[{"data":1,"prerenderedAt":1766},["ShallowReactive",2],{"navigation":3,"/en/management/contact-management":411,"/en/management/contact-management-surround":751},[4,218],{"title":5,"_path":6,"children":7},"En","/en",[8,29,35,67,77,87,105,130,148,155,162,178,190],{"title":9,"_path":10,"children":11},"Getting Started","/en/getting-started",[12,14,17,20,23,26],{"title":13,"_path":10},"Introduction",{"title":15,"_path":16},"Quick Start","/en/getting-started/quickstart",{"title":18,"_path":19},"Installation on Docker Standalone","/en/getting-started/dockerstandalone",{"title":21,"_path":22},"Installation on Docker Swarm","/en/getting-started/dockerswarm",{"title":24,"_path":25},"Installation on Windows","/en/getting-started/windows",{"title":27,"_path":28},"Installation on Linux","/en/getting-started/linux",{"title":30,"_path":31,"children":32},"Dashboard","/en/dashboard",[33],{"title":30,"_path":34},"/en/dashboard/dashboard",{"title":36,"_path":37,"children":38},"Datacollector","/en/datacollector",[39,42,45],{"title":40,"_path":41},"Data View","/en/datacollector/view",{"title":43,"_path":44},"Management","/en/datacollector/management",{"title":46,"_path":47,"children":48},"Vendors","/en/datacollector/vendors",[49,52,55,58,61,64],{"title":50,"_path":51},"Default Syslog Configuration","/en/datacollector/vendors/default",{"title":53,"_path":54},"FortiGate Syslog Configuration","/en/datacollector/vendors/fortigate-syslog",{"title":56,"_path":57},"Palo Alto Syslog Configuration","/en/datacollector/vendors/palo-alto-syslog",{"title":59,"_path":60},"Ruijie Syslog Configuration","/en/datacollector/vendors/ruijie-syslog",{"title":62,"_path":63},"Sophos Syslog Configuration","/en/datacollector/vendors/sophos-syslog",{"title":65,"_path":66},"SonicWall Syslog Configuration","/en/datacollector/vendors/sonicwall-syslog",{"title":68,"_path":69,"children":70},"Reports","/en/reports",[71,74],{"title":72,"_path":73},"Reports Views","/en/reports/view",{"title":75,"_path":76},"Scheduled Reports","/en/reports/scheduled-reports",{"title":78,"_path":79,"children":80},"Alert","/en/alert",[81,84],{"title":82,"_path":83},"Rule Management","/en/alert/rule-management",{"title":85,"_path":86},"Notification Policy","/en/alert/notification-policy",{"title":88,"_path":89,"children":90},"Hotspot","/en/hotspot",[91,93,96,99,102],{"title":13,"_path":92},"/en/hotspot/introduction",{"title":94,"_path":95},"Location","/en/hotspot/locations",{"title":97,"_path":98},"Templates","/en/hotspot/templates",{"title":100,"_path":101},"User Activity","/en/hotspot/user-stats",{"title":103,"_path":104},"Black & White List","/en/hotspot/bw-list",{"title":106,"_path":107,"children":108},"Integrations","/en/integrations",[109,112,115,118,121,124,127],{"title":110,"_path":111},"SMTP Server","/en/integrations/smtp",{"title":113,"_path":114},"SMS Provider","/en/integrations/sms",{"title":116,"_path":117},"PMS Integration","/en/integrations/pms",{"title":119,"_path":120},"LDAP Integration","/en/integrations/ldap",{"title":122,"_path":123},"API Integration","/en/integrations/api",{"title":125,"_path":126},"NTP Server Integration","/en/integrations/ntp",{"title":128,"_path":129},"Timestamp Server Integration","/en/integrations/time-stamp-server",{"title":43,"_path":131,"children":132},"/en/management",[133,136,139,142,145],{"title":134,"_path":135},"Data Management","/en/management/data-management",{"title":137,"_path":138},"Contact Management","/en/management/contact-management",{"title":140,"_path":141},"Object Management","/en/management/object",{"title":143,"_path":144},"Command Line Interface","/en/management/command-line-interface",{"title":146,"_path":147},"Disk Capacity Planning Formula","/en/management/disk-management",{"title":149,"_path":150,"children":151},"License","/en/license",[152],{"title":153,"_path":154},"License & Agents","/en/license/license",{"title":156,"_path":157,"children":158},"User Authentication","/en/user-authentication",[159],{"title":160,"_path":161},"User & Authentication ","/en/user-authentication/user-authentication",{"title":163,"_path":164,"children":165},"System","/en/system",[166,169,172,175],{"title":167,"_path":168},"Administrator Management","/en/system/administrator",{"title":170,"_path":171},"Feature Visibility","/en/system/features-visibility",{"title":173,"_path":174},"Update","/en/system/update",{"title":176,"_path":177},"System Settings","/en/system/settings",{"title":179,"_path":180,"children":181},"Practice","/en/practice",[182,185,187],{"title":183,"_path":184},"Top Bantwidth Usage","/en/practice/topbantwidthusage",{"title":183,"_path":186},"/en/practice/most-visited-websites",{"title":188,"_path":189},"Inspect Blocked Traffic","/en/practice/inspect-blocked-traffic",{"title":191,"_path":192,"children":193},"Blog","/en/blog",[194,197,200,203,206,209,212,215],{"title":195,"_path":196},"Load Balance Configuration with Docker Swarm","/en/blog/load-balance-config",{"title":198,"_path":199},"Getting Started with the AI Module","/en/blog/ai-module",{"title":201,"_path":202},"How To Config Fortigate Syslog","/en/blog/how-to-config-fortigate-syslog",{"title":204,"_path":205},"How To Config Paloalto Syslog","/en/blog/how-to-config-paloalto-syslog",{"title":207,"_path":208},"How To Config Sophos Syslog","/en/blog/how-to-config-sophos-syslog",{"title":210,"_path":211},"Installing MinIO on Linux Server","/en/blog/minio-install",{"title":213,"_path":214},"Docker Desktop On Windows","/en/blog/docker-desktop-on-windows",{"title":216,"_path":217},"Installing Docker on Ubuntu Server","/en/blog/docker-on-ubuntu-server",{"title":219,"_path":220,"children":221},"Tr","/tr",[222,242,247,275,284,293,310,333,350,356,361,375,387],{"title":223,"_path":224,"children":225},"Giriş","/tr/getting-started",[226,227,230,233,236,239],{"title":223,"_path":224},{"title":228,"_path":229},"Hızlı Başlangıç","/tr/getting-started/quickstart",{"title":231,"_path":232},"Docker Standalone Üzerine Kurulum","/tr/getting-started/dockerstandalone",{"title":234,"_path":235},"Docker Swarm Üzerinde Kurulum","/tr/getting-started/dockerswarm",{"title":237,"_path":238},"Windows'ta Kurulum","/tr/getting-started/windows",{"title":240,"_path":241},"Linux'ta Kurulum","/tr/getting-started/linux",{"title":30,"_path":243,"children":244},"/tr/dashboard",[245],{"title":30,"_path":246},"/tr/dashboard/dashboard",{"title":36,"_path":248,"children":249},"/tr/datacollector",[250,252,254],{"title":40,"_path":251},"/tr/datacollector/view",{"title":43,"_path":253},"/tr/datacollector/management",{"title":46,"_path":255,"children":256},"/tr/datacollector/vendors",[257,260,263,266,269,272],{"title":258,"_path":259},"Varsayılan Syslog Yapılandırması","/tr/datacollector/vendors/default",{"title":261,"_path":262},"FortiGate Syslog Yapılandırması","/tr/datacollector/vendors/fortigate-syslog",{"title":264,"_path":265},"Palo Alto Syslog Yapılandırması","/tr/datacollector/vendors/palo-alto-syslog",{"title":267,"_path":268},"Ruijie Syslog Yapılandırması","/tr/datacollector/vendors/ruijie-syslog",{"title":270,"_path":271},"Sophos Syslog Yapılandırması","/tr/datacollector/vendors/sophos-syslog",{"title":273,"_path":274},"SonicWall Syslog Yapılandırması","/tr/datacollector/vendors/sonicwall-syslog",{"title":68,"_path":276,"children":277},"/tr/reports",[278,281],{"title":279,"_path":280},"Rapor Görünümleri","/tr/reports/view",{"title":282,"_path":283},"Planlanmış Raporlar","/tr/reports/scheduled-reports",{"title":78,"_path":285,"children":286},"/tr/alert",[287,290],{"title":288,"_path":289},"Kural Yönetimi","/tr/alert/rule-management",{"title":291,"_path":292},"Bildirim Politikası","/tr/alert/notification-policy",{"title":88,"_path":294,"children":295},"/tr/hotspot",[296,298,301,304,307],{"title":223,"_path":297},"/tr/hotspot/introduction",{"title":299,"_path":300},"Konum","/tr/hotspot/locations",{"title":302,"_path":303},"Şablonlar","/tr/hotspot/templates",{"title":305,"_path":306},"Kullanıcı Etkinliği","/tr/hotspot/user-stats",{"title":308,"_path":309},"Kara ve Beyaz Liste","/tr/hotspot/bw-list",{"title":106,"_path":311,"children":312},"/tr/integrations",[313,315,318,321,324,327,330],{"title":110,"_path":314},"/tr/integrations/smtp",{"title":316,"_path":317},"SMS Sağlayıcı","/tr/integrations/sms",{"title":319,"_path":320},"Pms","/tr/integrations/pms",{"title":322,"_path":323},"LDAP Entegrasyonu","/tr/integrations/ldap",{"title":325,"_path":326},"API Entegrasyonu","/tr/integrations/api",{"title":328,"_path":329},"NTP Sunucu Entegrasyonu","/tr/integrations/ntp",{"title":331,"_path":332},"Zaman Damgası Sunucusu Entegrasyonu","/tr/integrations/time-stamp-server",{"title":43,"_path":334,"children":335},"/tr/management",[336,339,342,345,347],{"title":337,"_path":338},"Veri Yönetimi","/tr/management/data-management",{"title":340,"_path":341},"İletişim Yönetimi","/tr/management/contact-management",{"title":343,"_path":344},"Nesne Yönetimi","/tr/management/object",{"title":143,"_path":346},"/tr/management/command-line-interface",{"title":348,"_path":349},"Disk Kapasite Planlama Formülü","/tr/management/disk-management",{"title":149,"_path":351,"children":352},"/tr/license",[353],{"title":354,"_path":355},"Lisans ve Ajanlar","/tr/license/license",{"title":156,"_path":357,"children":358},"/tr/user-authentication",[359],{"title":156,"_path":360},"/tr/user-authentication/user-authentication",{"title":163,"_path":362,"children":363},"/tr/system",[364,367,370,372],{"title":365,"_path":366},"Yönetici Yönetimi","/tr/system/administrator",{"title":368,"_path":369},"Özellik Görünürlüğü","/tr/system/features-visibility",{"title":173,"_path":371},"/tr/system/update",{"title":373,"_path":374},"Sistem Ayarları","/tr/system/settings",{"title":179,"_path":376,"children":377},"/tr/practice",[378,381,384],{"title":379,"_path":380},"En Yüksek Bandwidth Kullanımı","/tr/practice/topbantwidthusage",{"title":382,"_path":383},"Top Bandwidth Kullanımı","/tr/practice/most-visited-websites",{"title":385,"_path":386},"Engellenen Trafiği İncele","/tr/practice/inspect-blocked-traffic",{"title":191,"_path":388,"children":389},"/tr/blog",[390,393,396,398,400,402,405,408],{"title":391,"_path":392},"Docker Swarm ile Yük Deneleme Yapılandırması","/tr/blog/load-balance-config",{"title":394,"_path":395},"AI Modülü ile Başlarken","/tr/blog/ai-module",{"title":201,"_path":397},"/tr/blog/how-to-config-fortigate-syslog",{"title":204,"_path":399},"/tr/blog/how-to-config-paloalto-syslog",{"title":207,"_path":401},"/tr/blog/how-to-config-sophos-syslog",{"title":403,"_path":404},"Minio Install","/tr/blog/minio-install",{"title":406,"_path":407},"Windows'ta Docker Desktop","/tr/blog/docker-desktop-on-windows",{"title":409,"_path":410},"Ubuntu Server'da Docker Kurulumu","/tr/blog/docker-on-ubuntu-server",{"_path":138,"_dir":412,"_draft":413,"_partial":413,"_locale":414,"title":137,"description":415,"body":416,"_type":745,"_id":746,"_source":747,"_file":748,"_stem":749,"_extension":750},"management",false,"","This section provides information about import, export, external backup services under the Data management topic.",{"type":417,"children":418,"toc":740},"root",[419,428,434,440,445,451,734],{"type":420,"tag":421,"props":422,"children":424},"element","h2",{"id":423},"_1-contact",[425],{"type":426,"value":427},"text","1. Contact 👤",{"type":420,"tag":429,"props":430,"children":431},"p",{},[432],{"type":426,"value":433},"Contacts are part of the alert module. Determines which alerts are forwarded to which people. When a notification policy is triggered, first the relevant contact in the contact list is selected, then alerts are sent to this contact via the specified channel.",{"type":420,"tag":421,"props":435,"children":437},{"id":436},"_2-contact-group",[438],{"type":426,"value":439},"2. Contact Group 👥",{"type":420,"tag":429,"props":441,"children":442},{},[443],{"type":426,"value":444},"By including Contacts in a group, you can configure the alert module on a group basis.",{"type":420,"tag":421,"props":446,"children":448},{"id":447},"example-flowchart",[449],{"type":426,"value":450},"Example Flowchart",{"type":420,"tag":452,"props":453,"children":454},"prose-mermaid",{},[455],{"type":420,"tag":456,"props":457,"children":461},"pre",{"className":458,"code":459,"language":460,"meta":414,"style":414},"language-mermaid shiki shiki-themes material-theme-lighter material-theme material-theme-palenight","graph LR\n    A[Malware Detected] --> B{\u003Cbr/>Malware Policy Triggered\u003Cbr/>}\n    B --> C[Contact Group Selected]\n    C --> D[SOC Team]\n    C --> E[Security Manager]\n    \n    D --> F[SMS Channel\u003Cbr/>Push Notification]\n    D --> G[E-Mail Channel\u003Cbr/>Detailed Report]\n    \n    E --> H[SMS Channel\u003Cbr/>Push Notification]\n    E --> I[E-Mail Channel\u003Cbr/>Detailed Report]\n    \n    F --> J[SOC Analyst1\u003Cbr/>555-111-2233]\n    F --> K[SOC Analyst2\u003Cbr/>555-444-5566]\n    \n    G --> L[soc e-mail address\u003Cbr/>Technical Detail]\n    \n    H --> M[security manager e-mail address\u003Cbr/>555-777-8899]\n    \n    I --> N[security manager \u003Cbr/>Manager Report]\n\n    style A fill:#ff6b6b\n    style B fill:#4ecdc4\n    style C fill:#45b7d1\n    style F fill:#96ceb4\n    style G fill:#96ceb4\n    style H fill:#96ceb4\n    style I fill:#96ceb4\n    ```\n::\n","mermaid",[462],{"type":420,"tag":463,"props":464,"children":465},"code",{"__ignoreMap":414},[466,477,486,495,504,513,522,531,540,548,557,566,574,583,592,600,609,617,626,634,643,653,662,671,680,689,698,707,716,725],{"type":420,"tag":467,"props":468,"children":471},"span",{"class":469,"line":470},"line",1,[472],{"type":420,"tag":467,"props":473,"children":474},{},[475],{"type":426,"value":476},"graph LR\n",{"type":420,"tag":467,"props":478,"children":480},{"class":469,"line":479},2,[481],{"type":420,"tag":467,"props":482,"children":483},{},[484],{"type":426,"value":485},"    A[Malware Detected] --> B{\u003Cbr/>Malware Policy Triggered\u003Cbr/>}\n",{"type":420,"tag":467,"props":487,"children":489},{"class":469,"line":488},3,[490],{"type":420,"tag":467,"props":491,"children":492},{},[493],{"type":426,"value":494},"    B --> C[Contact Group Selected]\n",{"type":420,"tag":467,"props":496,"children":498},{"class":469,"line":497},4,[499],{"type":420,"tag":467,"props":500,"children":501},{},[502],{"type":426,"value":503},"    C --> D[SOC Team]\n",{"type":420,"tag":467,"props":505,"children":507},{"class":469,"line":506},5,[508],{"type":420,"tag":467,"props":509,"children":510},{},[511],{"type":426,"value":512},"    C --> E[Security Manager]\n",{"type":420,"tag":467,"props":514,"children":516},{"class":469,"line":515},6,[517],{"type":420,"tag":467,"props":518,"children":519},{},[520],{"type":426,"value":521},"    \n",{"type":420,"tag":467,"props":523,"children":525},{"class":469,"line":524},7,[526],{"type":420,"tag":467,"props":527,"children":528},{},[529],{"type":426,"value":530},"    D --> F[SMS Channel\u003Cbr/>Push Notification]\n",{"type":420,"tag":467,"props":532,"children":534},{"class":469,"line":533},8,[535],{"type":420,"tag":467,"props":536,"children":537},{},[538],{"type":426,"value":539},"    D --> G[E-Mail Channel\u003Cbr/>Detailed Report]\n",{"type":420,"tag":467,"props":541,"children":543},{"class":469,"line":542},9,[544],{"type":420,"tag":467,"props":545,"children":546},{},[547],{"type":426,"value":521},{"type":420,"tag":467,"props":549,"children":551},{"class":469,"line":550},10,[552],{"type":420,"tag":467,"props":553,"children":554},{},[555],{"type":426,"value":556},"    E --> H[SMS Channel\u003Cbr/>Push Notification]\n",{"type":420,"tag":467,"props":558,"children":560},{"class":469,"line":559},11,[561],{"type":420,"tag":467,"props":562,"children":563},{},[564],{"type":426,"value":565},"    E --> I[E-Mail Channel\u003Cbr/>Detailed Report]\n",{"type":420,"tag":467,"props":567,"children":569},{"class":469,"line":568},12,[570],{"type":420,"tag":467,"props":571,"children":572},{},[573],{"type":426,"value":521},{"type":420,"tag":467,"props":575,"children":577},{"class":469,"line":576},13,[578],{"type":420,"tag":467,"props":579,"children":580},{},[581],{"type":426,"value":582},"    F --> J[SOC Analyst1\u003Cbr/>555-111-2233]\n",{"type":420,"tag":467,"props":584,"children":586},{"class":469,"line":585},14,[587],{"type":420,"tag":467,"props":588,"children":589},{},[590],{"type":426,"value":591},"    F --> K[SOC Analyst2\u003Cbr/>555-444-5566]\n",{"type":420,"tag":467,"props":593,"children":595},{"class":469,"line":594},15,[596],{"type":420,"tag":467,"props":597,"children":598},{},[599],{"type":426,"value":521},{"type":420,"tag":467,"props":601,"children":603},{"class":469,"line":602},16,[604],{"type":420,"tag":467,"props":605,"children":606},{},[607],{"type":426,"value":608},"    G --> L[soc e-mail address\u003Cbr/>Technical Detail]\n",{"type":420,"tag":467,"props":610,"children":612},{"class":469,"line":611},17,[613],{"type":420,"tag":467,"props":614,"children":615},{},[616],{"type":426,"value":521},{"type":420,"tag":467,"props":618,"children":620},{"class":469,"line":619},18,[621],{"type":420,"tag":467,"props":622,"children":623},{},[624],{"type":426,"value":625},"    H --> M[security manager e-mail address\u003Cbr/>555-777-8899]\n",{"type":420,"tag":467,"props":627,"children":629},{"class":469,"line":628},19,[630],{"type":420,"tag":467,"props":631,"children":632},{},[633],{"type":426,"value":521},{"type":420,"tag":467,"props":635,"children":637},{"class":469,"line":636},20,[638],{"type":420,"tag":467,"props":639,"children":640},{},[641],{"type":426,"value":642},"    I --> N[security manager \u003Cbr/>Manager Report]\n",{"type":420,"tag":467,"props":644,"children":646},{"class":469,"line":645},21,[647],{"type":420,"tag":467,"props":648,"children":650},{"emptyLinePlaceholder":649},true,[651],{"type":426,"value":652},"\n",{"type":420,"tag":467,"props":654,"children":656},{"class":469,"line":655},22,[657],{"type":420,"tag":467,"props":658,"children":659},{},[660],{"type":426,"value":661},"    style A fill:#ff6b6b\n",{"type":420,"tag":467,"props":663,"children":665},{"class":469,"line":664},23,[666],{"type":420,"tag":467,"props":667,"children":668},{},[669],{"type":426,"value":670},"    style B fill:#4ecdc4\n",{"type":420,"tag":467,"props":672,"children":674},{"class":469,"line":673},24,[675],{"type":420,"tag":467,"props":676,"children":677},{},[678],{"type":426,"value":679},"    style C fill:#45b7d1\n",{"type":420,"tag":467,"props":681,"children":683},{"class":469,"line":682},25,[684],{"type":420,"tag":467,"props":685,"children":686},{},[687],{"type":426,"value":688},"    style F fill:#96ceb4\n",{"type":420,"tag":467,"props":690,"children":692},{"class":469,"line":691},26,[693],{"type":420,"tag":467,"props":694,"children":695},{},[696],{"type":426,"value":697},"    style G fill:#96ceb4\n",{"type":420,"tag":467,"props":699,"children":701},{"class":469,"line":700},27,[702],{"type":420,"tag":467,"props":703,"children":704},{},[705],{"type":426,"value":706},"    style H fill:#96ceb4\n",{"type":420,"tag":467,"props":708,"children":710},{"class":469,"line":709},28,[711],{"type":420,"tag":467,"props":712,"children":713},{},[714],{"type":426,"value":715},"    style I fill:#96ceb4\n",{"type":420,"tag":467,"props":717,"children":719},{"class":469,"line":718},29,[720],{"type":420,"tag":467,"props":721,"children":722},{},[723],{"type":426,"value":724},"    ```\n",{"type":420,"tag":467,"props":726,"children":728},{"class":469,"line":727},30,[729],{"type":420,"tag":467,"props":730,"children":731},{},[732],{"type":426,"value":733},"::\n",{"type":420,"tag":735,"props":736,"children":737},"style",{},[738],{"type":426,"value":739},"html .light .shiki span {color: var(--shiki-light);background: var(--shiki-light-bg);font-style: var(--shiki-light-font-style);font-weight: var(--shiki-light-font-weight);text-decoration: var(--shiki-light-text-decoration);}html.light .shiki span {color: var(--shiki-light);background: var(--shiki-light-bg);font-style: var(--shiki-light-font-style);font-weight: var(--shiki-light-font-weight);text-decoration: var(--shiki-light-text-decoration);}html .default .shiki span {color: var(--shiki-default);background: var(--shiki-default-bg);font-style: var(--shiki-default-font-style);font-weight: var(--shiki-default-font-weight);text-decoration: var(--shiki-default-text-decoration);}html .shiki span {color: var(--shiki-default);background: var(--shiki-default-bg);font-style: var(--shiki-default-font-style);font-weight: var(--shiki-default-font-weight);text-decoration: var(--shiki-default-text-decoration);}html .dark .shiki span {color: var(--shiki-dark);background: var(--shiki-dark-bg);font-style: var(--shiki-dark-font-style);font-weight: var(--shiki-dark-font-weight);text-decoration: var(--shiki-dark-text-decoration);}html.dark .shiki span {color: var(--shiki-dark);background: var(--shiki-dark-bg);font-style: var(--shiki-dark-font-style);font-weight: var(--shiki-dark-font-weight);text-decoration: var(--shiki-dark-text-decoration);}",{"title":414,"searchDepth":479,"depth":479,"links":741},[742,743,744],{"id":423,"depth":479,"text":427},{"id":436,"depth":479,"text":439},{"id":447,"depth":479,"text":450},"markdown","content:en:8.management:2.contact-management.md","content","en/8.management/2.contact-management.md","en/8.management/2.contact-management","md",[752,1310],{"_path":135,"_dir":412,"_draft":413,"_partial":413,"_locale":414,"title":134,"description":753,"body":754,"_type":745,"_id":1307,"_source":747,"_file":1308,"_stem":1309,"_extension":750},"This section provides information about import, export, external backup services and backup forensic sign under the Data management topic.",{"type":417,"children":755,"toc":1290},[756,762,775,781,788,793,799,805,810,830,836,842,860,866,884,890,895,928,934,939,982,988,1021,1027,1034,1148,1154,1235,1241,1257,1263,1269,1274,1286],{"type":420,"tag":421,"props":757,"children":759},{"id":758},"_1-export-task",[760],{"type":426,"value":761},"1. Export Task 📤",{"type":420,"tag":429,"props":763,"children":764},{},[765,767,773],{"type":426,"value":766},"The Export task page allows you to view the exports you have already completed and the exports currently in progress.\nExport works through storage adapters. In order to start the export process, you must first define a storage adapter. Go to the ",{"type":420,"tag":768,"props":769,"children":770},"strong",{},[771],{"type":426,"value":772},"Object Management > Storage Adapters",{"type":426,"value":774}," documentation.",{"type":420,"tag":421,"props":776,"children":778},{"id":777},"_2-backup-forensic-sign",[779],{"type":426,"value":780},"2. Backup Forensic Sign 📥",{"type":420,"tag":782,"props":783,"children":785},"h3",{"id":784},"overview",[786],{"type":426,"value":787},"Overview 👀",{"type":420,"tag":429,"props":789,"children":790},{},[791],{"type":426,"value":792},"Our system securely collects, signs, and stores your organization's log records. This ensures the integrity and immutability of your logs.",{"type":420,"tag":782,"props":794,"children":796},{"id":795},"system-features",[797],{"type":426,"value":798},"System Features ✨",{"type":420,"tag":782,"props":800,"children":802},{"id":801},"log-collection-and-storage",[803],{"type":426,"value":804},"Log Collection and Storage",{"type":420,"tag":429,"props":806,"children":807},{},[808],{"type":426,"value":809},"The system segments log data into hourly chunks, where each chunk:",{"type":420,"tag":811,"props":812,"children":813},"ul",{},[814,820,825],{"type":420,"tag":815,"props":816,"children":817},"li",{},[818],{"type":426,"value":819},"Logs in your system are automatically collected",{"type":420,"tag":815,"props":821,"children":822},{},[823],{"type":426,"value":824},"Collected logs are securely processed and stored",{"type":420,"tag":815,"props":826,"children":827},{},[828],{"type":426,"value":829},"All logs are stored in an encrypted format",{"type":420,"tag":782,"props":831,"children":833},{"id":832},"signing-process",[834],{"type":426,"value":835},"Signing Process 🔄",{"type":420,"tag":782,"props":837,"children":839},{"id":838},"real-time-signing",[840],{"type":426,"value":841},"Real-Time Signing",{"type":420,"tag":811,"props":843,"children":844},{},[845,850,855],{"type":420,"tag":815,"props":846,"children":847},{},[848],{"type":426,"value":849},"Your logs are automatically grouped at specified time intervals",{"type":420,"tag":815,"props":851,"children":852},{},[853],{"type":426,"value":854},"Each group is compressed, encrypted, and digitally signed",{"type":420,"tag":815,"props":856,"children":857},{},[858],{"type":426,"value":859},"Signed data is transferred to a secure storage area",{"type":420,"tag":782,"props":861,"children":863},{"id":862},"official-authority-signature",[864],{"type":426,"value":865},"Official Authority Signature",{"type":420,"tag":811,"props":867,"children":868},{},[869,874,879],{"type":420,"tag":815,"props":870,"children":871},{},[872],{"type":426,"value":873},"At the end of the day, all log groups are signed by official authorities for an additional layer of security",{"type":420,"tag":815,"props":875,"children":876},{},[877],{"type":426,"value":878},"By default, FreeTSA is used",{"type":420,"tag":815,"props":880,"children":881},{},[882],{"type":426,"value":883},"Optionally, local authorities such as Kamusm or TÜBİTAK can be used",{"type":420,"tag":782,"props":885,"children":887},{"id":886},"verification-process",[888],{"type":426,"value":889},"Verification Process ✅",{"type":420,"tag":429,"props":891,"children":892},{},[893],{"type":426,"value":894},"To check the integrity of your log records:",{"type":420,"tag":811,"props":896,"children":897},{},[898,908,918],{"type":420,"tag":815,"props":899,"children":900},{},[901,906],{"type":420,"tag":768,"props":902,"children":903},{},[904],{"type":426,"value":905},"Verification Time:",{"type":426,"value":907}," Verification can be performed after the end-of-day official signing process is completed",{"type":420,"tag":815,"props":909,"children":910},{},[911,916],{"type":420,"tag":768,"props":912,"children":913},{},[914],{"type":426,"value":915},"Verification Scope:",{"type":426,"value":917}," You can select the desired log group for verification",{"type":420,"tag":815,"props":919,"children":920},{},[921,926],{"type":420,"tag":768,"props":922,"children":923},{},[924],{"type":426,"value":925},"Verification Result:",{"type":426,"value":927}," The system checks whether the selected logs have been altered",{"type":420,"tag":782,"props":929,"children":931},{"id":930},"security-features",[932],{"type":426,"value":933},"Security Features 🔒",{"type":420,"tag":429,"props":935,"children":936},{},[937],{"type":426,"value":938},"The system continuously monitors storage efficiency:",{"type":420,"tag":811,"props":940,"children":941},{},[942,952,962,972],{"type":420,"tag":815,"props":943,"children":944},{},[945,950],{"type":420,"tag":768,"props":946,"children":947},{},[948],{"type":426,"value":949},"Encryption:",{"type":426,"value":951}," All logs are encrypted using industry-standard algorithms",{"type":420,"tag":815,"props":953,"children":954},{},[955,960],{"type":420,"tag":768,"props":956,"children":957},{},[958],{"type":426,"value":959},"Digital Signature:",{"type":426,"value":961}," Each log group is cryptographically signed",{"type":420,"tag":815,"props":963,"children":964},{},[965,970],{"type":420,"tag":768,"props":966,"children":967},{},[968],{"type":426,"value":969},"Timestamp:",{"type":426,"value":971}," Legal value is provided through timestamps obtained from official authorities",{"type":420,"tag":815,"props":973,"children":974},{},[975,980],{"type":420,"tag":768,"props":976,"children":977},{},[978],{"type":426,"value":979},"Integrity Check:",{"type":426,"value":981}," Mathematical proof ensures that the logs have not been altered",{"type":420,"tag":782,"props":983,"children":985},{"id":984},"use-cases-️",[986],{"type":426,"value":987},"Use Cases ✍️",{"type":420,"tag":811,"props":989,"children":990},{},[991,1001,1011],{"type":420,"tag":815,"props":992,"children":993},{},[994,999],{"type":420,"tag":768,"props":995,"children":996},{},[997],{"type":426,"value":998},"Audit:",{"type":426,"value":1000}," Reliable log records for legal audits",{"type":420,"tag":815,"props":1002,"children":1003},{},[1004,1009],{"type":420,"tag":768,"props":1005,"children":1006},{},[1007],{"type":426,"value":1008},"Forensic Analysis:",{"type":426,"value":1010}," Log records that can be used as evidence in court",{"type":420,"tag":815,"props":1012,"children":1013},{},[1014,1019],{"type":420,"tag":768,"props":1015,"children":1016},{},[1017],{"type":426,"value":1018},"Compliance:",{"type":426,"value":1020}," Meeting regulatory requirements",{"type":420,"tag":782,"props":1022,"children":1024},{"id":1023},"system-diagram",[1025],{"type":426,"value":1026},"System Diagram 🖧",{"type":420,"tag":1028,"props":1029,"children":1031},"h4",{"id":1030},"backupsign-flowchart",[1032],{"type":426,"value":1033},"Backup&Sign Flowchart",{"type":420,"tag":452,"props":1035,"children":1036},{},[1037],{"type":420,"tag":456,"props":1038,"children":1040},{"className":458,"code":1039,"language":460,"meta":414,"style":414},"flowchart LR\n    A[TCP/UDP Log Source] --> B[MessageQ]\n    B --> C{Log Deployment}\n    C -->|Path 1| D[Database Insert]\n    C -->|Path 2| E[Sign Service]\n    E -->G[Create Chunk\u003Cbr/>-Compression\u003Cbr/>-Encryption\u003Cbr/>-SelfSign+TimeStamp]\n    G -->L\n    G -->H{End of the day?}\n    H -->|Yes| I[-Collect All Chunk Hashes\u003Cbr/>-Merge Hashes by Timestamp\u003Cbr/>-Sign with Official Authority FreeTSA/Kamusm/TÜBİTAK]\n    I --> J[Master Signature File]\n    J --> K[Upload to MinIO S3]\n    L[File+S3Metadata\u003Cbr/>-Timestamp\u003Cbr/>-Compression Algorithm\u003Cbr/>-Encryption Algorithm\u003Cbr/>-Data Size/Count\u003Cbr/>-Compression Ratio\u003Cbr/>- Hash SHA-256\u003Cbr/>-Digest/Sign]\n    L --> K\n",[1041],{"type":420,"tag":463,"props":1042,"children":1043},{"__ignoreMap":414},[1044,1052,1060,1068,1076,1084,1092,1100,1108,1116,1124,1132,1140],{"type":420,"tag":467,"props":1045,"children":1046},{"class":469,"line":470},[1047],{"type":420,"tag":467,"props":1048,"children":1049},{},[1050],{"type":426,"value":1051},"flowchart LR\n",{"type":420,"tag":467,"props":1053,"children":1054},{"class":469,"line":479},[1055],{"type":420,"tag":467,"props":1056,"children":1057},{},[1058],{"type":426,"value":1059},"    A[TCP/UDP Log Source] --> B[MessageQ]\n",{"type":420,"tag":467,"props":1061,"children":1062},{"class":469,"line":488},[1063],{"type":420,"tag":467,"props":1064,"children":1065},{},[1066],{"type":426,"value":1067},"    B --> C{Log Deployment}\n",{"type":420,"tag":467,"props":1069,"children":1070},{"class":469,"line":497},[1071],{"type":420,"tag":467,"props":1072,"children":1073},{},[1074],{"type":426,"value":1075},"    C -->|Path 1| D[Database Insert]\n",{"type":420,"tag":467,"props":1077,"children":1078},{"class":469,"line":506},[1079],{"type":420,"tag":467,"props":1080,"children":1081},{},[1082],{"type":426,"value":1083},"    C -->|Path 2| E[Sign Service]\n",{"type":420,"tag":467,"props":1085,"children":1086},{"class":469,"line":515},[1087],{"type":420,"tag":467,"props":1088,"children":1089},{},[1090],{"type":426,"value":1091},"    E -->G[Create Chunk\u003Cbr/>-Compression\u003Cbr/>-Encryption\u003Cbr/>-SelfSign+TimeStamp]\n",{"type":420,"tag":467,"props":1093,"children":1094},{"class":469,"line":524},[1095],{"type":420,"tag":467,"props":1096,"children":1097},{},[1098],{"type":426,"value":1099},"    G -->L\n",{"type":420,"tag":467,"props":1101,"children":1102},{"class":469,"line":533},[1103],{"type":420,"tag":467,"props":1104,"children":1105},{},[1106],{"type":426,"value":1107},"    G -->H{End of the day?}\n",{"type":420,"tag":467,"props":1109,"children":1110},{"class":469,"line":542},[1111],{"type":420,"tag":467,"props":1112,"children":1113},{},[1114],{"type":426,"value":1115},"    H -->|Yes| I[-Collect All Chunk Hashes\u003Cbr/>-Merge Hashes by Timestamp\u003Cbr/>-Sign with Official Authority FreeTSA/Kamusm/TÜBİTAK]\n",{"type":420,"tag":467,"props":1117,"children":1118},{"class":469,"line":550},[1119],{"type":420,"tag":467,"props":1120,"children":1121},{},[1122],{"type":426,"value":1123},"    I --> J[Master Signature File]\n",{"type":420,"tag":467,"props":1125,"children":1126},{"class":469,"line":559},[1127],{"type":420,"tag":467,"props":1128,"children":1129},{},[1130],{"type":426,"value":1131},"    J --> K[Upload to MinIO S3]\n",{"type":420,"tag":467,"props":1133,"children":1134},{"class":469,"line":568},[1135],{"type":420,"tag":467,"props":1136,"children":1137},{},[1138],{"type":426,"value":1139},"    L[File+S3Metadata\u003Cbr/>-Timestamp\u003Cbr/>-Compression Algorithm\u003Cbr/>-Encryption Algorithm\u003Cbr/>-Data Size/Count\u003Cbr/>-Compression Ratio\u003Cbr/>- Hash SHA-256\u003Cbr/>-Digest/Sign]\n",{"type":420,"tag":467,"props":1141,"children":1142},{"class":469,"line":576},[1143],{"type":420,"tag":467,"props":1144,"children":1145},{},[1146],{"type":426,"value":1147},"    L --> K\n",{"type":420,"tag":1028,"props":1149,"children":1151},{"id":1150},"verify-flowchart",[1152],{"type":426,"value":1153},"Verify Flowchart",{"type":420,"tag":452,"props":1155,"children":1156},{},[1157],{"type":420,"tag":456,"props":1158,"children":1160},{"className":458,"code":1159,"language":460,"meta":414,"style":414},"flowchart LR\nQ[Select Chunk] --> R[End of day check]\n        R --> S[Get hash/sign\u003Cbr/>of the metadata\u003Cbr/>of the chunk]\n        S --> T[-Collect All Chunk Hashes]\n        T --> U[Merge Hash's by timestamp]\n        U --> V[Comparison with master sign]\n        V --> W{Does it match?}\n        W -->|Yes| X[Verify is succesful]\n        W -->|No| Y[Verify is faided]\n",[1161],{"type":420,"tag":463,"props":1162,"children":1163},{"__ignoreMap":414},[1164,1171,1179,1187,1195,1203,1211,1219,1227],{"type":420,"tag":467,"props":1165,"children":1166},{"class":469,"line":470},[1167],{"type":420,"tag":467,"props":1168,"children":1169},{},[1170],{"type":426,"value":1051},{"type":420,"tag":467,"props":1172,"children":1173},{"class":469,"line":479},[1174],{"type":420,"tag":467,"props":1175,"children":1176},{},[1177],{"type":426,"value":1178},"Q[Select Chunk] --> R[End of day check]\n",{"type":420,"tag":467,"props":1180,"children":1181},{"class":469,"line":488},[1182],{"type":420,"tag":467,"props":1183,"children":1184},{},[1185],{"type":426,"value":1186},"        R --> S[Get hash/sign\u003Cbr/>of the metadata\u003Cbr/>of the chunk]\n",{"type":420,"tag":467,"props":1188,"children":1189},{"class":469,"line":497},[1190],{"type":420,"tag":467,"props":1191,"children":1192},{},[1193],{"type":426,"value":1194},"        S --> T[-Collect All Chunk Hashes]\n",{"type":420,"tag":467,"props":1196,"children":1197},{"class":469,"line":506},[1198],{"type":420,"tag":467,"props":1199,"children":1200},{},[1201],{"type":426,"value":1202},"        T --> U[Merge Hash's by timestamp]\n",{"type":420,"tag":467,"props":1204,"children":1205},{"class":469,"line":515},[1206],{"type":420,"tag":467,"props":1207,"children":1208},{},[1209],{"type":426,"value":1210},"        U --> V[Comparison with master sign]\n",{"type":420,"tag":467,"props":1212,"children":1213},{"class":469,"line":524},[1214],{"type":420,"tag":467,"props":1215,"children":1216},{},[1217],{"type":426,"value":1218},"        V --> W{Does it match?}\n",{"type":420,"tag":467,"props":1220,"children":1221},{"class":469,"line":533},[1222],{"type":420,"tag":467,"props":1223,"children":1224},{},[1225],{"type":426,"value":1226},"        W -->|Yes| X[Verify is succesful]\n",{"type":420,"tag":467,"props":1228,"children":1229},{"class":469,"line":542},[1230],{"type":420,"tag":467,"props":1231,"children":1232},{},[1233],{"type":426,"value":1234},"        W -->|No| Y[Verify is faided]\n",{"type":420,"tag":421,"props":1236,"children":1238},{"id":1237},"_3-external-backup-service",[1239],{"type":426,"value":1240},"3. External Backup Service ↗",{"type":420,"tag":429,"props":1242,"children":1243},{},[1244,1246,1255],{"type":426,"value":1245},"Extarnal backup service is a service to transfer log records to an external storage. To create an external backup service, a source is selected and a new storage adapter is created. Below you can see the storage adapter that the logger integrates with. For detailed information on how to add a storage adapter, see the ",{"type":420,"tag":1247,"props":1248,"children":1252},"a",{"href":1249,"rel":1250},"http://localhost:3000/en/management/object",[1251],"nofollow",[1253],{"type":426,"value":1254},"storage adapter",{"type":426,"value":1256}," section in the following document.",{"type":420,"tag":1258,"props":1259,"children":1262},"storage-adapter-modal",{":providers":1260,"title":1261,"trigger-text":1261},"[{\"name\":\"FTPS\",\"logo\":\"/images/logos/ftps.png\"},{\"name\":\"AWS S3\",\"logo\":\"/images/logos/aws.png\"},{\"name\":\"Azure Blob Storage\",\"logo\":\"/images/logos/azure.png\"},{\"name\":\"MinIO\",\"logo\":\"/images/logos/minio.png\"},{\"name\":\"SFTP Storage\",\"logo\":\"/images/logos/sftp.png\"}]","Storage Adapter List",[],{"type":420,"tag":421,"props":1264,"children":1266},{"id":1265},"_4-settings-️",[1267],{"type":426,"value":1268},"4. Settings ⚙️",{"type":420,"tag":429,"props":1270,"children":1271},{},[1272],{"type":426,"value":1273},"In the Settings tab, you can change some properties of the containers to which the logger software is connected. The features you can intervene in this tab are limited. You can use the CLI module for more detailed configurations.",{"type":420,"tag":429,"props":1275,"children":1276},{},[1277,1279],{"type":426,"value":1278},"👉 ",{"type":420,"tag":1247,"props":1280,"children":1283},{"href":1281,"rel":1282},"http://localhost:3000/en/management/command-line-interface",[1251],[1284],{"type":426,"value":1285},"How to use CLI ?",{"type":420,"tag":735,"props":1287,"children":1288},{},[1289],{"type":426,"value":739},{"title":414,"searchDepth":479,"depth":479,"links":1291},[1292,1293,1305,1306],{"id":758,"depth":479,"text":761},{"id":777,"depth":479,"text":780,"children":1294},[1295,1296,1297,1298,1299,1300,1301,1302,1303,1304],{"id":784,"depth":488,"text":787},{"id":795,"depth":488,"text":798},{"id":801,"depth":488,"text":804},{"id":832,"depth":488,"text":835},{"id":838,"depth":488,"text":841},{"id":862,"depth":488,"text":865},{"id":886,"depth":488,"text":889},{"id":930,"depth":488,"text":933},{"id":984,"depth":488,"text":987},{"id":1023,"depth":488,"text":1026},{"id":1237,"depth":479,"text":1240},{"id":1265,"depth":479,"text":1268},"content:en:8.management:1.data-management.md","en/8.management/1.data-management.md","en/8.management/1.data-management",{"_path":141,"_dir":412,"_draft":413,"_partial":413,"_locale":414,"title":140,"description":1311,"body":1312,"_type":745,"_id":1763,"_source":747,"_file":1764,"_stem":1765,"_extension":750},"This section provides information on installing Logger on Docker Swarm.",{"type":417,"children":1313,"toc":1751},[1314,1320,1325,1334,1339,1346,1354,1359,1370,1376,1381,1387,1392,1398,1404,1409,1417,1435,1441,1446,1453,1471,1477,1483,1491,1509,1517,1535,1543,1561,1567,1574,1592,1599,1617,1624,1642,1648,1653,1671,1677,1701,1707,1730,1736,1748],{"type":420,"tag":421,"props":1315,"children":1317},{"id":1316},"channel",[1318],{"type":426,"value":1319},"Channel 📡",{"type":420,"tag":429,"props":1321,"children":1322},{},[1323],{"type":426,"value":1324},"Channel is part of the alert module. It determines which alerts are communicated via which medium. When a notification policy is triggered, first the relevant person in the contact list is selected, then alerts are sent to this person via the specified channel.\nTo create a channel you need to use two different channel types.",{"type":420,"tag":1326,"props":1327,"children":1328},"ol",{},[1329],{"type":420,"tag":815,"props":1330,"children":1331},{},[1332],{"type":426,"value":1333},"SMS",{"type":420,"tag":429,"props":1335,"children":1336},{},[1337],{"type":426,"value":1338},"When the sms option is selected, sms is sent to the mobile phone number of the relevant contact. You can view the SMS providers supported by default in the list below.",{"type":420,"tag":1340,"props":1341,"children":1345},"sms-provider-modal",{":providers":1342,"title":1343,"trigger-text":1344},"[{\"name\":\"Acil SMS\",\"logo\":\"/images/logos/acilsms-logo.png\"},{\"name\":\"Ajans Iletisim Sms\",\"logo\":\"/images/logos/ajans-iletisim.png\"},{\"name\":\"AsistBT Sms\",\"logo\":\"/images/logos/asistbtsms-logo.png\"},{\"name\":\"Asistel Sms\",\"logo\":\"/images/logos/asistelsms-logo.png\"},{\"name\":\"AyYildiz Sms\",\"logo\":\"/images/logos/ayyildizsms-logo.png\"},{\"name\":\"CallTurk Sms\",\"logo\":\"/images/logos/callturksms-logo.png\"},{\"name\":\"CodecFast Sms\",\"logo\":\"/images/logos/codecfastsms-logo.png\"},{\"name\":\"DataPort Sms\",\"logo\":\"/images/logos/dataportsms-logo.png\"},{\"name\":\"Dinamik Sms\",\"logo\":\"/images/logos/dinamiksms-logo.png\"},{\"name\":\"EserTelekom Sms\",\"logo\":\"/images/logos/esertelekomsms-logo.png\"},{\"name\":\"IletiMerkezi Sms\",\"logo\":\"/images/logos/iletimerkezisms-logo.png\"},{\"name\":\"Interaktif Sms\",\"logo\":\"/images/logos/interaktifsms-logo.png\"},{\"name\":\"Jet Sms\",\"logo\":\"/images/logos/jetsms-logo.png\"},{\"name\":\"NetGsm\",\"logo\":\"/images/logos/netgsm-logo.png\"},{\"name\":\"Posta Guvercini Sms\",\"logo\":\"/images/logos/postaguvercini-logo.png\"}]","Sms Provider List","SMS Provider List",[],{"type":420,"tag":1326,"props":1347,"children":1348},{"start":479},[1349],{"type":420,"tag":815,"props":1350,"children":1351},{},[1352],{"type":426,"value":1353},"E-Mail",{"type":420,"tag":429,"props":1355,"children":1356},{},[1357],{"type":426,"value":1358},"When the E-mail option is selected, an e-mail is sent to the e-mail address of the relevant person. Mail is sent through our SMTP server. See the document below for detailed e-mail settings.",{"type":420,"tag":429,"props":1360,"children":1361},{},[1362,1363],{"type":426,"value":1278},{"type":420,"tag":1247,"props":1364,"children":1367},{"href":1365,"rel":1366},"http://localhost:3000/en/integrations/smtp",[1251],[1368],{"type":426,"value":1369},"How to add smtp server?",{"type":420,"tag":421,"props":1371,"children":1373},{"id":1372},"aliases-️",[1374],{"type":426,"value":1375},"Aliases 🏷️",{"type":420,"tag":429,"props":1377,"children":1378},{},[1379],{"type":426,"value":1380},"You can assign tags such as IP, Mac, device name, etc. to objects using Alias. You can see the matching objects and names both on the Log View page and on the Report View page and you can perform log tracking and analysis through this naming.",{"type":420,"tag":421,"props":1382,"children":1384},{"id":1383},"certificates",[1385],{"type":426,"value":1386},"Certificates 🔏",{"type":420,"tag":429,"props":1388,"children":1389},{},[1390],{"type":426,"value":1391},"You can add your CSR certificate to Logger or request a CSR certificate. You can also generate a self-signed certificate.",{"type":420,"tag":782,"props":1393,"children":1395},{"id":1394},"certificate-usage-areas",[1396],{"type":426,"value":1397},"Certificate Usage Areas 📍",{"type":420,"tag":1028,"props":1399,"children":1401},{"id":1400},"_1-hotspot-captive-portal-module",[1402],{"type":426,"value":1403},"1. Hotspot (Captive Portal) Module",{"type":420,"tag":429,"props":1405,"children":1406},{},[1407],{"type":426,"value":1408},"The Hotspot module operates as a WiFi authentication system. Certificates are used to securely serve the identity verification screen that users encounter when connecting to the WiFi network over HTTPS.",{"type":420,"tag":429,"props":1410,"children":1411},{},[1412],{"type":420,"tag":768,"props":1413,"children":1414},{},[1415],{"type":426,"value":1416},"Benefits:",{"type":420,"tag":811,"props":1418,"children":1419},{},[1420,1425,1430],{"type":420,"tag":815,"props":1421,"children":1422},{},[1423],{"type":426,"value":1424},"Encrypted transmission of user credentials",{"type":420,"tag":815,"props":1426,"children":1427},{},[1428],{"type":426,"value":1429},"Protection against man-in-the-middle attacks",{"type":420,"tag":815,"props":1431,"children":1432},{},[1433],{"type":426,"value":1434},"Providing trusted connections",{"type":420,"tag":1028,"props":1436,"children":1438},{"id":1437},"_2-siem-web-interface",[1439],{"type":426,"value":1440},"2. SIEM Web Interface",{"type":420,"tag":429,"props":1442,"children":1443},{},[1444],{"type":426,"value":1445},"Certificates are used to provide secure HTTPS access to the SIEM product's management panel and web interface.",{"type":420,"tag":429,"props":1447,"children":1448},{},[1449],{"type":420,"tag":768,"props":1450,"children":1451},{},[1452],{"type":426,"value":1416},{"type":420,"tag":811,"props":1454,"children":1455},{},[1456,1461,1466],{"type":420,"tag":815,"props":1457,"children":1458},{},[1459],{"type":426,"value":1460},"Secure transmission of administrator login credentials",{"type":420,"tag":815,"props":1462,"children":1463},{},[1464],{"type":426,"value":1465},"Encrypted transfer of system data",{"type":420,"tag":815,"props":1467,"children":1468},{},[1469],{"type":426,"value":1470},"Prevention of browser security warnings",{"type":420,"tag":782,"props":1472,"children":1474},{"id":1473},"certificate-types-and-differences",[1475],{"type":426,"value":1476},"Certificate Types and Differences 🤔",{"type":420,"tag":1028,"props":1478,"children":1480},{"id":1479},"self-signed-certificate",[1481],{"type":426,"value":1482},"Self-Signed Certificate",{"type":420,"tag":429,"props":1484,"children":1485},{},[1486],{"type":420,"tag":768,"props":1487,"children":1488},{},[1489],{"type":426,"value":1490},"Characteristics:",{"type":420,"tag":811,"props":1492,"children":1493},{},[1494,1499,1504],{"type":420,"tag":815,"props":1495,"children":1496},{},[1497],{"type":426,"value":1498},"Created and signed by the system itself",{"type":420,"tag":815,"props":1500,"children":1501},{},[1502],{"type":426,"value":1503},"Does not require any Certificate Authority (CA)",{"type":420,"tag":815,"props":1505,"children":1506},{},[1507],{"type":426,"value":1508},"Quick and easy to create",{"type":420,"tag":429,"props":1510,"children":1511},{},[1512],{"type":420,"tag":768,"props":1513,"children":1514},{},[1515],{"type":426,"value":1516},"Advantages:",{"type":420,"tag":811,"props":1518,"children":1519},{},[1520,1525,1530],{"type":420,"tag":815,"props":1521,"children":1522},{},[1523],{"type":426,"value":1524},"No cost required",{"type":420,"tag":815,"props":1526,"children":1527},{},[1528],{"type":426,"value":1529},"Ready for immediate use",{"type":420,"tag":815,"props":1531,"children":1532},{},[1533],{"type":426,"value":1534},"Ideal for internal network usage",{"type":420,"tag":429,"props":1536,"children":1537},{},[1538],{"type":420,"tag":768,"props":1539,"children":1540},{},[1541],{"type":426,"value":1542},"Disadvantages:",{"type":420,"tag":811,"props":1544,"children":1545},{},[1546,1551,1556],{"type":420,"tag":815,"props":1547,"children":1548},{},[1549],{"type":426,"value":1550},"Browsers display security warnings",{"type":420,"tag":815,"props":1552,"children":1553},{},[1554],{"type":426,"value":1555},"No third-party verification",{"type":420,"tag":815,"props":1557,"children":1558},{},[1559],{"type":426,"value":1560},"Not suitable for publicly accessible systems",{"type":420,"tag":1028,"props":1562,"children":1564},{"id":1563},"csr-certificate-signing-request-certificate",[1565],{"type":426,"value":1566},"CSR (Certificate Signing Request) Certificate",{"type":420,"tag":429,"props":1568,"children":1569},{},[1570],{"type":420,"tag":768,"props":1571,"children":1572},{},[1573],{"type":426,"value":1490},{"type":420,"tag":811,"props":1575,"children":1576},{},[1577,1582,1587],{"type":420,"tag":815,"props":1578,"children":1579},{},[1580],{"type":426,"value":1581},"Certificate request is created",{"type":420,"tag":815,"props":1583,"children":1584},{},[1585],{"type":426,"value":1586},"Signed by a trusted CA",{"type":420,"tag":815,"props":1588,"children":1589},{},[1590],{"type":426,"value":1591},"Requires official validation process",{"type":420,"tag":429,"props":1593,"children":1594},{},[1595],{"type":420,"tag":768,"props":1596,"children":1597},{},[1598],{"type":426,"value":1516},{"type":420,"tag":811,"props":1600,"children":1601},{},[1602,1607,1612],{"type":420,"tag":815,"props":1603,"children":1604},{},[1605],{"type":426,"value":1606},"Trusted and accepted by browsers",{"type":420,"tag":815,"props":1608,"children":1609},{},[1610],{"type":426,"value":1611},"Provides professional appearance",{"type":420,"tag":815,"props":1613,"children":1614},{},[1615],{"type":426,"value":1616},"Suitable for public access",{"type":420,"tag":429,"props":1618,"children":1619},{},[1620],{"type":420,"tag":768,"props":1621,"children":1622},{},[1623],{"type":426,"value":1542},{"type":420,"tag":811,"props":1625,"children":1626},{},[1627,1632,1637],{"type":420,"tag":815,"props":1628,"children":1629},{},[1630],{"type":426,"value":1631},"Requires additional cost",{"type":420,"tag":815,"props":1633,"children":1634},{},[1635],{"type":426,"value":1636},"CA approval process may take time",{"type":420,"tag":815,"props":1638,"children":1639},{},[1640],{"type":426,"value":1641},"Requires periodic renewal",{"type":420,"tag":782,"props":1643,"children":1645},{"id":1644},"certificate-import",[1646],{"type":426,"value":1647},"Certificate Import 📥",{"type":420,"tag":429,"props":1649,"children":1650},{},[1651],{"type":426,"value":1652},"The system also supports importing existing certificates (in PFX format). This feature:",{"type":420,"tag":811,"props":1654,"children":1655},{},[1656,1661,1666],{"type":420,"tag":815,"props":1657,"children":1658},{},[1659],{"type":426,"value":1660},"Enables the use of previously purchased certificates",{"type":420,"tag":815,"props":1662,"children":1663},{},[1664],{"type":426,"value":1665},"Provides compliance with corporate certificate policies",{"type":420,"tag":815,"props":1667,"children":1668},{},[1669],{"type":426,"value":1670},"Offers centralized certificate management capabilities",{"type":420,"tag":782,"props":1672,"children":1674},{"id":1673},"usage-recommendations",[1675],{"type":426,"value":1676},"Usage Recommendations 💡",{"type":420,"tag":429,"props":1678,"children":1679},{},[1680,1685,1687,1692,1694,1699],{"type":420,"tag":768,"props":1681,"children":1682},{},[1683],{"type":426,"value":1684},"Internal Network/Test Environment:",{"type":426,"value":1686}," Use self-signed certificates\n",{"type":420,"tag":768,"props":1688,"children":1689},{},[1690],{"type":426,"value":1691},"Production/Public Access:",{"type":426,"value":1693}," Prefer CSR certificates\n",{"type":420,"tag":768,"props":1695,"children":1696},{},[1697],{"type":426,"value":1698},"Corporate Environment:",{"type":426,"value":1700}," Import existing certificates",{"type":420,"tag":782,"props":1702,"children":1704},{"id":1703},"security-notes",[1705],{"type":426,"value":1706},"Security Notes 📌",{"type":420,"tag":811,"props":1708,"children":1709},{},[1710,1715,1720,1725],{"type":420,"tag":815,"props":1711,"children":1712},{},[1713],{"type":426,"value":1714},"Keep certificate private keys secure",{"type":420,"tag":815,"props":1716,"children":1717},{},[1718],{"type":426,"value":1719},"Renew expired certificates on time",{"type":420,"tag":815,"props":1721,"children":1722},{},[1723],{"type":426,"value":1724},"Enter certificate information correctly and completely",{"type":420,"tag":815,"props":1726,"children":1727},{},[1728],{"type":426,"value":1729},"Use strong key size (minimum 2048 bit)",{"type":420,"tag":421,"props":1731,"children":1733},{"id":1732},"storage-adapters",[1734],{"type":426,"value":1735},"Storage Adapters 🔏",{"type":420,"tag":429,"props":1737,"children":1738},{},[1739,1741,1746],{"type":426,"value":1740},"The storage adapter is an important part of the export service. Below you can find the external storage services that Logger integrates with by default.\nThe connection information requested from you may vary depending on the storage adapter you choose. After entering the connection information, optionally select ",{"type":420,"tag":768,"props":1742,"children":1743},{},[1744],{"type":426,"value":1745},"Use Ssl",{"type":426,"value":1747},".",{"type":420,"tag":1258,"props":1749,"children":1750},{":providers":1260,"title":1261,"trigger-text":1261},[],{"title":414,"searchDepth":479,"depth":479,"links":1752},[1753,1754,1755,1762],{"id":1316,"depth":479,"text":1319},{"id":1372,"depth":479,"text":1375},{"id":1383,"depth":479,"text":1386,"children":1756},[1757,1758,1759,1760,1761],{"id":1394,"depth":488,"text":1397},{"id":1473,"depth":488,"text":1476},{"id":1644,"depth":488,"text":1647},{"id":1673,"depth":488,"text":1676},{"id":1703,"depth":488,"text":1706},{"id":1732,"depth":479,"text":1735},"content:en:8.management:3.object.md","en/8.management/3.object.md","en/8.management/3.object",1775654251490]