Submit a request
Sign in
Logsign Support Center
Logsign SIEM
Logsign SIEM
Overview of Logsign SIEM
Capabilities of Product
Compare All Features
Supported WEB Browsers
Management Platform
Installation
While Starting
Capacity Planning
Installing Logsign SIEM on VMware with ISO
Installing Logsign SIEM on Bare-metal
Log Collect Methods
Source Adding
Source Adding Methods
Source Adding Procedures
Auditing Source Logs
Controlling Syslog Logs
Controlling SMB Logs
Controlling WMI Logs
Searching and Reporting
Column Architecture
Simple Search Methods
Mini Listed Queries
Report Types and Features
Compliance Reporting (ISO27001, PCI_DSS, FISMA, SOX, HIPAA, GLBA)
Offline Reports via Archive Logs (Reindex)
Dashboard
Prepared Dashboards
Creating a Dashboard
Analystic Dasboards
Operational Dashboards
Dynamic Search on Dashboards
Correlation
Understanding Correlation
Correlation Categories
Data Enrichment with Asset Context
Alert Notifications
Adaptive Response Dashboard
Threat Intelligence
Understanding Threat Intelligence
Use the Threat Activity Dashboards
Use the Threat Activity Reports
Active Response with Threat Intelligence
Device Management Settings
Device List
Agent Configuration
Data Policies (DPM)
Log Capture Tool
EPS Stats
Source Stats
See all 7 articles
User Management Settings
User Management
Tags
LDAP Settings
System Users
Data Management Settings
Policies
Fieldsets
Mini Queries
Config Backup
FTP Backup
Sign Settings
Network Management Settings
Position Services
Location Services
Network Interfaces
Secure Access
UI Permissions
Action & Notification Settings
Mail Settings
Sms Settings
Health Check Notifications
Custom Action Devices
Vulnerability Management
Logs Settings
Index
Signed Logs
Archived Logs
Logsign Audit Logs
Logsign Events
System Settings
Date & Time Settings
System Update
Reboot & Shutdown
License
Company Settings
Help Settings
Remote Support