TLS Syslog log source parameters for BeyondTrust Privilege Management for Unix, Linux and Networked Devices

If QRadar does not automatically detect the log source, add a BeyondTrust Privilege Management for Unix, Linux and Networked Devices log source on the QRadar Console by using the TLS Syslog protocol.

When using the TLS Syslog protocol, there are specific parameters that you must use.

The following table describes the parameters that require specific values to collect TLS Syslog events from BeyondTrust Privilege Management for Unix, Linux and Networked Devices:
Table 1. TLS Syslog log source parameters for the BeyondTrust Privilege Management for Unix, Linux and Networked Devices DSM
Parameter Value
Log Source type BeyondTrust Privilege Management for Unix, Linux and Networked Devices
Protocol Configuration TLS Syslog
Log Source Identifier Type a unique IP address or host name.