Symantec 10521146 Administration Guide - Page 123

Enabling or disabling blocking rules, For Every Non-Logged Events Log One Event

Page 123 highlights

Protection policies 123 Defining new protection policies ■ Select a protection policy, and click Edit > Full Event List. You can edit user-defined protection policies only. 2 To adjust your view of the event list, click Columns. See "Adjusting the view by columns" on page 119. 3 To select the events, do one of the following: ■ To select the entire event list, click Select All. ■ To select a subset of events, press Ctrl and select multiple events. 4 Click Log/Block. You can enable logging rules independently of blocking rules. See also "Enabling or disabling blocking rules" on page 123. 5 In Logging Options, do one of the following: ■ Click Log Event to enable logging. This generates an event in the Incidents tab each time a selected event is detected and blocked. ■ Unclick Log Event to disable logging. 6 If you enabled logging, then in Log Event, do one of the following: ■ To log all events, click Log For All IPs. ■ To log selected events, click Log For Selected IP Ranges. ■ To avoid logging selected events, click Log All Except IP Ranges. You can use this option as a partial filter to alert you periodically about non-logged event types. 7 If you chose to log a subset of events, then in Logging Options, specify the subset by doing the following: ■ Provide the Source and Destination IP addresses. ■ Provide the optional mask and port numbers, and click Add. 8 In Logging Options, you can keep track of non-logged event types by clicking For Every Non-Logged Events Log One Event and entering a number. 9 In Note For Selected Event Type(s), you can add an optional note, and click OK. Event Details displays this annotation each time this policy detects the annotated event. See "Viewing event details" on page 197. Enabling or disabling blocking rules The Symantec Network Security 7100 Series now provides the ability to prevent malicious traffic from entering your network. If sensors indicate that unexpected traffic is penetrating the firewall or router, you can block it by

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392

123
Protection policies
Defining new protection policies
Select a protection policy, and click
Edit
>
Full Event List
.
You can edit user-defined protection policies only.
2
To adjust your view of the event list, click
Columns
.
See
²Adjusting the view by columns³
on page 119.
3
To select the events, do one of the following:
To select the entire event list, click
Select All
.
To select a subset of events, press
Ctrl
and select multiple events.
4
Click
Log/Block
.
You can enable logging rules independently of blocking rules.
See also
²Enabling or disabling blocking rules³
on page 123.
5
In
Logging Options
, do one of the following:
Click
Log Event
to enable logging.
This generates an event in the Incidents tab each time a selected event
is detected and blocked.
Unclick
Log Event
to disable logging.
6
If you enabled logging, then in
Log Event
, do one of the following:
To log all events, click
Log For All IPs
.
To log selected events, click
Log For Selected IP Ranges
.
To avoid logging selected events, click
Log All Except IP Ranges
.
You can use this option as a partial filter to alert you periodically about
non-logged event types.
7
If you chose to log a subset of events, then in
Logging Options
, specify the
subset by doing the following:
Provide the Source and Destination IP addresses.
Provide the optional mask and port numbers, and click
Add
.
8
In
Logging Options
, you can keep track of non-logged event types by
clicking
For Every Non-Logged Events Log One Event
and entering a
number.
9
In
Note For Selected Event Type(s)
, you can add an optional note, and click
OK
. Event Details displays this annotation each time this policy detects the
annotated event. See
²Viewing event details³
on page 197.
Enabling or disabling blocking rules
The Symantec Network Security 7100 Series now provides the ability to prevent
malicious traffic from entering your network. If sensors indicate that
unexpected traffic is penetrating the firewall or router, you can block it by