About This Guide - Symantec 10521146 - Network Security 7120 Administration Manual

Administration guide
Hide thumbs Also See for 10521146 - Network Security 7120:
Table of Contents

Advertisement

About this guide

http://www.symantec.com/techsupp/enterprise/select_product_updates.ht
ml
2
Click Intrusion Detection > Symantec Network Security 4.0.
See also
"Finding information"
This guide contains the following sections:
Part 1 Introduction: This section introduces you to the Symantec Network
Security core intrusion detection system and the Symantec Network
Security 7100 Series appliance, describes the architecture, and outlines a
high-level setup and deployment scheme.
Chapter 1 Introduction: Describes the Symantec Network Security
intrusion detection system and the Symantec Network Security 7100
Series appliance, documentation, and alternative sources of
information.
Chapter 2 Architecture: Describes the system components,
compatibility, and integration of Symantec Network Security.
Chapter 3
Getting
Symantec Network Security intrusion detection system.
Part 2 Getting Started: This section explains how to set up your Symantec
Network Security intrusion detection system, populate a network topology
database, configure basic detection capabilities, and establish initial
protection and response policies.
Chapter 4
Populating the topology
network topology mapping process, and the information and
procedures required to populate the topology database.
Chapter 5
Protection
protection policies and how to customize and manage them.
Chapter 6 Responding: Describes Symantec Network Security's
response rules, and flow alert rules, and how to customize and manage
them.
Chapter 7 Detecting: Describes Symantec Network Security's methods
of intrusion, anomaly, and signature detection, and how to customize
and manage them.
Part 3 Using Symantec Network Security: This section describes how to use
Symantec Network Security to monitor your network, including interpreting
incident and event output, generating reports and running queries,
on page 20.
started: Describes deployment and setup options of a
database: Describes the initial
policies: Describes Symantec Network Security's
Introduction
23
Finding information

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network security

Table of Contents