24 Introduction
Finding information
maintaining logs and databases, and fine tuning the intrusion detection
system.
Chapter 8 Monitoring: Describes the types of information displayed for
■
incidents and their related events, and how to view incident data in the
Network Security console.
Chapter 9 Reporting: Describes the types of reports that Symantec
■
Network Security can generate, and how to generate them.
Chapter 10
Managing log
■
databases, and how to view, compress, save, export, and archive them.
Chapter 11
Advanced
■
such as high availability, cluster management, and integrating data
from third-party products.
Part 4 Appendices: This section contains detailed reference information.
■
Appendix A
User groups
■
lists exact permissions available for each group.
Appendix B
SQL
■
detailed table format.
Glossary: Describes terminology used in this guide.
■
Acronyms: Lists acronyms used in this guide.
■
See also
"Finding information"
files: Describes the Network Security log
configuration: Describes advanced procedures
reference: Describes the four user groups and
reference: Describes MySQL and Oracle support in a
on page 20.