2.1 Event Sources

Sentinel gathers security information and events from various sources in your IT environment. These sources are called event sources. Typically, the following are the event sources on your network:

Security Perimeter: Security devices including hardware and software used to create a security perimeter for your environment, such as firewalls, intrusion detective systems (IDS), and virtual private networks (VPN).

Operating Systems: Various operating systems running in the network.

Referential IT Sources: The software used to maintain and track assets, patches, configuration, and vulnerability.

Applications: Various applications installed in the network.

User Access Control: Applications or devices that allow users access to company resources.

For more information about collecting events from event sources, see Collecting and Routing Event Data in the Sentinel Administration Guide.