Symantec 10521146 Administration Guide - Page 33

About role-based administration, Devices tab, Incidents tab, Policies tab

Page 33 highlights

Architecture 33 About management and detection architecture protection policies, and view log data. You can generate reports and view them immediately in the Network Security console, or you can schedule them to generate automatically. The Network Security console contains three main tabs that provide a view of the Devices tab, Incidents tab, and Policies tab. ■ Devices tab: Provides a hierarchical tree view of the network topology, with a detailed summary of each device. ■ Incidents tab: Provides detailed descriptions of incidents and events taking place in the monitored network, and can be drilled down to reveal detailed packet information. ■ Policies tab: Provides the tools to create, manage, and apply user-defined signatures, signature variables, and protection policies. Reporting in the Network Security console includes dynamic chart and graph generation, with information drill-down and data retrieval. Pre-defined reports can be saved and printed. Users can send flow queries and play back traffic sequences from the Network Security console as well. About role-based administration The Network Security console provides a simple yet powerful interface that is useful for all levels of administration, from the Network Operation Center (NOC) operator who watches for a red light, to the skilled security administrator who examines and analyzes packets. Four pre-defined user groups provide efficient management. Each group includes a set of permissions for specific management operations. Each user's login identity indicates their role and permission assignment during an administrative session. Symantec Network Security automatically installs a SuperUser login account that is authenticated with full administrative capabilities. The SuperUser can create additional login accounts in the following user groups: ■ SuperUsers: A user authenticated with full administrative capabilities. This user is allowed to perform all administrative tasks that the Network Security console can execute. ■ Administrators: A user authenticated with partial administrative capabilities. This user is allowed to perform most administrative tasks, with the exception of some advanced actions. ■ StandardUsers: A user authenticated with full read-only capabilities. This user is allowed to view all information in the Network Security console.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392

33
Architecture
About management and detection architecture
protection policies, and view log data. You can generate reports and view them
immediately in the Network Security console, or you can schedule them to
generate automatically.
The Network Security console contains three main tabs that provide a view of
the Devices tab, Incidents tab, and Policies tab.
Devices tab
: Provides a hierarchical tree view of the network topology, with
a detailed summary of each device.
Incidents tab
: Provides detailed descriptions of incidents and events taking
place in the monitored network, and can be drilled down to reveal detailed
packet information.
Policies tab
: Provides the tools to create, manage, and apply user-defined
signatures, signature variables, and protection policies.
Reporting in the Network Security console includes dynamic chart and graph
generation, with information drill-down and data retrieval. Pre-defined reports
can be saved and printed. Users can send flow queries and play back traffic
sequences from the Network Security console as well.
About role-based administration
The Network Security console provides a simple yet powerful interface that is
useful for all levels of administration, from the Network Operation Center (NOC)
operator who watches for a red light, to the skilled security administrator who
examines and analyzes packets.
Four pre-defined user groups provide efficient management. Each group
includes a set of permissions for specific management operations. Each user°s
login identity indicates their role and permission assignment during an
administrative session.
Symantec Network Security automatically installs a SuperUser login account
that is authenticated with full administrative capabilities. The SuperUser can
create additional login accounts in the following user groups:
SuperUser
s: A user authenticated with full administrative capabilities. This
user is allowed to perform all administrative tasks that the Network Security
console can execute.
Administrators
: A user authenticated with partial administrative
capabilities. This user is allowed to perform most administrative tasks, with
the exception of some advanced actions.
StandardUsers
: A user authenticated with full read-only capabilities. This
user is allowed to view all information in the Network Security console.