68 Getting started
Deploying node clusters
Note:
If you reassign a node to a new monitoring group, change the view of
the incident list as well. If you view incidents from a node in a different
monitoring group than the one that defines your view subset, you can miss
events even though the sensors detect them. See
“Choosing monitoring
groups”
on page 68.
Deleting a monitoring group
Monitoring groups are deleted if they are not used. You can create a new
monitoring group by entering its new name when you add or edit a node. If you
later reassign that node to a different monitoring group and leave the original
monitoring group unused, it disappears from the list. However, it can continue
to define the subset of the incident list that you view.
If you reassign nodes or rename monitoring groups so that a monitoring group
is removed from the list, make sure to adjust the view of the incident list as well.
If you view incidents from a node in a different monitoring group than the
monitoring group that defines your view subset, you can miss events even
though the sensors detect them.
See
“Choosing monitoring groups”
on page 68.
Choosing monitoring groups
Symantec Network Security provides a way to display a subset of the incident
list focused on only those software or appliance nodes that are included in the
selected monitoring group.
To focus the incident view on a monitoring group
1
In the Network Security console, click
Configuration
>
Monitoring Groups
.
2
In
Choose Monitoring Groups
, select a group or check
Default
.
3
Click
OK
to view incidents from the selected monitoring group.
Note:
Always assign at least one node to each monitoring group. If you
create groups without assigning nodes to them, you can miss events even
though the sensors detect them. In other words, you can inadvertently hide
your view of the events by creating groups that you do not use.
Note:
All users can select monitoring groups. See
“User groups reference”
on
page 319 for more about permissions.
Содержание 10521146 - Network Security 7120
Страница 1: ...Symantec Network Security Administration Guide...
Страница 12: ...12 Contents Index...
Страница 14: ...14...
Страница 70: ...70...
Страница 110: ...110 Populating the topology database Adding nodes and objects...
Страница 158: ...158 Responding Managing flow alert rules...
Страница 188: ...188...
Страница 242: ...242 Reporting Playing recorded traffic...
Страница 268: ...268 Managing log files Exporting data...
Страница 316: ...316 Advanced configuration Configuring advanced parameters...
Страница 317: ...Part IV Appendices The following appendices provide additional reference information User groups reference SQL reference...
Страница 318: ...318...
Страница 338: ...338 SQL reference Using MySQL tables...
Страница 366: ...366 Glossary...
Страница 392: ...392 Index...