Symantec 10268947 User Guide - Page 65

Protection Policies, About protection policies

Page 65 highlights

5 Chapter Protection Policies This chapter includes the following topics: ■ About protection policies ■ Viewing protection policies ■ Adjusting the view of event types About protection policies Symantec Network Security provides a new functionality called protection policies, which utilize multiple components such as signature and protocol anomaly detection to take action directly at the point of entry into the network. Protection policies enable users to tailor the protection based on security policies and business need. Policies can be tuned by threat category, severity, intent, reliability, and profile of protected resources. Common or individualized policies can be applied per sensor, for both in-line and passive monitoring. The Symantec Network Security software and the Symantec Network Security 7100 Series appliance employ a common core architecture that provides detection, analysis, storage, and response functionality. Most procedures in this section apply to both the 7100 Series appliance and the Symantec Network Security 4.0 software. The 7100 Series appliance also provides additional functionality that is unique to an appliance. Each section describes this additional functionality in detail. For example, when the 7100 Series appliance is deployed in-line, it can perform session-based blocking against malicious traffic and prevent attacks from reaching their targets.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134

Chapter
5
Protection Policies
This chapter includes the following topics:
About protection policies
Viewing protection policies
Adjusting the view of event types
About protection policies
Symantec Network Security provides a new functionality called protection
policies, which utilize multiple components such as signature and protocol
anomaly detection to take action directly at the point of entry into the network.
Protection policies enable users to tailor the protection based on security
policies and business need. Policies can be tuned by threat category, severity,
intent, reliability, and profile of protected resources. Common or individualized
policies can be applied per sensor, for both in-line and passive monitoring.
The Symantec Network Security software and the Symantec Network Security
7100 Series appliance employ a common core architecture that provides
detection, analysis, storage, and response functionality. Most procedures in this
section apply to both the 7100 Series appliance and the Symantec Network
Security 4.0 software. The 7100 Series appliance also provides additional
functionality that is unique to an appliance. Each section describes this
additional functionality in detail.
For example, when the 7100 Series appliance is deployed in-line, it can perform
session-based blocking against malicious traffic and prevent attacks from
reaching their targets.