SlideShare una empresa de Scribd logo
1 de 14
Descargar para leer sin conexión
All Rights Reserved - Logsign 2015
Data Policy Manager
Security Information and Event Management
All Rights Reserved - Logsign 2015
LOGSIGN V4.0
WORKSHOP
All Rights Reserved - Logsign 2015 www.logsign.com http://support.logsign.com
Overview
Easy to deploy via over 200 ready integrations and free plugin services, Logsign
collects terabytes of logs and events in real time from hundreds of physical,
virtual and cloud data sources.
Logsign’s Enterprise Wide Log Collection Techniques are; WMI, Syslog,
Oracle, SQL, CEF, File Share, NFS Share, FTP/SFTP, ODBC, LEA API and
more.
In relation to that logs are getting bigger and bigger everyday.
Logsign Data Policy Manager enables you to optimize the log management
respecting any company and multiple regulations.
All Rights Reserved - Logsign 2015 www.logsign.com http://support.logsign.com
Data Policy Manager
How?
Create data policies with Logsign DPM,
● for every single log source or a group of sources to collect logs.
● for setting redundancy period of logs.
● for managing storage capacity whether to include or exclude logs collected.
Therefore Logsign DPM increases the effectiveness of collection, storage and
the performance of indexing.
All Rights Reserved - Logsign 2015 www.logsign.com http://support.logsign.com
For Input
In For Input field, there can be applied policies to the data that is collected at the
input level.
● With ‘Include by regexp’, desired data can be collected and written by adding
specific rules or words, and with ‘Exclude by regexp’, the unwanted data can
be specified with added rules.
All Rights Reserved - Logsign 2015 www.logsign.com http://support.logsign.com
● With ‘Include by Key-Value’, defined columns and values in parsed logs (e.g.
Windows logs) are set to be written to system, also they can be set not to be
viewed in system by using ‘Exclude by Key-Value’.
As you can see on the right
side,
For Windows, successful and
denied logon events are
collected, but logoff events are
set not to be collected.
For Input
All Rights Reserved - Logsign 2015 www.logsign.com http://support.logsign.com
● Your disk space is prevented to get filled with unnecessary files and logs by
filtering the same log lines that are captured in a specific time period when
you set a redundancy period.
For Input
All Rights Reserved - Logsign 2015 www.logsign.com http://support.logsign.com
For Parsing
● You can specify a column after the data parsed to make column-based
filtering for repetitive data in For Parsing field.
All Rights Reserved - Logsign 2015 www.logsign.com http://support.logsign.com
For Indexing
In For Indexing field, in addition to the fields, ‘Include/Exclude by Regexp’ and
‘Include/Exclude by Key-Value’;
● ‘Filter Index Fields’ allows you to index the only specified written columns.
(the results can’t also viewed in Search, Reports and Alerts)
All Rights Reserved - Logsign 2015 www.logsign.com http://support.logsign.com
For Indexing
In the Search menu, the results can viewed as below by default, Before and After
applying the Index Filter.
BEFORE AFTER
All Rights Reserved - Logsign 2015 www.logsign.com http://support.logsign.com
For Indexing
Additionally for indexing, the desired data can be viewed by ‘Include Log’ option
and the unwanted data is set not to be viewed by ‘Exclude Log’ option. When
‘Include/Exclude Log’ option is enabled, Event.SystemID column results can be
typed in SystemID fields.
All Rights Reserved - Logsign 2015 www.logsign.com http://support.logsign.com
For JSON Store & For RAW Store
● In For JSON Store field, there can be specified rules and filters with the same
features as in For Input and For Indexing fields.
● In For RAW Store field, the desired or unwanted data can be specified to be
collected or not by regexp rules at the first input level.
All Rights Reserved - Logsign 2015 www.logsign.com http://support.logsign.com
For Persisting
● In For Persist field, the data can be collected in the system with specific
names that defined for each sources.
All Rights Reserved - Logsign 2015 www.logsign.com http://support.logsign.com
Summary
Therefore, Logsign DPM can be considered as a SIEM use case.
Increased Effectiveness of
Collection, Storage and Performance of Indexing
Logsign DPM
Multiple
Regulations
Flexible & Customized
Rule Setting
Thanks
http://support.logsign.net

Más contenido relacionado

La actualidad más candente

SplunkLive! Customer Presentation - FINRA
SplunkLive! Customer Presentation - FINRASplunkLive! Customer Presentation - FINRA
SplunkLive! Customer Presentation - FINRASplunk
 
Closing the Cloud Security Gap with a CASB (in partnership with Forrester)
Closing the Cloud Security Gap with a CASB (in partnership with Forrester)Closing the Cloud Security Gap with a CASB (in partnership with Forrester)
Closing the Cloud Security Gap with a CASB (in partnership with Forrester)Bitglass
 
SplunkLive! Customer Presentation - SSA
SplunkLive! Customer Presentation - SSASplunkLive! Customer Presentation - SSA
SplunkLive! Customer Presentation - SSASplunk
 
securing the cloud for financial services
securing the cloud for financial servicessecuring the cloud for financial services
securing the cloud for financial servicesBitglass
 
PaaSword - No More Dark Clouds with PaaSword
PaaSword - No More Dark Clouds with PaaSwordPaaSword - No More Dark Clouds with PaaSword
PaaSword - No More Dark Clouds with PaaSwordPaaSword EU Project
 
5 Security Questions To Ask When Deploying O365
5 Security Questions To Ask When Deploying O3655 Security Questions To Ask When Deploying O365
5 Security Questions To Ask When Deploying O365Bitglass
 
Flare - Connecting Your Organization With Its Information
Flare - Connecting Your Organization With Its InformationFlare - Connecting Your Organization With Its Information
Flare - Connecting Your Organization With Its InformationIman Ruth Ali, CL, ACB
 
Elasticsearch audit logging | Search Guard
Elasticsearch audit logging | Search GuardElasticsearch audit logging | Search Guard
Elasticsearch audit logging | Search GuardJochen Kressin
 
Countering Threats with the Elastic Stack at CERDEC/ARL
Countering Threats with the Elastic Stack at CERDEC/ARLCountering Threats with the Elastic Stack at CERDEC/ARL
Countering Threats with the Elastic Stack at CERDEC/ARLElasticsearch
 
Security O365 Using AI-based Advanced Threat Protection
Security O365 Using AI-based Advanced Threat ProtectionSecurity O365 Using AI-based Advanced Threat Protection
Security O365 Using AI-based Advanced Threat ProtectionBitglass
 
Detecting s3 breaches with panther slide deck
Detecting s3 breaches with panther   slide deckDetecting s3 breaches with panther   slide deck
Detecting s3 breaches with panther slide deckKartikey Pandey
 
Empowering the Cloud Through G Suite
Empowering the Cloud Through G SuiteEmpowering the Cloud Through G Suite
Empowering the Cloud Through G SuiteBitglass
 
Best Security Focussed CMS: Drupal 8
Best Security Focussed CMS: Drupal 8Best Security Focussed CMS: Drupal 8
Best Security Focussed CMS: Drupal 8OpenSense Labs
 
GDPR and SuccessFactors
GDPR and SuccessFactorsGDPR and SuccessFactors
GDPR and SuccessFactorsTalenTeam
 
AWS Security Fundamentals: Dos and Don’ts
AWS Security Fundamentals: Dos and Don’tsAWS Security Fundamentals: Dos and Don’ts
AWS Security Fundamentals: Dos and Don’tsAlgoSec
 
Ensuring Continuous PCI-DSS 3.0 Compliance for Your Firewalls and Routers
Ensuring Continuous PCI-DSS 3.0 Compliance for Your Firewalls and RoutersEnsuring Continuous PCI-DSS 3.0 Compliance for Your Firewalls and Routers
Ensuring Continuous PCI-DSS 3.0 Compliance for Your Firewalls and RoutersAlgoSec
 
How Privacy in the Cloud Affects Organizations
How Privacy in the Cloud Affects OrganizationsHow Privacy in the Cloud Affects Organizations
How Privacy in the Cloud Affects OrganizationsWSO2
 

La actualidad más candente (20)

SplunkLive! Customer Presentation - FINRA
SplunkLive! Customer Presentation - FINRASplunkLive! Customer Presentation - FINRA
SplunkLive! Customer Presentation - FINRA
 
Closing the Cloud Security Gap with a CASB (in partnership with Forrester)
Closing the Cloud Security Gap with a CASB (in partnership with Forrester)Closing the Cloud Security Gap with a CASB (in partnership with Forrester)
Closing the Cloud Security Gap with a CASB (in partnership with Forrester)
 
SplunkLive! Customer Presentation - SSA
SplunkLive! Customer Presentation - SSASplunkLive! Customer Presentation - SSA
SplunkLive! Customer Presentation - SSA
 
securing the cloud for financial services
securing the cloud for financial servicessecuring the cloud for financial services
securing the cloud for financial services
 
Owasp v8 analysis
Owasp v8 analysisOwasp v8 analysis
Owasp v8 analysis
 
PaaSword - No More Dark Clouds with PaaSword
PaaSword - No More Dark Clouds with PaaSwordPaaSword - No More Dark Clouds with PaaSword
PaaSword - No More Dark Clouds with PaaSword
 
5 Security Questions To Ask When Deploying O365
5 Security Questions To Ask When Deploying O3655 Security Questions To Ask When Deploying O365
5 Security Questions To Ask When Deploying O365
 
Flare - Connecting Your Organization With Its Information
Flare - Connecting Your Organization With Its InformationFlare - Connecting Your Organization With Its Information
Flare - Connecting Your Organization With Its Information
 
Elasticsearch audit logging | Search Guard
Elasticsearch audit logging | Search GuardElasticsearch audit logging | Search Guard
Elasticsearch audit logging | Search Guard
 
Countering Threats with the Elastic Stack at CERDEC/ARL
Countering Threats with the Elastic Stack at CERDEC/ARLCountering Threats with the Elastic Stack at CERDEC/ARL
Countering Threats with the Elastic Stack at CERDEC/ARL
 
Security O365 Using AI-based Advanced Threat Protection
Security O365 Using AI-based Advanced Threat ProtectionSecurity O365 Using AI-based Advanced Threat Protection
Security O365 Using AI-based Advanced Threat Protection
 
Detecting s3 breaches with panther slide deck
Detecting s3 breaches with panther   slide deckDetecting s3 breaches with panther   slide deck
Detecting s3 breaches with panther slide deck
 
Empowering the Cloud Through G Suite
Empowering the Cloud Through G SuiteEmpowering the Cloud Through G Suite
Empowering the Cloud Through G Suite
 
Mobile Safety Software For The Energy Industry!
Mobile Safety Software For The Energy Industry!Mobile Safety Software For The Energy Industry!
Mobile Safety Software For The Energy Industry!
 
Elastic at KPN
Elastic at KPNElastic at KPN
Elastic at KPN
 
Best Security Focussed CMS: Drupal 8
Best Security Focussed CMS: Drupal 8Best Security Focussed CMS: Drupal 8
Best Security Focussed CMS: Drupal 8
 
GDPR and SuccessFactors
GDPR and SuccessFactorsGDPR and SuccessFactors
GDPR and SuccessFactors
 
AWS Security Fundamentals: Dos and Don’ts
AWS Security Fundamentals: Dos and Don’tsAWS Security Fundamentals: Dos and Don’ts
AWS Security Fundamentals: Dos and Don’ts
 
Ensuring Continuous PCI-DSS 3.0 Compliance for Your Firewalls and Routers
Ensuring Continuous PCI-DSS 3.0 Compliance for Your Firewalls and RoutersEnsuring Continuous PCI-DSS 3.0 Compliance for Your Firewalls and Routers
Ensuring Continuous PCI-DSS 3.0 Compliance for Your Firewalls and Routers
 
How Privacy in the Cloud Affects Organizations
How Privacy in the Cloud Affects OrganizationsHow Privacy in the Cloud Affects Organizations
How Privacy in the Cloud Affects Organizations
 

Similar a Logsign Data Policy Manager(DPM)

LOGBOOk ENTRIES IN SAP PM
LOGBOOk ENTRIES IN SAP PMLOGBOOk ENTRIES IN SAP PM
LOGBOOk ENTRIES IN SAP PMPiyush Bose
 
Read Access Logging (RAL) for SAP NetWeaver Overview
Read Access Logging (RAL) for SAP NetWeaver OverviewRead Access Logging (RAL) for SAP NetWeaver Overview
Read Access Logging (RAL) for SAP NetWeaver OverviewSAP Technology
 
Rpa fallout and log mechanism
Rpa fallout and log mechanismRpa fallout and log mechanism
Rpa fallout and log mechanismDantu Suhruth
 
Use Custom Metadata Types for Easy ALM & Compliance for Your Custom Apps
Use Custom Metadata Types for Easy ALM & Compliance for Your Custom AppsUse Custom Metadata Types for Easy ALM & Compliance for Your Custom Apps
Use Custom Metadata Types for Easy ALM & Compliance for Your Custom AppsSalesforce Developers
 
Analyzing OTM Logs and Troubleshooting
Analyzing OTM Logs and TroubleshootingAnalyzing OTM Logs and Troubleshooting
Analyzing OTM Logs and TroubleshootingMavenWire
 
OSMC 2017 | Log Monitoring with Logstash and Icinga by Walter Heck
OSMC 2017 | Log Monitoring with Logstash and Icinga by Walter HeckOSMC 2017 | Log Monitoring with Logstash and Icinga by Walter Heck
OSMC 2017 | Log Monitoring with Logstash and Icinga by Walter HeckNETWAYS
 
Windows splunk logging cheat sheet Oct 2016 - MalwareArchaeology.com
Windows splunk logging cheat sheet Oct 2016 - MalwareArchaeology.comWindows splunk logging cheat sheet Oct 2016 - MalwareArchaeology.com
Windows splunk logging cheat sheet Oct 2016 - MalwareArchaeology.comMichael Gough
 
Using The Mysql Binary Log As A Change Stream
Using The Mysql Binary Log As A Change StreamUsing The Mysql Binary Log As A Change Stream
Using The Mysql Binary Log As A Change StreamLuís Soares
 
Sharepoint Content and Usage Reports - guide by SPDocKit
Sharepoint Content and Usage Reports - guide by SPDocKitSharepoint Content and Usage Reports - guide by SPDocKit
Sharepoint Content and Usage Reports - guide by SPDocKitSysKit Ltd
 
Sumo Logic Cert Jam - Administration
Sumo Logic Cert Jam - AdministrationSumo Logic Cert Jam - Administration
Sumo Logic Cert Jam - AdministrationSumo Logic
 
Increase Salesforce Performance using Platform Cache Demo
Increase Salesforce Performance using Platform Cache DemoIncrease Salesforce Performance using Platform Cache Demo
Increase Salesforce Performance using Platform Cache DemoVineet Goel ☁
 
Windows Logging Cheat Sheet ver Jan 2016 - MalwareArchaeology
Windows Logging Cheat Sheet ver Jan 2016 - MalwareArchaeologyWindows Logging Cheat Sheet ver Jan 2016 - MalwareArchaeology
Windows Logging Cheat Sheet ver Jan 2016 - MalwareArchaeologyMichael Gough
 
Meetup milano #4 log management and anypoint advanced monitoring
Meetup milano #4   log management and anypoint advanced monitoringMeetup milano #4   log management and anypoint advanced monitoring
Meetup milano #4 log management and anypoint advanced monitoringGonzalo Marcos Ansoain
 
Upcoming changes in MySQL 5.7
Upcoming changes in MySQL 5.7Upcoming changes in MySQL 5.7
Upcoming changes in MySQL 5.7Morgan Tocker
 
Using Sumo Logic - Apr 2018
Using Sumo Logic - Apr 2018Using Sumo Logic - Apr 2018
Using Sumo Logic - Apr 2018Sumo Logic
 
Design and Implementation Anypoint Platform Audit Logs Splunk Integration
Design and Implementation Anypoint Platform Audit Logs Splunk IntegrationDesign and Implementation Anypoint Platform Audit Logs Splunk Integration
Design and Implementation Anypoint Platform Audit Logs Splunk IntegrationMary Joy Sabal
 
CIP IT Governance 5.0 Release Notes for ArcSight Logger
CIP IT Governance 5.0 Release Notes for ArcSight LoggerCIP IT Governance 5.0 Release Notes for ArcSight Logger
CIP IT Governance 5.0 Release Notes for ArcSight Loggerprotect724rkeer
 

Similar a Logsign Data Policy Manager(DPM) (20)

LOGBOOk ENTRIES IN SAP PM
LOGBOOk ENTRIES IN SAP PMLOGBOOk ENTRIES IN SAP PM
LOGBOOk ENTRIES IN SAP PM
 
Read Access Logging (RAL) for SAP NetWeaver Overview
Read Access Logging (RAL) for SAP NetWeaver OverviewRead Access Logging (RAL) for SAP NetWeaver Overview
Read Access Logging (RAL) for SAP NetWeaver Overview
 
Rpa fallout and log mechanism
Rpa fallout and log mechanismRpa fallout and log mechanism
Rpa fallout and log mechanism
 
Use Custom Metadata Types for Easy ALM & Compliance for Your Custom Apps
Use Custom Metadata Types for Easy ALM & Compliance for Your Custom AppsUse Custom Metadata Types for Easy ALM & Compliance for Your Custom Apps
Use Custom Metadata Types for Easy ALM & Compliance for Your Custom Apps
 
Closing cockpit v 1.3
Closing cockpit v 1.3Closing cockpit v 1.3
Closing cockpit v 1.3
 
Analyzing OTM Logs and Troubleshooting
Analyzing OTM Logs and TroubleshootingAnalyzing OTM Logs and Troubleshooting
Analyzing OTM Logs and Troubleshooting
 
OSMC 2017 | Log Monitoring with Logstash and Icinga by Walter Heck
OSMC 2017 | Log Monitoring with Logstash and Icinga by Walter HeckOSMC 2017 | Log Monitoring with Logstash and Icinga by Walter Heck
OSMC 2017 | Log Monitoring with Logstash and Icinga by Walter Heck
 
Graylog
GraylogGraylog
Graylog
 
Windows splunk logging cheat sheet Oct 2016 - MalwareArchaeology.com
Windows splunk logging cheat sheet Oct 2016 - MalwareArchaeology.comWindows splunk logging cheat sheet Oct 2016 - MalwareArchaeology.com
Windows splunk logging cheat sheet Oct 2016 - MalwareArchaeology.com
 
Using The Mysql Binary Log As A Change Stream
Using The Mysql Binary Log As A Change StreamUsing The Mysql Binary Log As A Change Stream
Using The Mysql Binary Log As A Change Stream
 
Sharepoint Content and Usage Reports - guide by SPDocKit
Sharepoint Content and Usage Reports - guide by SPDocKitSharepoint Content and Usage Reports - guide by SPDocKit
Sharepoint Content and Usage Reports - guide by SPDocKit
 
Sumo Logic Cert Jam - Administration
Sumo Logic Cert Jam - AdministrationSumo Logic Cert Jam - Administration
Sumo Logic Cert Jam - Administration
 
logs.pptx
logs.pptxlogs.pptx
logs.pptx
 
Increase Salesforce Performance using Platform Cache Demo
Increase Salesforce Performance using Platform Cache DemoIncrease Salesforce Performance using Platform Cache Demo
Increase Salesforce Performance using Platform Cache Demo
 
Windows Logging Cheat Sheet ver Jan 2016 - MalwareArchaeology
Windows Logging Cheat Sheet ver Jan 2016 - MalwareArchaeologyWindows Logging Cheat Sheet ver Jan 2016 - MalwareArchaeology
Windows Logging Cheat Sheet ver Jan 2016 - MalwareArchaeology
 
Meetup milano #4 log management and anypoint advanced monitoring
Meetup milano #4   log management and anypoint advanced monitoringMeetup milano #4   log management and anypoint advanced monitoring
Meetup milano #4 log management and anypoint advanced monitoring
 
Upcoming changes in MySQL 5.7
Upcoming changes in MySQL 5.7Upcoming changes in MySQL 5.7
Upcoming changes in MySQL 5.7
 
Using Sumo Logic - Apr 2018
Using Sumo Logic - Apr 2018Using Sumo Logic - Apr 2018
Using Sumo Logic - Apr 2018
 
Design and Implementation Anypoint Platform Audit Logs Splunk Integration
Design and Implementation Anypoint Platform Audit Logs Splunk IntegrationDesign and Implementation Anypoint Platform Audit Logs Splunk Integration
Design and Implementation Anypoint Platform Audit Logs Splunk Integration
 
CIP IT Governance 5.0 Release Notes for ArcSight Logger
CIP IT Governance 5.0 Release Notes for ArcSight LoggerCIP IT Governance 5.0 Release Notes for ArcSight Logger
CIP IT Governance 5.0 Release Notes for ArcSight Logger
 

Último

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 

Último (20)

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

Logsign Data Policy Manager(DPM)

  • 1. All Rights Reserved - Logsign 2015 Data Policy Manager Security Information and Event Management All Rights Reserved - Logsign 2015 LOGSIGN V4.0 WORKSHOP
  • 2. All Rights Reserved - Logsign 2015 www.logsign.com http://support.logsign.com Overview Easy to deploy via over 200 ready integrations and free plugin services, Logsign collects terabytes of logs and events in real time from hundreds of physical, virtual and cloud data sources. Logsign’s Enterprise Wide Log Collection Techniques are; WMI, Syslog, Oracle, SQL, CEF, File Share, NFS Share, FTP/SFTP, ODBC, LEA API and more. In relation to that logs are getting bigger and bigger everyday. Logsign Data Policy Manager enables you to optimize the log management respecting any company and multiple regulations.
  • 3. All Rights Reserved - Logsign 2015 www.logsign.com http://support.logsign.com Data Policy Manager How? Create data policies with Logsign DPM, ● for every single log source or a group of sources to collect logs. ● for setting redundancy period of logs. ● for managing storage capacity whether to include or exclude logs collected. Therefore Logsign DPM increases the effectiveness of collection, storage and the performance of indexing.
  • 4. All Rights Reserved - Logsign 2015 www.logsign.com http://support.logsign.com For Input In For Input field, there can be applied policies to the data that is collected at the input level. ● With ‘Include by regexp’, desired data can be collected and written by adding specific rules or words, and with ‘Exclude by regexp’, the unwanted data can be specified with added rules.
  • 5. All Rights Reserved - Logsign 2015 www.logsign.com http://support.logsign.com ● With ‘Include by Key-Value’, defined columns and values in parsed logs (e.g. Windows logs) are set to be written to system, also they can be set not to be viewed in system by using ‘Exclude by Key-Value’. As you can see on the right side, For Windows, successful and denied logon events are collected, but logoff events are set not to be collected. For Input
  • 6. All Rights Reserved - Logsign 2015 www.logsign.com http://support.logsign.com ● Your disk space is prevented to get filled with unnecessary files and logs by filtering the same log lines that are captured in a specific time period when you set a redundancy period. For Input
  • 7. All Rights Reserved - Logsign 2015 www.logsign.com http://support.logsign.com For Parsing ● You can specify a column after the data parsed to make column-based filtering for repetitive data in For Parsing field.
  • 8. All Rights Reserved - Logsign 2015 www.logsign.com http://support.logsign.com For Indexing In For Indexing field, in addition to the fields, ‘Include/Exclude by Regexp’ and ‘Include/Exclude by Key-Value’; ● ‘Filter Index Fields’ allows you to index the only specified written columns. (the results can’t also viewed in Search, Reports and Alerts)
  • 9. All Rights Reserved - Logsign 2015 www.logsign.com http://support.logsign.com For Indexing In the Search menu, the results can viewed as below by default, Before and After applying the Index Filter. BEFORE AFTER
  • 10. All Rights Reserved - Logsign 2015 www.logsign.com http://support.logsign.com For Indexing Additionally for indexing, the desired data can be viewed by ‘Include Log’ option and the unwanted data is set not to be viewed by ‘Exclude Log’ option. When ‘Include/Exclude Log’ option is enabled, Event.SystemID column results can be typed in SystemID fields.
  • 11. All Rights Reserved - Logsign 2015 www.logsign.com http://support.logsign.com For JSON Store & For RAW Store ● In For JSON Store field, there can be specified rules and filters with the same features as in For Input and For Indexing fields. ● In For RAW Store field, the desired or unwanted data can be specified to be collected or not by regexp rules at the first input level.
  • 12. All Rights Reserved - Logsign 2015 www.logsign.com http://support.logsign.com For Persisting ● In For Persist field, the data can be collected in the system with specific names that defined for each sources.
  • 13. All Rights Reserved - Logsign 2015 www.logsign.com http://support.logsign.com Summary Therefore, Logsign DPM can be considered as a SIEM use case. Increased Effectiveness of Collection, Storage and Performance of Indexing Logsign DPM Multiple Regulations Flexible & Customized Rule Setting