: Configure Syslog Monitoring on Data Security
Focus
Focus

Configure Syslog Monitoring on Data Security

Table of Contents

Configure Syslog Monitoring on Data Security

Use these steps to configure a syslog server profile on Data Security.
Data Security supports the following log types:
  • Incidents log
  • Policy Violation log
  • Remediation log
  • Activity Monitoring log
  • Admin Audit log
  1. To configure syslog monitoring, go to SettingsDirectory & External ServicesExternal ServicesAdd Syslog/API Client.
  2. Select Syslog Receiver to create a Syslog server profile.
    You can add only external service — forward logs to a syslog receiver or Add Cloud Apps to Data Security.
  3. Enter a Name for the profile.
  4. Add the information Data Security requires to connect to it:
    • Name—Unique name for the server profile.
    • Server IP—IP address of the syslog server.
    • Port—The port number on which you send syslog messages. You must use the same port number for Data Security and the syslog server.
    • Facility—Select a syslog standard value (for example, LOG_USER) to calculate the priority (PRI) field in your syslog server implementation. The PRI part of the syslog message represents the Facility and Severity of the message. Select the value that maps to how you use the PRI field to manage your syslog messages. Values can be LOG_USER or LOG_LOCAL0 through LOG_LOCAL7. There is no default.
    • Message format—Select the syslog message format to use: BSD (the default) or IETF. Traditionally, IETF format is used over TCP or SSL.
  5. Save your changes.
  6. On the Syslog server, self-sign your server and create the SSL certificate, then enable TLS in the syslog configuration, setting the TLS option to peer-verify(optional-untrusted).
    TCP is required as the reliable transport.