Syslog log source parameters for STEALTHbits StealthINTERCEPT

If QRadar does not automatically detect the log source, add a STEALTHbits StealthINTERCEPT log source on the QRadar Console by using the Syslog protocol.

When using the Syslog protocol, there are specific parameters that you must use.

The following table describes the parameters that require specific values to collect Syslog events fromSTEALTHbits StealthINTERCEPT:
Table 1. Syslog log source parameters for the STEALTHbits StealthINTERCEPT DSM
Parameter Value
Log Source type STEALTHbits StealthINTERCEPT
Protocol Configuration Syslog