Enter a logical Source Name of your choice to define the source host, and select from either the UDP or TCP protocol.

Add encryption in the form of TLS or a custom provided certificate. Note that encryption is only available for the TCP protocol.

Select the port used by the source host.

Select the ‘Save’ button to create the first part of the Rule. This will add the Rule to the dashboard for completion.

To access the options available for completing or modifying a Rule, use the small vertical ellipsis button associated with each one, shown in the picture below.

  • Edit - Rules can be edited at any time using this option
  • Add filter - Enable and configure an optional log receiver filter
  • Add destination - Each Rule must have a destination applied before it can be saved.
  • Copy from - Enables a quick way to replicate similar Rule components.