Symantec 10268947 User Guide - Page 89

Viewing signatures, About signature variables, About refinement rules

Page 89 highlights

Detection Methods 89 About refinement rules Viewing signatures All users can view all available PAD event types and user-defined signatures from the Policies tab. You can also see which signatures are applied to the monitoring interfaces, interface pairs, or interface groups, as well as the list of signature variables. To see interfaces ◆ On the Policies tab, click Policies > Policies Applied to Interfaces to see interfaces with policies applied. To see applied signatures ◆ On the Policies tab, click Policies > Policies to see the Symantec signatures that are applied. To see available signatures ◆ On the Policies tab, click the User-defined Signatures tab to see available user-defined signatures. To see signature variables ◆ On the Policies tab, click the Signature Variables tab to see available variables to use when defining signatures. About signature variables Symantec Network Security provides signature variables for speed and accuracy, such as the variable name port to stand for a value of 2600. The signature variables apply globally to all signatures, both default Symantec signatures and any user-defined signatures. To view signature variables ◆ On the Policies tab, click Signature Variables > New. About refinement rules Symantec Network Security detects both known and unknown (zero-day) attacks, using multiple detection technologies concurrently. Event refinement rules extend the Protocol Anomaly Detection capabilities. Symantec Network Security matches generic anomalies against a database of refinement rules, and for known attacks, reclassifies an anomaly event by retagging it with its specific name.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134

89
Detection Methods
About refinement rules
Viewing signatures
All users can view all available PAD event types and user-defined signatures
from the Policies tab. You can also see which signatures are applied to the
monitoring interfaces, interface pairs, or interface groups, as well as the list of
signature variables.
To see interfaces
On the
Policies
tab, click
Policies
>
Policies Applied to Interfaces
to see
interfaces with policies applied.
To see applied signatures
On the
Policies
tab, click
Policies
>
Policies
to see the Symantec signatures
that are applied.
To see available signatures
On the
Policies
tab, click the
User-defined Signatures
tab to see available
user-defined signatures.
To see signature variables
On the
Policies
tab, click the
Signature Variables
tab to see available
variables to use when defining signatures.
About signature variables
Symantec Network Security provides signature variables for speed and
accuracy, such as the variable name
port
to stand for a value of 2600. The
signature variables apply globally to all signatures, both default Symantec
signatures and any user-defined signatures.
To view signature variables
On the
Policies
tab, click
Signature Variables
>
New
.
About refinement rules
Symantec Network Security detects both known and unknown (zero-day)
attacks, using multiple detection technologies concurrently. Event refinement
rules extend the Protocol Anomaly Detection capabilities. Symantec Network
Security matches generic anomalies against a database of refinement rules, and
for known attacks, reclassifies an anomaly event by retagging it with its specific
name.