Sign In
Upload
Manuals
Brands
Symantec Manuals
Software
SOFTWARE MANAGER
User Manuals: Symantec SOFTWARE MANAGER Solution
Manuals and User Guides for Symantec SOFTWARE MANAGER Solution. We have
4
Symantec SOFTWARE MANAGER Solution manuals available for free PDF download: Administration Manual, User Manual, Installation Manual
Symantec SOFTWARE MANAGER Administration Manual (392 pages)
Administration Guide
Brand:
Symantec
| Category:
Firewall
| Size: 3 MB
Table of Contents
Table of Contents
5
Chapter 1 Introduction
15
About the Symantec Network Security Foundation
15
About the Symantec Network Security 7100 Series
15
About Other Symantec Network Security Features
17
Finding Information
20
About 7100 Series Appliance Documentation
20
About Network Security Software Documentation
21
About the Web Sites
22
About this Guide
23
Chapter 2 Architecture
25
About Symantec Network Security
25
About the Core Architecture
25
About Detection
26
About Analysis
30
About Response
31
About Management and Detection Architecture
32
About the Network Security Console
32
About the Node Architecture
34
About the 7100 Series Appliance Node
37
Chapter 3 Getting Started
41
Getting Started
41
General Checklist
42
General Software and Appliance Checklist
42
Additional Appliance-Specific Checklist
43
About the Management Interfaces
44
Using the Network Security Console
44
Using the Serial Console
49
Using the LCD Panel
51
Managing User Access
54
Managing User Login Accounts
55
Managing User Passphrases
57
Controlling User Access
59
Planning the Deployment
60
Deploying Single Nodes
61
Deploying a Single Network Security Software Node
61
Deploying a Single 7100 Series Appliance Node
62
Configuring Single-Node Parameters
63
Deploying Node Clusters
64
Deploying Software and Appliance Nodes in a Cluster
65
Monitoring Groups Within a Cluster
66
Initial Configuration
69
Chapter 4 Populating the Topology Database
71
About the Network Topology
71
About the Devices Tab
72
About Topology Mapping
74
Managing the Topology Tree
78
Viewing Auto-Generated Objects
79
Viewing Node Details
79
Viewing Node Status
79
Adding Objects for the First Time
80
Editing Objects
81
Deleting Objects
81
Reverting Changes
82
Saving Changes
82
Forcing Nodes to Synchronize
83
Backing up
83
Adding Nodes and Objects
83
About Location Objects
83
About Nodes and Interfaces
85
About Network Security Software Nodes
86
About 7100 Series Appliance Nodes
92
About Router Objects
101
About Smart Agents
104
About Managed Network Segments
108
Chapter 5 Protection Policies
111
About Protection Policies
111
Responding to Malicious or Suspicious Events
112
Understanding the Protection Policy Work Area
112
Using Protection Policies
113
Selecting Pre-Defined Policies
114
Setting Policies to Interfaces
115
Applying to Save Changes
115
Overriding Blocking Rules Globally
115
Undoing Policy Settings
116
Adjusting the View of Event Types
117
Searching to Create a Subset of Event Types
117
Adjusting the View by Columns
119
Viewing Event Type Details
119
Defining New Protection Policies
120
Adding or Editing User-Defined Protection Policies
121
Cloning Existing Protection Policies
121
Enabling or Disabling Logging Rules
122
Enabling or Disabling Blocking Rules
123
Deleting User-Defined Protection Policies
125
Updating Policies Automatically
125
Annotating Policies and Events
126
Backing up Protection Policies
128
Chapter 6 Responding
129
About Response Rules
129
About Automated Responses
131
Managing Response Rules
132
Viewing Response Rules
132
Adding New Response Rules
133
Editing Response Rules
134
Searching Event Types
134
Deleting Response Rules
135
Saving or Reverting Changes
135
Backing up Response Rules
135
Setting Response Parameters
136
Setting Event Targets
136
Setting Event Types
136
Setting Severity Levels
137
Setting Confidence Levels
139
Setting Event Sources
139
Setting Response Actions
140
Setting Next Actions
140
Setting Response Actions
141
Setting no Response Action
142
Setting Email Notification
142
Setting SNMP Notification
145
Setting Trackback Response Action
147
Setting a Custom Response Action
147
Setting a TCP Reset Response Action
150
Setting Traffic Record Response Action
150
Setting a Console Response Action
152
Setting Export Flow Response Action
153
Managing Flow Alert Rules
154
Viewing Flow Alert Rules
155
Adding Flow Alert Rules
155
Editing Flow Alert Rules
156
Deleting Flow Alert Rules
156
Chapter 7 Detecting
159
About Detection
159
Configuring Sensor Detection
160
Configuring Sensor Parameters
161
Restarting or Stopping Sensors
161
Basic Sensor Parameters
162
Data Collection Parameters
163
Threshold Parameters
164
Saturation Parameters
165
Miscellaneous Parameters
167
Checksum Validation Parameters
168
Advanced Sensor Parameters
169
Interval and Flow Parameters
170
Miscellaneous Parameters
172
Table Element Parameters
173
Segment Parameters
175
Configuring Port Mapping
177
Configuring Signature Detection
179
About Symantec Signatures
179
About User-Defined Signatures
180
Managing Signatures
180
Managing Signature Variables
184
Using Symantec Network Security
187
Chapter 8 Monitoring
189
About Incident and Event Data
189
Viewing Incident and Event Data
190
Adjusting the View
191
Examining Incident and Event Data
192
Examining Incident Data
193
Examining Event Data
196
Managing Incident and Event Data
201
Selecting Columns
202
Selecting View Filters
205
Marking and Annotating
207
Saving, Copying, and Printing Data
209
Emailing Incident or Event Data
211
Tuning Incident Parameters
213
Setting Incident Idle Time
213
Setting Maximum Incidents
214
Setting Maximum Active Incident Life
214
Setting Incident Unique IP Limit
215
Setting Event Correlation 'Name' Weight
215
Event Correlation 'Source IP' Weight
216
Event Correlation 'Destination IP' Weight
217
Event Correlation 'Source Port' Weight
217
Event Correlation 'Destination Port' Weight
218
Monitoring Flow Statistics
219
Enabling Flow Data Collection
219
Configuring Flowchaser
220
Chapter 9 Reporting
223
About Reports and Queries
223
Scheduling Reports
224
Adding or Editing Report Schedules
224
Refreshing the List of Reports
225
Deleting Report Schedules
226
Managing Scheduled Reports
226
Reporting Top-Level and Drill-Down
228
About Report Formats
228
About Report Types
229
About Incident/Event Reports
229
Printing and Saving Reports
230
About Top-Level Report Types
230
Reports of Top Events
231
Reports Per Incident Schedule
232
Reports Per Event Schedule
233
Reports by Event Characteristics
233
Reports Per Network Security Device
235
Drill-Down-Only Reports
236
Querying Flows
237
Viewing Current Flows
238
Viewing Flow Statistics
239
Viewing Exported Flows
239
Playing Recorded Traffic
240
Replaying Recorded Traffic Flow Data
241
Chapter 10 Managing Log Files
243
About the Log Files
243
About the Install Log
243
About the Operational Log
244
Managing Logs
244
Viewing Log Files
244
Viewing Live Log Files
245
Archiving Log Files
246
Copying Log Files
246
Deleting Log Files
247
Refreshing the List of Log Files
247
Configuring Automatic Archiving
248
Setting Automatic Logging Levels
248
Archiving Log Files
249
Compressing Log Files
252
Exporting Data
254
Exporting to File
254
Exporting to SESA
255
Exporting to SQL
257
Exporting to Syslog
260
Transferring Via SCP
264
Chapter 11 Advanced Configuration
269
About Advanced Setup
269
Updating Symantec Network Security
269
About Liveupdate
270
Scanning for Available Updates
271
Applying Updates
271
Setting the Liveupdate Server
272
Scheduling Live Updates
273
Adding or Editing Automatic Updates
273
Deleting Automatic Update Schedules
274
Reverting Automatic Update Schedules
274
Backing up Liveupdate Configurations
274
Managing Node Clusters
275
Creating a New Cluster
275
Managing an Established Cluster
278
Setting a Cluster-Wide Parameter
281
Backup up Cluster-Wide Data
282
Integrating Third-Party Events
282
Integrating Via Smart Agents
283
Integrating with Symantec Decoy Server
285
Establishing High Availability Failover
287
Monitoring Node Availability
287
Configuring Availability for Single Nodes
288
Configuring Availability for Multiple Nodes
289
Configuring Watchdog Processes
293
Backing up and Restoring
297
Backing up and Restoring on the Network Security Console
298
Backing up and Restoring on Compact Flash
302
Configuring Advanced Parameters
308
About Parameters for Clusters, Nodes, and Sensors
309
About Basic Setup and Advanced Tuning
309
Configuring Node Parameters
310
Configuring Basic Parameters
310
Configuring Network Security Console Parameters
311
Configuring Advanced Parameters
311
Appendices
317
Appendix A User Groups Reference
319
About User Groups
319
About Group Permissions
319
Permissions by Group
320
Permissions by Task
321
Appendix B SQL Reference
325
About SQL Export Parameters
325
Setting up SQL Export
325
Using Oracle Tables
326
Oracle Incident Table
326
Oracle Event Table
328
Using Mysql Tables
332
Mysql Incident Table
332
Mysql Event Table
334
Glossary
339
Advertisement
Symantec SOFTWARE MANAGER User Manual (134 pages)
User Guide
Brand:
Symantec
| Category:
Firewall
| Size: 1 MB
Table of Contents
Table of Contents
5
Chapter 1 Introduction
9
About the Symantec Network Security Foundation
9
About the Symantec Network Security 7100 Series
9
About Other Symantec Network Security Features
11
Finding Information
14
About 7100 Series Appliance Documentation
14
About Software Documentation
15
About the Web Sites
16
About this Guide
17
Chapter 2 Architecture
19
About Symantec Network Security
19
About the Core Architecture
19
About Detection
20
About Analysis
24
About Response
25
About Management and Detection Architecture
26
About the Network Security Console
26
About the Node Architecture
28
About the 7100 Series Appliance Node
31
Chapter 3 Getting Started
35
Getting Started
35
About the Management Interfaces
35
About the Network Security Console
36
About Management of 7100 Series Appliances
38
About User Permissions
39
About User Passphrases
39
About Deployment
40
About Deploying Single Nodes
41
About Deploying Single Network Security Software Nodes
41
About Deploying Single 7100 Series Appliance Nodes
42
About Deploying Node Clusters
43
Monitoring Groups Within a Cluster
44
Chapter 4 Topology Database
47
About the Network Topology
47
Viewing the Topology Tree
48
Viewing Objects in the Topology Tree
51
Viewing Auto-Generated Objects
51
About Location Objects
51
About Symantec Network Security Objects
52
About Router Objects
59
About Smart Agents
60
About Managed Network Segments
62
Launching Symantec Decoy Server
63
Chapter 5 Protection Policies
65
About Protection Policies
65
Viewing Protection Policies
66
Understanding the Protection Policy View
67
Adjusting the View of Event Types
68
Adjusting the View by Searching
68
Adjusting the View by Columns
69
Viewing Logging and Blocking Rule Details
70
Viewing Event Detailed Descriptions
70
Viewing Policy Automatic Update
70
Annotating Policies or Events
71
Chapter 6 Response Rules
73
About Response Rules
73
About Automated Responses
74
Viewing Response Rules
75
Searching Event Types
76
About Response Parameters
76
About Event Targets
76
About Event Types
77
About Severity Levels
77
About Confidence Levels
78
About Event Sources
78
About Response Actions
78
About Next Actions
79
About Response Actions
79
About no Response Action
80
About Email Notification
80
About SNMP Notification
80
About Trackback Response Action
80
About Custom Response Action
81
About TCP Reset Response Action
81
About Traffic Record Response Action
81
About Console Response Action
82
About Export Flow Response Action
82
About Flow Alert Rules
83
Viewing Flow Alert Rules
83
Playing Recorded Traffic
83
Replaying Recorded Traffic Flow Data
84
Chapter 7 Detection Methods
85
About Detection
85
About Sensor Detection
86
Viewing Sensor Parameters
87
About Port Mapping
87
Viewing Port Mappings
87
About Signature Detection
87
About Symantec Signatures
88
About User-Defined Signatures
88
Viewing Signatures
89
About Signature Variables
89
About Refinement Rules
89
Chapter 8 Incidents and Events
91
About Incidents and Events
91
About the Incidents Tab
94
Monitoring Incidents
96
Viewing Incident Data
96
Filtering the View of Incidents
98
Monitoring Events
99
Viewing Event Data
99
Filtering the View of Events
101
Viewing Event Notices
102
Managing the Incident/Event Data
103
Loading Cross-Node Correlated Events
104
Saving, Printing, or Emailing Incidents
104
Chapter 9 Reports and Queries
109
About Reports
109
Reporting Via the Network Security Console
109
About Report Formats
110
About Top-Level Report Types
110
Reports of Top Events
111
Reports Per Incident Schedule
112
Reports Per Event Schedule
113
Reports by Event Characteristics
113
Reports Per Network Security Device
115
Drill-Down-Only Reports
116
About Querying Flows
117
Viewing Current Flows
117
Viewing Exported Flows
119
Chapter 10 Log Files
121
About the Log Files
121
About the Install Log
121
About the Operational Log
122
About Log Files
122
Viewing Log Files
122
Viewing Live Log Files
123
Refreshing the List of Log Files
123
SYMANTEC SOFTWARE MANAGER Installation Manual (57 pages)
Brand:
SYMANTEC
| Category:
Software
| Size: 0 MB
Table of Contents
Legal Notice
2
Technical Support
3
Customer Service
4
Table of Contents
6
Chapter 1: Introduction to Software Manager
8
About Software Manager
8
Packages in Software Manager
8
Package Management with Software Manager
9
Starting Software Manager
9
Introduction to Software Manager
9
About the Software Manager Window
10
Customizing the Software Manager Workspace
11
Refreshing the Software Manager Display
11
Icons in Software Manager
12
Resource Icons
13
Relationship Icons
13
About the Wise Software Repository
14
About the Software Manager Database
15
How Source Files Are Indexed
16
Sharing the Software Manager Database with Wise Package Studio
16
About Applications and Packages
17
About Package Meta Data
18
Defining Custom Meta Data Fields
19
Editor
19
Defining a Custom Meta Data Type
21
Product Documentation
21
Online Help
22
Release Notes
22
Note
23
Software Manager from Windows Installer Editor
23
About Formatted Text Strings in Registry Entries
24
Package Import
25
Import Methods
25
About Patch and Transform Import
26
Importing from the Share Point Directory
27
About .QUE Files
29
Importing a Windows Installer File
29
Importing a Merge Module File
31
Importing a Transform File
33
Importing a Windows Installer Patch File
36
Importing Multiple Files
38
Chapter 2: Importing Packages
23
About Importing Packages
23
How to Get Packages into the Software Manager Database
23
See
23
Chapter 3: Managing Packages
41
About Managing Packages
41
Package Groups
41
Creating Package Groups
42
Selecting Superseding Packages
43
Adding Applications and Packages to Groups
44
Editing Package Groups
44
Viewing and Editing Package Attributes
45
Viewing Resource Properties
46
Software Manager Reports
46
Generating a Software Manager Report
47
Using the Report Viewer
47
Moving a Package to Another Application
47
Deleting a Package
48
Changing the Package Status
49
Chapter 4: Software Manager Database Maintenance
51
About Software Manager Database Maintenance
51
Changing the Server Path
51
Deleting a Server Path
53
Restructuring the Index
53
Rebuilding the Index
54
Index
56
Advertisement
Symantec SOFTWARE MANAGER User Manual (30 pages)
In-line Bypass Unit
Brand:
Symantec
| Category:
Firewall
| Size: 0 MB
Table of Contents
Table of Contents
7
About the Symantec Network Security In-Line Bypass Unit
9
Verifying the Contents of the Box
10
In-Line Bypass Unit Features
10
The 2 In-Line Bypass Unit
11
The 4 In-Line Bypass Unit
11
USB Connection
12
Port Groups
12
Matching Port Groups to In-Line Pairs
14
Online and Bypass Modes
15
Auto-Negotiation on Bypass Unit Interfaces
16
Front Panel Leds on the Bypass Unit
16
Rear Panel Leds on the Bypass Unit
17
Setup Overview
18
Mounting Onto a Rack
19
Cabling the 2 In-Line Bypass Unit to the 7120
20
Cabling Port Group 0 to the 7120
21
Cabling Port Group 1 to the 7120
22
Cabling the USB Port to the 7120
22
Connecting the Power on the 2 In-Line Bypass Unit
22
Cabling the 4 In-Line Bypass Unit to the 7160
23
Cabling Port Group 0 to the 7160
25
Cabling Port Group 1 to the 7160
25
Cabling Port Group 2 to the 7160
25
Cabling Port Group 3 to the 7160
26
Cabling the USB Port to the 7160
26
Connecting the Power on the 4 In-Line Bypass Unit
26
Product Specifications
27
Product Certifications
28
CE Certification
28
Safety Instructions
28
Advertisement
Related Products
SYMANTEC ASSET MANAGEMENT SUITE 7.0
SYMANTEC SERVICEDESK 7.0 - CUSTOMIZATION GUIDE
SYMANTEC SERVICEDESK 7.0 MR2 - CUSTOMIZATION GUIDE V1.0
SYMANTEC SERVICEDESK 7.0 MR2 - IMPLEMENTATION GUIDE V1.0
Symantec SERVICEDESK 7.0
Symantec SERVICEDESK 7.0 MR2
Symantec SGM 1600
Symantec S550 Series
Symantec SV3800B-20
Symantec SV1800 Series
Symantec Categories
Software
Network Hardware
Gateway
Storage
Firewall
More Symantec Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL