Novell SENTINEL 6.1 SP2 - 02-2010 User Manual page 321

Table of Contents

Advertisement

11 Right-click Collect Data and select Add Transition. Select and specify the following:
Name, Hacked or Not?
Type, Unconditional
Destination, Hacked or Not
12 Right-click Hacked or Not and select Add Transition. Select and specify the following:
Name, Not Hacked
Type, Else
Destination, Not Hacked
13 Right-click Hacked or Not and select Add Transition. Select and specify the following:
Name, Hack Happened
Type, Conditional
Destination, Prevent Future Attacks
Click Set > EXP
Select Variables and Values
Select Attribute Hacked
Select Condition equals
Specify Value of yes
Click OK until the transition is complete
14 Right-click Prevent Future Attacks and select Add Transition. Select and specify the following:
Name, Proper Measures Taken
Type, Unconditional
Destination, Measures Taken
15 Right-click Measures Taken and select Add End Transition.
16 Click Save. Your new process should appear in the Template Manager.
Example Scenario – Running an iTRAC Process for a Possible Network Attack
The following example assumes the following:
A process named iTRAC Process Tutorial has been assigned to your role (analyst)
NOTE: This is a process created in Section.
Tiered iTRAC Process for a Possible Network Attack" on page
All steps within the process belong to the Analyst group
"Example Scenario – Creating a Simple Two
312.
Quick Start 321

Advertisement

Table of Contents
loading

This manual is also suitable for:

Sentinel 6.1 sp2

Table of Contents