- 积分
- 147
- 鸿鹄币
- 个
- 好评度
- 点
- 精华
- 最后登录
- 1970-1-1
- 阅读权限
- 20
- 听众
- 收听
助理工程师
 
|
发表于 2016-6-2 16:39:13
|
显示全部楼层
第七十题 K2 o7 I1 H5 s2 D6 |
有些疑问
5 Y: P/ C3 F/ ~( B! h9 U4 p+ \2 S$ p% j2 D& ?
1. Add the anomaly detection policy to your virtual sensors.# k; a$ m) t b$ X y
You can use the default anomaly detection policy, ad0, or you can configure a new one.1 p0 b! H$ T9 ~8 ?( V5 O* u7 r$ z
2. Configure the anomaly detection zones and protocols.
5 e1 k, }8 Q9 `* j1 M: F3. By default, the anomaly detection operational mode is set to Detect, although for the first 24 hours
! p6 S/ O5 U) m7 z: mit performs learning to create a populated KB. The initial KB is empty and during the default 248 A8 z9 Y( c2 A$ L
hours, anomaly detection collects data to use to populate the KB. If you want the learning period to
( l$ M8 q4 r9 |* Q: Hbe longer than the default period of 24 hours, you must manually set the mode to Learning Accept.0 C( V5 U( ^, [+ s2 J2 b
4. Let the sensor run in learning accept mode for at least 24 hours (the default).5 z& }! F0 ~. R+ L
You should let the sensor run in learning accept mode for at least 24 hours so it can gather+ Y( `# {/ k( @" I# v
information on the normal state of the network for the initial KB. However, you should change the3 z ^4 b; R) s) t+ c
amount of time for learning accept mode according to the complexity of your network.
: b* }0 u! v; ~9 N* Z9 N# z5 J5. If you manually set anomaly detection to learning accept mode, switch back to detect mode.
5 v9 c4 G& \# N1 C, x6. Configure the anomaly detection parameters:" a- w* {, p' N! e$ J5 v; K" Y/ Q9 o* s
• Configure the worm timeout and which source and destination IP addresses should be bypassed
u, d" b' ~5 Bby anomaly detection.
6 g- y0 h0 Q) z2 _/ wAfter this timeout, the scanner threshold returns to the configured value.6 K& |/ ]4 A( C1 q. s
• Decide whether you want to enable automatic KB updates when anomaly detection is in detect5 m/ @+ E, |* ~4 a
mode.
$ ]) U: y: ] p( d• Configure the 18 anomaly detection worm signatures to have more event actions than just the
, N6 l) V5 r1 M7 N4 d/ `6 x0 {0 Kdefault Produce Alert. For example, configure them to have Deny Attacker event actions.
8 L1 _* b/ B" J2 x |
-
5#
2016-6-2 16:39:13
回复(0)
收起回复
|