- CheckMates
- :
- Products
- :
- Quantum
- :
- Threat Prevention
- :
- Re: Event Policy, Legacy
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Mute
- Printer Friendly Page
Are you a member of CheckMates?
×- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Event Policy, Legacy
Hi, as briefly mentioned in my latest question we have moved from R77.30 to R80.10. In the Smart Event Policy we have noticed that for Thread Prevention some automatic reactions have moved to Legacy folder. Legacy suggest "old" and maybe superseded by something else. I cannot find any other setting however. Is this still a useful to configure in Legacy ?
Also is there a way to define the severity ourselves ? Header Rejection we find not ourselves not Cricital but DNS trap (which has severity low) we find high or critical ?
kind regards,
Mikel
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Not sure why SmartEvent has those in Legacy.
It's not currently possible to redefine specific IPS protections with a different severity.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
A bit more familiair now with the new Smart Event Dashboard of R80.10 but I would like to set automatic reactions like mail alert again in Smart Event in case of Virus Incident but with exceptions because I want only very specific email alerting. I had this also in R77.30 but for some reason is exclude Any not supported anymore ? Well to be exact, it looks like it does not allow any NET or group. I want to exclude any source and any destination for a specific protection name and protection type but is not allowed. Also I would like to have alerting only from Severity High and Critical. Unfortunately also this is still not possible. Anyone also experiencing the same ?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Sharing some info, I have learned that for having different alerting for different severity for the same threat is done by manually create an event based on the existing threat event. So I will play around with that. If anybody has any experience and tips for this I am interested. Would be nice to hear some best practices used by others.
