Скачать презентацию
Идет загрузка презентации. Пожалуйста, подождите
Презентация была опубликована 10 лет назад пользователемКонстантин Рамзаев
1 © 2006 Cisco Systems, Inc. All rights reserved. HIPS v Using CSA Analysis Generating Application Deployment Reports
2 © 2006 Cisco Systems, Inc. All rights reserved. HIPS v Objectives At the end of this lesson, you will be able to meet these objectives: Identify the various types of application deployment reports Describe how to generate an Antivirus Installations report Describe how to generate an Installed Products report Describe how to generate an Unprotected Hosts report Describe how to generate an Unprotected Products report Describe how to generate a Product Usage report Describe how to generate a Network Data Flows report Describe how to generate a Network Server Applications report
3 © 2006 Cisco Systems, Inc. All rights reserved. HIPS v Application Deployment Report CSA MC Norton AntiVirus 2003 Norton AntiVirus 2004 Norton AntiVirus 2006 Application Deployment Reports
4 © 2006 Cisco Systems, Inc. All rights reserved. HIPS v Generating an Antivirus Installations Report
5 © 2006 Cisco Systems, Inc. All rights reserved. HIPS v Generating an Antivirus Installations Report (Cont.)
6 © 2006 Cisco Systems, Inc. All rights reserved. HIPS v Antivirus Installations Report
7 © 2006 Cisco Systems, Inc. All rights reserved. HIPS v Generating an Installed Products Report
8 © 2006 Cisco Systems, Inc. All rights reserved. HIPS v Generating an Installed Products Report (Cont.)
9 © 2006 Cisco Systems, Inc. All rights reserved. HIPS v Installed Products Report
10 © 2006 Cisco Systems, Inc. All rights reserved. HIPS v Practice: Generating an Installed Products Report
11 © 2006 Cisco Systems, Inc. All rights reserved. HIPS v Generating an Unprotected Hosts Report
12 © 2006 Cisco Systems, Inc. All rights reserved. HIPS v Generating an Unprotected Hosts Report (Cont.)
13 © 2006 Cisco Systems, Inc. All rights reserved. HIPS v Unprotected Hosts Report
14 © 2006 Cisco Systems, Inc. All rights reserved. HIPS v Generating an Unprotected Products Report
15 © 2006 Cisco Systems, Inc. All rights reserved. HIPS v Generating an Unprotected Products Report (Cont.)
16 © 2006 Cisco Systems, Inc. All rights reserved. HIPS v Unprotected Products Report
17 © 2006 Cisco Systems, Inc. All rights reserved. HIPS v Generating a Product Usage Report
18 © 2006 Cisco Systems, Inc. All rights reserved. HIPS v Generating a Product Usage Report (Cont.)
19 © 2006 Cisco Systems, Inc. All rights reserved. HIPS v Product Usage Report
20 © 2006 Cisco Systems, Inc. All rights reserved. HIPS v Generating an Network Data Flows Report
21 © 2006 Cisco Systems, Inc. All rights reserved. HIPS v Generating a Network Data Flows Report (Cont.)
22 © 2006 Cisco Systems, Inc. All rights reserved. HIPS v Generating a Network Data Flows Report (Cont.)
23 © 2006 Cisco Systems, Inc. All rights reserved. HIPS v Network Data Flows Report
24 © 2006 Cisco Systems, Inc. All rights reserved. HIPS v Generating a Network Server Applications Report
25 © 2006 Cisco Systems, Inc. All rights reserved. HIPS v Generating a Network Server Applications Report (Cont.)
26 © 2006 Cisco Systems, Inc. All rights reserved. HIPS v Network Server Applications Report
27 © 2006 Cisco Systems, Inc. All rights reserved. HIPS v Summary Application Deployment reports can be used to monitor the applications used by the various hosts and groups in a network. These reports summarize the data gathered during the Application Deployment Investigation process. An Antivirus Installations report can be used to view the software version and the signature version information for detected Norton and McAfee Antivirus installations. An Installed Product report can be used to view the list of products categorized based on whether they are installed or not installed on designated hosts. An Unprotected Hosts report can be used to view hosts which are being used in network connections, and not protected by CSA. An Unprotected Products report can be used to view hosts that have products installed which do not have associated CSA policies. A Products Usage report can be used to view the number of systems on which installed products are used or not used. A Network Data Flows report can be used to constrain communication between a host and the hosts to which it talks. A Network Server Applications report can be used to view information about network server application activity on a given set of hosts.
28 © 2006 Cisco Systems, Inc. All rights reserved. HIPS v
Еще похожие презентации в нашем архиве:
© 2024 MyShared Inc.
All rights reserved.