Flylib.com
Cisco Security Agent
Cisco Security Agent
ISBN: 1587052059
EAN: 2147483647
Year: 2005
Pages: 145
Authors:
Chad Sullivan
BUY ON AMAZON
Cisco Security Agent
Table of Contents
Copyright
About the Author
About the Technical Reviewers
Acknowledgments
This Book Is Safari Enabled
Foreword
Command Syntax Conventions
Introduction
Who Should Read This Book?
How This Book Is Organized
Part I: The Need for Endpoint Security
Chapter 1. Introducing Endpoint Security
The Early Days: Viruses and Worms
The Present: Blended Threats
The Insider
Understanding Point Security Weaknesses
Using Attack-Detection Methods
Establishing a Security Policy
Summary
Chapter 2. Introducing the Cisco Security Agent
Intrusion Prevention and Intrusion Detection Technologies
The Life Cycle of an Attack
CSA Capabilities
CSA Components Overview
CSA Communication
CSA s Role Within SAFE
Summary
Part II: Understanding the CSA Building Blocks
Chapter 3. Understanding CSA Groups and Hosts
The Relationship Between Groups and Hosts
Understanding CSA Groups
Understanding CSA Hosts
Summary
Chapter 4. Understanding CSA Policies, Modules, and Rules
The Relationship Between Policies, Modules, and Rules
Establishing Acceptable Use Documents and Security Policies
CSA Rules
CSA Rule Modules
CSA Policies
Summary
Chapter 5. Understanding Application Classes and Variables
Using Application Classes
Introducing Variables
Summary
Part III: CSA Agent Installation and Local Agent Use
Chapter 6. Understanding CSA Components and Installation
General CSA Agent Components Overview
CSA Installation Requirements
Agent Kits
Summary
Chapter 7. Using the CSA User Interface
Windows Agent Interface
Linux Agent Interface
Solaris Agent Interface
Summary
Part IV: Monitoring and Reporting
Chapter 8. Monitoring CSA Events
Status Summary
Event Log
Event Monitor
Event Log Management
Event Sets
Alerts
Summary
Chapter 9. Using CSA MC Reports
Audit Trail Reporting
Event Reporting
Group Detail Reporting
Host Detail Reporting
Policy Detail Reporting
Report Viewing
Creating a Sample Report
Summary
Part V: Analyzing CSA
Chapter 10. Application Deployment Investigation
Using Application Deployment Investigation
Using Application Deployment Reports
Summary
Chapter 11. Application Behavior Analysis
Understanding Application Behavior Investigation Components
Configuring Application Behavior Investigation
Using Application Behavior Investigation on the Remote Agent
Analyzing Log Data
Viewing Behavior Reports
Exporting the Behavior Analysis Report Data
Analyzing UNIX Application Behavior
Creating Behavior Analysis Rule Modules
Summary
Part VI: Creating Policy, Implementing CSA, and Maintaining the CSA MC
Chapter 12. Creating and Tuning Policy
Creating Policy
Tuning Policy
Summary
Chapter 13. Developing a CSA Project Implementation Plan
Planning for Success
The Project Plan
Outlining the Project Phases
Summary
Chapter 14. CSA MC Administration and Maintenance
CSA Licensing
CSA MC Registration Control
CSA MC Component Sharing
CSA MC Role-Based Access Control
Other CSA MC Administrative Features
CSA MC Backup and Restore Procedures
Summary
Part VII: Appendixes
Appendix A. VMS and CSA MC 4.5 Installation
VMS v2.3 Components
Installation
Summary
Appendix B. Security Monitor Integration
Adding the CSA MC to the Security Monitor
Configuring the Security Monitor
Verifying Connectivity
Viewing Events in the Security Monitor
Summary
Appendix C. CSA MIB
CSA MC MIB Definitions
Index
index_SYMBOL
index_A
index_B
index_C
index_D
index_E
index_F
index_G
index_H
index_I
index_L
index_M
index_N
index_O
index_P
index_Q
index_R
index_S
index_T
index_U
index_V
index_W
Cisco Security Agent
ISBN: 1587052059
EAN: 2147483647
Year: 2005
Pages: 145
Authors:
Chad Sullivan
BUY ON AMAZON
Similar book on Amazon
CompTIA Project+ Study Guide: Exam PK0-003
Security Monitoring with Cisco Security MARS
Security Threat Mitigation and Response: Understanding Cisco Security MARS
The Tao of Network Security Monitoring: Beyond Intrusion Detection
Network Security Principles and Practices (CCIE Professional Development)
OpenSSH: A Survival Guide for Secure Shell Handling (Version 1.0)
The .NET Developers Guide to Directory Services Programming
System.DirectoryServices.ActiveDirectory Overview
Sorting Search Results
Advanced LDAP Searches
Reading and Writing LDAP Attributes
Appendix A. Three Approaches to COM Interop with ADSI
WebLogic: The Definitive Guide
Deployment Considerations
Designing a Domain
Creating a Custom Authentication Provider
Using the Web Services Framework
Reliable SOAP Messaging
Snort Cookbook
Installing Snort Binaries on Linux
Installing and Configuring MySQL
Detecting IDS Evasion
Detecting Fragmentation Attacks and Fragment Reassembly with Frag2
Creating a Reactive IDS
C++ GUI Programming with Qt 3
Subclassing QWidget
Layout Management
Handling Files and Directories
XML
A Note on Licensing
Programming .Net Windows Applications
Building and Running
Updating with SQL
Multiuser Updates
Command Builder
Bugs
User Interfaces in C#: Windows Forms and Custom Controls
Control Class Basics
Custom Controls
Design-Time Support for Custom Controls
MDI Interfaces and Workspaces
GDI+ Basics
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies