Threat intelligence and CAE
Event logs can assist with monitoring suspicious activity and identifying the cause of cybersecurity breaches that could lead to a cybersecurity incident. See Configuring CAE for information on viewing configuration history.
Setting up cybersecurity event logs
The event log can be used to monitor user logins and user account lockouts. Logs are based on Windows Event Viewer policies governed by your organization. Syslog server IP address, Syslog server IP port, and SNMP server IP address settings are not required for a standalone environment.
To set up cybersecurity event logs:
- Open Cybersecurity Admin Expert.
- Select SECURITY SETTINGS > Logs.
- Enter details.
- Click Save.
Viewing and exporting cybersecurity event logs
To view and export cybersecurity event logs:
- Open Cybersecurity Admin Expert.
- Click the Question Mark icon on the title bar.
- Select Audit Logs. The Audit Logs window opens.
- Click Export.
- Enter a file name.
- Click Save.