Chapter 17. Enterprise IDS Monitoring and Reporting

Upon completion of this chapter, you will be able to perform the following tasks:

  • Identify the server requirements for the Monitoring Center for Security (Security Monitor)

  • Identify the client requirements for the Security Monitor

  • Identify the major sections of the Security Monitor user interface

  • Monitor alarms using the Security Monitor Event Viewer

  • Manipulate the Security Monitor Event Viewer display

  • Configure the Security Monitor Event Viewer preferences

  • Administer the Security Monitor

  • Graph alarm information using the Security Monitor Event Viewer

  • Generate reports using the Security Monitor

When deploying a large number of Cisco IDS sensors, you need an efficient way by which to monitor the alerts ...

Get CCSP Self-Study: Cisco Secure Intrusion Detection System (CSIDS) now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.