最新博彩网站

Security Information and Event Management

Security Information and Event Management (SIEM) allows an administrator to efficiently manage increasing security threats and also comply with regulatory norms. SIEM helps you detect, visualize, scrutinize, and respond to the various threats that risk your organization's data security. Using 最新博彩网站 Mail you can integrate the audit events logged in Admin Console with your SIEM tool.

Splunk

Splunk is an analytics-driven SIEM tool that continuously collects high volumes of network and machine data, analyzes, and correlates them in readable form in real time. 

To integrate Splunk with 最新博彩网站 Mail follow these steps:

  1. Log in to your organization's Splunk account.
  2. This token must be entered when you configure Splunk in 最新博彩网站 Mail Admin Console.

Once you generate a token, you can configure Splunk settings in 最新博彩网站 Mail Admin Console.

Configure Splunk in 最新博彩网站 Mail

Follow these steps to configure Splunk in 最新博彩网站 Mail:

  1. Log in to .
  2. Choose Integrated Apps from the left menu and select SIEM.
  3. Navigate to Splunk and click Configure.
    SIEM Integration
  4. Select the audit event categories in the Selected Categories field.
    SIEM Integration
  5. In the Host Address field, add the hostname in which your organization's Splunk instance is running. Please ensure to provide the host address without including 'https://' prefix. The system will automatically add 'https://' to your provided host address.
  6. Enter the token which you generated in Splunk. Ensure that the HTTP event collector is enabled in the Splunk Global Settings menu.
    • If required, follow the steps to under the Splunk Global Settings menu.
  7. Click the Add button. The categories that you selected get saved and you can view the audit log data seamlessly in your Splunk account.
    SIEM Configuration
  8. To modify the audit event categories, add or remove the events in the Selected Categories field, enter the Token and click the Update button.

Note:

  • Your organization's host can run in an on-premise Splunk Enterprise or a Splunk Cloud Platform with a paid plan.
  • 最新博彩网站 Mail supports only the port value 443 for HTTPS domains which has a valid SSL certificate.

Loggly

Loggly is a cloud based log management and analytical solution that helps organizations manage, analyze, and gain insights from their log data. It supports searching, filtering, and visualizing massive log volumes, making it easier to understand and act upon the information contained in their logs. 

To integrate Loggly with 最新博彩网站 Mail follow these steps:

  1. Log in to your organization's Loggly account.
  2. Copy your from Loggly. This token is a unique identifier for your Loggly account. The Customer Token must be an Active Token.

This token must be entered when you configure Loggly in 最新博彩网站 Mail Admin Console.

Configure Loggly in 最新博彩网站 Mail 

Follow these steps to configure Loggly in 最新博彩网站 Mail:

  1. Log in to .
  2. Choose  Integrated Apps from the left menu and select SIEM.
  3. Navigate to Loggly and click Configure.
    SIEM Integration
  4. Select the audit event categories in the Selected Categories field.
  5. Enter the Token (Customer token) copied from your Loggly account.
  6. Click the Add button. 
    SIEM Integration
  7. To modify the audit event categories, add or remove the events in the Selected Categories field, enter the Customer Token again if needed and click Update.
  8. Enter the OTP sent to your Loggly account to save the modifications.

The categories that you selected get saved, and you can view the audit log data in your Loggly account.

QRadar

IBM QRadar is a network security management solution that collects, correlates, and analyzes real-time audit log data to identify and address security threats. It helps organizations manage their network security by providing real-time information and monitoring, alerting for offenses, and responding to potential network threats.

To integrate QRadar with 最新博彩网站 Mail follow these steps:

Note:

最新博彩网站 Mail supports sending event logs from Admin Console to QRadar only through the , with a valid SSL certificate issued by a certificate authority (CA). For more information, click

  1. Log in to your organization's QRadar account.
  2. Navigate to Log Source Management App to create a new HTTP Receiver log source.
  3. Create a new HTTP Receiver protocol log source in the section.
  4. Ensure that your QRadar account has an open inbound Port 12469  for seamless reception of data.

Once the HTTP Receiver Log Source has been configured and deployed in QRadar, you can configure QRadar settings in 最新博彩网站 Mail Admin Console.

Configure Qradar in 最新博彩网站 Mail

Follow these steps to configure QRadar in 最新博彩网站 Mail:

  1. Log in to .
  2. Choose Integrated Apps from the left menu and select SIEM.
  3. Navigate to QRadar and click Configure.
    SIEM Integration
  4. Select the audit event categories in the Selected Categories field.
  5. Enter the Https Receiver Protocol Configuration URL from your QRadar account in the URL field.
  6. Click the Add button.
    SIEM Integration
  7. To modify the audit event categories, add or remove the events in the Selected Categories field, and click Update.
  8. Enter the OTP sent to your QRadar account to save the modifications.

The categories that you selected get saved and can be viewed in your QRadar account.

Webhooks

In 最新博彩网站 Mail, Webhooks provide a flexible and adaptable alternative if the SIEM tool you are attempting to integrate is not directly supported, to ensure seamless event data transmission and integration with the SIEM tool. This adaptability allows you to maintain effective log management and event monitoring, even when dealing with SIEM tools that may not have native support. Our webhooks serve as a bridge, enabling you to send event data from Admin Console to your preferred SIEM infrastructure.

Follow the below steps to configure Webhooks: 

  1. Log in to .
  2. Choose Integrated Apps from the left menu and select SIEM.
  3. Navigate to Webhooks and click Configure.
    SIEM Integration
  4. Select the audit event categories in the Selected Categories field.
  5. Enter a Name for the webhook.
  6. Select the Data Format from the drop-down.
    • JSONARRAY
    • NDJSON
  7. Enter the webhook URL that will receive the incoming data in the Listener URL field.
  8. Enter the required Custom Header name and Custom Header value from the SIEM tool in the Custom Headers field.
  9. Click the Add button.
    SIEM Integration
  10. To modify the audit event categories, add or remove the events in the Selected Categories field and click Update.
  11. Enter the OTP sent to your configured application to save the modifications.

Manage SIEM Configurations

Enable/ Disable Integration

Based on your organization's needs, you can disable an Integration whenever it is not needed. Navigate to your preferred Integration page, and select the Integration toggle button, and click the Disable button. This allows you to enable the same configuration at a later stage.
SIEM Integration

Remove Configuration

 If you no longer need an configuration, select Remove Configuration in the respective Integration page and click the Remove button in the pop-up that appears.
SIEM Integration

Note:

  • Be cautious when you configure your SIEM applications in 最新博彩网站 Mail. By doing this, you agree to share your organization's data from Admin Console with other applications.
  • The SIEM Integration is introduced as a BETA version and will be available for organizations that use one of 最新博彩网站 Mail's paid plans.

Still can't find what you're looking for?

Write to us: support@zohomail.com