Lookout Product Documentation

Find answers about using and optimizing Lookout products.

Create New SIEM Configuration

  1. From the Enterprise Integration page, click SIEM and then click New.
  2. Enter the following information.
    • Name - Enter a name for this configuration.
    • (Optional) Description -- Enter a brief description.
    • Destinations - Select one or more destinations to which to apply this configuration:
      • SaaS Apps (select the category, or expand it to select individual apps)
      • Enterprise Apps (select the category, or expand it to select individual apps)
      • Websites (select the category, or expand it to select individual sites)
      • Networks (select the category, or expand it to select individual networks)
      • Admin Audit Logs
    • Event Type - Select one or more event types for this configuration:
      • Activities
      • Violations
      • Anomalies
      • CDD Activities
      • CDD Violations
      • Security Posture
      • Discovery
    • Vendor -- Select a vendor:
      • HP ArcSight
      • IBM QRadar
      • Intel Security
      • Log Rhythm
      • Others
      • Splunk
    • Forwarded Type -- Select Spooling Directory, Syslog TCP, or Syslog UDP.
      • For Spooling Directory, enter the directory path for the log files generated.
      • For Syslog TCP or Syslog UDP, enter a remote host name, a port number, and a log format (JSON, CEF, or CEF_V2).
  3. Click Save.

    The new configuration is added to the list. By default, the authentication token is hidden. To display it, click Show.

    Once an agent is downloaded and installed, a connection can be made. A green connector icon indicates a successful connection.