Syslog log source parameters for Raz-Lee iSecurity
If QRadar does not automatically detect the log source, add a Raz-Lee iSecurity log source on the QRadar Console by using the Syslog protocol.
When using the Syslog protocol, there are specific parameters that you must use.
Parameter | Value |
---|---|
Log Source type | Raz-Lee iSecurity |
Protocol Configuration | Syslog |
Log Source Identifier |
The IP address or host name of the log source that sends events from the Raz-Lee iSecurity device. |
Enabled |
By default, the check box is selected. |
Credibility |
The Credibility of the log source. The range is 0 - 10. The credibility indicates the integrity of an event or offense as determined by the credibility rating from the source devices. Credibility increases if multiple sources report the same event. The default is 5. |
Coalescing Events |
By default, automatically discovered log sources inherit the value of the Coalescing Events list from the System Settings in QRadar. When you create a log source or edit an existing configuration, you can override the default value by configuring this option for each log source. |
Incoming Payload Encoding |
Select Incoming Payload Encoder for parsing and storing the logs. |
Store Event Payload |
By default, automatically discovered log sources inherit the value of the Store Event Payload list from the System Settings in QRadar. When you create a log source or edit an existing configuration, you can override the default value by configuring this option for each log source. |