Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Holm Security is a cybersecurity platform which is a agent based- service that runs on the devices operating system for active vulnerability threat scanning and asset tracking . We here providing you the steps to ingest the device with Seceon SIEM to have a better visibility of threats happening in your environment .

Configuration Steps

...

  1. Enter the name of the device.

  2. Enter the CCE IP.

  3. Now skip the Access ID/username section and give any input inthe password/Secret Key section.

  4. Now in valid JSON Format in the last field, put JSON with valid credentials as

 {

 "token":"test",

 "protocol":"https",

...

5. Click on the Save button.

Verification

Going Navigate to log/flows collection under the System tab, we will can check that we are seeing Holm Security there.