Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

 
 

Log File Log Source Parameters for Resolution1 CyberSecurity

If JSA does not automatically detect the log source, add a Resolution1 CyberSecurity log source on the JSA Console by using the Log File protocol.

When using the Log File protocol, there are specific parameters that you must use.

The following table describes the parameters that require specific values to collect Log File events from Resolution1 CyberSecurity:

Table 1: Log File Log Source Parameters for the Resolution1 CyberSecurity DSM

Parameter

Value

Log Source type

Resolution1 CyberSecurity

Protocol Configuration

Syslog

Log Source Identifier

Type the IP address or host name of the Resolution1 CyberSecurity device.