Raritan Computer COMMANDCENTER NOC User Manual

Page 8

Advertising
background image

viii

F

IGURES

Configuring a Windows 98/ME box for Remote WMI Management.............................................129

Configuring a Windows Proxy Details ..........................................................................................130

Registry Changes [configuration]: .........................................................................................................131

Appendix E: Managing and Responding to Intrusion Detection
Events ......................................................................................... 133

How the Intrusion Detection works ...............................................................................................133

Reducing False Positives with the Signature Profiler............................................................................133

Signature Profiler and the Rules Engine ...............................................................................................133

Responding to Events and Notifications ...............................................................................................134

Event Categories ..........................................................................................................................134

What do I do when… ....................................................................................................................134

What if I have been hacked? ........................................................................................................135

Security – An Elusive Goal ...........................................................................................................135

Appendix F: Notification Parameters......................................... 137

Notification Parameter Substitution ..............................................................................................137

Available values............................................................................................................................137

Notification: ...................................................................................................................................137

Events:..........................................................................................................................................137

Assets: ..........................................................................................................................................138

Appendix G: Network Traffic Overhead: Network Management’s
Necessary Evil ............................................................................ 139

ICMP Pings...................................................................................................................................139

TCP Socket Reachability..............................................................................................................139

HTTP Synthetic Transaction.........................................................................................................140

SNMP Data Collection..................................................................................................................140

Additional Notes............................................................................................................................142

Advertising