OVERVIEW:

ONBOARDING YOUR ECM CLOUD ENVIRONMENT:

           Below requires customer to possess valid ENVID w/ minimal approved iATO

ONBOARDED ECM CLOUD ENVIRONMENT DASHBOARD:

 Below requires customer ECM environment to have been already onboarded/registered as described above for Vulnerability Scanning


REQUEST/ENSURE SPLUNK LOGS ARE REPORTING:

To request Splunk logging for the environment a General Service Request must be submitted.

Enter the following information in the box under "Do you have additional location information you would like to share?": Environment ID, Environment Name, and the note "Please route this ticket to CIS_Cyber_BE_Integration”.

In the topic field, enter "Integrate IT Environment with Enterprise Splunk".

In the Details field, enter “Environment ID, Environment Name, IP Address Range (IP Networks or subnets), Number of hosts in the environment, and the note “Please route this ticket to CIS_Cyber_BE_Integration”.