Raritan Computer NOC Modem User Manual


 
viii FIGURES
Configuring a Windows 98/ME box for Remote WMI Management.............................................129
Configuring a Windows Proxy Details ..........................................................................................130
Registry Changes [configuration]:.........................................................................................................131
Appendix E: Managing and Responding to Intrusion Detection
Events ......................................................................................... 133
How the Intrusion Detection works...............................................................................................133
Reducing False Positives with the Signature Profiler............................................................................133
Signature Profiler and the Rules Engine...............................................................................................133
Responding to Events and Notifications ...............................................................................................134
Event Categories ..........................................................................................................................134
What do I do when… ....................................................................................................................134
What if I have been hacked?........................................................................................................135
Security – An Elusive Goal...........................................................................................................135
Appendix F: Notification Parameters......................................... 137
Notification Parameter Substitution ..............................................................................................137
Available values............................................................................................................................137
Notification:...................................................................................................................................137
Events:..........................................................................................................................................137
Assets:..........................................................................................................................................138
Appendix G: Network Traffic Overhead: Network Management’s
Necessary Evil............................................................................ 139
ICMP Pings...................................................................................................................................139
TCP Socket Reachability..............................................................................................................139
HTTP Synthetic Transaction.........................................................................................................140
SNMP Data Collection..................................................................................................................140
Additional Notes............................................................................................................................142