Raritan-computer COMMANDCENTER NOC Manual de usuario Pagina 8

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 156
  • Tabla de contenidos
  • SOLUCIÓN DE PROBLEMAS
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 7
viii FIGURES
Configuring a Windows 98/ME box for Remote WMI Management.............................................129
Configuring a Windows Proxy Details ..........................................................................................130
Registry Changes [configuration]:.........................................................................................................131
Appendix E: Managing and Responding to Intrusion Detection
Events......................................................................................... 133
How the Intrusion Detection works...............................................................................................133
Reducing False Positives with the Signature Profiler............................................................................133
Signature Profiler and the Rules Engine...............................................................................................133
Responding to Events and Notifications ...............................................................................................134
Event Categories ..........................................................................................................................134
What do I do when… ....................................................................................................................134
What if I have been hacked?........................................................................................................135
Security – An Elusive Goal...........................................................................................................135
Appendix F: Notification Parameters......................................... 137
Notification Parameter Substitution ..............................................................................................137
Available values............................................................................................................................137
Notification:...................................................................................................................................137
Events:..........................................................................................................................................137
Assets:..........................................................................................................................................138
Appendix G: Network Traffic Overhead: Network Management’s
Necessary Evil............................................................................ 139
ICMP Pings...................................................................................................................................139
TCP Socket Reachability..............................................................................................................139
HTTP Synthetic Transaction.........................................................................................................140
SNMP Data Collection..................................................................................................................140
Additional Notes............................................................................................................................142
Vista de pagina 7
1 2 3 4 5 6 7 8 9 10 11 12 13 ... 155 156

Comentarios a estos manuales

Sin comentarios