Symantec 10521146 Administration Guide - Page 373

console, Symantec Decoy Server console, LCD, Counter Number of Streak Packets

Page 373 highlights

Index 373 Cluster ID setting node parameters 257 cluster parameters about 309 clusters about deployment 60 about parameters 63 adding slave nodes 277 applying policies after setting masters 279 backing up 282 creating 275 deploying 64 licensing nodes 278 managing 275 monitoring groups 66 restarting sensors 281 software and appliance nodes 65 subclusters 66 synchronization with 279 synchronizing nodes 278 tracking data stream 147 upgrading 276 columns adjusting the view of event types 119 selecting 202, 203 sorting incident data 192 communication via EDP proxy 284 via QSP proxy 35 compact flash about 40 backing up 302 backing up and restoring 302 restoring 303 saving configurations 304 Compression Command setting node parameters 253 Compression On/Off Switch setting node parameters 252 confidence assigning levels 194, 195, 198 likelihood of attack 139 mapping level 204 response rules 139 setting level 139 viewing events 197 configuration via compact flash 40 console response action configuring 152 console. See Network Security console, serial console, Symantec Decoy Server console, LCD panel conventions node description 77 node naming 77 copy ports. See monitoring interfaces copying configurations 299 event details 210 incident data and pasting 209 logs 246 top events 210 correlation about 30 about cross-node analysis 31 Counter Number of Streak Packets setting sensor parameters 172 creating clusters 275 monitoring groups 66 protection policies 120 cross-node correlation loading events from 196 custom response actions creating rules 147 failure to execute 201 customer IDs devices 77 D data about collection parameters 163 events displayed 202, 204 exporting to syslog 260 incidents 190, 202 tracking stream 147 databases architecture 35 deleting user-defined signatures 183 forcing synchronization 83, 279 time delay while loading 45 DB Connection String setting node parameters 258 DB Password setting node parameters 260

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392

373
Index
Cluster ID
setting node parameters
257
cluster parameters
about 309
clusters
about deployment
60
about parameters
63
adding slave nodes
277
applying policies after setting masters
279
backing up
282
creating 275
deploying 64
licensing nodes
278
managing 275
monitoring groups
66
restarting sensors
281
software and appliance nodes
65
subclusters 66
synchronization with
279
synchronizing nodes
278
tracking data stream
147
upgrading 276
columns
adjusting the view of event types
119
selecting
202, 203
sorting incident data
192
communication
via EDP proxy
284
via QSP proxy
35
compact flash
about 40
backing up
302
backing up and restoring
302
restoring 303
saving configurations
304
Compression Command
setting node parameters
253
Compression On/Off Switch
setting node parameters
252
confidence
assigning levels
194, 195, 198
likelihood of attack
139
mapping level
204
response rules
139
setting level
139
viewing events
197
configuration
via compact flash
40
console response action
configuring 152
console.
See
Network Security console, serial
console, Symantec Decoy Server console, LCD
panel
conventions
node description
77
node naming
77
copy ports.
See
monitoring interfaces
copying
configurations 299
event details
210
incident data and pasting
209
logs 246
top events
210
correlation
about 30
about cross-node analysis
31
Counter Number of Streak Packets
setting sensor parameters
172
creating
clusters 275
monitoring groups
66
protection policies
120
cross-node correlation
loading events from
196
custom response actions
creating rules
147
failure to execute
201
customer IDs
devices 77
D
data
about collection parameters
163
events displayed
202, 204
exporting to syslog
260
incidents
190, 202
tracking stream
147
databases
architecture 35
deleting user-defined signatures
183
forcing synchronization
83, 279
time delay while loading
45
DB Connection String
setting node parameters
258
DB Password
setting node parameters
260