Define rules, lists, and other common objects used by policies
The Common Objects pages (located under Policies > Common Objects in Deep Security Manager) provide a way to define objects once so that you can reuse them various policies and rules. When you use one of the common objects in the policy or computer editor, its settings can be overridden for that specific policy or computer. For more information on how common object properties can be inherited and overridden at the policy or computer level, see Policies, inheritance, and overrides.
You can automate common object creation and configuration using the Deep Security API. For examples, see the Create and Configure Common Objects for Policies and Computers guide.
Some protection modules make use of rules:
- Create a firewall rule
- Configure an intrusion prevention rule for use in policies
- Create an integrity monitoring rule
- Define a log inspection rule for use in policies
- Create a list of directories for use in policies
- Create a list of file extensions for use in policies
- Create a list of files for use in policies
- Create a list of IP addresses for use in policies
- Create a list of MAC addresses for use in policies
- Create a list of ports for use in policies