
312
Sentinel 6.1 User Guide
no
vd
ocx
(e
n)
7 Ja
nua
ry 201
0
14.3 iTRAC
This section gives and idea relevant to iTRAC.
14.3.1 Instantiating a Process
An iTRAC process can be instantiated in the iTRAC server by associating an iTRAC process to an
incident the following methods:
Associate an iTRAC process to the incident at the time of incident creation
Associate an iTRAC process to incident after an incident has been created
Associate an iTRAC process to an incident as an action when deploying a correlation rule
For more information on association a process to an incident, see
Chapter 3, “Correlation Tab,” on
page 65
and
Chapter 4, “Incidents Tab,” on page 93
.
Example Scenario – Creating a Simple Two Tiered iTRAC Process for a Possible
Network Attack
NOTE:
To perform all of the scenarios in the iTRAC section, iTRAC scenario sections must be
followed in the order presented.
This discusses how to make a simple two tiered iTRAC Process. The process is flow of steps that
can be taken in the event there is a possible attack on your system.
The example process is:
Asks the question (in the first step – a manual step [Decide if Hacked]), from a preliminary
look has the network been attacked? This leads to a Decision Step.
NOTE:
All Decision Steps provide different execution paths depending on the value of the
variable defined in the previous step.
If there has been an attack, go collect necessary data to determine if there has been an attack. If
there is no attack, send an email out to the supervisor that there is not an attack.
The Collect Data step is to review the data to make a better determination if there has been an
attack.
If there has been an attack, take measures to prevent another attack and send an email out to the
supervisor that proper measures have been taken. If there is no attack, send an email out to the
supervisor that there is not an attack.
Figure 14-3
iTRAC Process
Summary of Contents for SENTINEL 6.1 SP2
Page 4: ...4 Sentinel 6 1 User Guide novdocx en 7 January 2010 ...
Page 20: ...20 Sentinel 6 1 User Guide novdocx en 7 January 2010 ...
Page 34: ...34 Sentinel 6 1 User Guide novdocx en 7 January 2010 ...
Page 116: ...116 Sentinel 6 1 User Guide novdocx en 7 January 2010 Integer Variable String Variable ...
Page 146: ...146 Sentinel 6 1 User Guide novdocx en 7 January 2010 ...
Page 172: ...172 Sentinel 6 1 User Guide novdocx en 7 January 2010 ...
Page 178: ...178 Sentinel 6 1 User Guide novdocx en 7 January 2010 ...
Page 280: ...280 Sentinel 6 1 User Guide novdocx en 7 January 2010 ...
Page 306: ...306 Sentinel 6 1 User Guide novdocx en 7 January 2010 ...
Page 329: ...Quick Start 329 novdocx en 7 January 2010 ...
Page 330: ...330 Sentinel 6 1 User Guide novdocx en 7 January 2010 ...
Page 412: ...412 Sentinel 6 1 User Guide novdocx en 7 January 2010 ...
Page 430: ...430 Sentinel 6 1 User Guide novdocx en 7 January 2010 ...
Page 440: ...440 Sentinel 6 1 User Guide novdocx en 7 January 2010 Figure 18 3 Reports ...
Page 528: ...528 Sentinel 6 1 User Guide novdocx en 7 January 2010 ...