Specifications
Buttons
Create (Group)
Opens the Create Search Scope Group window where you can create groups of devices that will be
searched when Dragon notifies ASM of a threat.
Edit (Group)
Select a Search Scope in the table and click Edit to open the Edit Search Scope Group window where
you can edit the set of devices included.
in the group.
Move Up/Move Down
Search Scope Rules are evaluated from top to bottom in the order in which they appear in the table.
These buttons let you arrange the order by selecting a particular rule and clicking the Move Up or
Move Down button to move it to the desired position.
Create (Rule)
Opens the Create Search Scope Rule window that lets you create rules that determine which search
scope will be used when a specific threat arrives.
Edit (Rule)
Select a Search Scope Rule in the table and click Edit to open the Edit Search Scope Rule window
where you can edit the conditions of that rule.
Remove
Deletes one or more rows selected from the associated table.
Continue
Confirms the defined Search Scopes and Search Scope Rules and takes you to the Exclude Port
Types view.
Exclude Port Types
This view lets you exclude specific ports from threat management actions based on port type. This allows you
to safeguard critical port types. Several check boxes list the port types available from the devices that are
targeted for ASM actions. A check for a particular port type excludes that port type from threat management
actions. Link Aggregation, CDP, Backplane, and Host Data ports are always excluded, by default.
Click areas in the window for more information.
Automated Security Manager Help
Exclude Port Types 116