Maintaining Idp; Creating Idp-Only Administrators - Juniper NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1 Administration Manual

Table of Contents

Advertisement

Network and Security Manager Administration Guide

Maintaining IDP

Creating IDP-Only Administrators

54
NOTE: The DI/IDP Logs view is a predefined custom view applied to all
log entries received by NSM. To view all log entries for all devices in the
selected domain without filters, select the Log Viewer module in the main
navigation tree.
We recommend you review and analyze these log entries to determine the effectiveness
of your current security policy and IDP rules. Log entries are often a valuable insight into
your network traffic. You can see where traffic is coming from, where traffic is going to,
and what malicious content (if any) the traffic contains.
Attackers are constantly devising new and better ways to infiltrate your network. Juniper
Networks actively discovers these new attacks and creates new attack objects to detect
them—so you can prevent the attacks from entering your network. To ensure that the
IDP security module and security policies remain highly effective against all emerging
and evolving threats, we highly recommend that you perform frequent updates to the
attack object database and to the IDP detection engine, described in "Managing the
Attack Object Database" on page 289.
You can use NSM's role-based administration (RBA) to create a custom role for
administrators working with IDP functionality on a device. For example, if your
organization's IDS or IDP administrators do not configure firewall/VPN security devices,
you can restrict administrative privileges for those administrators within the NSM system
to IDP tasks only.
NOTE: The NSM "super" administrator automatically has all IDP-related
permissions.
A custom role for IDP administrators might include the following permissions:
Attack Update
Create/View/Edit/Delete Policies
Create/View/Edit/Delete Backdoor and IDP Rulebases
View Firewall Rulebases
Create/Edit/Delete Shared Objects and Groups
For details on RBA in NSM, see "Configuring Role-Based Administration" on page 66; for
an example that shows how to create an IDP-only administrator, see "Creating
Administrators" on page 67.
Copyright © 2010, Juniper Networks, Inc.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager 2010.4

Table of Contents