Intrusion prevention rules
Whereas Firewall Rules and Firewall Stateful Configurations examine a packet's control information (data that describes the packet), Intrusion Prevention Rules examine the actual content of the packet (and sequences of packets). Based on the conditions set within the Intrusion Prevention Rule, various actions are then carried out on these packets: from replacing specifically defined or suspicious byte sequences, to completely dropping packets and resetting the connection.
Intrusion Prevention Rule icons:
- Normal Intrusion Prevention Rules
- Intrusion Prevention Rules that operate according to a schedule
- Intrusion Prevention Rules that have configuration options
- Intrusion Prevention Rules must be configured before use
The Intrusion Prevention Rules page lets you create and manage Intrusion Prevention Rules. From the toolbar or the right-click shortcut menu you can:
- Create New Intrusion Prevention Rules from scratch ()
- Import () Intrusion Prevention Rules from an XML file (located under the New menu.)
- Examine or modify the Properties of an existing Intrusion Prevention Rule ()
- Duplicate (and then modify) existing Intrusion Prevention Rules ()
- Delete an Intrusion Prevention Rule ()
- Export () one or more Intrusion Prevention Rules to an XML or CSV file. (Either export them all using the Export button, or choose from the list to export only those that are selected or displayed.)
- Add/Remove Columns () columns can be added or removed by clicking Add/Remove Columns. The order in which the columns are displayed can be controlled by dragging them into their new position. Listed items can be sorted and searched by the contents of any column.
Clicking New () or Properties () displays the Intrusion Prevention Rule Properties window.
See the list of intrusion prevention rules
The Policies page provides a list of intrusion prevention rules. You can search for intrusion prevention rules, and open and edit rule properties. In the list, rules are grouped by application type, and some rule properties appear in different columns.
The "TippingPoint" column contains the equivalent Trend Micro TippingPoint rule ID. In the Advanced Search for intrusion prevention, you can search on the TippingPoint rule ID. You can also see the TippingPoint rule ID in the list of assigned intrusion prevention rules in the policy and computer editor.
To see the list, click Policies, and then below Common Objects/Rules click Intrusion Prevention Rules.
- Name: The name of the Intrusion Prevention Rule.
- Description: The description of the Intrusion Prevention Rule.
- Minimum Agent/Appliance Version: The minimum version of the Deep Security Agent or ApplianceThe Deep Securty Agent and Deep Security Virtual Appliance are the components that enforce the Deep Security policies that you have defined. Agents are deployed directly on a computer. Appliances are used in VMware vSphere environments to provide agentless protection. They are not available with Deep Security as a Service. required to implement this Intrusion Prevention Rule.
- Application Type: The Application Type this Intrusion Prevention Rule will be grouped under. You can select an existing type, or create a new one.
You can also edit existing types from this panel. Remember that if you edit an existing Application Type from here, the changes will be applied to all security elements making use of it.
- Priority: The priority level of the Intrusion Prevention Rule. Higher priority rules are applied before lower priority rules.
- Severity: Setting the severity of a rule has no effect on how the rule is implemented or applied. Severity levels can be useful as sorting criteria when viewing a list of Intrusion Prevention Rules. More importantly, each severity level is associated with a severity value; this value is multiplied by a computer's Asset Value to determine the Ranking of an Event. (See Administration > System Settings > Ranking.)
- CVSS Score: A measure of the severity of the vulnerability according the National Vulnerability Database.
- Detect Only: Use this checkbox when testing new rules. By checking this box, the rule will create a log entry prefaced with the words "detect only:" but will not interfere with traffic. If you set the "disable logging" checkbox in the next panel (below), the rule's activity will not be logged regardless of whether "Detect Only" is checked or not.
Some Intrusion Prevention Rules are designed to only operate in "Detect Only" mode and cannot be configured to block traffic. For these rules, the "Detect Only" option will be set and locked so it cannot be changed.
- Disable Event Logging: Check to disable Event logging.
- Generate Event on Packet Drop: Log the dropping or blocking of a packet.
- Always Include Packet Data: Includes the packet data in the log entry.
- Enable Debug Mode: Logs multiple packets preceding and following the packet that triggered the rule. Trend Micro recommends only using this option if instructed to do so by your support provider.
Identification (Displayed for Trend Micro rules only)
- Type: Can be either Smart (one or more known and unknown (zero day) vulnerabilities), Exploit (a specific exploit, usually signature based), or Vulnerability (a specific vulnerability for which one or more exploits may exist).
- Issued: The date the Rule was released (not downloaded).
- Last Updated: The last time the Rule was modified either locally or during Security Update download.
- Identifier: The rule's unique identifier tag.
Vulnerability (Displayed for Trend Micro rules only)
Displays information about this particular vulnerability. When applicable, the Common Vulnerability Scoring System (CVSS) is displayed. (For information on this scoring system, see the CVSS page at the National Vulnerability Database.)
Configuration (Displayed for Trend Micro rules only)
- Configuration Options: If the downloaded rule has any configurable options, they will be displayed here. Examples of options might be header length, allowed extensions for http, cookie length, etc. If you apply a rule without setting a required option, an Alert will be triggered telling you which rule on which computer(s) requires configuration. (This also applies to any rules that are downloaded and automatically applied by way of a Security Update.)
View Rules (Available for custom Intrusion Prevention Rules only)
The View Rules button will be available for Intrusion Prevention Rules that have not been marked confidential by Trend Micro. (Contact Trend Micro for information on writing your own Intrusion Prevention Rules.)
Select whether or not this Intrusion Prevention Rule should trigger an Alert when it is triggered. If you only wish this rule to be active during specific periods, assign a schedule from the list.
Select whether the Intrusion Prevention Rule should only be active during a scheduled time.
Contexts are a powerful way of implementing different security policies depending on the computer's network environment. You will most often use Contexts to create Policies which apply different Firewall and Intrusion Prevention Rules to computers (usually mobile laptops) depending on whether that computer is in or away from the office.
Contexts are designed to be associated with Firewall and Intrusion Prevention Rules. If the conditions defined in the Context associated with a Rule are met, the Rule is applied.
To determine a computer's location, Contexts examine the nature of the computer's connection to its domain controller. For more information on Contexts, see Policies > Common Objects > Other > Contexts.
Use this option to exclude this Intrusion Prevention Rule from Rule recommendations made after Recommendation Scans.
This tab displays the list of computers and Policies to which this Intrusion Prevention Rule is assigned.