Novell SENTINEL RAPID DEPLOYMENT 6.1 - 12-2009 User Manual page 301

Table of Contents

Advertisement

5b4 (Optional) Under the Description tab, specify To further evaluate after collecting of
events to determine if there has been an attack.
5b5 Click OK to rename the step.
5c Manual Step-2 to Prevent Future Attacks:
5c1 Set Role to Analyst.
5c2 (Optional) Under the Description tab, specify Take measures to stop the attack.
(firewall, router or other intrusion protection method). Also, if possible, determine
how the attacked was done.
5c3 Click OK to rename the step.
5d Mail Step-3 to Not Hacked:
5d1 In the To field (because this is for a tutorial), provide your e-mail address. When this
step finishes, sends you an e-mail.
5d2 In the From field, provide a made up address such as me@nowhere.com.
5d3 In the Subject field, specify We have not been hacked.
5d4 (Optional) Under the Body tab, specify This e-mail is generated from a tutorial
(simulation) iTRAC process.
Quick Start 301

Advertisement

Table of Contents
loading

This manual is also suitable for:

Sentinel rapid deployment 6.1

Table of Contents