Raritan Computer COMMANDCENTER NOC User Manual
Page 8

viii
F
IGURES
Registry Changes [configuration]: .........................................................................................................131
How the Intrusion Detection works ...............................................................................................133
Reducing False Positives with the Signature Profiler............................................................................133
Signature Profiler and the Rules Engine ...............................................................................................133
Responding to Events and Notifications ...............................................................................................134
Event Categories ..........................................................................................................................134
What do I do when… ....................................................................................................................134
What if I have been hacked? ........................................................................................................135
Security – An Elusive Goal ...........................................................................................................135
Appendix F: Notification Parameters......................................... 137
Notification Parameter Substitution ..............................................................................................137
Available values............................................................................................................................137
Notification: ...................................................................................................................................137
Events:..........................................................................................................................................137
Assets: ..........................................................................................................................................138
ICMP Pings...................................................................................................................................139
TCP Socket Reachability..............................................................................................................139
HTTP Synthetic Transaction.........................................................................................................140
SNMP Data Collection..................................................................................................................140
Additional Notes............................................................................................................................142