Attack Objects in Intrusion Detection and Prevention Security Policies Overview

You use the NSM Object Manager to manage NSM administrative objects, including the attack objects used in IDP security policies.

For more explanation of attack objects and examples, see the Network and Security Manager Administration Guide.

For details on how to use NSM Object Manager features to copy objects, find references to objects, search for unused objects, or configure object versions, see the NSM online Help.

IDP administration using attack objects can include the following tasks related to attack objects:

Related Documentation