-
Votes
6
WTMP Agent RPM
Worlking at Worldline in a Sentinel project. Worldline has already a Linuy based "Siem" for Linux events, that the buils on Linux scripting. Now they build a Sentinel ...
Comments (2) | by: Ulrich S. | over a year ago | Last activity over a year ago | Status changed over a year ago | Installation/Deployment
-
Votes
3
VMware NSX Collector for Sentinel
There is no supported collector for VMware NSX in Sentinel. Create a collector that supports the VMware NSX platform/technology. VMware's Network virtualization ...
Comments (1) | by: Anthony D. | over a year ago | Last activity over a year ago | Status changed over a year ago | Integrations
-
Votes
6
To support report for ISO 27002, year 2013.
Current version is ISO 27002, year 2005. When sentinel can support 2013?
Comments (1) | by: Fredric T. | over a year ago | Last activity over a year ago | Status changed over a year ago | Other
-
Votes
14
EPS level alert, monitoring and visualization
Currently Sentinel does not have any method to monitor EPS levels properly. It would good to have some way to monitor EPS levels and have an alert if e.g. system ...
Comments (5) | by: Timo S. | over a year ago | Last activity over a year ago | Status changed over a year ago | Other
-
Votes
10
Postgres collector
Have the ability to collect, store, and read postgres logs via Sentinel. Working with the military, we have a requirement to store audit and database logs in 1 location. ...
Comments (4) | by: Shawn G. | over a year ago | Last activity over a year ago | Status changed over a year ago | Integrations
-
Votes
10
Make Sentinel 8 CentOS 7 "compatible"
Hi, Sometimes I want to install Sentinel to CentOS (e.g no hassle with licensing in labs). Sentinel 7.4 series run fine in Centos 6.x. Would developers make Sentinel 8 ...
Comments (2) | by: Timo S. | over a year ago | Last activity over a year ago | Status changed over a year ago | Installation/Deployment
-
Votes
4
Use Email lists in correlation events
If you have multiple recipients for correlation event alarms, you have to create from CC's action manager an action for each recipient or add multiple addresses to the ...
Comments (2) | by: Jari V. | over a year ago | Last activity over a year ago | Status changed over a year ago | Other
-
Votes
9
Search results sorting
Currenty search results are sorted descending according to Event Time. But when two same events have the Event Time parameter same, the order of these events is wrong. ...
Comments (1) | by: Jakub M. | over a year ago | Last activity over a year ago | Status changed over a year ago | Other
-
Votes
6
Asset mapping for hostnames
Current Asset mapping works only for IP and tenant name as a keys. But some customers use hostnames as the asset identification as they use DHCP servers. It is not ...
Comments (1) | by: Jakub M. | over a year ago | Last activity over a year ago | Status changed over a year ago | Configuration
-
Votes
2
Integrate with Serena tools for IT service management
Companies who handle their ITIL processes using Serena want to do the same for their incident response process. The "Computer Security Incident Response Plan Management" ...
Comments (1) | by: Norbert K. | over a year ago | Last activity over a year ago | Status changed over a year ago | Integrations
-
Votes
13
Multiple roles for users
Current user role allocation supports well administration, but how to allocate rights easily in user environment (for users that only go there to search events and run ...
Comments (3) | by: Timo S. | over a year ago | Last activity over a year ago | Status changed over a year ago | Configuration
-
Votes
2
Use Delta RPMs for Appliance
The size of the current RPMs is very significant, both to download/bandwidth and the temporary disk requirements. This is extremely slow and often unreliable when ...
Comments (1) | by: Ben W. | over a year ago | Last activity over a year ago | Status changed over a year ago | Installation/Deployment
-
Votes
7
Enable Users to Toggle Case Sensitivity in Dynamic Lists
When leveraging values in dynamic lists, Sentinel currently enforces case sensitivity when using those values in correlation rules. In some cases, this can be misleading ...
Comments (1) | by: Eric L. | over a year ago | Last activity over a year ago | Status changed over a year ago | Configuration
-
Planned
6
Carbon Black Enterprise Response collector
Carbon Black Enterprise Response is well know in this space. With no Sentinel Collector, that's a significant blindspot of device and user activity in our network.
Comments (2) | by: Richard M. | over a year ago | Last activity over a year ago | Status changed over a year ago | Integrations
-
Planned
5
Forcepoint's web gateways AP-Web collector
Forcepoint's web gateways AP-Web is well know in this space. With no Sentinel Collector, that's a significant blindspot of device and user activity in our network.
Comments (1) | by: Richard M. | over a year ago | Last activity over a year ago | Status changed over a year ago | Integrations
-
Planned
2
Forcepoint's Data Leak Prevention (DLP) AP-Data collector
Forcepoint's Data Leak Prevention (DLP) AP-Data is well know in this space. With no Sentinel Collector, that's a significant blindspot of device and user activity in our ...
Comments (0) | by: Richard M. | over a year ago | Last activity over a year ago | Status changed over a year ago | Integrations
-
Planned
3
Meraki Firewall Collector Plugin development
The Cisco Meraki proprietary packet processing engine analyzes network traffic up to and including layer 7. Cisco Meraki's next generation firewall controls evasive, ...
Comments (0) | by: securview s. | over a year ago | Last activity over a year ago | Status changed over a year ago | Integrations
-
Votes
8
A way to migrate event and rawdata from Sentinel installation to ...
Currently there is no way to migrate event and rawdata between separate Sentinel Installations. The current "Find data" operability in Data Restoration supports only ...
Comments (0) | by: Timo S. | over a year ago | Last activity over a year ago | Status changed over a year ago | Installation/Deployment
-
Votes
9
CM backup
Customers are asking why we do not have official backup/restore script or other CLI method to export/import CM configuration.
Comments (0) | by: Piotr P. | over a year ago | Last activity over a year ago | Status changed over a year ago | Other
-
Votes
9
pseudonymization of user identifiers
Data privacy laws and regulations in certain areas prohibit the use of subject’s real names or identifiers which can easily be attributed to a subject (e.g. account names ...
Comments (2) | by: Norbert K. | over a year ago | Last activity over a year ago | Status changed over a year ago | Dashboards/Visualizations