For an overview of the log inspection module, see About Log Inspection.
![]() |
NoteYou need a Workload license to enable log inspection.
|
To use log inspection, follow the steps in these procedures:
Procedure
Turn on the log inspection module
Enable log inspection for a policy.
Procedure
- Go to Policies.
- Double-click the policy.
- Select .
- Select On for Log Inspection State.
- Click Save.
Run a recommendation scan
Run a recommendation scan on the computer for recommendations about which rules to apply.
Apply the recommended log inspection rules
Server & Workload Protection ships with many pre-defined rules covering a wide variety of operating systems and
applications. When you run a recommendation scan, you can choose to have Server & Workload Protection
automatically implement recommendations or you can choose to manually select and assign the rules.
Although Server & Workload Protection ships with log inspection rules for many common operating systems and applications,
you also have the option to create your own custom rules. To create a custom rule,
you can either use the Basic Rule template, or you can write your new rule in XML.
For information on how to create a custom rule, see Define a log inspection rule for use in policies.
Test Log Inspection
Before completing Log Inspection configuration, test that the rules are working correctly:
Procedure
- Ensure Log Inspection is enabled.
- In the computer or policies editor, select .
- Set Store events at the Agent/Appliance for later retrieval by DSM when they equal or exceed the following severity level to Low (3) then click Save.
- On the General tab, click Assign/Unassign.
- Search for and enable 1002792 - Default Rules Configuration. This is required for all other Log Inspection rules to work.
- Enable the rules for the platform:
- For Windows, enable 1002795 - Microsoft Windows Events to log events every time the Windows auditing functionality registers an event.
- For Linux, enable 1002831 - Unix - Syslog to inspect the syslog for events.
- Click OK then click Save.
- Try to log in to the server with an account that does not exist. Log Inspection should prevent this action.
- Go to to verify the record of the failed log-in attempt. A record of the detection indicates Log Inspection is working correctly.
Configure log inspection event forwarding and storage
When an event triggers a log inspection rule, Server & Workload Protection logs the event. You can view these Log Inspection Events under Events & Reports and Policy editor (see Log inspection events). Depending on the severity of the event, you may send the event to a syslog server
(see Forward Server & Workload Protection events to an external syslog or SIEM server) or store events in the database using the severity clipping feature.
To configure severity clipping:
Procedure
- Go to Policies and double-click the policy.
- Select .
- Choose a severity between Low (0) and Critical (15) for Send Agent/Appliance events to syslog when they equal or exceed the following severity
level.This setting determines which events triggered by those rules get sent to the syslog server when syslog is enabled.
- Choose a severity between Low (0) and Critical (15) for Store events at the Agent/Appliance for later retrieval by DSM when they equal or
exceed the following severity level.This setting determines which Log Inspection events the database keeps and appear on the Log Inspection Events page.
- Click Save.