About common objects
The Common Objects pages (located under Policies > Common Objects in Deep Security Manager) provide a way to define objects once so that you can reuse them various policies and rules. When you use one of the common objects in the policy or computer editor, its settings can be overridden for that specific policy or computer. For more information on how common object properties can be inherited and overridden at the policy or computer level, see Policies, inheritance, and overrides.
Rules
Some protection modules make use of rules:
- Create a firewall rule
- Configure an intrusion prevention rule for use in policies
- Create an Integrity Monitoring rule
- Define a Log Inspection rule for use in policies
Lists
- Create a list of directories for use in policies
- Create a list of file extensions for use in policies
- Create a list of files for use in policies
- Create a list of IP addresses for use in policies
- Create a list of MAC addresses for use in policies
- Create a list of ports for use in policies