Most ebook files are in PDF format, so you can easily read them using various software such as Foxit Reader or directly on the Google Chrome browser.
Some ebook files are released by publishers in other formats such as .awz, .mobi, .epub, .fb2, etc. You may need to install specific software to read these formats on mobile/PC, such as Calibre.
Please read the tutorial at this link. https://ebooknice.com/page/post?id=faq
We offer FREE conversion to the popular formats you request; however, this may take some time. Therefore, right after payment, please email us, and we will try to provide the service as quickly as possible.
For some exceptional file formats or broken links (if any), please refrain from opening any disputes. Instead, email us first, and we will try to assist within a maximum of 6 hours.
EbookNice Team
Status:
Available0.0
0 reviewsISBN 10: 1587052520
ISBN 13: 9781587052521
Author: Chad Sullivan, Jeff Asher, Paul Mauvais
Protecting systems within an enterprise has proven as important to overall security as securing the enterprise perimeter. Over the past few years, the number of vulnerabilities stemming from weaknesses in applications and operating systems has grown dramatically. In direct correlation with the number of weaknesses discovered, the number of viruses, worms, and security attacks has also exploded across the Internet. To add to the typical virus issues that businesses have had to confront, there are also malicious programs infiltrating organizations today in the form of spyware and adware.
Protecting systems where the private data and intellectual property resides is no longer considered a function of perimeter defense systems but has instead become the domain of endpoint protection software, such as host Intrusion Prevention Systems (IPS). Cisco® Security Agent (CSA) is the Cisco Systems® host-IPS solution. CSA provides the security controls that corporations need to deal with threats to host and desktop computing resources.
Advanced Host Intrusion Prevention with CSA is a practical guide to getting the most out of CSA deployments. Through methodical explanation of advanced CSA features and concepts, this book helps ease the fears of security administrators seeking to install and configure a host IPS. This book explains in detail such topics as installation of the management servers, installation of the agents for mass deployment, granular agent policy creation, advanced policy creation, real-world troubleshooting techniques, and best practices in implementation methodology. This guide also provides a practical installation framework taken from the actual installation and support experience of the authors.
CSA Overview
Malicious Code
Hackers
Legislation
Capabilities
CSA Component Architecture
CSA Hosts and Groups
Policy Implementation
CSA Project Planning and Implementation
Defining Purpose
Understanding the Environment
Important Individuals
Timeline
Pre-Planning
Pilot
Production Implementation
Ongoing Support
Security Policy Document
Change Control Documentation
Quality Assurance
Contacts and Support Escalation
CSA Installation
Implementation Options
CSA MC Server Hardware Requirements
CSA MC Server Installation
Agent Installation Requirements
Agent Installer
Installation Parameters and Examples for SETUP.EXE
CSA Policy
Policy Requirements
Purpose of Policy
Policy Application and Association
Builtin Policy Details
Why Write Custom Policies?
Preparing for the CSA Tuning Process
Best Practices for Tuning
Sample Custom Policies
Using Dynamic Application Classes
Forensics
Monitoring and Troubleshooting
CSA MC Event Database
Automated Filtering from Directed Links
Additional Event Correlation
Common Issues
NOC Troubleshooting Tools
Agent Troubleshooting Tools
SQL Troubleshooting
Cisco TAC
Overview
Gathering Information
Acceptable Use Policy
Security Problems
Inventory
Determine Goals
Determine Scope
Determine Conditions
Create the CSA Base Policy
Deploy Agents in Test Mode
Test Applications and Review Logs
Convert Agents to Protect Mode
Documentation
General Deployment Phase: Test Mode
Deploy Agents and Monitor Progress Against System Inventory
Review Security Policy and Acceptable Use Policies and Build Appropriate Exceptions
Test System Patches in Lab
Upgrading MC
Upgrading Agents
System Warnings
Network Status
Most Active
Event Log Changes
Group Level Changes
Hosts
Host Management Tasks
Rule Modules
Actions
New Set Action
Hosts Search
Rules Search
Agent Diagnostics
Database Maintenance Information
advanced intrusion prevention
host intrusion prevention system
4-1 discussion host-based and network-based firewalls
3-1 lab implement a host-based firewall
10.1.9 implement intrusion prevention with pfsense
zscaler intrusion prevention system
Tags: Chad Sullivan, Jeff Asher, Paul Mauvais, Intrusion, Prevention