Raritan Computer NOC Modem User Manual


 
vi FIGURES
Chapter 3: Configuring Intrusion Detection................................. 45
Configure a Spanned or Mirrored Port ...........................................................................................45
Ethernet TAP ..................................................................................................................................45
Benefits...................................................................................................................................................45
Deployment.............................................................................................................................................46
Configure Appliance Home Networks ............................................................................................46
Configure Port Scan Detection.......................................................................................................47
Enable/Disable Signature Types via Signature Profiler..................................................................49
Select Intrusion Detection Appliance(s) ..................................................................................................50
Select Types of Signatures to Monitor ....................................................................................................51
Load Default Signatures or Settings from Another Appliance.................................................................52
Delete Intrusion Detection Performance Data................................................................................52
Advanced Intrusion Detection Administration.................................................................................53
Manage Signatures.................................................................................................................................53
Upload Custom Signatures Tool .............................................................................................................54
Chapter 4: Configuring Windows Management............................ 55
Windows Management Instrumentation (WMI) ..............................................................................55
Configure an External Windows Proxy...........................................................................................55
External Proxy Host Requirements.........................................................................................................56
Overview.................................................................................................................................................56
Download and Run ProxyInstaller ..................................................................................................56
Open Ports on External Proxy Host ........................................................................................................57
Configuring the CC-NOC to communicate with the Proxy.......................................................................57
Configuring a WINS Server or LMHOSTS File .......................................................................................62
Authenticate Windows Computers .................................................................................................64
Manage, Unmanage, or Rescan Devices ...............................................................................................64
Configure Windows Performance Thresholds................................................................................65
Configure WINS Server or LMHOSTS File on 2500M ...................................................................65
Edit WINS Settings .................................................................................................................................65
Edit LMHOSTS File.................................................................................................................................67
Chapter 5: Configuring Vulnerability Scanning............................ 69
Accessing Vulnerability Scanning...................................................................................................69
Vulnerability Scan Levels........................................................................................................................70
Specify IP Addresses and Schedule the Scan........................................................................................71
Chapter 6: Configuring Notifications ........................................... 73
Enable/Disable Notifications...........................................................................................................73
Configure Event Notifications .........................................................................................................74
Add/Edit a Notification.............................................................................................................................74
Configure Notification Groups ........................................................................................................78
Add/Modify a Notification Group .............................................................................................................79
Configure Notification Paths...........................................................................................................81
Add/Edit a Notification Path ....................................................................................................................81
Configure TAP Paging....................................................................................................................86
Add a new TAP Service..........................................................................................................................87
Edit Modem Parameters .........................................................................................................................88
Revert to Original Configuration .....................................................................................................88
Chapter 7: Managing Assets ........................................................ 89
Manage Assets...............................................................................................................................89
Import Assets..........................................................................................................................................89
Export Assets..........................................................................................................................................91
Map Unassociated Assets to Nodes .......................................................................................................91
Clear All Asset Records..................................................................................................................92
Chapter 8: Creating Users, Categories, Views ............................ 93
Create, Modify, Delete Users .........................................................................................................93
Add a New User......................................................................................................................................93
Edit a User..............................................................................................................................................94
Adding/Editing a Duty Schedule .............................................................................................................95
Configure Categories......................................................................................................................96
Configure Views..............................................................................................................................99
Add/Modify an Existing View.................................................................................................................100