This document provides guidance on using the alarm, risk management, database assessment, and security policy features of SecureSphere. It includes sections on understanding the alarm details window, configuring alarm notifications, acknowledging alarms, and adding notes to alarms. Other sections cover the risk management process, CVSS risk scoring, configuring database assessment policies, running database scans, and analyzing results. The document also introduces security policies and their uses for multi-level protection through correlation policies and intrusion prevention in signature policies.
This document provides guidance on using the alarm, risk management, database assessment, and security policy features of SecureSphere. It includes sections on understanding the alarm details window, configuring alarm notifications, acknowledging alarms, and adding notes to alarms. Other sections cover the risk management process, CVSS risk scoring, configuring database assessment policies, running database scans, and analyzing results. The document also introduces security policies and their uses for multi-level protection through correlation policies and intrusion prevention in signature policies.
This document provides guidance on using the alarm, risk management, database assessment, and security policy features of SecureSphere. It includes sections on understanding the alarm details window, configuring alarm notifications, acknowledging alarms, and adding notes to alarms. Other sections cover the risk management process, CVSS risk scoring, configuring database assessment policies, running database scans, and analyzing results. The document also introduces security policies and their uses for multi-level protection through correlation policies and intrusion prevention in signature policies.