Deleting a user-defined alarm matching policy, Managing security control policies, Viewing the security control policy list – H3C Technologies H3C Intelligent Management Center User Manual
Page 960

946
When the attack location options configured, SCC displays the attack path for the alarm on the
attack topology.
7.
Modify the mappings between alarm variables and action variables in the Action/Alarm Variable
Mapping List:
a.
Click Add Mapping.
The Add Mapping window appears.
b.
Select an action variable from the Action Variable Name list. SCC preloads all action variables
it can identify in the list.
c.
Select an alarm variable from the Alarm Variable Name list. If the alarm does not contain
variables, the list is empty.
d.
Click OK.
The new mapping appears in the Action/Alarm Variable Mapping List.
e.
Repeat the previous steps to add more rules.
f.
To delete one or more mappings, click Delete for the associated mappings.
8.
Click OK.
Deleting a user-defined alarm matching policy
To delete a user-defined alarm matching policy:
1.
Navigate to Alarm > Alarm Matching Policy:
a.
Click the Alarm tab from the tabular navigation system on the top.
b.
Click the Security Control Center on the navigation tree on the left.
c.
Click the Alarm Matching Policy link located under Security Control Center on the navigation
tree on the left.
The Alarm Matching Policy List appears in the main pane of the Security Control Policy page.
2.
Click the Delete icon for the user-defined alarm matching policy you want to delete.
3.
Click OK to confirm deletion of the selected policy.
Managing security control policies
You can proactively manage the response to security threats and attacks using security control policies.
A security control policy combines three key pieces of information: 1) the identification and alarming of
a security attack; 2) an action that can be taken in response to the security attack; and 3) identification
of the portion of the network to be protected by the security control policy. The actions configured for
security control policies can be executed manually or they can be configured to run automatically upon
detection of the security attack.
Viewing the security control policy list
The Security Control Policy List provides you with a list of all configured security control policies in IMC.
From this list, you can view the policy names, descriptions, and execution types for each policy. From this
list, you can also modify and delete security control policies.
To view the Security Control Policy List: