Specifications

Table of Contents
How To Send a Test Incident to ASM.............................................................................................................69
To test a response by sending threat information directly to ASM:......................................................69
To perform a more comprehensive test:................................................................................................69
Server Configuration Considerations.............................................................................................................71
Running the Server on a non−DNS Enabled Solaris System................................................................71
Limiting Client Connections on Solaris and Linux...............................................................................71
Accepting Connection from Local Client Only..............................................................................71
Limiting Connections to a Specific IP Address..............................................................................71
Adding Memory to the Server on Solaris and Linux.............................................................................72
Firewall Considerations.........................................................................................................................72
How to Set Options...........................................................................................................................................73
How to Set Automated Security Manager Options.......................................................................................74
Common Functions................................................................................................................................74
Action Limits.........................................................................................................................................74
Dialog Boxes..........................................................................................................................................75
Dragon EMS..........................................................................................................................................75
SNMP.....................................................................................................................................................75
Using the ASM Activity Monitor.....................................................................................................................76
Setting ASM's Operation Mode.............................................................................................................76
Confirming Actions for Selected Log Entries.......................................................................................76
Undo Action...........................................................................................................................................76
Delete Table Entries...............................................................................................................................76
Clean Up Incidents.................................................................................................................................77
NetSight Automated Security Manager Windows.........................................................................................78
Advanced Statistics Window............................................................................................................................79
Automated Security Manager Activity Monitor............................................................................................81
Right−Click Menu.................................................................................................................................92
Buttons...................................................................................................................................................92
Automated Security ManagerConfiguration Window..................................................................................94
Common Features..................................................................................................................................94
Rule Variables........................................................................................................................................94
Day and Time Ranges.....................................................................................................................95
Buttons.............................................................................................................................................96
Event Categories..............................................................................................................................97
Buttons...........................................................................................................................................100
Notifications..................................................................................................................................100
Buttons...........................................................................................................................................101
Policies..........................................................................................................................................102
Buttons...........................................................................................................................................103
Sender Identifiers..........................................................................................................................103
Automated Security Manager Help
iv