
312
Sentinel 6.1 User Guide
no
vd
ocx
(e
n)
7 Ja
nua
ry 201
0
14.3 iTRAC
This section gives and idea relevant to iTRAC.
14.3.1 Instantiating a Process
An iTRAC process can be instantiated in the iTRAC server by associating an iTRAC process to an
incident the following methods:
Associate an iTRAC process to the incident at the time of incident creation
Associate an iTRAC process to incident after an incident has been created
Associate an iTRAC process to an incident as an action when deploying a correlation rule
For more information on association a process to an incident, see
Chapter 3, “Correlation Tab,” on
page 65
and
Chapter 4, “Incidents Tab,” on page 93
.
Example Scenario – Creating a Simple Two Tiered iTRAC Process for a Possible
Network Attack
NOTE:
To perform all of the scenarios in the iTRAC section, iTRAC scenario sections must be
followed in the order presented.
This discusses how to make a simple two tiered iTRAC Process. The process is flow of steps that
can be taken in the event there is a possible attack on your system.
The example process is:
Asks the question (in the first step – a manual step [Decide if Hacked]), from a preliminary
look has the network been attacked? This leads to a Decision Step.
NOTE:
All Decision Steps provide different execution paths depending on the value of the
variable defined in the previous step.
If there has been an attack, go collect necessary data to determine if there has been an attack. If
there is no attack, send an email out to the supervisor that there is not an attack.
The Collect Data step is to review the data to make a better determination if there has been an
attack.
If there has been an attack, take measures to prevent another attack and send an email out to the
supervisor that proper measures have been taken. If there is no attack, send an email out to the
supervisor that there is not an attack.
Figure 14-3
iTRAC Process
Содержание SENTINEL 6.1 SP2
Страница 4: ...4 Sentinel 6 1 User Guide novdocx en 7 January 2010 ...
Страница 20: ...20 Sentinel 6 1 User Guide novdocx en 7 January 2010 ...
Страница 34: ...34 Sentinel 6 1 User Guide novdocx en 7 January 2010 ...
Страница 57: ...Active Views Tab 57 novdocx en 7 January 2010 Figure 2 7 Organic View Figure 2 8 Hierarchical View ...
Страница 97: ...Incidents Tab 97 novdocx en 7 January 2010 Sort By You can set rules to sort the incidents in the display view ...
Страница 116: ...116 Sentinel 6 1 User Guide novdocx en 7 January 2010 Integer Variable String Variable ...
Страница 146: ...146 Sentinel 6 1 User Guide novdocx en 7 January 2010 ...
Страница 172: ...172 Sentinel 6 1 User Guide novdocx en 7 January 2010 ...
Страница 178: ...178 Sentinel 6 1 User Guide novdocx en 7 January 2010 ...
Страница 280: ...280 Sentinel 6 1 User Guide novdocx en 7 January 2010 ...
Страница 306: ...306 Sentinel 6 1 User Guide novdocx en 7 January 2010 ...
Страница 329: ...Quick Start 329 novdocx en 7 January 2010 ...
Страница 330: ...330 Sentinel 6 1 User Guide novdocx en 7 January 2010 ...
Страница 401: ...Sentinel Link Solution 401 novdocx en 7 January 2010 3 Select the Novell Sentinel Link Collector then click Next ...
Страница 405: ...Sentinel Link Solution 405 novdocx en 7 January 2010 6 In the Configure Connector window specify the following ...
Страница 412: ...412 Sentinel 6 1 User Guide novdocx en 7 January 2010 ...
Страница 430: ...430 Sentinel 6 1 User Guide novdocx en 7 January 2010 ...
Страница 440: ...440 Sentinel 6 1 User Guide novdocx en 7 January 2010 Figure 18 3 Reports ...
Страница 528: ...528 Sentinel 6 1 User Guide novdocx en 7 January 2010 ...