Log Sources

Log Source allows you to configure different servers, applications, network devices, databases, or any other source to collect or fetch their logs. The collected or fetched log data is then centralized and analyzed within Logpoint in real-time to detect potential security threats. Currently, you can only use the Universal REST API fetcher and Syslog Collector to configure Log Sources. The cloud sources can have multiple endpoints, and every configured source consumes one device license.

You can also create templates from the Log Sources configurations. These templates can be saved and later used to configure the same or a different source. These templates simplify the process of configuring log sources by providing pre-defined settings, reducing the need for manual configuration and the risk of configuration errors. They also provide consistency in collecting, processing and analyzing log data, which is critical for accurate security event analysis and reporting.

Note

You must have Read, Create and Delete permissions of Devices, DeviceGroups, Log Collection Policy and Parsers to configure Log Source.


Helpful?

We are glad this guide helped.


Please don't include any personal information in your comment

Contact Support