|
|
Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [Z] parent processes passwords, OTPs pattern detection pattern matching, regular expressions pattern-based security policies PCs, zombies peer-to-peer networks permissive systems persistence process application execution file modification system configuration personal firewalls phases of deployment for CSA conducting pilot tests finalizing the project full deployment implementing management predeployment planning selection and classification of target hosts tuning understanding the product for IPS finalizing the project predeployment planning 2nd sensor deployment tuning understanding the product pilot test, conducting 2nd placing IPS sensors in network policy groups configuring secondary groups port security PortMapper predeployment planning phase of IPS deployment processing capacity as sensor selection criteria promiscuous mode sensor operation 2nd capturing network traffic protocol decodes 2nd Pull model (management console) Push model (management console) |
|
|