Log File Log Source Parameters for Resolution1 CyberSecurity
If JSA does not automatically detect the log source, add a Resolution1 CyberSecurity log source on the JSA Console by using the Log File protocol.
When using the Log File protocol, there are specific parameters that you must use.
The following table describes the parameters that require specific values to collect Log File events from Resolution1 CyberSecurity:
Parameter |
Value |
---|---|
Log Source type |
Resolution1 CyberSecurity |
Protocol Configuration |
Syslog |
Log Source Identifier |
Type the IP address or host name of the Resolution1 CyberSecurity device. |