Syslog log source parameters for IBM Defender Data Protect DSM

If IBM QRadar does not automatically detect the log source, add an IBM® Defender Data Protect log source on the QRadar Console by using the Syslog protocol.
The following table describes the parameters that require specific values to events from IBM Defender Data Protect:
Table 1. Syslog log source parameters for the IBM Defender Data Protect DSM
Parameter Value
Log Source type IBM Defender Data Protect
Protocol Configuration Syslog
Log Source Identifier

Type the IP address or host name for the IBM Defender Data Protect.