Symantec 10521146 Administration Guide - Page 374

Destination Host for SCP

Page 374 highlights

374 Index DB User setting node parameters 259 deception device nodes 285 setting EDP passphrases 106 Decoy Server integrating with 285 launching from a new location 286 Decoy Server console launching from Network Security console 285 defining protection policies 120 signature variables 184 signatures 181 view of incidents 68 deleting configurations 299 flow alert rules 156 LiveUpdate schedules 274 log files 247 monitoring groups 68 nodes 81, 277 objects 81 passphrases 78 report schedules 226 response rules 135 saved reports 228 signature variables 185 user login accounts 56 user-defined protection policies 125 denial of service. See DoS deployment about clusters 60 about in-line mode 60 about passive mode 61 about single-node 60 appliance-specific checklist 43 clustering software and appliance nodes 65 general checklist 42 monitoring groups 66 node clusters 64 planning 60 single appliance node 62 single node 61 slave node 277 Destination Directory for SCP setting node parameters 266 Destination Host for SCP setting node parameters 265 details viewing event types 119 viewing objects 74 detection about 159 about 7100 Series appliances 38 about architecture 26 about denial of service 29 about protocol anomaly detection 159 about refinement rules 160 about signature 160 about traffic rate monitoring 29 about user-defined signatures 28 adding or editing port mappings 178 adding or editing user-defined signatures 181 adding user-defined signatures 181 creating signature variables 184 deleting port mappings 178 deleting user-defined signatures 183 deselecting signatures 183 disabling signatures 183 external EDP 29 managing user-defined signatures 180 port mapping 177 protocol anomaly 27 removing signatures 183 signature 179 Symantec signatures 28, 179 upgrading signatures 183 user-defined signatures 180 devices event data display 202, 204 Devices tab about 72 documentation 7100 Series 20 software 21 DoS about detection architecture 29 top Telnet event type 231 drill-down reports destination sources 234 devices with flow statistics 235 drill-down-only reports 236 event destinations 236 event details 236 event lists 236 event sources 236 events per day 233

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392

374
Index
DB User
setting node parameters
259
deception
device nodes
285
setting EDP passphrases
106
Decoy Server
integrating with
285
launching from a new location
286
Decoy Server console
launching from Network Security console
285
defining
protection policies
120
signature variables
184
signatures 181
view of incidents
68
deleting
configurations 299
flow alert rules
156
LiveUpdate schedules
274
log files
247
monitoring groups
68
nodes
81, 277
objects 81
passphrases 78
report schedules
226
response rules
135
saved reports
228
signature variables
185
user login accounts
56
user-defined protection policies
125
denial of service.
See
DoS
deployment
about clusters
60
about in-line mode
60
about passive mode
61
about single-node
60
appliance-specific checklist
43
clustering software and appliance nodes
65
general checklist
42
monitoring groups
66
node clusters
64
planning 60
single appliance node
62
single node
61
slave node
277
Destination Directory for SCP
setting node parameters
266
Destination Host for SCP
setting node parameters
265
details
viewing event types
119
viewing objects
74
detection
about 159
about 7100 Series appliances
38
about architecture
26
about denial of service
29
about protocol anomaly detection
159
about refinement rules
160
about signature
160
about traffic rate monitoring
29
about user-defined signatures
28
adding or editing port mappings
178
adding or editing user-defined signatures
181
adding user-defined signatures
181
creating signature variables
184
deleting port mappings
178
deleting user-defined signatures
183
deselecting signatures
183
disabling signatures
183
external EDP
29
managing user-defined signatures
180
port mapping
177
protocol anomaly
27
removing signatures
183
signature 179
Symantec signatures
28, 179
upgrading signatures
183
user-defined signatures
180
devices
event data display
202, 204
Devices tab
about 72
documentation
7100 Series
20
software 21
DoS
about detection architecture
29
top Telnet event type
231
drill-down reports
destination sources
234
devices with flow statistics
235
drill-down-only reports
236
event destinations
236
event details
236
event lists
236
event sources
236
events per day
233