TLS Syslog log source parameters for BeyondTrust Privilege Management for Unix, Linux and Networked Devices
If QRadar does not automatically detect the log source, add a BeyondTrust Privilege Management for Unix, Linux and Networked Devices log source on the QRadar Console by using the TLS Syslog protocol.
When using the TLS Syslog protocol, there are specific parameters that you must use.
The following table describes the parameters that require specific values to collect TLS Syslog
events from BeyondTrust Privilege Management for Unix, Linux and Networked Devices:
Parameter | Value |
---|---|
Log Source type | BeyondTrust Privilege Management for Unix, Linux and Networked Devices |
Protocol Configuration | TLS Syslog |
Log Source Identifier | Type a unique IP address or host name. |