Exploit Detection - Novell SENTINEL RAPID DEPLOYMENT 6.1 - 12-2009 User Manual

Table of Contents

Advertisement

4 Click Finish. If you have an active network, you might see something similar to:
NOTE: To display a 3-D graph without real-time events, click the Display Events down-arrow
and select No.

13.1.2 Exploit Detection

To view any events indicating a possible exploitation, you must have the following:
Advisor Feed
Intrusion detection
Vulnerability scanning
294 Sentinel 6.1 Rapid Deployment User Guide

Advertisement

Table of Contents
loading

This manual is also suitable for:

Sentinel rapid deployment 6.1

Table of Contents