The attack alarm management function allows you to query alarm information, and allows a series of operations to be performed for the attack alarms to eliminate the network threats.
The links of the operations are provided on both the Realtime Attack Alarm page and the Browse Attack Alarm page. You can access the links by doing either of the following:
A security control policy can be executed automatically or manually. If the alarms match a policy that can be executed automatically, the system automatically executes the actions in the policy. |
A security control policy can be executed automatically or manually. If the alarms match a policy that needs to be executed manually, you need to manually execute the policy. Operation Procedure
|
If an alarm does not match any security control policy, you can specify some actions and execute them manually. Operation Procedure
|
After the policies matched by alarms are executed, or you execute the actions for alarms matching no policy, you can view the execution results. Click the Executed link of an alarm to enter the result report page. The page displays the following information:
Precautions
|
Some of the actions can be recovered after being executed. Operation Procedure
Precautions
|
This function is used to delete attack alarms that are not concerned. Operation Procedure
|
The RESTful action uses a third-party API to implement specific functions. In Intelligent Policy Center, configure a policy to associate the Execute RESTful Action option with a periodic event. Then, the system periodically calls the third-party API according to the RESTful action configuration. Use the following configuration to test the RESTful action: |
||||||||||||
|
||||||||||||
Structure of Request and Response Messages |
||||||||||||
|
The system provides the following parameters that can be used directly in the Jython script. A parameter value is empty when it does not exist.
The system also provides the jythonErrorMsg parameter that returns execution failure information to the system. You can customize the execution failure information. |