Step 1. Configure your Log Sources

With Tripwire LogCenter, you can collect log messages from a wide variety of Log Sources (i.e. log-generating systems and devices).

The following topics explain how to configure some popular Log Sources to send log messages to a Manager of your choosing. In Step 5. Configure your Collectors, you will create the Collectors for your Log Sources.

Configuring an Alcatel Switch

Configuring an Apache Server

Configuring a Blue Coat ProxySG Appliance

Configuring a Check Point Firewall

Configuring a Cisco Access Control Server (ACS)

Configuring a Cisco Adaptive Security Appliance (ASA)

Configuring a Cisco CATOS Switch

Configuring a Cisco IDS Sensor

Configuring a Cisco IOS Router

Configuring a Cisco PIX Firewall

Configuring a Fortinet Fortigate Firewall

Configuring an Internet Information Server (IIS)

Configuring a McAfee ePO Server

Configuring a Microsoft Windows System

Configuring a Microsoft IAS Server

Configuring a Microsoft ISA Server

Configuring a Microsoft SQL Server

Configuring a MySQL Server

Configuring an Nmap Security Scanner

Configuring an Oracle Database Server

Configuring a Snare Windows Server

Configuring a Snort IDS

Configuring a Syslog or Rsyslog Module

Configuring a Syslog-ng Module

Configuring a Tenable Nessus Vulnerability Scanner

Configuring a Tripwire VnE Manager

Configuring a VMware ESX Server

Configuring a VMware ESXi Server

Notes 

For the list of Log Sources available with this release, see:

https://www.tripwire.com/products/tripwire-log-center/system-requirements/

To configure other Log Sources, contact Tripwire Support for assistance.

If a Monitored Asset does not exist for the Log Source, TLC will automatically create the Asset when it begins receiving log messages from the Log Source if:

1. TLC uses a File or Network Collector for the Log Source, and
2. The Collector on the Manager receiving the log messages has been configured for Auto-Discovery.

Otherwise, you will need to create a Monitored Asset for the Log Source (see Working with Monitored Assets).

For more information about Auto-Discovery, see How does Auto-Discovery work?.