Before You Install the Threat Mitigation Application

Installing the Threat Mitigation Application into an SRC-managed environment requires:

Before you use the Threat Mitigation Application, you typically:

  • Install the transactional database. The Threat Mitigation Application provides a sample schema that includes these tables:
    • ATTACK—Attacks
    • ATTACK_TYPE—Attack types
    • ACTION—Configured actions that the application can execute
    • ATTACK_TYPE_CANDIDATE_ACTION—Candidate actions that can be taken in response to attack types

      The administrator maintains the data in the ATTACK_TYPE, ACTION, and ATTACK_TYPE_CANDIDATE_ACTION tables to ensure that the data defines the relationship between attack types and candidate actions. In cases where attacks do not belong to any defined attack types, the administrator should create a default attack type and the candidate actions for the default attack type.

  • Install the IDP sensors. The sensors monitor network traffic to detect suspicious or anomalous traffic and respond as configured.
  • Install NetScreen-Security Manager to monitor the IDP sensors. The administrator creates the attack types that are reported to the Threat Mitigation Application.