The example procedure does the following:
Asks the user to decide if a preliminary look indicates that the network has been attacked. This
leads to a decision step.
NOTE: All decision steps provide different execution paths, depending on the value of the
variable defined in the previous step.
The Collect Data step reviews the data to make a better determination if there has been an
attack.
If there has been an attack, iTRAC takes measures to prevent another attack and sends an e-
mail to the supervisor indicating that proper measures have been taken. If there is no attack,
iTRAC sends an e-mail to the supervisor indicating that there is not an attack.
iTRAC Process
Figure 13-3
To create this iTRAC process:
1 Click the iTRAC tab.
2 In the navigation pane, click iTRAC Administration > Template Manager.
3 In the Template Manager window, click Add.
The iTRAC Process Builder displays with a Process Details window.
4 Use the name iTRAC Tutorial. Optionally, add a description.
5 From the Step Palette pane, drag and drop three manual steps, two mail steps, and two Decision
Steps. Rename and the attributes to the steps as follows by right-clicking and selecting Edit
Step.
5a Manual Step-0 to Decide If Hacked.
5a1 Set the Role to Analyst.
5a2 Click Associate, then click Add.
5a3 Specify Hacked in the
field.
Name
Quick Start 299