Using CSA Analysis

Generating Application Deployment Reports

© 2006 Cisco Systems, Inc. All rights reserved.

HIPS v3.0—6-1

Objectives
At the end of this lesson, you will be able to meet these objectives:
• Identify the various types of application deployment reports • Describe how to generate an Antivirus Installations report • Describe how to generate an Installed Products report • Describe how to generate an Unprotected Hosts report • Describe how to generate an Unprotected Products report • Describe how to generate a Product Usage report • Describe how to generate a Network Data Flows report • Describe how to generate a Network Server Applications report

© 2006 Cisco Systems, Inc. All rights reserved.

HIPS v3.0—6-2

Application Deployment Reports

Norton AntiVirus 2003

Norton AntiVirus 2004

Application Deployment Report
Norton AntiVirus 2006

CSA MC

© 2006 Cisco Systems, Inc. All rights reserved.

HIPS v3.0—6-3

Generating an Antivirus Installations Report

© 2006 Cisco Systems, Inc. All rights reserved.

HIPS v3.0—6-4

Generating an Antivirus Installations Report (Cont.)

© 2006 Cisco Systems, Inc. All rights reserved.

HIPS v3.0—6-5

Antivirus Installations Report

© 2006 Cisco Systems, Inc. All rights reserved.

HIPS v3.0—6-6

Generating an Installed Products Report

© 2006 Cisco Systems, Inc. All rights reserved.

HIPS v3.0—6-7

Generating an Installed Products Report (Cont.)

© 2006 Cisco Systems, Inc. All rights reserved.

HIPS v3.0—6-8

Installed Products Report

© 2006 Cisco Systems, Inc. All rights reserved.

HIPS v3.0—6-9

Practice: Generating an Installed Products Report

© 2006 Cisco Systems, Inc. All rights reserved.

HIPS v3.0—6-10

Generating an Unprotected Hosts Report

© 2006 Cisco Systems, Inc. All rights reserved.

HIPS v3.0—6-11

Generating an Unprotected Hosts Report (Cont.)

© 2006 Cisco Systems, Inc. All rights reserved.

HIPS v3.0—6-12

Unprotected Hosts Report

© 2006 Cisco Systems, Inc. All rights reserved.

HIPS v3.0—6-13

Generating an Unprotected Products Report

© 2006 Cisco Systems, Inc. All rights reserved.

HIPS v3.0—6-14

Generating an Unprotected Products Report (Cont.)

© 2006 Cisco Systems, Inc. All rights reserved.

HIPS v3.0—6-15

Unprotected Products Report

© 2006 Cisco Systems, Inc. All rights reserved.

HIPS v3.0—6-16

Generating a Product Usage Report

© 2006 Cisco Systems, Inc. All rights reserved.

HIPS v3.0—6-17

Generating a Product Usage Report (Cont.)

© 2006 Cisco Systems, Inc. All rights reserved.

HIPS v3.0—6-18

Product Usage Report

© 2006 Cisco Systems, Inc. All rights reserved.

HIPS v3.0—6-19

Generating an Network Data Flows Report

© 2006 Cisco Systems, Inc. All rights reserved.

HIPS v3.0—6-20

Generating a Network Data Flows Report (Cont.)

© 2006 Cisco Systems, Inc. All rights reserved.

HIPS v3.0—6-21

Generating a Network Data Flows Report (Cont.)

© 2006 Cisco Systems, Inc. All rights reserved.

HIPS v3.0—6-22

Network Data Flows Report

© 2006 Cisco Systems, Inc. All rights reserved.

HIPS v3.0—6-23

Generating a Network Server Applications Report

© 2006 Cisco Systems, Inc. All rights reserved.

HIPS v3.0—6-24

Generating a Network Server Applications Report (Cont.)

© 2006 Cisco Systems, Inc. All rights reserved.

HIPS v3.0—6-25

Network Server Applications Report

© 2006 Cisco Systems, Inc. All rights reserved.

HIPS v3.0—6-26

Summary
• Application Deployment reports can be used to monitor the applications used by the various hosts and groups in a network. These reports summarize the data gathered during the Application Deployment Investigation process. • An Antivirus Installations report can be used to view the software version and the signature version information for detected Norton and McAfee Antivirus installations. • An Installed Product report can be used to view the list of products categorized based on whether they are installed or not installed on designated hosts. • An Unprotected Hosts report can be used to view hosts which are being used in network connections, and not protected by CSA. • An Unprotected Products report can be used to view hosts that have products installed which do not have associated CSA policies. • A Products Usage report can be used to view the number of systems on which installed products are used or not used. • A Network Data Flows report can be used to constrain communication between a host and the hosts to which it talks. • A Network Server Applications report can be used to view information about network server application activity on a given set of hosts.

© 2006 Cisco Systems, Inc. All rights reserved.

HIPS v3.0—6-27

© 2006 Cisco Systems, Inc. All rights reserved.

HIPS v3.0—6-28

Sign up to vote on this title
UsefulNot useful