Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

 

About the Signature Database Page

 

To access this page, select Administration > Signature Database.

Use the Signature Database page to install the active signature database, which contains intrusion prevention system (IPS) and application signatures, on one or more devices. The signature database contains definitions of attacks and application, which are used in defining IPS profile rules and application firewall rules. These attack objects and groups are designed to detect known attack patterns and protocol anomalies within the network traffic.

Tasks You Can Perform

You can perform the following task from this page:

  • Install signatures on one or more devices. See Installing Signatures.

  • Show or hide columns—Click the Show Hide Columns icon at the top right corner of the page and select the columns that you want displayed on the Signature Database page.

Field Descriptions

Table 1 describes the fields on this page.

Table 1: Fields on the Signature Database Page

Field

Description

Active Database

Database Version

Version of signature database.

Publish Date

Date and time (YYYY-MM-DD HH:MM:SS 24-hour format) when the signature database was published.

Installed Device Count

Number of devices on which the signature database was successfully installed.

Detectors

Version numbers of the detector engines associated with the signature database.

Click the detector-versions link to view the detector details. The Detector Details for Signature-Database-Version page appears displaying (in a table) the platform, OS version, and version of the detectors for the signature database. Click Close to return to the Signature Database page.

Action

Click the Install on device link to install the signatures on one or more devices.

The Install Signatures page appears. See Installing Signatures.

Note: This field appears only for users with the Tenant Administrator role.

Related Documentation