Working Hours
Working Hours are used to detect unauthorized attempts to access protected systems and other forbidden operations after-hours. To set the Regular Working Hours for an event Record of a security or network incident that is based on one or more logs, and on a customizable set of rules that are defined in the Event Policy., select a Time Object that you have configured from the drop-down list.
To create a Time Object:
-
From the Policy tab, select General Settings Objects > Time Objects.
-
Click Add.
-
Enter a Name and Description.
-
Select the days and times that are considered Regular Working Hours.
-
Click OK.
To assign a Time Object to an event:
-
From the Policy tab, select an event that requires a Time Object (for example, User Login at irregular hours in the Unauthorized Entry event category).
-
Select the Time Object you created from the drop-down list.
-
Select File > Save.