In This Section: |
Once you have arranged the events as you like in the Event Log, you can begin to investigate their details and evaluate whether they represent a threat.
Events can be categorized and assigned to administrators to track their path through the workflow of resolving threats. Once administrators review an event, they can assign it a status, such as Investigation in Progress, Resolved, or False Alarm; add comments that detail the actions that have been taken with respect to the event; and assign an administrator as the owner of the event. This process is called Ticketing.
After editing the ticket, administrators can use queries to track the actions taken to mitigate security threats and produce statistics based on those actions.
When you review events generated from the IPS blade, review the IPS protections and profiles to understand why an event was generated or attempt to change the way the traffic is handled by the IPS blade.
The IPS menu presents actions that are specific to IPS events. These actions include:
To see log entries for an event, right-click the event and select Additional Information > View Event Raw Logs. SmartView Tracker displays the log entries that comprise the event.
Note - If the log data for a certain event exceeds 100Kb, the data is discarded. |
If any logs have related packet captures, you can open a packet viewer to see the contents of the captured packet. You can also save the packet capture to a file for further investigation.
To use the Packet Capture feature, you must activate these blades and plug-ins:
To view a packet capture:
You can select Actions > Packet Capture Configuration to define an application in which to view packet capture information. The options are:
The SmartEvent client provides a convenient way to run common command line executables that can assist you in investigating events. By right-clicking on cells in the Event Log that refer to an IP address, the default list of commands appears in the context-sensitive menu.
The following commands are available by default: ping, whois, nslookup and Telnet. They appear by design only on cells that refer to IP addresses, because the IP address of the active cell is used as the destination of the command when run.
For example, if you right-click a cell containing an IP address and select the default ping command, a window opens and three ICMP packets are sent to that address. This behavior is configurable, and other commands can be added as well. To add your own custom commands, see Configuring Custom Commands.