Sentinel gathers security information and events from various sources in your IT environment. These sources are called event sources. Typically, the following are the event sources on your network:
Security Perimeter: Security devices including hardware and software used to create a security perimeter for your environment, such as firewalls, intrusion detective systems (IDS), and virtual private networks (VPN).
Operating Systems: Various operating systems running in the network.
Referential IT Sources: The software used to maintain and track assets, patches, configuration, and vulnerability.
Applications: Various applications installed in the network.
User Access Control: Applications or devices that allow users access to company resources.
For more information about collecting events from event sources, see Collecting and Routing Event Data
in the Sentinel Administration Guide.