Viewing Predefined Idp Attacks; Viewing Predefined Idp Attack Groups - Juniper NETWORK AND SECURITY MANAGER 2010.2 - ADMINISTRATION GUIDE REV1 Administration Manual

Table of Contents

Advertisement

Viewing Predefined IDP Attacks

Viewing Predefined IDP Attack Groups

Copyright © 2010, Juniper Networks, Inc.
Juniper Networks updates the predefined attack objects and groups on a regular basis
with newly-discovered attack patterns.
The Predefined Attacks tab displays all attacks in a table format and includes the
following information:
Name of the attack object
Severity of the attack: critical, major, minor, warning, info
Category. You can view the IP version of predefined IDP attack objects.
Keywords for the attack
CVE number which identifies the attack's number in the Common Vulnerabilities and
Exposures database
Bugtraq number which identifies the equivalent attack in the Security Focus Bugtraq
database
By default, attack objects are listed alphabetically by Category name. To view attacks
in a different order, click a column heading. To display a detailed description of an attack
object, double-click the attack.
To view attack object details, right-click the attack object and select View to display the
attack viewer.
The Predefined Attack Group tab displays the following predefined attack groups:
All — a list of all attack objects, organized in the categories described below.
Recommended — a list of all attack object objects that Juniper Networks considers to
be serious threats, organized into categories.
Attack Type groups attack objects by type (anomaly or signature). Within each type,
attack objects are grouped by severity.
Category groups attack objects by predefined categories. You can view the IP version
of predefined IDP attack groups. Within each category, attack objects are grouped by
severity.
Operating System groups attack objects by the operating system to which they apply:
BSD, Linux, Solaris, or Windows. Within each operating system, attack objects are
grouped by services and severity.
Severity groups attack objects by the severity assigned to the attack. IDP has five
severity levels: Info, Warning, Minor, Major, Critical. Within each severity, attack objects
are grouped by category.
To locate all rules that use a predefined attack object group, right-click the attack object
group and select View Usages.
Chapter 8: Configuring Objects
339

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager 2010.2

Table of Contents