Symantec 10268947 User Guide - Page 126

console, Symantec Decoy Server console, LCD, Decoy Server. See Symantec Decoy Server

Page 126 highlights

126 Index selecting 100 communication via QSP proxy 29 confidence about level 78 likelihood of attack 78 mapping level 101 response rules 78 console response action configuring 82 console. See Network Security console, serial console, Symantec Decoy Server console, LCD panel copy ports. See monitoring interfaces correlation about 24 about cross-node analysis 25 custom response actions creating rules 81 failure to execute 103 custom signatures. See user-defined signatures D data events displayed 97, 100 incidents 96 tracking stream 80 databases architecture 29 time delay while loading 36 deception device objects 63 Decoy Server. See Symantec Decoy Server denial of service. See DoS deployment about 40 about clusters 40 about in-line mode 40 about passive mode 40 about single-node 40 monitoring groups 44 node clusters 43 single appliance node 42 single node 41 single software node 41 details viewing event types 70 viewing objects 50 detection about 85 about 7100 Series appliances 32 about architecture 20 about denial of service 23 about protocol anomaly detection 85 about refinement rules 86 about signature 86 about traffic rate monitoring 23 about user-defined signatures 22 by refinement rules 89 external EDP 23 port mapping 87 protocol anomaly 21 signature 87 Symantec signatures 22, 88 user-defined signatures 88 viewing port mappings 87 viewing signatures 89 Devices viewing details 92 devices event data display 97, 100 event notice display 102 documentation 7100 Series 14 software 15 DoS about detection architecture 23 top Telnet event type 111 drill-down reports destination sources 114 devices with flow statistics 115 drill-down-only reports 116 event destinations 116 event details 116 event lists 116 event sources 116 events per day 113 events per hour 113 events per month 113 flows by destination address 116 flows by destination port 117 flows by protocol 117 flows by source address 116 flows by source port 117 incident details 116 incidents list 112 incidents per day 112 incidents per hour 112

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134

126
Index
selecting 100
communication
via QSP proxy
29
confidence
about level
78
likelihood of attack
78
mapping level
101
response rules
78
console response action
configuring 82
console.
See
Network Security console, serial
console, Symantec Decoy Server console, LCD
panel
copy ports.
See
monitoring interfaces
correlation
about 24
about cross-node analysis
25
custom response actions
creating rules
81
failure to execute
103
custom signatures.
See
user-defined signatures
D
data
events displayed
97, 100
incidents 96
tracking stream
80
databases
architecture 29
time delay while loading
36
deception
device objects
63
Decoy Server. See Symantec Decoy Server
denial of service.
See
DoS
deployment
about 40
about clusters
40
about in-line mode
40
about passive mode
40
about single-node
40
monitoring groups
44
node clusters
43
single appliance node
42
single node
41
single software node
41
details
viewing event types
70
viewing objects
50
detection
about 85
about 7100 Series appliances
32
about architecture
20
about denial of service
23
about protocol anomaly detection
85
about refinement rules
86
about signature
86
about traffic rate monitoring
23
about user-defined signatures
22
by refinement rules
89
external EDP
23
port mapping
87
protocol anomaly
21
signature 87
Symantec signatures
22, 88
user-defined signatures
88
viewing port mappings
87
viewing signatures
89
Devices
viewing details
92
devices
event data display
97, 100
event notice display
102
documentation
7100 Series
14
software 15
DoS
about detection architecture
23
top Telnet event type
111
drill-down reports
destination sources
114
devices with flow statistics
115
drill-down-only reports
116
event destinations
116
event details
116
event lists
116
event sources
116
events per day
113
events per hour
113
events per month
113
flows by destination address
116
flows by destination port
117
flows by protocol
117
flows by source address
116
flows by source port
117
incident details
116
incidents list
112
incidents per day
112
incidents per hour
112