Appendix I: Log-Source Configuration

Configuring an Alcatel Switch

Configuring an Apache Server

Configuring a Blue Coat ProxySG Appliance

Configuring a Check Point Firewall

Configuring a Cisco Access Control Server (ACS)

Configuring a Cisco Adaptive Security Appliance (ASA)

Configuring a Cisco CATOS Switch

Configuring a Cisco IDS Sensor

Configuring a Cisco IOS Router

Configuring a Cisco PIX Firewall

Configuring an F5 BIG-IP Server

Configuring a Fortinet Fortigate Firewall

Configuring an Internet Information Server (IIS)

Configuring a McAfee ePO Server

Configuring a Microsoft Windows System

Configuring a Microsoft IAS Server

Configuring a Microsoft ISA Server

Configuring a MySQL Server

Configuring an Nmap Security Scanner

Configuring an Oracle Database Server

Configuring a Snare Windows Server

Configuring a Snort IDS

Configuring a Syslog or Rsyslog Module

Configuring a Syslog-ng Module

Configuring a Tenable Nessus Vulnerability Scanner

Configuring a Tripwire VnE Manager

Configuring a VMware ESX Server

Configuring a VMware ESXi Server