FortiSIEM Configuring Network Compliance Management Applications
Configuring Network Compliance Management Applications AccelOps supports these Network Compliance Management applications and monitoring. Cisco Network Compliance Manager Configuration Cisco Network...
View ArticleFortiSIEM Configuring Network Intrusion Protection Systems (IPS)
Configuring Network Intrusion Protection Systems (IPS) AccelOps supports these intrusion protection systems for discovery and monitoring. AirTight Networks SpectraGuard Cisco FireSIGHT Cisco Intrusion...
View ArticleFortiSIEM Configuring Routers and Switches
Configuring Routers and Switches AccelOps supports these routers and switches for discovery and monitoring. Alcatel TiMOS and AOS Switch Configuration Arista Router and Switch Configuration Brocade...
View ArticleFortiSIEM Configuring Security Gateways
Configuring Security Gateways AccelOps supports these security gateways for discovery and monitoring. Barracuda Networks Spam Firewall Configuration Blue Coat Web Proxy Configuration Cisco IronPort...
View ArticleFortiSIEM Configuring Servers
Configuring Servers AccelOps supports these servers for discovery and monitoring. HP UX Server Configuration IBM AIX Server Configuration IBM OS400 Server Configuration Linux Server Configuration...
View ArticleFortiSIEM Configuring Storage
Configuring Storage AccelOps supports these storage devices for discovery and monitoring. Brocade SAN Switch Configuration Dell Compellant Storage Configuration Dell EqualLogic Storage Configuration...
View ArticleFortiSIEM Configuring Virtualization
Configuring Virtualization AccelOps supports these virtualization servers for discovery and monitoring. HyperV Configuration VMware ESX Configuration HyperV Configuration What is Discovered and...
View ArticleFortiSIEM Juniper Networks SSL VPN Gateway Configuration
Juniper Networks SSL VPN Gateway Configuration What is Discovered and Monitored Configuration Settings for Access Credentials What is Discovered and Monitored Protocol Information Discovered Metrics...
View ArticleFortiSIEM Microsoft PPTP VPN Gateway Configuration
Microsoft PPTP VPN Gateway Configuration Configuring Microsoft PPTP Windows 2003 Server Logon with administrative rights Configure PPTP VPN Go to Start | All Programs | Administrative Tools | Configure...
View ArticleFortiSIEM Configuring Vulnerability Scanners
Configuring Vulnerability Scanners AccelOps supports these vulnerability scanners for discovery and monitoring. McAfee Foundstone Vulnerability Scanner Configuration Nessus Vulnerability Scanner...
View ArticleFortiSIEM Configuring WAN Accelerators
Configuring WAN Accelerators AccelOps supports these wide area network accelerators for discovery and monitoring. Cisco Wide Area Application Server Configuration Riverbed SteelHead WAN Accelerator...
View ArticleFortiSIEM Configuring Wireless LANs
Configuring Wireless LANs AccelOps supports these wireless local area network devices for discovery and monitoring. Aruba Networks Wireless LAN Configuration Cisco Wireless LAN Configuration Motorola...
View ArticleFortiSIEM Using Virtual IPs to Access Devices in Clustered Environments
Using Virtual IPs to Access Devices in Clustered Environments AccelOps communicates to devices and applications using multiple protocols. In many instances, access credentials for discovery protocols...
View ArticleFortiSIEM Configuring Syslog over TLS
Configuring Syslog over TLS To receive syslog over TLS, a port needs to be enabled and certificates need to be defined. The following configurations are already added to phoenix_config.txt in...
View ArticleFortiSIEM Discovering Infrastructure
Discovering Infrastructure FortiSIEM can automatically discover the devices, applications, and users in your IT infrastructure and begin monitoring them. You initiate device discovery by providing the...
View ArticleFortiSIEM Discovery Settings
Discovery Settings Before you initiate discovery, you should configure the Discovery Settings in your Supervisor. Log in to your Supervisor node. Go to Admin > General Settings > Discovery....
View ArticleFortiSIEM Setting Device Location Information
Setting Device Location Information In the Admin > General Settings > Discovery screen, you can set device locations based on IP range and organization. You can do this manually for each...
View ArticleFortiSIEM Discovery for Multi-Tenant Deployments
Discovery for Multi-Tenant Deployments In multi-tenant deployments with organizations, the discovery process differs depending on whether or not you are using Collectors. This is because of the way in...
View ArticleFortiSIEM Setting up CyberArk
Setting up CyberArk This section specifies how FortiSIEM can be configured to fetch credentials from CyberArk. Installing CyberArk Provider in FortiSIEM Login to FortiSIEM as root Run the rpm command...
View ArticleFortiSIEM Setting Access Credentials for Device Discovery
Setting Access Credentials for Device Discovery Before you can discover devices, you need to provide the access protocol and credentials associated with the IP address or range where your devices are...
View Article