Initial Configuration
This section explains how to set up your Symantec Network Security intrusion
detection system. After getting started, indicate what to monitor by creating a
network topology database, what kind of activity to look for by configuring
detection signatures and parameters, and how to respond by establishing
protection policies and response rules:
■
■
■
■
Populating the topology database
Detecting
Protection policies
Responding
Part II