Arcsight Correlation PDF
Arcsight Correlation PDF
Arcsight Correlation PDF
Benefits
Embedded Correlation
data that has been collected via the SmartAgents deployed through-
and attacks that are typical in large, diverse networks and are organ-
out the network. Because the collected data is normalized into a com-
including:
Geography
Device type
Source
Target
Time thresholds
Event type
SmartRules define which events generate an alert, when those events
generate an alert, and what actions are associated with the alert.
Hence each SmartRule contains event conditions, thresholds, and
actions. When incoming events match rule conditions and thresholds,
the ArcSight SmartRule automatically fires the action that has been
defined. Actions can include:
Reconnaissance
Suspicion
Attack
Compromise
is preserved. Rule Categories also enable ArcSight to initiate correlation as soon as installation is complete.
RULE FIRES
FAILED LOGIN FROM SNORT IDS
existing rules. The ArcSight Rules Language uses simple logic opera-
If(an ids evasion attack) occurs (from the same source ip address) (3
Contact Information
Email: securitysolutions@arcsight.com