• Votes

    6

    WTMP Agent RPM

    Worlking at Worldline in a Sentinel project. Worldline has already a Linuy based "Siem" for Linux events, that the buils on Linux scripting. Now they build a Sentinel ...

  • Votes

    3

    VMware NSX Collector for Sentinel

    There is no supported collector for VMware NSX in Sentinel. Create a collector that supports the VMware NSX platform/technology. VMware's Network virtualization ...

  • Votes

    6

    To support report for ISO 27002, year 2013.

    Current version is ISO 27002, year 2005. When sentinel can support 2013?

  • Votes

    14

    EPS level alert, monitoring and visualization

    Currently Sentinel does not have any method to monitor EPS levels properly. It would good to have some way to monitor EPS levels and have an alert if e.g. system ...

  • Votes

    10

    Postgres collector

    Have the ability to collect, store, and read postgres logs via Sentinel. Working with the military, we have a requirement to store audit and database logs in 1 location. ...

  • Votes

    10

    Make Sentinel 8 CentOS 7 "compatible"

    Hi, Sometimes I want to install Sentinel to CentOS (e.g no hassle with licensing in labs). Sentinel 7.4 series run fine in Centos 6.x. Would developers make Sentinel 8 ...

  • Votes

    4

    Use Email lists in correlation events

    If you have multiple recipients for correlation event alarms, you have to create from CC's action manager an action for each recipient or add multiple addresses to the ...

  • Votes

    9

    Search results sorting

    Currenty search results are sorted descending according to Event Time. But when two same events have the Event Time parameter same, the order of these events is wrong. ...

  • Votes

    6

    Asset mapping for hostnames

    Current Asset mapping works only for IP and tenant name as a keys. But some customers use hostnames as the asset identification as they use DHCP servers. It is not ...

  • Votes

    2

    Integrate with Serena tools for IT service management

    Companies who handle their ITIL processes using Serena want to do the same for their incident response process. The "Computer Security Incident Response Plan Management" ...

  • Votes

    13

    Multiple roles for users

    Current user role allocation supports well administration, but how to allocate rights easily in user environment (for users that only go there to search events and run ...

  • Votes

    2

    Use Delta RPMs for Appliance

    The size of the current RPMs is very significant, both to download/bandwidth and the temporary disk requirements. This is extremely slow and often unreliable when ...

  • Votes

    7

    Enable Users to Toggle Case Sensitivity in Dynamic Lists

    When leveraging values in dynamic lists, Sentinel currently enforces case sensitivity when using those values in correlation rules. In some cases, this can be misleading ...

  • Planned

    6

    Carbon Black Enterprise Response collector

    Carbon Black Enterprise Response is well know in this space. With no Sentinel Collector, that's a significant blindspot of device and user activity in our network.

  • Planned

    5

    Forcepoint's web gateways AP-Web collector

    Forcepoint's web gateways AP-Web is well know in this space. With no Sentinel Collector, that's a significant blindspot of device and user activity in our network.

  • Planned

    2

    Forcepoint's Data Leak Prevention (DLP) AP-Data collector

    Forcepoint's Data Leak Prevention (DLP) AP-Data is well know in this space. With no Sentinel Collector, that's a significant blindspot of device and user activity in our ...

  • Planned

    3

    Meraki Firewall Collector Plugin development

    The Cisco Meraki proprietary packet processing engine analyzes network traffic up to and including layer 7. Cisco Meraki's next generation firewall controls evasive, ...

  • Votes

    8

    A way to migrate event and rawdata from Sentinel installation to ...

    Currently there is no way to migrate event and rawdata between separate Sentinel Installations. The current "Find data" operability in Data Restoration supports only ...

  • Votes

    9

    CM backup

    Customers are asking why we do not have official backup/restore script or other CLI method to export/import CM configuration.

  • Votes

    9

    pseudonymization of user identifiers

    Data privacy laws and regulations in certain areas prohibit the use of subject’s real names or identifiers which can easily be attributed to a subject (e.g. account names ...