Deploy and Install
The installation process depends on where you deploy Logpoint.
There are five different ways to deploy On-prem SIEM:
If it is not the latest version, we recommend you upgrade Logpoint to the latest version after you deploy it. To upgrade or install a patch, go to Upgrades and Patches. Before installing patch, check the product versions compatibility in the Compatibility Matrix.
Installation
After deployment, you must:
Verify access or connect to the deployment. How you verify access depends on the deployment type.
Setup the Logpoint server or instance. A Logpoint server or instance can be:
Standard or Compliance mode — preconfigured dashboards and repositories for access management, incident management, and perimeter security monitoring. Dashboards come with ready-to-use widgets for compliance, and repositories are mapped to specific source types (firewalls, servers).
Custom Configuration — you setup dashboards and repositories yourself.
Collector — retrieves logs from sources, buffers them, normalizes logs into key-value pairs, applies static enrichment, and forwards to a Logpoint Storage Node.
Syslog Forwarder — collects and normalizes logs (including from syslog collectors) and forwards them to Logpoint via TCP port 514.
Configure each relevant interface (DHCP or Manual/static). See network-specific sections per deployment type below.
Customize storage partitions during installation using automatic partitioning or customize partitions (create GPT partitions, LVM groups, logical volumes).
Configure the Logpoint Instance or Server
When you first log in, configure the Logpoint instance/server as one of:
Standard or Compliance instance
Advanced Configuration
Custom Configuration
Collector
Syslog Forwarder
Standard or Compliance
Standard Configuration enables a quick start with preconfigured dashboards and repositories for access management, incident management, and perimeter security monitoring. Dashboards come with ready-to-use widgets for compliance, and the repositories are mapped to specific source types, such as firewalls and servers, which you can use when creating a log source.
Log into Logpoint.
Select Standard Configuration and click Get started.
Choose Yes to use pre-configured dashboards (then select repos per widget) or No to proceed without dashboards (repos created).
You are redirected to Log Sources page to add log sources and map to repositories.
Advanced Configuration
Custom Configuration
Custom Configuration has complete features without any preconfigured dashboards or repositories. You can configure it according to your specific needs and preferences.
Log into Logpoint.
Click Advanced Configuration dropdown and select Custom Configuration.
Click Get started and Confirm.
Configure dashboards, repositories, and other settings manually.
Collector
Collector collects logs from different sources, normalizes them using the signatures applied, and forwards them to a configured remote Logpoint. It can enable buffering to persist locally during network outages. You can convert Logpoint to Logpoint Collector during login or configure later from Settings >> System Settings.
Log into Logpoint.
Click Advanced Configuration dropdown and select Collector.
Click Get started.
Select Enable buffering to store the data in local persistence during a network outage.
Click Confirm.
Syslog Forwarder
Syslog Forwarder collects logs from different sources, normalizes them using the signatures applied, and forwards them to a configured Logpoints and a target storage. You can convert Logpoint to a syslog forwarder during login or configure later from Settings >> System Settings.
Log into Logpoint.
Click Advanced Configuration dropdown.
Select Syslog Forwarder.
Click Get started and click Confirm.
Last updated
Was this helpful?





























