Monitoring Groups Within A Cluster - Symantec 10521146 - Network Security 7120 Administration Manual

Administration guide
Hide thumbs Also See for 10521146 - Network Security 7120:
Table of Contents

Advertisement

66 Getting started
Deploying node clusters

Monitoring groups within a cluster

The Network Security console provides a way to subdivide a cluster into
different monitoring groups. You can then configure the Network Security
console to display only the incidents of selected monitoring groups. In this way,
you can manage the delegation of responsibilities in a large installation where
each operator is responsible for only a subset of software or appliance nodes.
This increases performance as well, because it reduces the number of incidents
that a single Network Security console must load.
When subdivided by monitoring groups, Symantec Network Security continues
to perform cross-node correlation across all nodes in the cluster, even though
the Network Security console displays incidents only from the subset.
This section includes the following topics:
Creating a monitoring group
Assigning a monitoring group
Renaming a monitoring group
Choosing monitoring groups
Deleting a monitoring group
Creating a monitoring group
By default, one monitoring group exists upon installation. You can create
additional monitoring groups via the Network Security console. When you add a
software or appliance node to the topology tree, the node is assigned a
monitoring group either by default, or by your selection. After groups are
established, you can activate one or more monitoring groups in the Network
Security console.
Note: SuperUsers can add, assign, and rename monitoring groups;
Administrators, StandardUsers, and RestrictedUsers can choose them. See
"User groups reference"
To add a new monitoring group
1
In the Network Security console, on the Devices tab, right-click any software
or appliance node.
2
Click Edit.
3
In the Monitoring Group field, enter a new name into the list by writing
over the Default name.
on page 319 for more about permissions.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network security

Table of Contents