Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

Navigation
Guide That Contains This Content
[+] Expand All
[-] Collapse All

    Viewing Predefined Attack Objects (NSM Procedure)

    Purpose

    Juniper Networks Security Center (J-Security Center) develops predefined attack objects and attack object groups for IDP rulebase rules.

    In most cases, the predefined attack objects are the only attack objects you need to protect your network.

    The predefined attack object list in the NSM Object Manager provides the following summary of each attack object:

    • Name of the attack object
    • Severity of the attack: critical, major, minor, warning, info
    • Category
    • Keywords
    • Common Vulnerabilities and Exposures database (CVE) number
    • Security Focus Bugtraq database number

    Action

    To view predefined attack object details:

    1. In the Object Manager, click Attack Objects > IDP Objects to display the IDP Objects dialog box.
    2. Click either the Predefined Attacks or Predefined Attack Groups tab to view the predefined attack object list.
    3. Double-click the table row entry for the attack object to display its details.

    Note: You cannot create, edit, or delete predefined attack objects.

    Published: 2013-01-03