INTOUCH® INSA
Network Security Agent


Begin Index

Contents (summary)
Chapter 1 Product Overview
Chapter 2 Setting Up the INTOUCH INSA Hardware
Chapter 3 Start Up Procedures
Chapter 4 Getting Started Examples
Chapter 5 Using INTOUCH INSA as a Surveillance Tool - Some Scenarios
Chapter 6 Using the INTOUCH INSA Utilities and Desktop Management
Chapter 7 Status Menu Procedures
Chapter 8 Maintenance Menu Procedures
Chapter 9 Security Menu Procedures
Chapter 10 Report Menu Procedures
Chapter 11 General Menu Procedures
Chapter 12 Advanced Menu Procedures
Chapter 13 E-mail Surveillance
Chapter 14 Transport Agents
Chapter 15 User Expectations and Legal Considerations
Chapter 16 Using the INTOUCH INSA Editor
Appendix A Summary of INSA Manager Menus
Appendix B INTOUCH Network Security Agent Features
Appendix C Report Examples
Appendix D Chart Options
Appendix E Answers to Commonly Asked Questions
Appendix F User Notes
  Glossary
  Index
  Examples
  Tables


Contents


Chapter 1
1 Product Overview
     1.1     INTOUCH INSA - Network Security Agent
         1.1.1         Network and System Impact
     1.2     Intrusion Detection
     1.3     Enforcing Computer-Use Policies
         1.3.1         How INTOUCH INSA Does Its Job
         1.3.2         INTOUCH INSA is Inexpensive and Highly Effective
     1.4     About this Manual
Chapter 2
2 Setting Up the INTOUCH INSA Hardware
     2.1     Connecting the External Disk Drive
Chapter 3
3 Start Up Procedures
     3.1     Initialization
     3.2     Logging In
     3.3     INSA Manager
Chapter 4
4 Getting Started Examples
     4.1     The INTOUCH INSA Main Menu
     4.2     Example: Displaying Active Sessions
     4.3     Example: Watching an Active Session
     4.4     Example: Setting Up an Alert
         4.4.1         Defining the Alert
         4.4.2         Adding Alert Information
     4.5     Example: Creating an Alert Incident
     4.6     Example: INTOUCH INSA E-mail Action
     4.7     Example: INTOUCH INSA Flagging the Incident
     4.8     Example: Reports
     4.9     Example: Playing Back a Recorded Session
Chapter 5
5 Using INTOUCH INSA as a Surveillance Tool - Some Scenarios
     5.1     Scenarios and Setting Up the Alerts
         5.1.1         Example 1
         5.1.2         Example 2
         5.1.3         Example 3
     5.2     Summary
Chapter 6
6 Using the INTOUCH INSA Utilities and Desktop Management
     6.1     The INTOUCH INSA Menu
     6.2     Selecting Menu Items
     6.3     Exiting and Backing Up
     6.4     Entering Dates
     6.5     On-line Help System
         6.5.1         Examples
     6.6     Reports
         6.6.1         Report Generation Statistics
         6.6.2         Report Output Options
         6.6.3         Report Display
     6.7     Desktop Management
         6.7.1         Moving a Window
         6.7.2         Window Management Options
         6.7.3         Opening and Closing a DECterm Window
         6.7.4         Online Tutorial
Chapter 7
7 Status Menu Procedures
     7.1     Network Status Option
     7.2     INTOUCH INSA Status Option
     7.3     Security Status Option
Chapter 8
8 Maintenance Menu Procedures
     8.1     INTOUCH INSA Files and Data
     8.2     Alert File Maintenance
         8.2.1         Adding Alert Information
         8.2.2         Changing Alert Information
         8.2.3         Delete Alert Information
         8.2.4         Inquiring On Alert Information
     8.3     Rules Maintenance
         8.3.1         About the Rules File
         8.3.2         Alert Rules and Patterns
         8.3.3         EXCLUDE Rules
         8.3.4         Creating Rule Patterns
     8.4     Maintaining E-mail Distribution Lists
         8.4.1         New List
         8.4.2         Editing E-mail Lists
     8.5     Page File Maintenance
         8.5.1         Adding Page Information
         8.5.2         Changing Page Information
         8.5.3         Delete Page Information
         8.5.4         Inquiring On Page Information
     8.6     Maintaining Page Distribution Lists
         8.6.1         New List
         8.6.2         Editing Page Lists
     8.7     Purge and Archive Records
Chapter 9
9 Security Menu Procedures
     9.1     Sessions Option
         9.1.1         Selecting Sessions
         9.1.2         Selecting Sessions to Review and Watch
     9.2     Playback Option
         9.2.1         Selecting Session Recordings to Play Back
         9.2.2         Playing Back a Recording
     9.3     Archive Playback Option
Chapter 10
10 Report Menu Procedures
     10.1     Incident Reports
     10.2     Alert Reports
     10.3     Recordings Reports
     10.4     Browser Accesses Report
     10.5     URL Accesses Report
     10.6     Active Browsers Report
     10.7     Audit Reports
     10.8     Page Report
     10.9     Top IP Address Report
     10.10     Top IP Connection Report
     10.11     Top Browser Accesses Report
     10.12     Top URL Accesses Report
     10.13     Top URL Connection Report
     10.14     Top E-mail by Count Report
     10.15     Top E-mail by Volume Report
     10.16     Top E-mail Correspondence by Count Report
     10.17     Top E-mail Correspondence by Volume Report
     10.18     Archive Incident Reports
     10.19     Archive Recordings Reports
     10.20     Archive Audit Reports


Previous Next Contents Index