Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

Guide That Contains This Content
[+] Expand All
[-] Collapse All

    Attack Objects in Intrusion Detection and Prevention Security Policies Overview

    You use the NSM Object Manager to manage NSM administrative objects, including the attack objects used in IDP security policies.

    For more explanation of attack objects and examples, see the Network and Security Manager Administration Guide.

    For details on how to use NSM Object Manager features to copy objects, find references to objects, search for unused objects, or configure object versions, see the NSM online Help.

    IDP administration using attack objects can include the following tasks related to attack objects:

    • Updating IDP detector engine and the NSM attack database
    • Viewing predefined attack object definitions
    • Viewing attack object groups
    • Updating predefined IDP attack objects and groups

    Published: 2013-01-03