Performing an embedded installation in the BMC Defender Server


This topic describes how to install the BMC Defender SyslogDefender product as an integrated component of the BMC AMI Command Center for Security or BMC Defender SIEM Correlation Server (referred to collectively as the BMC Defender Server. In this installation method, you, as the administrator, configure SyslogDefender through the BMC Defender Server web interface by accessing the System > Tools > SyslogDefender tab.

Before you begin

An existing BMC AMI Command Center for Security or BMC Defender SIEM Correlation Server installation is required. 

Download the installation package, BMC-Defender-SyslogDefender-v.r.mm.bbbb.exe, from the BMC Electronic Product Distribution (EPD) website. The placeholder v.r.mm.bbbb represents the version number.

Your ability to access product pages on the EPD website is determined by the license entitlements purchased by your company.

Warning

If you have an existing BMC Defender SyslogDefender instance, back up all configuration files and any SSL certificates before installing the latest version.

To embed SyslogDefender in the BMC Defender Server

The following procedure summarizes the installation and basic configuration of SyslogDefender as an embedded component of the BMC Defender Server:

  1. Navigate to the location of the installation package, BMC-Defender-SyslogDefender-v.r.mm.bbbb.exe.
  2. Right-click the installation application package and select Run as Administrator.
    The installation process creates the installationDirectory\SyslogDefender\ directory (by default, the installationDirectory is C:\Program Files\BMC Software\BMC Defender\SyslogDefender), containing all the files necessary to proceed with the installation.
  3. Follow the prompts for the installation package.  
    When prompted, enter the location of the installationDirectory\SyslogDefender directory that you previously specified.

No further steps are necessary. When the installation completes, the SyslogDefender program is running and ready to be configured.

Where to go from here

Continue to Customizing-after-installation to complete SyslogDefender customization.

 

Tip: For faster searching, add an asterisk to the end of your partial query. Example: cert*