24 Introduction
Finding information
maintaining logs and databases, and fine tuning the intrusion detection
system.
■
Chapter 8
Monitoring
: Describes the types of information displayed for
incidents and their related events, and how to view incident data in the
Network Security console.
■
Chapter 9
Reporting
: Describes the types of reports that Symantec
Network Security can generate, and how to generate them.
■
Chapter 10
Managing log files
: Describes the Network Security log
databases, and how to view, compress, save, export, and archive them.
■
Chapter 11
Advanced configuration
: Describes advanced procedures
such as high availability, cluster management, and integrating data
from third-party products.
■
Part 4 Appendices
: This section contains detailed reference information.
■
Appendix A
User groups reference
: Describes the four user groups and
lists exact permissions available for each group.
■
Appendix B
SQL reference
: Describes MySQL and Oracle support in a
detailed table format.
■
Glossary
: Describes terminology used in this guide.
■
Acronyms
: Lists acronyms used in this guide.
See also
“Finding information”
on page 20.
Содержание 10521146 - Network Security 7120
Страница 1: ...Symantec Network Security Administration Guide...
Страница 12: ...12 Contents Index...
Страница 14: ...14...
Страница 70: ...70...
Страница 110: ...110 Populating the topology database Adding nodes and objects...
Страница 158: ...158 Responding Managing flow alert rules...
Страница 188: ...188...
Страница 242: ...242 Reporting Playing recorded traffic...
Страница 268: ...268 Managing log files Exporting data...
Страница 316: ...316 Advanced configuration Configuring advanced parameters...
Страница 317: ...Part IV Appendices The following appendices provide additional reference information User groups reference SQL reference...
Страница 318: ...318...
Страница 338: ...338 SQL reference Using MySQL tables...
Страница 366: ...366 Glossary...
Страница 392: ...392 Index...