Working With Attack Objects; Attack Objects In Intrusion Detection And Prevention Security Policies; Overview - Juniper NETWORK AND SECURITY MANAGER 2010.3 - CONFIGURING INTRUSION DETECTION AND PREVENTION GUIDE REV1 Manual

Configuring intrusion detection and prevention devices guide
Table of Contents

Advertisement

CHAPTER 5

Working with Attack Objects

Copyright © 2010, Juniper Networks, Inc.

Attack Objects in Intrusion Detection and Prevention Security Policies

Overview on page 61
You use the NSM Object Manager to manage NSM administrative objects, including the
attack objects used in IDP security policies.
For more explanation of attack objects and examples, see the Network and Security
Manager Administration Guide.
For details on how to use NSM Object Manager features to copy objects, find references
to objects, search for unused objects, or configure object versions, see the NSM online
Help.
IDP administration using attack objects can include the following tasks related to attack
objects:
Updating IDP detector engine and the NSM attack database
Viewing predefined attack object definitions
Viewing attack object groups
Updating predefined IDP attack objects and groups
61

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager 2010.3

Table of Contents