183
Detecting
Configuring signature detection
Note:
See the
Symantec Network Security Installation Guide
for upgrading
user-defined signatures from Symantec ManHunt 3.0.
Deleting user-defined signatures
The Network Security console provides a way to delete user-defined signatures
at any time.
To delete user-defined signatures
1
On the
Policies
tab, click
User-defined Signatures
.
2
Click the signature, and click
Delete
.
Note:
If you delete a user-defined signature that is used in a policy, the
deletion takes effect immediately on the master node, and on slave nodes
after a database synchronization. See
“Forcing nodes to synchronize”
on
page 83.
Caution:
When a user-defined signature is deleted, the descriptive
information, title, and long descriptions of any events that were triggered
in the past by the now-deleted signature will not have recognizable names.
Importing user-defined signatures
The Network Security console provides a way to import user-defined signatures
in bulk from a file. Using a file browser from the Network Security console,
select a signature file.
To import multiple user-defined signatures from a file
1
On the
Policies
tab, click
User-defined Signature
>
Import
.
2
In
Import Signatures
, locate the file containing bulk signatures.
3
Click
Import Signatures
.
4
Click
OK
to save and exit.
Resolving signature compile errors
If signatures fail to compile, the Network Security console displays the Compile
Error Log. Check all new or uncompiled signatures for errors such as undefined
variables or improperly formatted IP addresses or ports. Then recompile. If even
one signature fails to compile, it will cause a group of signatures to fail.
Содержание 10521146 - Network Security 7120
Страница 1: ...Symantec Network Security Administration Guide...
Страница 12: ...12 Contents Index...
Страница 14: ...14...
Страница 70: ...70...
Страница 110: ...110 Populating the topology database Adding nodes and objects...
Страница 158: ...158 Responding Managing flow alert rules...
Страница 188: ...188...
Страница 242: ...242 Reporting Playing recorded traffic...
Страница 268: ...268 Managing log files Exporting data...
Страница 316: ...316 Advanced configuration Configuring advanced parameters...
Страница 317: ...Part IV Appendices The following appendices provide additional reference information User groups reference SQL reference...
Страница 318: ...318...
Страница 338: ...338 SQL reference Using MySQL tables...
Страница 366: ...366 Glossary...
Страница 392: ...392 Index...