6 Contents
Chapter 4
Topology Database
About the network topology ...............................................................................47
Viewing the topology tree ...........................................................................48
Viewing objects in the topology tree .................................................................51
Viewing auto-generated objects .................................................................51
About location objects .................................................................................51
About Symantec Network Security objects ..............................................52
About router objects ....................................................................................59
About Smart Agents .....................................................................................60
About managed network segments ...........................................................62
Launching Symantec Decoy Server ...........................................................63
Chapter 5
Protection Policies
About protection policies ....................................................................................65
Viewing protection policies ...............................................................................66
Understanding the protection policy view ...............................................67
Adjusting the view of event types ......................................................................68
Adjusting the view by searching ...............................................................68
Adjusting the view by columns ..................................................................69
Viewing logging and blocking rule details ...............................................70
Viewing event detailed descriptions .........................................................70
Viewing policy automatic update ..............................................................70
Annotating policies or events ....................................................................71
Chapter 6
Response Rules
About response rules ...........................................................................................73
About automated responses ...............................................................................74
Viewing response rules ...............................................................................75
Searching event types .................................................................................76
About response parameters ........................................................................76
About event targets ......................................................................................76
About event types .........................................................................................77
About severity levels ....................................................................................77
About confidence levels ..............................................................................78
About event sources .....................................................................................78
About response actions ...............................................................................78
About next actions .......................................................................................79
About response actions .......................................................................................79
About no response action ............................................................................80
About email notification .............................................................................80
About SNMP notification ............................................................................80
About TrackBack response action .............................................................80
Summary of Contents for 10268947 - Network Security 7160
Page 1: ...Symantec Network Security User Guide...
Page 18: ...18 Introduction Finding information...
Page 34: ...34 Architecture About management and detection architecture...
Page 46: ...46 Getting Started About deploying node clusters...
Page 64: ...64 Topology Database Viewing objects in the topology tree...
Page 124: ...124 Log Files About log files...
Page 134: ...134 Index...