Novell SENTINEL RAPID DEPLOYMENT 6.1 - 12-2009 User Manual page 305

Table of Contents

Advertisement

14 Right-click Collect Data and select Add Transition. Select and specify the following:
Name: Hacked or Not?
Type: Unconditional
Destination: Hacked or Not
15 Right-click Hacked or Not and select Add Transition. Specify the following:
Name: Not Hacked.
Type: Else.
Destination: Not Hacked.
16 Right-click Hacked or Not and select Add Transition. Specify the following:
Name: Hack Happened.
Type: Conditional.
Destination: Prevent Future Attacks.
17 Click Set > EXP.
17a Select Variables and Values.
17b Select Attribute Hacked.
17c Select Condition equals.
17d Specify Value of yes.
17e Click OK until the transition is complete.
18 Right-click Prevent Future Attacks and select Add Transition. Specify the following:
Name: Proper Measures Taken.
Type: Unconditional.
Destination: Measures Taken.
19 Right-click Measures Taken and select Add End Transition.
20 Click Save. Your new process should appear in the Template Manager.
Example Scenario: Running an iTRAC Process for a Possible Network Attack
The following example assumes the following:
A process named iTRAC Process Tutorial has been assigned to your role (analyst)
This is a process created in
for a Possible Network Attack" on page
All steps within the process belong to the Analyst group
NOTE: If you assign steps to other roles, you need to log out and then log in as a user assigned to
that role and accept the process. For simplicity, the following example is assigned to one role.
"Example Scenario: Creating a Simple Two-Tiered iTRAC Process
298.
Quick Start 305

Advertisement

Table of Contents
loading

This manual is also suitable for:

Sentinel rapid deployment 6.1

Table of Contents