Creating a Report Template by Importing a Dashboard or Workflow.Creating a Report Template from an Event View.Creating a Report Template from an Existing Template.Setting Attributes for PDF and HTML Report Documents.Configuring the Content of the Template Sections.Security, Internet Access, and Communication Ports.Viewing the Status of Long-Running Tasks.Purging Discovery Data from the Database.Using the FireSIGHT System as a Compliance Tool.Configuring Correlation Policies and Rules.Configuring External Alerting for Intrusion Rules.Working with Connection & Security Intelligence Data.Understanding and Writing Intrusion Rules.Tailoring Intrusion Protection to Your Network Assets.Getting Started with Intrusion Policies.Tuning Preprocessing in Passive Deployments.Configuring Transport & Network Layer Preprocessing.Getting Started with Network Analysis Policies.Using Layers in Intrusion and Network Analysis Policies.Understanding Intrusion and Network Analysis Policies.Tuning Traffic Decryption Using SSL Rules.Controlling Traffic Using Intrusion and File Policies.Controlling Traffic with Reputation-Based Rules.Controlling Traffic with Network-Based Rules.Tuning Traffic Flow Using Access Control Rules.Blacklisting Using Security Intelligence IP Address Reputation. ![]() Getting Started with Access Control Policies.
0 Comments
Leave a Reply. |