beautypg.com

Configuring custom events, Configuration guide, Table 151 – H3C Technologies H3C SecCenter UTM Manager User Manual

Page 179

background image

171

Table 151 Query option

Option Description

Virus Type

Select a virus type to query the corresponding viruses.

Details

Click the

icon to view the virus category detailed information, including virus

type, page, policy name, and the segment to which the policy applies. See

Figure

163

.

Figure 163 Virus category information

Configuring custom events

Massive security events occur on the network. It is helpful if network administrators are aware of the

critical network events in time. The custom event analysis function is thus introduced. With this function,

administrators custom an analysis policy by defining sources of the event data, event type, event name,

source IP/port of attacks, destination IP/port of attacks, and protocols. The event analysis engine then

correlates and analyzes the massive event data against analysis policies. If matching a policy, an event
is recorded and an alarm is triggered.
Event analysis engine adopts the correlation technique to correlate original events of different

characteristics and generate one event record for multiple repeated events in a specific period. The

correlation analysis greatly reduces amount of event records.
A custom event is an analysis policy that contains one or more rules. Before you get started with the

custom event analysis function, the following describes concepts that are involved:

Policy: A policy contains one or more rules. If all rules of a policy are matched during a time period

(association interval in the policy), an alarm is triggered (a custom event is recorded).

Rule: A rule contains on or more filters. If all filters of a rule are matched, the rule is considered to

be matched. A time period and a threshold of repeated matches can also be set for a rule.

Event: An original security event that the event analysis engine receives and processes.

Filter: Match criteria for different fields in an event, that is, the configuration items in a rule.

Configuration guide

From the navigation tree of the IPS management component, select Custom Events under Policy
Management to enter the custom event management page, as shown in

Figure 164

. You can configure

a custom event analysis policy. When attack or virus events match the policy, an alarm is triggered.
The custom event management page shows a list of custom events (analysis policies), displaying

information about the custom event name, level, notification method, number of unacknowledged events,

time when last alarm is triggered, and the status of the policy. The page also allows you to add new

custom events, delete, modify, export, and import custom events, edit the notification method of custom
events, enable or disable custom events, authorize operators, and remove authorization.

Table 152

describes the custom event management functions.