Symantec 10521146 Administration Guide - Page 23
About this guide, Intrusion Detection, Symantec Network Security 4.0, Part 1 Introduction
UPC - 037648268134
View all Symantec 10521146 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 23 highlights
Introduction 23 Finding information http://www.symantec.com/techsupp/enterprise/select_product_updates.ht ml 2 Click Intrusion Detection > Symantec Network Security 4.0. See also "Finding information" on page 20. About this guide This guide contains the following sections: ■ Part 1 Introduction: This section introduces you to the Symantec Network Security core intrusion detection system and the Symantec Network Security 7100 Series appliance, describes the architecture, and outlines a high-level setup and deployment scheme. ■ Chapter 1 Introduction: Describes the Symantec Network Security intrusion detection system and the Symantec Network Security 7100 Series appliance, documentation, and alternative sources of information. ■ Chapter 2 Architecture: Describes the system components, compatibility, and integration of Symantec Network Security. ■ Chapter 3 Getting started: Describes deployment and setup options of a Symantec Network Security intrusion detection system. ■ Part 2 Getting Started: This section explains how to set up your Symantec Network Security intrusion detection system, populate a network topology database, configure basic detection capabilities, and establish initial protection and response policies. ■ Chapter 4 Populating the topology database: Describes the initial network topology mapping process, and the information and procedures required to populate the topology database. ■ Chapter 5 Protection policies: Describes Symantec Network Security's protection policies and how to customize and manage them. ■ Chapter 6 Responding: Describes Symantec Network Security's response rules, and flow alert rules, and how to customize and manage them. ■ Chapter 7 Detecting: Describes Symantec Network Security's methods of intrusion, anomaly, and signature detection, and how to customize and manage them. ■ Part 3 Using Symantec Network Security: This section describes how to use Symantec Network Security to monitor your network, including interpreting incident and event output, generating reports and running queries,