Triggers
Create triggers for security rules to correlate incoming security events from network devices. When an incoming security event satisfies a trigger, all security rules using the trigger are evaluated in order of their rank. A security alarm is created based on the first security rule which also matches its optional user/host profile. If no security rules are matched, an alarm is not created. An optional security action will be associated to the alarm and, if selected, will be executed automatically.
Settings
Field |
Definition |
||
---|---|---|---|
Add Filter |
Allows you to select a field from the current view to filter information. Select the field from the drop-down list, and then enter the information you wish to filter. |
||
Update |
Displays the filtered data in the table. |
||
Table columns |
|||
Name |
User defined name for the trigger. The type of event that will activate the rule if the rule is enabled. |
||
Time Limit |
The time span to satisfy all required filters for the trigger to be satisfied. |
||
Filter Match |
The number of filters that must be matched by security events for the trigger to be satisfied. Select Any to set the minimum number of filters that must be matched. Select All to specify that all filters must be matched. |
||
Total Filters |
The number of security filters associated with the security trigger. |
||
Last Modified By |
User name of the last user to modify the security trigger. |
||
Last Modified Date |
Date and time of the last modification to this security trigger. |
||
Right click options |
|||
Delete |
Deletes the selected trigger. |
||
Modify |
Opens the Modify Security Trigger window for the selected trigger. |
||
Show Audit Log |
Opens the admin auditing log showing all changes made to the selected item. For information about the admin auditing log, see Audit Logs.
|
||
Buttons |
|||
Export |
Exports the data displayed to a file in the default downloads location. File types include CSV, Excel, PDF, or RTF. See Export data. |