Viewing And Working With Data Generated By Network Security Platform; Configuring Your Deployment Using The Manager - McAfee M-1250 - Network Security Platform Deployment Manual

Deployment guide
Hide thumbs Also See for M-1250 - Network Security Platform:
Table of Contents

Advertisement

McAfee® Network Security Platform 6.0
Viewing and working with data generated by Network Security
Platform
Once you've completed the steps in the previous sections, you're up and running. While
actively monitoring network traffic, your Sensor will generate alerts for traffic that is in
violation of the set security policy.
Network Security Platform displays a summary view of the count of alerts in the Manager
Home page, organized by severity (High, Medium, Low, and Informational). Network
Security Platform provides two tools for examining and viewing the alerts:
Note:
Reports Guide

Configuring your deployment using the Manager

Once you're up and running and reviewing the data generated by the system, you can
further configure and maintain your system. For example, you can do the following:
The Threat Analyzer enables you to drill down to the details of an alert such as what
triggered the alert, when, what Sensor detected it, the source IP address of the attack
that triggered the alert, the destination IP address of the attack, and so on. You use
the Threat Analyzer to perform forensic analysis on the alert to help you tune the
Network Security Platform system, provide better responses to attacks, and otherwise
shore up your defenses.
The Reports Main page provides you detailed reports based on your alerts, and
reports on your Network Security Platform configuration. You can use these reports to
communicate incidents to other members of your team and to your management.
For more information on these tools, see
.
Apply security policies to each interface of your multi-port Sensor
to all interfaces, as when you chose the default policy in Establish Sensor-to-Manager
communication (on page 2)). You can ensure all of your interfaces use policies
specifically for the areas of your network they are monitoring. For example, you can
Web Server
apply the
policy to one interface, a
Segment
policy to another, and so on. For more information on the provided policies,
see Network Security Platform policies,
Configure responses to alerts.
Developing a system of actions, alerts, and logs based on
impact severity is recommended for effective network security. For example, you can
configure Network Security Platform to send a page or an email notification, execute a
script, disconnect a TCP connection, send an "ICMP Host Not Reachable" message to
the attack source for ICMP transmissions, or send address-blocking for a host.
For more information on response actions, see Response management,
Guide
. For more information on configuring pager, email, or script notification, or
configuring an IPS quarantine response, see
Device Configuration Guide.
Filter alerts.
An attack filter limits the number of alerts generated by the system by
excluding certain Source and Destination IP address parameters. If these address
parameters are detected in a packet, the packet is not analyzed further (and is
automatically forwarded when in In-line Mode). For more information on attack filters,
Administrative Domain Configuration Guide
see
Manager Server Configuration Guide
Mail Server
Getting Started Guide
Administrative Domain Configuration Guide
.
5
Getting Started
and
(instead of applying one policy
Internal
policy to another, the
.
Getting Started
and

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network security platform

Table of Contents