HP-UX Host Intrusion Detection System Version 4.1 Administrator's Guide

Secure network communications link HP-UX HIDS uses an encrypted network
link as a means of stopping an attacker from observing the traffic between its
components, and possibly sending false data to disrupt its operations.
Response capability Alerts are sent to the System Manager. In addition, alerts can
be processed by response programs that you create or install.
For more definitions, see “Glossary of HP-UX HIDS Terms” (page 30).
Figure 1-1 shows a graphic representation of these components.
The HP-UX HIDS System Manager performs security management and develops
surveillance schedules. These schedules are sent to the HP-UX HIDS Agent where they
are run at specified times. The HP-UX HIDS agent uses Kernel Audit Data and System
Log Data to run these schedules.
If an alert is generated, it is sent to the HP-UX HIDS System Manager. The System
Manager delivers this message to you as an alert notification.
In addition, the HP-UX HIDS agent executes your alert response programs, which can
include an HP-supplied interface with OpenView Operations as well as other response
actions.
28 Introduction