Raritan Computer COMMANDCENTER NOC User Manual

Page 6

Advertising
background image

vi

F

IGURES

Chapter 3: Configuring Intrusion Detection ................................. 45

Configure a Spanned or Mirrored Port ...........................................................................................45

Ethernet TAP ..................................................................................................................................45

Benefits...................................................................................................................................................45

Deployment.............................................................................................................................................46

Configure Appliance Home Networks ............................................................................................46

Configure Port Scan Detection .......................................................................................................47

Enable/Disable Signature Types via Signature Profiler..................................................................49

Select Intrusion Detection Appliance(s) ..................................................................................................50

Select Types of Signatures to Monitor ....................................................................................................51

Load Default Signatures or Settings from Another Appliance .................................................................52

Delete Intrusion Detection Performance Data................................................................................52

Advanced Intrusion Detection Administration.................................................................................53

Manage Signatures.................................................................................................................................53

Upload Custom Signatures Tool .............................................................................................................54

Chapter 4: Configuring Windows Management............................ 55

Windows Management Instrumentation (WMI) ..............................................................................55

Configure an External Windows Proxy ...........................................................................................55

External Proxy Host Requirements .........................................................................................................56

Overview.................................................................................................................................................56

Download and Run ProxyInstaller ..................................................................................................56

Open Ports on External Proxy Host ........................................................................................................57

Configuring the CC-NOC to communicate with the Proxy.......................................................................57

Configuring a WINS Server or LMHOSTS File .......................................................................................62

Authenticate Windows Computers .................................................................................................64

Manage, Unmanage, or Rescan Devices ...............................................................................................64

Configure Windows Performance Thresholds................................................................................65

Configure WINS Server or LMHOSTS File on 2500M ...................................................................65

Edit WINS Settings .................................................................................................................................65

Edit LMHOSTS File.................................................................................................................................67

Chapter 5: Configuring Vulnerability Scanning............................ 69

Accessing Vulnerability Scanning...................................................................................................69

Vulnerability Scan Levels........................................................................................................................70

Specify IP Addresses and Schedule the Scan........................................................................................71

Chapter 6: Configuring Notifications ........................................... 73

Enable/Disable Notifications...........................................................................................................73

Configure Event Notifications .........................................................................................................74

Add/Edit a Notification.............................................................................................................................74

Configure Notification Groups ........................................................................................................78

Add/Modify a Notification Group .............................................................................................................79

Configure Notification Paths ...........................................................................................................81

Add/Edit a Notification Path ....................................................................................................................81

Configure TAP Paging....................................................................................................................86

Add a new TAP Service ..........................................................................................................................87

Edit Modem Parameters .........................................................................................................................88

Revert to Original Configuration .....................................................................................................88

Chapter 7: Managing Assets ........................................................ 89

Manage Assets ...............................................................................................................................89

Import Assets..........................................................................................................................................89

Export Assets..........................................................................................................................................91

Map Unassociated Assets to Nodes .......................................................................................................91

Clear All Asset Records..................................................................................................................92

Chapter 8: Creating Users, Categories, Views ............................ 93

Create, Modify, Delete Users .........................................................................................................93

Add a New User......................................................................................................................................93

Edit a User ..............................................................................................................................................94

Adding/Editing a Duty Schedule .............................................................................................................95

Configure Categories......................................................................................................................96

Configure Views..............................................................................................................................99

Add/Modify an Existing View.................................................................................................................100

Advertising