148 Responding
Setting response actions
command is entered in the Custom Response field which executes when the
response rule is triggered. The minimum delay between responses is 0.
To enable custom responses
1
In the Network Security console, click
Configuration
>
Response Rules
.
2
In
Response Rules
, click the
Response Action
column of a rule.
3
In
Configure Response Action
, click
Custom Response
.
4
Provide the following information:
■
Start Command
: Enter the command with applicable arguments.
See
“Table of response variables”
on page 148.
■
Maximum number of executions
: Enter the number of executions per
incident of this response.
■
Delay between executions (mins)
: Enter the time in minutes that you
want Symantec Network Security to wait per incident, before making
another execution.
5
In
Configure Response Action
, click
OK
to save and exit.
6
In
Response Rules
, click
OK
to save and exit.
Note:
If you create a custom response action, it will be enabled on all
software and appliance nodes defined in your topology. Be sure to include
the custom application binary in the same location for each node.
Note:
SuperUsers can read and write custom response actions; Administrators,
StandardUsers, and RestrictedUsers can view only. See
“User groups reference”
on page 319 for more about permissions.
Table of response variables
The Network Security console provides a way to specify case-sensitive variables
in the commands that you enter for custom, Network Security console, and
email response actions. For example, to set the Subject Line of an email
notification to display Date, Time, Source, Destination, and Event,
enter
%T %s %d %t
. Separate the variables by a space to expedite possible future
editing. Upon execution, the values from the corresponding event replace the
variable.
To enable custom response actions, provide the path to the application binary,
as well as any arguments, to pass on the command line (up to 255 characters
long).
Содержание 10521146 - Network Security 7120
Страница 1: ...Symantec Network Security Administration Guide...
Страница 12: ...12 Contents Index...
Страница 14: ...14...
Страница 70: ...70...
Страница 110: ...110 Populating the topology database Adding nodes and objects...
Страница 158: ...158 Responding Managing flow alert rules...
Страница 188: ...188...
Страница 242: ...242 Reporting Playing recorded traffic...
Страница 268: ...268 Managing log files Exporting data...
Страница 316: ...316 Advanced configuration Configuring advanced parameters...
Страница 317: ...Part IV Appendices The following appendices provide additional reference information User groups reference SQL reference...
Страница 318: ...318...
Страница 338: ...338 SQL reference Using MySQL tables...
Страница 366: ...366 Glossary...
Страница 392: ...392 Index...