97
Incidents and Events
Monitoring incidents
The Incidents tab can display the following incident data
:
See the following related information:
■
See
“About incidents and events”
on page 91.
■
See
“Selecting event columns”
on page 100.
■
Last Mod.
Time
Indicates the date and time when Symantec Network Security
last modified the incident record.
■
Name
Indicates t
he user group of the current user.
■
Severity
Indicates t
he severity level assigned to the incident. An
incident’s severity is a measure of the potential damage that it
can cause.
■
Source
Indicates t
he IP address of the
attack source.
If the source is
made up of multiple addresses, then the Network Security
console displays
(multiple IPs)
and you can view the list of
addresses by double-clicking the event to see Event Details.
■
Destination
Indicates t
he IP address of the attack target. If the destination is
made up of multiple addresses, then the Network Security
console displays
(multiple IPs)
and you can view the list of
addresses by double-clicking the event to see Event Details.
■
Event Count
Indicates the total number of events associated with this incident
that have been logged to the database.
■
Device Name
Indicates the name of the device where the incident was
detected.
■
Location
Indicates the location of the device where the incident was
detected.
■
State
Indicates the condition of the incident, either
Active
or
Closed
. Incidents to which no new events have been added for a
given amount of time are considered idle, and Symantec
Network Security closes them.
■
Marked
Indicates whether you marked the incident as viewed.
■
Node #
Indicates the number of the software or appliance node that
detected the incident.
■
Node Name
Indicates the name of the software or appliance node that
detected the incident.
■
Other Node
#’s
Indicates the numbers of the software or appliance node that the
incident was cross-node correlated to, if any.
Summary of Contents for 10268947 - Network Security 7160
Page 1: ...Symantec Network Security User Guide...
Page 18: ...18 Introduction Finding information...
Page 34: ...34 Architecture About management and detection architecture...
Page 46: ...46 Getting Started About deploying node clusters...
Page 64: ...64 Topology Database Viewing objects in the topology tree...
Page 124: ...124 Log Files About log files...
Page 134: ...134 Index...