Working With Attack Objects; Attack Objects In Intrusion Detection And Prevention Security Policies; Overview - Juniper NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING INTRUSION DETECTION PREVENTION DEVICES GUIDE REV 01 Manual

Configuring intrusion detection and prevention devices guide
Hide thumbs Also See for NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING INTRUSION DETECTION PREVENTION DEVICES GUIDE REV 01:
Table of Contents

Advertisement

CHAPTER 5

Working with Attack Objects

Attack Objects in Intrusion Detection and Prevention Security Policies Overview
Related
Documentation

Attack Objects in Intrusion Detection and Prevention Security Policies

Overview on page 63
You use the NSM Object Manager to manage NSM administrative objects, including the
attack objects used in IDP security policies.
For more explanation of attack objects and examples, see the Network and Security
Manager Administration Guide.
For details on how to use NSM Object Manager features to copy objects, find references
to objects, search for unused objects, or configure object versions, see the NSM online
Help.
IDP administration using attack objects can include the following tasks related to attack
objects:
Updating IDP detector engine and the NSM attack database
Viewing predefined attack object definitions
Viewing attack object groups
Creating custom attack objects
Updating predefined IDP attack objects and groups
63

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING INTRUSION DETECTION PREVENTION DEVICES GUIDE REV 01 and is the answer not in the manual?

Questions and answers

Table of Contents