This IBM Security Support Open Mic recording explains how QRadar uses log source protocols to collect event data, capturing configuration properties, error messages, and other use cases for data collection.
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Syllabus
- Events FAQ and terminology
- Listening protocols (Syslog)
- Polling protocols (JDBC / Log File)
- Tips and performance suggestions
- Specialty protocols (APIs)
- Questions and discussion