Use https://seceonhelp.freshdesk.com/support/login to access updated Knowledge Base Articles, Submit Technical Support Tickets and Review Status of submitted support tickets.

Device Configuration: Holm Security

Overview

Holm Security is a cybersecurity platform which is a agent based- service that runs on the devices operating system for active vulnerability threat scanning and asset tracking . We here providing you the steps to ingest the device with Seceon SIEM to have a better visibility of threats happening in your environment .

Configuration Steps

  1. Enter the name of the device (you can give any random name for ex. Holm Security).

  2. Enter the CCE IP.

  3. Now skip the Access ID/username section and give any input in the password/Secret Key section.

  4. Now in valid JSON Format in the last field, put JSON with valid credentials as (these credentials need to be made available by the respective device administrator) :

 {

 "token":"test",

 "protocol":"https",

 "domain":"http://my-api.holmsecurity.com ",

 "port":"443",

 "version":"v2"

 }

If the doployment is "On-Prem" version will be “v2” and if it is "Cloud Based" version will be “v1”.

5. Click on the Save button.

Verification

Navigate to log/flows collection under the System tab, we can check Holm Security there.

Seceon Inc. All rights reserved. https://www.seceon.com