HP-UX Host Intrusion Detection System Version 4.3 administrator guide

Table Of Contents
updates the schedule and deploys it over the two agents. The administrator can choose to intervene
in this process; however, it is not required.
Schedule Tuning Process
The process by which a schedule is tuned can be broken down into the following steps:
Step 1: Analyzing Alerts and Tuning Schedules.”
“Step 2: Modifying the Filters in the Tune Command Report” (page 183)
“Step 3: Updating and Deploying the Schedule” (page 184)
Figure C-1 provides a pictorial representation of the process by which HIDS tunes schedules.
Figure C-1 Flowchart Depicting the Tuning Process
Step 1: Analyzing Alerts and Tuning Schedules
Invoke the tune command from the idsadmin command line, or its interactive command
interface to start analyzing alerts and tuning schedules.
180 Tuning Schedules and Generating Alert Reports