Symantec 10268947 User Guide - Page 29

About the alert manager, About the administration service, About analysis, About the databases

Page 29 highlights

Architecture 29 About management and detection architecture ■ About sensor processes ■ About Smart Agents ■ About FlowChaser About the alert manager The Network Security Alerting Manager provides three types of alerts: a Network Security console action alert, an email alert, and an SNMP trap alert. About the sensor manager The Sensor Manager maintains a pool of sub-processes to manage sensor-related functionality. This includes sensor processes for event detection, traffic recording, and FlowChaser sub-processes that handle network device configuration, starting, and stopping. About the administration service All communication across the network passes through the QSP Proxy, an administration service with 256-bit AES encryption and passphrase authentication. This ensures that all communication between the Network Security console and the master node, and between software and appliance nodes within a cluster, are properly authenticated and encrypted. In addition, this service enforces role-base administration and thus prevents any circumvention of established access policy. About analysis Symantec Network Security's analysis framework aggregates event data on possible attacks from all event sources. The analysis framework also performs statistical correlation analysis on events to identify event patterns that vary significantly from usual network activity and to identify individual events that are highly related, such as a port scan followed closely by an intrusion attempt. About the databases Symantec Network Security provides multiple databases to store information about attacks, the network topology, and configuration information. ■ Topology database: Stores information about local network devices and interfaces and the network configuration. Symantec Network Security uses this data to direct the FlowChaser toward the area of the network in which an attack occurs.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134

29
Architecture
About management and detection architecture
About sensor processes
About Smart Agents
About FlowChaser
About the alert manager
The Network Security Alerting Manager provides three types of alerts: a
Network Security console action alert, an email alert, and an SNMP trap alert.
About the sensor manager
The Sensor Manager maintains a pool of sub-processes to manage
sensor-related functionality. This includes sensor processes for event detection,
traffic recording, and FlowChaser sub-processes that handle network device
configuration, starting, and stopping.
About the administration service
All communication across the network passes through the QSP Proxy, an
administration service with 256-bit AES encryption and passphrase
authentication. This ensures that all communication between the Network
Security console
and the master node, and between software and appliance
nodes within a cluster, are properly authenticated and encrypted. In addition,
this service enforces role-base administration and thus prevents any
circumvention of established access policy.
About analysis
Symantec Network Security’s analysis framework aggregates event data on
possible attacks from all event sources. The analysis framework also performs
statistical correlation analysis on events to identify event patterns that vary
significantly from usual network activity and to identify individual events that
are highly related, such as a port scan followed closely by an intrusion attempt.
About the databases
Symantec Network Security provides multiple databases to store information
about attacks, the network topology, and configuration information.
Topology database
: Stores information about local network devices and
interfaces and the network configuration. Symantec Network Security uses
this data to direct the FlowChaser toward the area of the network in which
an attack occurs.