23
Introduction
Finding information
http://www.symantec.com/techsupp/enterprise/select_product_updates.ht
ml
2
Click
Intrusion Detection
>
Symantec Network Security 4.0
.
See also
“Finding information”
on page 20.
About this guide
This guide contains the following sections:
■
Part 1 Introduction
: This section introduces you to the Symantec Network
Security core intrusion detection system and the Symantec Network
Security 7100 Series appliance, describes the architecture, and outlines a
high-level setup and deployment scheme.
■
Chapter 1
Introduction
: Describes the Symantec Network Security
intrusion detection system and the Symantec Network Security 7100
Series appliance, documentation, and alternative sources of
information.
■
Chapter 2
Architecture
: Describes the system components,
compatibility, and integration of Symantec Network Security.
■
Chapter 3
Getting started
: Describes deployment and setup options of a
Symantec Network Security intrusion detection system.
■
Part 2 Getting Started
: This section explains how to set up your Symantec
Network Security intrusion detection system, populate a network topology
database, configure basic detection capabilities, and establish initial
protection and response policies.
■
Chapter 4
Populating the topology database
: Describes the initial
network topology mapping process, and the information and
procedures required to populate the topology database.
■
Chapter 5
Protection policies
: Describes Symantec Network Security’s
protection policies and how to customize and manage them.
■
Chapter 6
Responding
: Describes Symantec Network Security’s
response rules, and flow alert rules, and how to customize and manage
them.
■
Chapter 7
Detecting
: Describes Symantec Network Security’s methods
of intrusion, anomaly, and signature detection, and how to customize
and manage them.
■
Part 3 Using Symantec Network Security
: This section describes how to use
Symantec Network Security to monitor your network, including interpreting
incident and event output, generating reports and running queries,
Summary of Contents for 10521146 - Network Security 7120
Page 1: ...Symantec Network Security Administration Guide...
Page 12: ...12 Contents Index...
Page 14: ...14...
Page 70: ...70...
Page 110: ...110 Populating the topology database Adding nodes and objects...
Page 158: ...158 Responding Managing flow alert rules...
Page 188: ...188...
Page 242: ...242 Reporting Playing recorded traffic...
Page 268: ...268 Managing log files Exporting data...
Page 316: ...316 Advanced configuration Configuring advanced parameters...
Page 318: ...318...
Page 338: ...338 SQL reference Using MySQL tables...
Page 366: ...366 Glossary...
Page 392: ...392 Index...