113
Protection policies
Using protection policies
The following list describes each tab:
■
Protection Policies tab
: Symantec Network Security installs with a set of
pre-defined policies that you can use immediately by setting them to
interfaces, override existing blocking rules, and applying them.
■
Selecting pre-defined policies
■
Setting policies to interfaces
■
Applying to save changes
■
Overriding blocking rules globally
■
Undoing policy settings
■
Search Events tab
: At first, the Search Events tab displays the full list of
event types that the selected policy can detect. You can reduce this list to a
more manageable size by setting search parameters. Then the Search
Results pane displays a subset of the types of events that you specified. You
can apply logging and/or blocking rules from this tab, and add new
protection policies that you define yourself.
■
Searching to create a subset of event types
■
Adding or editing user-defined protection policies
■
Enabling or disabling logging rules
■
Enabling or disabling blocking rules
■
Full Event List tab
: The Full Event List displays all event types that the
selected policy can detect. Even after you define the display on the Search
Events tab, you can use the Full Event List to view the total list of all event
types. You can also set logging and blocking rules from this tab.
■
Enabling or disabling logging rules
■
Enabling or disabling blocking rules
■
Auto Update tab
: Provides the ability to establish automatic policy,
signature, and engine updates through LiveUpdate.
■
Updating policies automatically
■
Notes tab
: Provides the ability to annotate policies so that your note is
displayed as a tool tip when you hover the cursor over the annotated policy.
■
Annotating policies and events
Using protection policies
Symantec Network Security provides a set of pre-defined protection policies
that include attack policies, audit policies, and prevention policies. You can
Содержание 10521146 - Network Security 7120
Страница 1: ...Symantec Network Security Administration Guide...
Страница 12: ...12 Contents Index...
Страница 14: ...14...
Страница 70: ...70...
Страница 110: ...110 Populating the topology database Adding nodes and objects...
Страница 158: ...158 Responding Managing flow alert rules...
Страница 188: ...188...
Страница 242: ...242 Reporting Playing recorded traffic...
Страница 268: ...268 Managing log files Exporting data...
Страница 316: ...316 Advanced configuration Configuring advanced parameters...
Страница 317: ...Part IV Appendices The following appendices provide additional reference information User groups reference SQL reference...
Страница 318: ...318...
Страница 338: ...338 SQL reference Using MySQL tables...
Страница 366: ...366 Glossary...
Страница 392: ...392 Index...