Symantec 10521146 Administration Guide - Page 379

Limit Size for Traffic Record Directory

Page 379 highlights

Index 379 LCD panel (cont.) rebooting nodes 53 restarting nodes 53 setting lock 59 shutting down nodes 54 stopping nodes 54 unlocking 52 LCD screen. See LCD panel licenses checking status 49 checking via Network Security console 49 Limit Size for Archive Directory setting node parameters 250 Limit Size for Traffic Record Directory setting node parameters 251 LiveUpdate about 269, 270 adding or editing 273 applying 271 backing up configurations 274 blocking automatically 124, 126 deleting schedules 274 reverting schedules 274 scanning for available updates 271 setting the server 272 loads events button 196 location adding 84 editing 84 Location of SCP Binary setting node parameters 267 Lock LCD Screen setting node parameter 59 locking LCD panel 59 logging about 38 enabling rules 122 preventing cleartext passwords 149 viewing non-logged events 122 login adding user accounts 55 deleting user login accounts 56 editing user accounts 56 from Windows 45 history report 235 Network Security Administrator 200 Network Security console 199, 200 login (cont.) setting maximum failures 59 logs about 243 about install 243 about operational 244 archiving 246, 249 clearing directory 250 compressing files 252 copying 246 deleting 247 exporting data 254, 260 managing 244 managing operational 244 refreshing the list 247 rotating by size 249 rotating with SCP 264 secure copy protocol 264 setting automatic logging levels 248 viewing 244 viewing live 245 M managed network segments about 108 managers alert 35 sensor 35 managing controlling user access 59 from the LCD panel 51 from the Network Security console 44 from the serial console 49 node clusters 275 report schedules 226 response rules 132 topology tree 78 user login accounts 54, 55 user passphrases 57 via user interfaces 44 managing flow statistics 219 ManTrap. See Symantec Decoy Server mapping adding ports 178 deleting ports 178 event type to base event 230 event type to incident 232 gathering topology data 76 network sample 61, 76

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392

379
Index
LCD panel (cont.)
rebooting nodes
53
restarting nodes
53
setting lock
59
shutting down nodes
54
stopping nodes
54
unlocking 52
LCD screen.
See
LCD panel
licenses
checking status
49
checking via Network Security console
49
Limit Size for Archive Directory
setting node parameters
250
Limit Size for Traffic Record Directory
setting node parameters
251
LiveUpdate
about
269, 270
adding or editing
273
applying 271
backing up configurations
274
blocking automatically
124, 126
deleting schedules
274
reverting schedules
274
scanning for available updates
271
setting the server
272
loads
events button
196
location
adding 84
editing 84
Location of SCP Binary
setting node parameters
267
Lock LCD Screen
setting node parameter
59
locking
LCD panel
59
logging
about 38
enabling rules
122
preventing cleartext passwords
149
viewing non-logged events
122
login
adding user accounts
55
deleting user login accounts
56
editing user accounts
56
from Windows
45
history report
235
Network Security Administrator
200
Network Security console
199, 200
login (cont.)
setting maximum failures
59
logs
about 243
about install
243
about operational
244
archiving
246, 249
clearing directory
250
compressing files
252
copying 246
deleting 247
exporting data
254, 260
managing 244
managing operational
244
refreshing the list
247
rotating by size
249
rotating with SCP
264
secure copy protocol
264
setting automatic logging levels
248
viewing 244
viewing live
245
M
managed network segments
about 108
managers
alert 35
sensor 35
managing
controlling user access
59
from the LCD panel
51
from the Network Security console
44
from the serial console
49
node clusters
275
report schedules
226
response rules
132
topology tree
78
user login accounts
54, 55
user passphrases
57
via user interfaces
44
managing flow statistics
219
ManTrap.
See
Symantec Decoy Server
mapping
adding ports
178
deleting ports
178
event type to base event
230
event type to incident
232
gathering topology data
76
network sample
61, 76