovery, upgrades, or platform changes, you may choose to m... (last changed by SheriffCyberSecurity)</description>
  <dc:date>2022-07-01T17:32:23Z</dc:date>
  <dc:contributor>
    <rdf:Description link="https://sheriffcybersecurity.com/docs?topic=Main.SheriffCyberSecurity">
      <rdf:value>SheriffCyberSecurity</rdf:value>
    </rdf:Description>
  </dc:contributor>
</item>
<item rdf:about="https://sheriffcybersecurity.com/docs/Sheriff/VMwareVCenter">
  <title>VMwareVCenter</title>
  <link>https://sheriffcybersecurity.com/docs/Sheriff/VMwareVCenter</link>
  <description>UpPrevious Next Sheriff CSM™ VMware vCenter When you configure VMware vCenter to send log data to Sheriff CSM, you can use the VMware vCenter plugin to translate... (last changed by SheriffCyberSecurity)</description>
  <dc:date>2022-07-01T17:02:14Z</dc:date>
  <dc:contributor>
    <rdf:Description link="https://sheriffcybersecurity.com/docs?topic=Main.SheriffCyberSecurity">
      <rdf:value>SheriffCyberSecurity</rdf:value>
    </rdf:Description>
  </dc:contributor>
</item>
<item rdf:about="https://sheriffcybersecurity.com/docs/Sheriff/TrendMicroVulnerabilityProtection">
  <title>TrendMicroVulnerabilityProtection</title>
  <link>https://sheriffcybersecurity.com/docs/Sheriff/TrendMicroVulnerabilityProtection</link>
  <description>UpPrevious Next Sheriff CSM™ Trend Micro Vulnerability Protection When you configure Trend Micro Vulnerability Protection to send log data to Sheriff CSM, you can... (last changed by SheriffCyberSecurity)</description>
  <dc:date>2022-07-01T03:57:43Z</dc:date>
  <dc:contributor>
    <rdf:Description link="https://sheriffcybersecurity.com/docs?topic=Main.SheriffCyberSecurity">
      <rdf:value>SheriffCyberSecurity</rdf:value>
    </rdf:Description>
  </dc:contributor>
</item>
<!-- <ul>
<li> Set SKIN = rss
</li> <li> Set COVER = rss
</li></ul> 
-->
</rdf:RDF>