• Votes

    3

    Appliance based Elastic Nodes for event visualisation

    The requirement to build your own elastic nodes to provide event visualisation, means this is not a full product, this then requires additional Server OS licencing. All ...

  • Votes

    3

    File Connector should support an option to rename the processed logs

    Originally tracked in bug: https://bugzilla.netiq.com/show_bug.cgi?id=455690 The file connector should follow the pattern that IDM follows, which is simply provide the ...

  • Votes

    3

    Configure connection when cloning event source

    When cloning an event source, it will keep the connection to the source server, which is useless. When we create a template event source, which we would like to apply to ...

  • Votes

    3

    Disable dashboard

    It would be great to disable the dashboard or have an automated forward to the main interface. Nobody of us is using the dashboard, its always an additional click which ...

  • Votes

    3

    Change Guardian Agent install

    In CG version 5.1 there is no more build in option to do a agent install via software distribution software. There is a cool solution: ...

  • Votes

    3

    Sentinel plugin for Log4j

    It is a popular implementation to log application data

  • Votes

    3

    Enable Postgresql DB storage to use an different filesystem/partition ...

    When the DB is on the same store as the event store, either the DB or the event store overrunning available storage can create problems for the other store. Also, ...

  • Votes

    3

    Distributed search for All Identity Tracking Reports

    All Identity Tracking Reports (Account Tracking, Recent Activity, Password changes, Suspicious activity overview ) have hardcoded Database in the selection of data source ...

  • Votes

    3

    Make Data Source selection permanent

    Data Source selection should be made permanent so that it is selected every time you make a search. Now it should be manually ticked every time you make a new search.

  • Votes

    3

    Customize the search result fields

    Search result display a set of attributes ie sn: sip: , this can be expanded upon by selecting the more option and you can view all the results by selecting the All ...

  • Votes

    3

    CG reports (.csv) should print events line by line without any report ...

    When the CG reports are generated, the output of the report with the selected events will be displayed in the proper report specific format. Whereas, when the events ...

  • Votes

    3

    Generating Security Intelligence Graph with Custom Field for Y-axis

    Currently Sentinel able to generates security intelligence graph using event per seconds as Y-axis. Suggest to enable graph generating with custom integer as Y-axis (as ...

  • Votes

    3

    Support for RELP (Reliable Event Logging Protocol)

    One of our customer was trying to use rsyslog with Relp to securly send events to Sentinel. Since Relp seems to become a quite common it would be a good thing if Sentinel ...

  • Votes

    3

    VMware NSX Collector for Sentinel

    There is no supported collector for VMware NSX in Sentinel. Create a collector that supports the VMware NSX platform/technology. VMware's Network virtualization ...

  • Votes

    3

    Browse to AD objects when creating correlation rule or lists.

    It would be good if we could leverage some of the technology in CG to browse to AD objects when creating correlation rule or lists.

  • Votes

    3

    Microsoft ATA

    Create and release to test a new Microsoft ATA collector plugin for Sentinel 7/8 to integrate with leading edge threat analytics platforms

  • Votes

    3

    Data Synchronization enhancement

    Enhance the data synchronization feature to allow the user to specify a start and finish date. Additionally, allow the user to kick-off the job on a specific date/time ...

  • Votes

    3

    Add the ID field to the message logs under all information

    I think it would beneficial to take the information from the TIPS area in sentinel and populate it in the details of the logs when you select all. Add the ID tag to the ...

  • Planned

    3

    Meraki Firewall Collector Plugin development

    The Cisco Meraki proprietary packet processing engine analyzes network traffic up to and including layer 7. Cisco Meraki's next generation firewall controls evasive, ...

  • Votes

    3

    authorization for actions

    Allow actions to have access controls and be aware of the user running the action. I may have users in role 1 that I with to allow to disable switch ports through an ...