Network Security Platform v6.0 Page 8
700-2360F00
Release Notes
For details, see IPS Configuration Guide.
Support for Import of NAC Exclusion List from a File
With this release, you can add items like IP addresses, IPv4 networks, MAC addresses, OUIs, and Network Objects to
the NAC Exclusion List. If you have a long list of heterogeneous items to add to the NAC Exclusions List, consider using
a CSV file. For example, consider having to add some 100 IPv6 addresses, 100 MACs, 10 OUIs, and 200 IPv4
addresses one by one to the NAC Exclusion List. Instead, you can store them all as comma-separated values in a CSV
file and import them into the Manager. The successfully imported items are appended to the current NAC Exclusion List.
You can import the CSV file using the NAC Exclusions page in the NAC Configuration Wizard or the IPS Quarantine
Wizard.
For details, see NAC Configuration Guide.
Automatic Custom Role Synchronization between an MDR pair
From this 5.1 release, custom role synchronization is performed automatically between an MDR pair. Custom roles
created on the Primary Manager are automatically copied onto the Secondary Manager.
If you have a Central Manager setup, then custom role synchronization between the Central Manager and the Manager
also happens automatically.
For details, see Administrative Domain Configuration Guide.
Alert Synchronization between an MDR pair
When the Sensor detects a transmission that is violating the security policy of the network, it generates a data on such
transmission. This data or 'alert' is sent to the Manager, which in turn is acknowledged for storage or marked for deletion.
The actions that are triggered on these alerts from the active Manager are synchronized with the standby Manager in
real time. This ensures minimal loss of data if the active Manager goes down.
For details, see Manager Server Configuration Guide.
Renaming of Threat Analyzer UI Components
Earlier you could launch the Threat Analyzer from the Homepage by making your selection from a drop-down list and
clicking the Launch button. With this release, the Home page UI has been enhanced to include two new menu items:
Real-time Threats – click to open Real-time Threat Analyzer
Historical Threats – click to open Historical Threat Analyzer
In Threat Analyzer, the following views have been renamed:
Previous terminology New terminology
Summary Dashboards
General NSP Health
For details, see System Status Monitoring Guide.
Viewing URL information for exploit alerts
When you receive an exploit alert in the Threat Analyzer, you can right-click to view the alert details. With this release,
the details of an alert also include the target URL for server targeted attacks. The URL is displayed only for http alerts.
For any non-http request, a blank area (----) will appear in the text area.
Note: Display of URL is disabled by default. Refer KB69333 for enabling this option.
Comments to this Manuals