Hi,
As far as I can tell, there is no ability to limit individual admin's rights over single or select Threat Prevention layers:
This is actually coming in the next release of Security Management Server, not this one.
Further more, when multiple Threat Prevention layers are used, I am seeing a warning about possible conflict in IPS:
I'll read the SK later to see what is it all about.
Personally I think we may have used the wrong UI indication to tell our users that the policy works as they designed it. It means that the stricter option matters. It's not really a warning, it's more like a reminder of how the policy will behave.
So we can talk about 2 examples:
1. Each layer controls a software blade. This pattern already happens for users who upgraded their Management but not their gateways - the IPS Shared Layer is separated from the rest of the Threat Prevention products, which are in a second layer. So the upgraded policy scenario is a private case of this pattern. Users can go further and separate the signature-based decisions and profiles with the dynamic-based decisions and profiles by placing them in multiple layers.
2. Each layer controls a different network, and has multiple profiles for different portions of a network (so multiple rules per layer).
Why split to layers and not just have one big rule-base? It's up to each administrator to decide, generally:
1. Smaller building blocks help understand the policy better
2. Features that are coming in the next release: Sharing the same layer across multiple policies, and assigning different permission profiles to edit different layers - similar to the way Access Control layers are defined.