Dell Data Protection Threat Defense Installation And Administrator Guide V17.11.06 User Manual Guide10 En Us
User Manual: Dell dell-data-protection-threat-defense - Threat Defense Installation and Administrator Guide v17.11.06
Open the PDF directly: View PDF
Page Count: 85
- OVERVIEW
- CONSOLE
- APPLICATION
- Threat Defense Agent
- Windows Agent
- macOS Agent
- Agent Service
- Virtual Machines
- Password-Protected Uninstall
- Integrations
- Syslog/SIEM
- Event Types
- Audit Log
- Example Message for Audit Log being forwarded to Syslog
- Devices
- Example Message for Device Registered Event
- Example Message for Device Removed Event
- Example Message for Device Updated Event
- Threats
- Example Message of Threat Event
- Threat Classifications
- Example Message of Threat Classification
- SIEM (Security Information and Event Management)
- Protocol
- TLS/SSL
- IP/Domain
- Port
- Severity
- Facility
- Testing the Connection
- Event Types
- Custom Authentication
- Threat Data Report
- Syslog/SIEM
- TROUBLESHOOTING
- APPENDIX A: GLOSSARY
- APPENDIX B: HANDLING EXCEPTIONS
- APPENDIX C: USER PERMISSIONS
- APPENDIX D: FILE-BASED WRITE FILTER