x FIGURES
Figure 52 Add a New Network Route.........................................................................................................41
Figure 53 Prune Unused Performance Data.............................................................................................. 41
Figure 54 Delete Management Settings and Data ..................................................................................... 42
Figure 55 Delete Traffic Analysis Performance Data ................................................................................. 43
Figure 56 Install a new License File...........................................................................................................43
Figure 57 Installed Appliances List ............................................................................................................ 44
Figure 58 Ethernet TAP Deployment ......................................................................................................... 46
Figure 59 Selecting an Intrusion Detection Appliance for Home Network Configuration............................ 46
Figure 60 Configuring Home Network for Intrusion Detection Appliance ...................................................47
Figure 61 Selecting an Intrusion Detection Appliance for Portscan Detection ........................................... 48
Figure 62 Configuring Portscan Detection for an Intrusion Detection Appliance........................................48
Figure 63 Selecting Intrusion Detection Appliances for Signature Profiler ................................................. 50
Figure 64 Selecting Signature Types ......................................................................................................... 51
Figure 65 Load Intrusion Detection Settings .............................................................................................. 52
Figure 66 Deleting Intrusion Detection Performance Data......................................................................... 52
Figure 67 Selecting an Intrusion Detection Appliance for Changing Signature Set.................................... 53
Figure 68 Generating New Signature Set ..................................................................................................53
Figure 69 Selecting an Intrusion Detection Appliance for Changing Signature Set.................................... 54
Figure 70 Selecting an Intrusion Detection Appliance for Changing Signature Set.................................... 54
Figure 71 Configure an External Proxy for Windows Management............................................................ 58
Figure 72 Specifying proxy host information ..............................................................................................58
Figure 73 Specifying proxy host information ..............................................................................................59
Figure 74 Specifying proxy authentication credentials ...............................................................................60
Figure 75 List of Windows Management Proxies....................................................................................... 61
Figure 76Selecting Internet Protocol (TCP/IP) for WINS Settings.............................................................. 62
Figure 77Selecting WINS Tab.................................................................................................................... 63
Figure 78 Change Authentication Usernames and Passwords for Discovered Targets............................. 64
Figure 79 Manage Devices ........................................................................................................................64
Figure 80 Configuring Windows Performance Thresholds......................................................................... 65
Figure 81 Edit WINS Settings .................................................................................................................... 66
Figure 82 WINS Server IP Address ...........................................................................................................66
Figure 83 CommandCenter NOC 2500M Options .....................................................................................67
Figure 84 Edit LMHOSTS File.................................................................................................................... 67
Figure 85 Vulnerability Scanning Warning .................................................................................................69
Figure 86 Type IP Addresses for Vulnerability Scanning ...........................................................................71
Figure 87 Create a Vulnerability Scanning Schedule................................................................................. 72
Figure 88 Notification Status...................................................................................................................... 73
Figure 89 Admin Status .............................................................................................................................73
Figure 90 A Configuring Event Notifications...............................................................................................74
Figure 91 Adding a New Event Notification................................................................................................ 75
Figure 92 Specifying an Interface/Service Rule for Event Notification ....................................................... 75
Figure 93 Validating an Interface/Service Rule.......................................................................................... 77
Figure 94 Entering Notification Recipient Information................................................................................ 77
Figure 95 Special Values for Email Subject and Text Message Fields ...................................................... 78
Figure 96 Arranging Event Notifications..................................................................................................... 78
Figure 97 Configure Notification Groups.................................................................................................... 79
Figure 98 Assigning a Name to a Notification Group ................................................................................. 79
Figure 99 Assigning Users to a Notification Group .................................................................................... 80
Figure 100 Configuring a Notification Path................................................................................................. 81
Figure 101 Configuring a Notification Path................................................................................................. 82
Figure 102 Configuring a User Target in Notification Path......................................................................... 82
Figure 103 Configuring a Group Target in Notification Path....................................................................... 83
Figure 104 Configuring an Email Target in Notification Path...................................................................... 83