Syslog log source parameters for Raz-Lee iSecurity

If QRadar does not automatically detect the log source, add a Raz-Lee iSecurity log source on the QRadar Console by using the Syslog protocol.

When using the Syslog protocol, there are specific parameters that you must use.

The following table describes the parameters that require specific values to collect Syslog events from Raz-Lee iSecurity:
Table 1. Syslog log source parameters for the Raz-Lee iSecurity DSM
Parameter Value
Log Source type Raz-Lee iSecurity
Protocol Configuration Syslog
Log Source Identifier

The IP address or host name of the log source that sends events from the Raz-Lee iSecurity device.

Enabled

By default, the check box is selected.

Credibility

The Credibility of the log source. The range is 0 - 10.

The credibility indicates the integrity of an event or offense as determined by the credibility rating from the source devices. Credibility increases if multiple sources report the same event. The default is 5.

Coalescing Events

By default, automatically discovered log sources inherit the value of the Coalescing Events list from the System Settings in QRadar. When you create a log source or edit an existing configuration, you can override the default value by configuring this option for each log source.

Incoming Payload Encoding

Select Incoming Payload Encoder for parsing and storing the logs.

Store Event Payload

By default, automatically discovered log sources inherit the value of the Store Event Payload list from the System Settings in QRadar. When you create a log source or edit an existing configuration, you can override the default value by configuring this option for each log source.