6
Contents
Chapter
4
Topology Database
About the network topology
...............................................................................
47
Viewing the topology tree
...........................................................................
48
Viewing objects in the topology tree
.................................................................
51
Viewing auto-generated objects
.................................................................
51
About location objects
.................................................................................
51
About Symantec Network Security objects
..............................................
52
About router objects
....................................................................................
59
About Smart Agents
.....................................................................................
60
About managed network segments
...........................................................
62
Launching Symantec Decoy Server
...........................................................
63
Chapter
5
Protection Policies
About protection policies
....................................................................................
65
Viewing protection policies
...............................................................................
66
Understanding the protection policy view
...............................................
67
Adjusting the view of event types
......................................................................
68
Adjusting the view by searching
...............................................................
68
Adjusting the view by columns
..................................................................
69
Viewing logging and blocking rule details
...............................................
70
Viewing event detailed descriptions
.........................................................
70
Viewing policy automatic update
..............................................................
70
Annotating policies or events
....................................................................
71
Chapter
6
Response Rules
About response rules
...........................................................................................
73
About automated responses
...............................................................................
74
Viewing response rules
...............................................................................
75
Searching event types
.................................................................................
76
About response parameters
........................................................................
76
About event targets
......................................................................................
76
About event types
.........................................................................................
77
About severity levels
....................................................................................
77
About confidence levels
..............................................................................
78
About event sources
.....................................................................................
78
About response actions
...............................................................................
78
About next actions
.......................................................................................
79
About response actions
.......................................................................................
79
About no response action
............................................................................
80
About email notification
.............................................................................
80
About SNMP notification
............................................................................
80
About TrackBack response action
.............................................................
80