© 2006 Cisco Systems, Inc. All rights reserved. HIPS v3.06-1 Using CSA Analysis Generating Application Deployment Reports.

Презентация:



Advertisements
Похожие презентации
© 2006 Cisco Systems, Inc. All rights reserved. HIPS v Using CSA Analysis Configuring Application Deployment Investigation.
Advertisements

© 2006 Cisco Systems, Inc. All rights reserved. HIPS v Using CSA Analysis.
© 2006 Cisco Systems, Inc. All rights reserved. HIPS v Administering Events and Generating Reports Generating Reports.
© 2006 Cisco Systems, Inc. All rights reserved. HIPS v Using CSA Analysis Configuring Application Behavior Investigation.
© 2006 Cisco Systems, Inc. All rights reserved. HIPS v Administering Events and Generating Reports Managing Events.
© 2006 Cisco Systems, Inc. All rights reserved. HIPS v Configuring Groups and Policies Managing Hosts and Deploying Software Updates.
© 2006 Cisco Systems, Inc. All rights reserved. HIPS v Using CSA Analysis Generating Behavior Analysis Reports.
© 2006 Cisco Systems, Inc. All rights reserved. HIPS v Configuring Rules Configuring Rules Common to Windows and UNIX.
© 2006 Cisco Systems, Inc. All rights reserved. HIPS v Configuring Rules Configuring Windows-Only Rules.
© 2006 Cisco Systems, Inc. All rights reserved. HIPS v Configuring CSA.
© 2006 Cisco Systems, Inc. All rights reserved. HIPS v Configuring Groups and Policies Configuring Policies.
© 2006 Cisco Systems, Inc. All rights reserved. HIPS v Configuring Rules Configuring System Correlation Rules.
© 2006 Cisco Systems, Inc. All rights reserved. HIPS v Module Summary Application Deployment Investigation is a data collection and behavior analysis.
© 2006 Cisco Systems, Inc. All rights reserved. HIPS v Configuring Groups and Policies Building an Agent Kit.
© 2006 Cisco Systems, Inc. All rights reserved. HIPS v Configuring Rules Configuring UNIX-Only Rules.
© 2006 Cisco Systems, Inc. All rights reserved. HIPS v Configuring Groups and Polices Configuring Groups.
© 2006 Cisco Systems, Inc. All rights reserved. HIPS v Configuring CSA Installing and Configuring CSA MC.
© 2006 Cisco Systems, Inc. All rights reserved. HIPS v Configuring Rules Rule Basics.
© 2006 Cisco Systems, Inc. All rights reserved. HIPS v Administering Events and Generating Reports.
© 2006 Cisco Systems, Inc. All rights reserved. HIPS v Module Summary Event Management is an important component of network administration that deals.
Транксрипт:

© 2006 Cisco Systems, Inc. All rights reserved. HIPS v Using CSA Analysis Generating Application Deployment Reports

© 2006 Cisco Systems, Inc. All rights reserved. HIPS v Objectives At the end of this lesson, you will be able to meet these objectives: Identify the various types of application deployment reports Describe how to generate an Antivirus Installations report Describe how to generate an Installed Products report Describe how to generate an Unprotected Hosts report Describe how to generate an Unprotected Products report Describe how to generate a Product Usage report Describe how to generate a Network Data Flows report Describe how to generate a Network Server Applications report

© 2006 Cisco Systems, Inc. All rights reserved. HIPS v Application Deployment Report CSA MC Norton AntiVirus 2003 Norton AntiVirus 2004 Norton AntiVirus 2006 Application Deployment Reports

© 2006 Cisco Systems, Inc. All rights reserved. HIPS v Generating an Antivirus Installations Report

© 2006 Cisco Systems, Inc. All rights reserved. HIPS v Generating an Antivirus Installations Report (Cont.)

© 2006 Cisco Systems, Inc. All rights reserved. HIPS v Antivirus Installations Report

© 2006 Cisco Systems, Inc. All rights reserved. HIPS v Generating an Installed Products Report

© 2006 Cisco Systems, Inc. All rights reserved. HIPS v Generating an Installed Products Report (Cont.)

© 2006 Cisco Systems, Inc. All rights reserved. HIPS v Installed Products Report

© 2006 Cisco Systems, Inc. All rights reserved. HIPS v Practice: Generating an Installed Products Report

© 2006 Cisco Systems, Inc. All rights reserved. HIPS v Generating an Unprotected Hosts Report

© 2006 Cisco Systems, Inc. All rights reserved. HIPS v Generating an Unprotected Hosts Report (Cont.)

© 2006 Cisco Systems, Inc. All rights reserved. HIPS v Unprotected Hosts Report

© 2006 Cisco Systems, Inc. All rights reserved. HIPS v Generating an Unprotected Products Report

© 2006 Cisco Systems, Inc. All rights reserved. HIPS v Generating an Unprotected Products Report (Cont.)

© 2006 Cisco Systems, Inc. All rights reserved. HIPS v Unprotected Products Report

© 2006 Cisco Systems, Inc. All rights reserved. HIPS v Generating a Product Usage Report

© 2006 Cisco Systems, Inc. All rights reserved. HIPS v Generating a Product Usage Report (Cont.)

© 2006 Cisco Systems, Inc. All rights reserved. HIPS v Product Usage Report

© 2006 Cisco Systems, Inc. All rights reserved. HIPS v Generating an Network Data Flows Report

© 2006 Cisco Systems, Inc. All rights reserved. HIPS v Generating a Network Data Flows Report (Cont.)

© 2006 Cisco Systems, Inc. All rights reserved. HIPS v Generating a Network Data Flows Report (Cont.)

© 2006 Cisco Systems, Inc. All rights reserved. HIPS v Network Data Flows Report

© 2006 Cisco Systems, Inc. All rights reserved. HIPS v Generating a Network Server Applications Report

© 2006 Cisco Systems, Inc. All rights reserved. HIPS v Generating a Network Server Applications Report (Cont.)

© 2006 Cisco Systems, Inc. All rights reserved. HIPS v Network Server Applications Report

© 2006 Cisco Systems, Inc. All rights reserved. HIPS v Summary Application Deployment reports can be used to monitor the applications used by the various hosts and groups in a network. These reports summarize the data gathered during the Application Deployment Investigation process. An Antivirus Installations report can be used to view the software version and the signature version information for detected Norton and McAfee Antivirus installations. An Installed Product report can be used to view the list of products categorized based on whether they are installed or not installed on designated hosts. An Unprotected Hosts report can be used to view hosts which are being used in network connections, and not protected by CSA. An Unprotected Products report can be used to view hosts that have products installed which do not have associated CSA policies. A Products Usage report can be used to view the number of systems on which installed products are used or not used. A Network Data Flows report can be used to constrain communication between a host and the hosts to which it talks. A Network Server Applications report can be used to view information about network server application activity on a given set of hosts.

© 2006 Cisco Systems, Inc. All rights reserved. HIPS v