-
Votes
3
Appliance based Elastic Nodes for event visualisation
The requirement to build your own elastic nodes to provide event visualisation, means this is not a full product, this then requires additional Server OS licencing. All ...
Comments (0) | by: damon k. | over a year ago | Last activity over a year ago | Status changed over a year ago | Installation/Deployment
-
Votes
3
File Connector should support an option to rename the processed logs
Originally tracked in bug: https://bugzilla.netiq.com/show_bug.cgi?id=455690 The file connector should follow the pattern that IDM follows, which is simply provide the ...
Comments (0) | by: Brandon L. | over a year ago | Last activity over a year ago | Status changed over a year ago | Integrations
-
Votes
3
Configure connection when cloning event source
When cloning an event source, it will keep the connection to the source server, which is useless. When we create a template event source, which we would like to apply to ...
Comments (0) | by: Andreas H. | over a year ago | Last activity over a year ago | Status changed over a year ago | Configuration
-
Votes
3
Disable dashboard
It would be great to disable the dashboard or have an automated forward to the main interface. Nobody of us is using the dashboard, its always an additional click which ...
Comments (1) | by: Andreas H. | over a year ago | Last activity over a year ago | Status changed over a year ago | Dashboards/Visualizations
-
Votes
3
Change Guardian Agent install
In CG version 5.1 there is no more build in option to do a agent install via software distribution software. There is a cool solution: ...
Comments (1) | by: Ulrich S. | over a year ago | Last activity over a year ago | Status changed over a year ago | Installation/Deployment
-
Votes
3
Sentinel plugin for Log4j
It is a popular implementation to log application data
Comments (0) | by: John G. | over a year ago | Last activity over a year ago | Status changed over a year ago | Integrations
-
Votes
3
Enable Postgresql DB storage to use an different filesystem/partition ...
When the DB is on the same store as the event store, either the DB or the event store overrunning available storage can create problems for the other store. Also, ...
Comments (0) | by: Brandon L. | over a year ago | Last activity over a year ago | Status changed over a year ago | Installation/Deployment
-
Votes
3
Distributed search for All Identity Tracking Reports
All Identity Tracking Reports (Account Tracking, Recent Activity, Password changes, Suspicious activity overview ) have hardcoded Database in the selection of data source ...
Comments (1) | by: Khris F. | over a year ago | Last activity over a year ago | Status changed over a year ago | Other
-
Votes
3
Make Data Source selection permanent
Data Source selection should be made permanent so that it is selected every time you make a search. Now it should be manually ticked every time you make a new search.
Comments (1) | by: Timo S. | over a year ago | Last activity over a year ago | Status changed over a year ago | Configuration
-
Votes
3
Customize the search result fields
Search result display a set of attributes ie sn: sip: , this can be expanded upon by selecting the more option and you can view all the results by selecting the All ...
Comments (1) | by: Al K. | over a year ago | Last activity over a year ago | Status changed over a year ago | Configuration
-
Votes
3
CG reports (.csv) should print events line by line without any report ...
When the CG reports are generated, the output of the report with the selected events will be displayed in the proper report specific format. Whereas, when the events ...
Comments (3) | by: Mahantesh H. | over a year ago | Last activity over a year ago | Status changed over a year ago | Dashboards/Visualizations
-
Votes
3
Generating Security Intelligence Graph with Custom Field for Y-axis
Currently Sentinel able to generates security intelligence graph using event per seconds as Y-axis. Suggest to enable graph generating with custom integer as Y-axis (as ...
Comments (1) | by: Azizah A. | over a year ago | Last activity over a year ago | Status changed over a year ago | Dashboards/Visualizations
-
Votes
3
Support for RELP (Reliable Event Logging Protocol)
One of our customer was trying to use rsyslog with Relp to securly send events to Sentinel. Since Relp seems to become a quite common it would be a good thing if Sentinel ...
Comments (0) | by: Lennart J. | over a year ago | Last activity over a year ago | Status changed over a year ago | Integrations
-
Votes
3
VMware NSX Collector for Sentinel
There is no supported collector for VMware NSX in Sentinel. Create a collector that supports the VMware NSX platform/technology. VMware's Network virtualization ...
Comments (1) | by: Anthony D. | over a year ago | Last activity over a year ago | Status changed over a year ago | Integrations
-
Votes
3
Browse to AD objects when creating correlation rule or lists.
It would be good if we could leverage some of the technology in CG to browse to AD objects when creating correlation rule or lists.
Comments (0) | by: James H. | over a year ago | Last activity over a year ago | Status changed over a year ago | Integrations
-
Votes
3
Microsoft ATA
Create and release to test a new Microsoft ATA collector plugin for Sentinel 7/8 to integrate with leading edge threat analytics platforms
Comments (1) | by: John G. | over a year ago | Last activity over a year ago | Status changed over a year ago | Integrations
-
Votes
3
Data Synchronization enhancement
Enhance the data synchronization feature to allow the user to specify a start and finish date. Additionally, allow the user to kick-off the job on a specific date/time ...
Comments (2) | by: Richard B. | over a year ago | Last activity over a year ago | Status changed over a year ago | Other
-
Votes
3
Add the ID field to the message logs under all information
I think it would beneficial to take the information from the TIPS area in sentinel and populate it in the details of the logs when you select all. Add the ID tag to the ...
Comments (1) | by: James H. | over a year ago | Last activity over a year ago | Status changed over a year ago | Other
-
Planned
3
Meraki Firewall Collector Plugin development
The Cisco Meraki proprietary packet processing engine analyzes network traffic up to and including layer 7. Cisco Meraki's next generation firewall controls evasive, ...
Comments (0) | by: securview s. | over a year ago | Last activity over a year ago | Status changed over a year ago | Integrations
-
Votes
3
authorization for actions
Allow actions to have access controls and be aware of the user running the action. I may have users in role 1 that I with to allow to disable switch ports through an ...
Comments (0) | by: cameron s. | over a year ago | Last activity over a year ago | Status changed over a year ago | Configuration