Summary

[ LiB ]  

In this chapter, you first saw how IDM and IEV together provide an IDS management and monitoring solution for small-scale IDS deployments. You then learned how to install IEV and how to add devices so that you can view and filter their event logs in IEV. After seeing how you can create custom views in IEV, you saw how the NSDB provides signature information and vulnerability reports for IDS signatures. We described the method of creating filters that allow for a more manageable way to view events before finally going through how you customize IEV application settings and preferences.

[ LiB ]  


CSIDS Exam Cram 2 (Exam 642-531)
CSIDS Exam Cram 2 (Exam 642-531)
ISBN: N/A
EAN: N/A
Year: 2004
Pages: 213

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net