Quantcast
Channel: Fortinet GURU
Browsing all 2380 articles
Browse latest View live

Configuring FortiSIEM

Configuring FortiSIEM Initial System Configuration Before you can initiate discovery and monitoring of your IT infrastructure, you will need to configure several general settings, add users, and add...

View Article


Managing Organizations for Multi-Tenant Deployments

Managing Organizations for Multi-Tenant Deployments Organizations can be created with or without Collectors. If you are using Collectors in a clustered deployment that includes Workers, please make...

View Article


Deleting Organizations

Deleting Organizations Log into your Supervisor node as a Super/Global user. Go to Admin > Setup Wizard > Organizations. Write down the ID of the organization you want to delete. Go to Admin >...

View Article

Dynamic Distribution of Events per Second (EPS) across Collectors

Dynamic Distribution of Events per Second (EPS) across Collectors In multi-tenant deployments, the service provider is licensed a certain amount of EPS. The service provider distributes these EPS among...

View Article

How Devices are Added to Organizations

How Devices are Added to Organizations When you initiate device discovery for organizations, the way in which those devices are added to organizations depends on whether you are using Collectors in...

View Article


Adding Users to Multi-Tenant Deployments

Adding Users to Multi-Tenant Deployments Two kinds of admin users can be added users belonging to a specific organization or super-local users belonging to super-global Adding specific organization...

View Article

Adding Super/Global Users to Organizations with Collectors

Adding Super/Global Users to Organizations with Collectors In multi-tenant deployments, you may need to create Super/Global users who have roles within multiple organizations. If your deployments...

View Article

Configuring External Systems for Discovery, Monitoring and Log Co

Configuring External Systems for Discovery, Monitoring and Log Collection Ports Used by FortiSIEM for Discovery and Monitoring These ports are used by FortiSIEM to discover devices, pull metrics and...

View Article


Configuring FortiSIEM Windows Agents

Configuring FortiSIEM Windows Agents This section describes how to setup FortiSIEM Windows Agent and Agent Manager as part of FortiSIEM infrastructure. Configure FortiSIEM Supervisor Register Windows...

View Article


Configuring Applications FortiSIEM

Configuring Applications This section describes how to configure applications for discovery and for providing information to AccelOps. What is Discovered and Monitored Protocol Information discovered...

View Article

FortiSIEM Microsoft ASP.NET Configuration

Microsoft ASP.NET Configuration Creating a Generic User Who Does Not Belong to the Local Administrator Group Enable Remote WMI Requests by Adding a Monitoring Account to the Distributed COM Users Group...

View Article

FortiSIEM Oracle WebLogic Configuration

Oracle WebLogic Configuration What is Discovered and Monitored Protocol Information discovered Metrics collected Used for JMX   Generic information: Application version, Application port, SSL listen...

View Article

FortiSIEM Redhat JBOSS Configuration

Redhat JBOSS Configuration What is Discovered and Monitored Event Types Rules Reports Configuration JMX Configuring JMX on the JBOSS Application Server Configuring AccelOps to Use the JMX Protocol with...

View Article


FortiSIEM Authentication Server Configuration

Authentication Server Configuration AccelOps supports these authentication servers for discovery and monitoring. Cisco Access Control Server (ACS) Configuration Microsoft Internet Authentication Server...

View Article

FortiSIEM CyberArk Password Vault Configuration

CyberArk Password Vault Configuration What is Discovered and Monitored Protocol Information discovered Logs parsed Used for Syslog (CEF formatted and others)   CyberArk Safe Activity Security...

View Article


FortiSIEM Database Server Configuration

Database Server Configuration AccelOps supports these database servers for discovery and monitoring. IBM DB2 Server Configuration Microsoft SQL Server Configuration Microsoft SQL Server Scripts SQL...

View Article

FortiSIEM Microsoft SQL Server Scripts

Microsoft SQL Server Scripts SQL Server Database Level Event Creation Script (PH_Database_Level_Events.sql) SQL Server DDL Event Creation Script (PH_DDL_Server_Level_Events.sql) CREATE TRIGGER...

View Article


FortiSIEM MySQL Server Configuration

MySQL Server Configuration What is Discovered and Monitored Event Types Rules Reports SNMP JDBC for Database Auditing – MySQL Server Settings for Access Credentials Sample events System Level...

View Article

FortiSIEM Oracle Database Server Configuration

Oracle Database Server Configuration Supported Versions What is Discovered and Monitored Event Types Rules Reports SNMP JDBC for Database Performance Monitoring – Oracle Database Server JDBC for...

View Article

FortiSIEM ISC BIND DNS Configuration

ISC BIND DNS Configuration What is Discovered and Monitored Protocol Information discovered Metrics collected Used for SNMP Application type Process level CPU utilization, Memory utilization...

View Article
Browsing all 2380 articles
Browse latest View live