D-28
User Guide for Cisco Security MARS Local Controller
78-17020-01
Appendix D System Rules and Reports
List of System Reports
This report captures the Network Access Device (NAD) that are permitting end hosts into the
network as static exceptions. For these end hosts, the NAD directly permits network access without
consulting the posture validation server.
•
Activity: Security Posture: NAC Status Query Failure - Top Hosts.
This report details the top hosts that failed the status queries from the Network Access Devices
(NAD). Such failures occur after initial authorization whenever there is a change in posture detected
by the Cisco Trust Agent (CTA) on the end host. Such failures may be caused by user frequently
enabling or disabling CTA agents.
•
Activity: Security Posture: NAC Status Query Failure - Top Hosts.
This report details the top hosts that failed the status queries from the Network Access Devices
(NAD). Such failures occur after initial authorization whenever there is a change in posture detected
by the Cisco Trust Agent (CTA) on the end host. Such failures may be caused by user frequently
enabli
•
Activity: Security Posture: Not Healthy - All Events.
This report lists the detailed events for users whose security posture is not up to date, ie. in either a
CHECKUP, QUARANTINE or INFECTED state. The software on these hosts need to be upgraded.
The CHECKUP hosts may need DAT file updates, the QUARANTINE hosts must do DAT file
updates before network access and the INFECTED hosts must be remediated before network access.
•
Activity: Security Posture: Not Healthy - All Events.
This report lists the detailed events for users whose security posture is not up to date, ie. in either a
CHECKUP, QUARANTINE or INFECTED state. The software on these hosts need to be upgraded.
The CHECKUP hosts may need DAT file updates, the QUARANTINE hosts must do DAT file
updates before network
•
Activity: Spyware - All Events.
This event details all spyware events.
•
Activity: Spyware - All Events.
This event details all spyware events.
•
Activity: Spyware - Top Hosts.
This report ranks the hosts running spyware applications. Spywares are malicious applications that
installs and runs on hosts, collect the username, passwords, and credit card information and send
this information to the spyware writers.
•
Activity: Spyware - Top Hosts.
Activity: Spyware - Top Hosts
•
Activity: Stealth Scans - Top Sources.
This report ranks attackers by the amount of stealth scanning activity. Such activities include
sending crafted packets to detect host operating systems and other vulnerabilities. Vulnerability
scanners may generate such events.
•
Activity: Stealth Scans - Top Sources.
Activity: Stealth Scans - Top Sources
•
Activity: Sudden Traffic Increase To Port - All Destinations.
This report lists hosts that exhibit anomalous behavior by suddenly receiving statistically significant
volume on a TCP/UDP port or ICMP traffic.
•
Activity: Sudden Traffic Increase To Port - All Destinations.
Содержание CS-MARS-20-K9 - Security MARS 20
Страница 20: ...Contents xx User Guide for Cisco Security MARS Local Controller 78 17020 01 ...
Страница 356: ...17 16 User Guide for Cisco Security MARS Local Controller 78 17020 01 Chapter 17 Network Summary Summary Page ...
Страница 420: ...20 28 User Guide for Cisco Security MARS Local Controller 78 17020 01 Chapter 20 Queries and Reports Reports ...
Страница 580: ...Glossary GL 4 User Guide for Cisco Security MARS Local Controller 78 17020 01 ...