Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?


Log File Log Source Parameters for Resolution1 CyberSecurity

If JSA does not automatically detect the log source, add a Resolution1 CyberSecurity log source on the JSA Console by using the Log File protocol.

When using the Log File protocol, there are specific parameters that you must use.

The following table describes the parameters that require specific values to collect Log File events from Resolution1 CyberSecurity:

Table 1: Log File Log Source Parameters for the Resolution1 CyberSecurity DSM



Log Source type

Resolution1 CyberSecurity

Protocol Configuration


Log Source Identifier

Type the IP address or host name of the Resolution1 CyberSecurity device.