Configure Entities
Device Groups
The device groups are the collection of log forwarding devices. You can associate a single device to multiple device groups.
Devices
Devices are machines from which you send logs to Logpoint. To start receiving logs from a device, make sure that you configure it in Logpoint, and set up collection configurations and repos to it.
Enrichment Policies
An enrichment policy is a set of enrichment specifications. Each log from the device or collector/fetcher configured for an enrichment policy goes through each of the specifications. Refer to the Enrichment Policies section in LogPoint to learn more about enrichment policies.
Label Packages
Director Console allows you to create label packages in multiple Fabric-enabled LogPoint instances. Label packages are the collection of labeling rules. Labeling rules are search terms that apply specific labels to log messages. Using labels, you can group similar logs. Refer to the Label Packages section in LogPoint for more details.
Lists
Using Director Console, you can create static and dynamic lists in Fabric-enabled LogPoint instances. A static list in LogPoint is the collection of pre-defined values and a dynamic list in LogPoint is a list that collects specific values from the events during the runtime and stores them for a limited or an unlimited period. Refer to the Lists section in LogPoint for more details.
Log Collection Policies
A log collection policy allows you to configure different collectors and fetchers to multiple devices at once.
In Director Console, you can add a collector or a fetcher to a log collection policy from the built-in collectors/fetchers section. Once you add the required collectors and fetchers, you can configure the policy to a device. The device uses the collectors and fetchers from the policy, which helps to speed up the configuration process.
Log Sources
Log Sources allow you to configure different servers, applications, network devices, databases, or any other sources to collect or fetch their logs. The collected or fetched log data is then centralized and analyzed within Logpoint in real-time to detect potential security threats. To learn more, go to Log Sources.
You can configure Log Sources using collectors, fetchers or any log source integrations installed on Logpoint.
Log Source Templates
The Director Console includes pre-configured Vendor Templates derived from connected Logpoints. You can use these templates to create new ones, even after disconnecting your Logpoints. They are not deleted. Only the latest version of a template is saved, replacing older versions. You can create log sources using templates that come with predefined settings and configurations to fetch logs from different sources using Universal REST API Fetcher or Syslog Collector.
Macros
You can create macros to save any search query with an alias and use it to perform a search action based on the saved query in a Fabric-enabled LogPoint. Refer to the Macros section in LogPoint for more details.
Normalization Packages
Normalization packages are the collections of log signatures. A log signature defines the rules to extract the key-value pairs from a log. A normalization package consists of the log signatures that normalize logs from a particular log source.
Normalization Policies
A normalization policy is a combination of one or more normalization packages. You can select different normalization packages and group them under a normalization policy.
Parsers
You can use parsers to analyze the incoming data and extract each log message from them.
Processing Policies
A processing policy combines a normalization policy, an enrichment policy, and a routing policy into a single policy. Its primary purpose is to help in the overall process of data normalization and enrichment.
Raw Syslog Forwarders
You can use the Raw Syslog Forwarder (RSF) to collect logs from different sources and forward the raw messages to a remote server in a Fabric-enabled LogPoint.
To use the raw syslog forwarder, you need to follow these steps:
Add Remote Targets
Add devices
Remote Targets
Remote targets are the devices where the raw syslog messages are forwarded. You need to create the remote target first to configure Raw Syslog Forwarders.
Repos
LogPoint uses the repos (repositories) to collect streaming logs in LogPoint and store them securely.
Routing Policies
A routing policy lets you direct the incoming logs into different repositories in the LogPoint. You can use either Key Present or Value Matches criteria to configure a routing policy.
SNMP Policies
An SNMP policy is used by the SNMP fetcher to make an SNMP walk query. Each SNMP policy is a set of Object Identities (OID) and their query time intervals. The OID specifies all the branches of the OID tree for fetching. All variables in the sub-tree below the given OID are queried.
File System Collectors
A file system collector reads the contents of files configured in a LogPoint. It is only applied to the localhost device to monitor the log files.
The file system collector collects all the internal logs generated in each LogPoint. It captures all the records from collectors, web servers, mergers, normalizers, and the applications used in LogPoint.
FTP Collectors
You can use a FTP collector to collect logs from files uploaded to the LogPoint using FTP clients.
FTP Fetchers
You can use an FTP fetcher to set up an FTP client in LogPoint to pull the data available in the remote FTP server.
SCP Fetchers
An SCP fetcher fetches logs from the log files present in the remote host using an SSH connection.
SFlow Collectors
You can collect the flow packets forwarded to LogPoint using an SFlow collector. SFlow is a sampling technology used to monitor networks, wireless, and host devices. The sampled packets are called flow packets.
Snare Collectors
You can use a Snare collector to collect and analyze logs from the Windows Snare agent or any other Syslog server forwarding data to the 6161 port.
SNMP Fetchers
An SNMP fetcher allows you to make SNMP queries to network devices to get responses into LogPoint. You need an SNMP policy to make an SNMP walk query. An SNMP policy is a set of OIDs and their query time intervals.
SNMP Trap Collectors
An SNMP trap collector collects logs from the SNMP enabled devices. SNMP traps are alert messages sent by the devices to the SNMP manager with information about the occurrence of any significant event.
Syslog Collectors
You can use a syslog collector to collect data from sources that follow the syslog protocol. Once you add a device, you can use it either as a proxy, or as a device depending on its mode of configuration.
Tables
Tables store the data that you can use to enrich the logs. A dynamic table is a table where you can specify the fields and obtain the values for the specified fields during runtime for a limited or an unlimited period.
You can configure dynamic tables via Director Console and update the values for the table via runtime using a search query through a Fabric-enabled Logpoint or a Logpoint Search Master. Go to Tables for more details.
WMI Fetchers
You can use a WMI Fetcher to collect information from Windows devices using the WMI service.
Last updated
Was this helpful?
























































































