For instructions for creating a static attack object group, see the
NSM Online Help
topic
“Adding Static Attack Groups.”
Creating Dynamic Attack Groups (IDP Only)
A dynamic group contains a dynamic set of attack objects that are automatically added
or deleted based on specified criteria for the group. For example, an attack database
update can add or remove attack objects from a dynamic group based on the group
criteria. This eliminates the need to review each new signature to determine if you need
to use it in your existing security policy.
A predefined or custom dynamic group can only contain attack objects and not attack
groups. Dynamic group members can be either predefined or custom attack objects.
To create a custom dynamic group:
1.
In Object Manager, select
Attack Objects > IDP Objects
. The IDP Objects dialog box
appears.
2.
Click the Custom Attack Groups tab, then click the Add icon and select
Add Dynamic
Group
. The New Dynamic Group dialog box appears.
3.
Enter a name and description for the static group. Select a color for the group icon.
4.
In the Filters tab, click the Add icon and select one of the following:
•
Add Products Filter to add attack objects based on the application that is vulnerable
to the attack.
•
Add Severity Filter to add attack objects based on the attack severity.
NOTE:
All predefined attack objects are assigned a severity level by Juniper
Networks. However, you can edit this setting to match the needs of your
network.
•
Add Category Filter to add attack objects based on category.
•
Add Last Modified Filter to add attack objects based on their last modification date.
•
Add Recommended Filter to include only attacks designated to be the most serious
threats to the dynamic group. In the future, Juniper Networks will designate only attacks
it considers to be serious threats as Recommended. These settings will be updated
with new attack object updates. In addition, you can designate custom attack objects
as Recommended or not.
You create filters one at a time; each criteria you add is compared to the attributes for
each attack object. Attack objects that do not match the criteria are immediately filtered
out. If you create a filter with attributes that no attack object can match, a message
appears warning you that your dynamic group has no members.
Copyright © 2010, Juniper Networks, Inc.
364
Network and Security Manager Administration Guide
Содержание NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 236: ...Copyright 2010 Juniper Networks Inc 186 Network and Security Manager Administration Guide...
Страница 292: ...Copyright 2010 Juniper Networks Inc 242 Network and Security Manager Administration Guide...
Страница 314: ...Copyright 2010 Juniper Networks Inc 264 Network and Security Manager Administration Guide...
Страница 368: ...Copyright 2010 Juniper Networks Inc 318 Network and Security Manager Administration Guide...
Страница 370: ...Copyright 2010 Juniper Networks Inc 320 Network and Security Manager Administration Guide...
Страница 484: ...Copyright 2010 Juniper Networks Inc 434 Network and Security Manager Administration Guide...
Страница 584: ...Copyright 2010 Juniper Networks Inc 534 Network and Security Manager Administration Guide...
Страница 588: ...Copyright 2010 Juniper Networks Inc 538 Network and Security Manager Administration Guide...
Страница 600: ...Copyright 2010 Juniper Networks Inc 550 Network and Security Manager Administration Guide...
Страница 678: ...Copyright 2010 Juniper Networks Inc 628 Network and Security Manager Administration Guide...
Страница 694: ...Copyright 2010 Juniper Networks Inc 644 Network and Security Manager Administration Guide...
Страница 700: ...Copyright 2010 Juniper Networks Inc 650 Network and Security Manager Administration Guide...
Страница 706: ...Copyright 2010 Juniper Networks Inc 656 Network and Security Manager Administration Guide...
Страница 708: ...Copyright 2010 Juniper Networks Inc 658 Network and Security Manager Administration Guide...
Страница 758: ...Copyright 2010 Juniper Networks Inc 708 Network and Security Manager Administration Guide...
Страница 788: ...Copyright 2010 Juniper Networks Inc 738 Network and Security Manager Administration Guide...
Страница 882: ...Copyright 2010 Juniper Networks Inc 832 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 918: ...Copyright 2010 Juniper Networks Inc 868 Network and Security Manager Administration Guide...
Страница 920: ...Copyright 2010 Juniper Networks Inc 870 Network and Security Manager Administration Guide...
Страница 1005: ...PART 6 Index Index on page 957 955 Copyright 2010 Juniper Networks Inc...
Страница 1006: ...Copyright 2010 Juniper Networks Inc 956 Network and Security Manager Administration Guide...