Plugin Name. X N/A sudo X Antivirus Avast avast X GFI Security gfi X McAfee mcafee X mcafee-epo



Similar documents
Symantec Security Information Manager Version 4.7

LogLogic Release Notes for Security Event Viewer and Security Event Manager, v3.5.0

RSA envision. Supported Event Sources. Vendor Device Collection Method. Vendor Device Collection Method. Vendor Device Collection Method

OWASP Logging Project - Roadmap

Log Correlation Engine 4.2 Architecture Guide. October 3, 2013 (Revision 2)

Full version is >>> HERE <<<

ArcSight Supports a Wide Range of Security Relevant Products

Tripwire Log Center PRODUCT BRIEF HIGH PERFORMANCE LOG AND EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE

List of Supported Systems & Devices

og 4 NET A SureL 201

Supported Devices (Event Log Sources)

Advanced Linux System Administration Knowledge GNU/LINUX Requirements

LOG CENTER SECURITY INTELLIGENCE MADE SIMPLE

HawkEye AP Log Adapter List Updated January 2014

Reference Guide. Skybox View Revision: 11

Vendor/Product Log Format Analyzer Standard. Analyzer Premium & Analyzer Giga

REQUEST FOR PROPOSAL ACQUISITION & IMPLEMENTATION OF CENTRALIZED LOG MANAGEMENT SYSTEM

COURCE TITLE DURATION LPI-202 Advanced Linux Professional Institute 40 H.

Detecting a Hacking Attempt

Assuria can help protectively monitor firewalls for PCI compliance. Assuria can also check the configurations of personal firewalls on host devices

TECHNOLOGY INTEGRATION GUIDE

Global Security Software Market

HawkEye AP Log Adapter List Updated January 2016

Release Notes ArcSight SmartConnector

TECHNOLOGY INTEGRATION GUIDE

Supported Log File Formats

CiscoWorks SIMS(Netforensics)

Global Endpoint Security Market

World-class security solutions for your business. Kaspersky. OpenSpaceSecurity

INTEGRATION GUIDE TECHNOLOGY INTRODUCTION NETWORK DEVICES AND INFRASTRUCTURE

TRIPWIRE LOG CENTER HIGH PERFORMANCE LOG AND SECURITY EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE

To read more Linux Journal or start your subscription, please visit

Log Correlation Engine 4.2 Log Normalization Guide. October 3, 2013 (Revision 3)

Log Correlation Engine 3.6 Log Normalization Guide

JUNIPER NETWORKS STRM TECHNICAL NOTE

Linux Server Support by Applied Technology Research Center. Proxy Server Configuration

By Jascha Wanger

Log Correlation Engine Log Normalization Guide. December 22, 2014 (Revision 2)

Global Cloud Security Software Market - By End User Industry, Vendors and Geography Market Shares, Forecasts and Trends ( )

ALERT LOGIC ACTIVEWATCH FOR LOG MANAGER

Secure Your Operations through NOC/SOC Integration

Open Source Security Tool Overview

Supported Data & Log Sources

Next-Generation Firewalls: CEO, Miercom

TIBCO LogLogic. HIPAA Compliance Suite Quick Start Guide. Software Release: December Two-Second Advantage

Audit and Control of Enterprise Vulnerability Management. Grant Johnson, Technical Account Manager

Reference Technology Roadmap

World-class security solutions for your business. Business Products. C a t a l o g u e

PCI DSS. Get Compliant, Stay Compliant Seminar

TCS Managed Security Services

TIBCO LogLogic. SOX and COBIT Compliance Suite Quick Start Guide. Software Release: December Two-Second Advantage

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)

Security Information Management

How To Make Money On Security For A Large Organization

How To Protect Your Virtual Infrastructure From Attack From A Cyber Threat

MANAGED SERVICES. Remote Monitoring. Contact US: millenniuminc.com

Continuous Monitoring for the New IT Landscape. July 14, 2014 (Revision 1)

Information Security Measures and Monitoring System at BARC. - R.S.Mundada Computer Division B.A.R.C., Mumbai-85

SNMP Collector Supported Device Inventory

How To Get A Fortinet Security System For Free

NetBrain Workstation 6.0

Global Security Testing Market

Measurably reducing risk through collaboration, consensus & practical security management CIS Security Benchmarks 1

High Speed Data Transfer from the APS. Kenneth Sidorowicz September 27, 2006

Microsoft Azure Configuration

Measurably reducing risk through collaboration, consensus & practical security management CIS Security Benchmarks 1

Reference Technology Roadmap

Proven Technical and Management skills over a career spanning more than 10 years. Brunswick Vic 3056 Australia

Firewalls. ITS335: IT Security. Sirindhorn International Institute of Technology Thammasat University ITS335. Firewalls. Characteristics.

Firewalls. Contents. ITS335: IT Security. Firewall Characteristics. Types of Firewalls. Firewall Locations. Summary

CenturyLink Cloud Configuration

VMware Integrated Partner Solutions for Networking and Security

Connectors Overview APPLICATION SECURITY ANTI-VIRUS/ANTI-SPAM CLOUD CONTENT SECURITY APPLICATIONS DATABASE ACTIVITY MONITORING (DAM)/ DB SECURITY

How To Use Logrhythm For A Log On A Computer Or Network Device (For A Network) For A Network (For An Uniden Network) (For Log On Device) ( For Awn) (On A Network Or Network) Or

A progressive and integrated approach to protecting corporate networks

AL RAFEE ENTERPRISES Solutions & Expertise.

GL275 - ENTERPRISE LINUX NETWORKING SERVICES

Principal IT Consultant. Michael Buth IT Consultant Werner Str Dortmund (Germany)

network Sentry FAMILY

FUNCTIONAL OVERVIEW

GL-275: Red Hat Linux Network Services. Course Outline. Course Length: 5 days

Operations Management and Open Source Tools

Title of Document Here

CH ENSA EC-Council Network Security Administrator Detailed Course Outline

Content Filtering Product Trends

Spamfilter Relay Mailserver

ENTERPRISE LINUX NETWORKING SERVICES

Transcription:

Functionality Vendor Plugin Name AlienVault Supported Plugin Community Supported Plugin Access Control Cisco Systems cisco-acs cisco-acs-idm cisco-asa N/A sudo Antivirus Avast avast GFI Security gfi McAfee mcafee mcafee-epo Panda Software panda-se Sophos Inc sophos SourceFire clamav Asset Monitoring Hewlett Packard sitescope Independent nmap-monitor Nagios nagios OCS Inventory Team ocs-monitor Authentication System N/A tacacs-plus Open System Consultants radiator RSA Security rsa-secureid token-rsa Shrubbery Networks shrubbery-tacacs Camera Monitoring Independent motion Data Logging Independent rrd Data Loss Prevention IBM fidelis Database Oracle oracle-sql oracle-syslog Device netscreen- Management Juniper Networks manager netscreen-nsm Directory Service OpenLDAP Foundation openldap DNS Service Internet Systems Consortium bind-syslog File Server Independent nfs pureftpd smbd

vsftpd wuftp Firewall Brocade vyatta Checkpoint fw1-alt fw1ngr60 Cisco Systems cisco-fw cisco-pix FreeBSD Project ipfw Independent m0n0wall Juniper Networks netscreen-firewall netscreen-igs McAfee cyberguard sidewinder Motorola motorola-firewall NetFilter Project iptables NetKeeper netkeeper-fw OpenBSD Project pf Palo Alto Networks paloalto StoneSoft Corporation stonegate Firewall / VPN Alcatel lucent-brick Honeypot Independent amun-honeypot artemisa dionaea glastopng honeyd nepenthes Host Intrusion Detection Trend Micro ossec ossec-single-line Brookhaven National Lab osiris Host Management Oracle tarantella Symantec symantec-epm Host Monitor Trend Micro ossec-idm Intrusion Detection Cisco Systems cisco-ids Enterasys dragon ImmunityInc eljefe Independent Bro-IDS

NetKeeper netkeeper-nids SourceFire snort_syslog snortunified OISF suricata suricata-http Intrusion Prevention BIT9 bit9 Cisco Systems cisco-ips-syslog Hardened PHP Project suhosin IBM realsecure McAfee intrushield RadWare Inc radware-ips StoneSoft Corporation stonegate_ips Tippingpoint tippingpoint TrustWave modsecurity Load Balancer Allot allot Cisco Systems cisco-ace Citrix citrix-netscaler F5 f5 Hewlett Packard serviceguard Independent heartbeat tera ascenlink Red Hat clurgmgr Mail Intrusion Detection Trend Micro trendmicro Mail Server Axigen Messaging axigen-mail Cisco Systems ironport Double Precision Inc courier Independent dovecot postfix Microsoft exchange Sendmail Inc sendmail Mobile Device Apple iphone Network Management Internet Systems Consortium linuxdhcp Microsoft dhcp Network Monitor Independent arpalert ntop-monitor p0f pads prads

session-monitor tcptrack-monitor The OpenNMS Group opennms-monitor Lawrence Berkeley Lab arpwatch Operating IBM AI Audit System IBM Logs Independent pam_unix Microsoft wmi-applicationlogger wmi-monitor wmi-securitylogger wmi-securitylogger-srv2008 wmi-systemlogger N/A syslog usbudev Remote Access Management Brocade raslogd Remote Logging Independent ntsyslog Intersect Alliance snare snare-idm snare-mssql snare-msssis Remote Management Independent webmin OpenBSD Project ssh ssh-remote VMWare vandyke-vshell Router Cisco Systems cisco-3030 cisco-asr cisco-router NetGear netgear Security Management IBM siteprotector Panda Software panda-as Symantec symantec-ams Spam Filter Apache Foundation spamassassin McAfee mcafee-antispam

Enterasys enterasys-rmatrix Extreme Networks extreme-switch Juniper Networks juniper-srx Nortel alteonos nortel-switch Threat Intelligence Service Fortinet fortiguard Independent whois-monitor Kaspersky mwcollect MDL Project malwaredomainlis t-monitor Web Application Drupal Project drupal-wiki Independent moodle SAP sap OpteNet optenet Storage Management Hewlett Packard hp-eva Switch Cisco Systems cisco-nexus-nxos Unified Firewall Dell sonicwall Fortinet fortigate Virtualization Hypervisor VMWare vmware-esxi vmware-vcenter vmware-vcentersql vmwareworkstation VPN Cisco Systems cisco-vpn F5 f5-firepass Juniper Networks juniper-vpn Vulnerability Scanner Tenable nessus nessus-detector nessus-monitor Web Application Ergon airlock Imperva impervasecuresphere

Web Proxy Blue Coat Systems bluecoat Independent squid Microsoft isa Web Security Gateway SafeNet aladdin Shalla Secure Services squidguard WebSense websense Web Server Apache Foundation apache apache-syslog Microsoft iis Wireless Access Aruba Networks aruba Cisco Systems cisco-wlc Extreme Networks extreme-wireless Proxim proxim-orinoco