Configure and manage Log Inspection module settings.
Important
|
Log Inspection helps you identify important events that might be buried in your operating
system and application logs. These events can be sent to a security information and
event management (SIEM) system or centralized logging server for correlation, reporting,
and archiving.
Procedure
- To protect your endpoints with Log Inspection, select Enable.
- Configure Recommendation settings.Recommendation settings control which Log Inspection rules agents apply when monitoring your endpoints.
-
Use Recommendation Scan to dynamically apply rules to each endpoint: Allow agents to run the Recommendation Scan and dynamically apply recommended rules to each endpoint. Recommendation scan analyzes your security environment and the context for each endpoint, allowing agents to determine which rules with the Dynamic status to trigger and take actions on.
-
Apply Log Inspection rules you have configured to "Always" status : Only triggers and performs actions on a rule if you change the Status of the rule to Always in the Rule status and configuration table.
-
- Manage Rule status and configuration.
- Locate the rule you want to configure.Use the search and filters to find the rule you want to manage. To view more details about a rule, click the rule name.
- Configure the rule status.
-
Dynamic: Agents might apply the rule to trigger and take action on security events depending on your recommendation settings. Dynamic is the default setting. You must manually change the rule status if you want to set a rule to Always or Never.
-
Always: Agents trigger and take action on the rule regardless of your recommendation settings. You can configure up to 350 rules with the always applied status.
-
Never: Agents do not trigger and take action on the rule regardless of your recommendation settings.
-
- Locate the rule you want to configure.
