About IPS Policies
To access this page, select Secure Edge > Security Subscriptions > IPS.
The intrusion prevention system (IPS) profile is deployed on a device by associating the profile with a firewall policy intent, which is deployed on the device. You can associate IPS rules or exempt rules with an IPS profile.
Use this page to view, add, modify, clone, or delete the IPS rules and exempt rules in the IPS profiles.
Tasks You Can Perform
-
Create an IPS rule —See Create IPS Rule.
-
Create an exempt rule—See Create Exempt Rule.
-
Edit, clone, or delete an IPS rule—See Edit, Clone, and Delete IPS Rules.
-
Edit, clone, or delete an Exempt rule—See Edit, Clone, and Delete Exempt Rule.
-
Search for rules by using keywords—Click the search icon, enter the search term in the text box, and press Enter. The search results are displayed on the same page.
-
Filter rules—Click the filter icon (funnel), and specify one or more filtering criteria. The filtered results are displayed on the same page.
Note:Filtering is applicable only to some fields.
-
Table 1: Fields on the IPS Policy Page Field Description Name The name of the IPS rule. IPS Signatures Displays the IPS signatures associated with the IPS rule.
If multiple signatures are associated with the rule, the number of additional signatures is displayed. Hover over the number to view the full list of signatures.
Action Displays the action to be taken when the IPS rule is matched.
Options Displays the configuration options for IPS rules.
Hover over the arrow icon to view the logging options configured.