67
Protection Policies
Viewing protection policies
Understanding the protection policy view
The Protection Policies view contains five main tabs, as follows:
The following list describes each tab more fully:
■
Protection Policies tab
: Symantec Network Security installs with a set of
pre-defined policies that you can use immediately by setting them to
interfaces, override existing blocking rules, and applying them.
■
Viewing protection policies
■
Search Events tab
: At first, the Search Events tab displays the full list of
event types that the selected policy can detect. You can reduce this list to a
more manageable size by setting search parameters. Then the Search
Results pane displays a subset of the types of events that you specified. You
can apply logging and/or blocking rules from this tab, and add new
protection policies that you define yourself.
■
Adjusting the view by searching
■
Full Event List tab
: The Full Event List displays all event types that the
selected policy can detect. Even after you define the display on the Search
Events tab, you can use the Full Event List to view the total list of all event
types. You can also set logging and blocking rules from this tab.
■
Auto Update tab
: Provides the ability to establish automatic policy,
signature, and engine updates through LiveUpdate.
■
Viewing policy automatic update
Protection Policies
Search Events
Full Event List
Auto Update
Notes
* Set policies
to interfaces
* Override
blocking rules
* Apply/Unapply
* Set search criteria
* Search
* View Search Events
* Select events to apply
logging and/or block
* View unaltered event list
* Adjust view of list
logging and/or blocking
* Select events to apply
* Configure LiveUpdate so any
* Annotate policies to
show notes as tool tips
new event types that match
criteria are logged
policies
* Adjust view of list
rules
rules
Summary of Contents for 10268947 - Network Security 7160
Page 1: ...Symantec Network Security User Guide...
Page 18: ...18 Introduction Finding information...
Page 34: ...34 Architecture About management and detection architecture...
Page 46: ...46 Getting Started About deploying node clusters...
Page 64: ...64 Topology Database Viewing objects in the topology tree...
Page 124: ...124 Log Files About log files...
Page 134: ...134 Index...