NoteThere is no limit to the number of rules you can create.
However, for manageability, limit the rules to 15—as there are 15
rule types.
|
|
Rule Type
|
Description
|
Example
|
Multiple Condition
|
|---|---|---|---|
|
Device Access Type
|
The requested access type, either read/write
or read-only.
|
|
Yes
|
|
Device Mount Point
|
The mounting point for the data storage
device if keys are approved.
|
|
Yes
|
|
Key Request Date
|
Date when the key request was received.
|
01/21/2011
|
Yes
|
|
Request Source IP Address (IPv4)
|
IPv4 IP address from which the key request
originated.
|
|
Yes
|
|
Request Source IP Address (IPv6)
|
IPv6 IP address from which the key request
originated.
|
|
Yes
|
|
Instance First Seen
|
Date when SecureCloud first processed any
data related to an instance. Based on this timestamp, SecureCloud
can determine if the time period has lapsed to grant the instance encryption
keys.
|
01/21/2012 |
No
|
|
Instance User Data
|
Data packet provided to the instance at
start up.
|
DataKey=MySecretKey
|
Yes
|
|
Instance Location
|
Location of the server farm running the
machine instance.
|
Us-east-1c
|
Yes
|
|
OSSEC Version
|
The version of OSSEC that is present in
the machine instance.
|
2.5.1 |
Yes
|
|
Trend Micro Software
|
The Trend Micro security software installed
on the running instance.
|
OfficeScan
|
Yes
|
|
Trend Micro Virus Scan Engine Version
|
The version of the Trend Micro virus scan
engine available in the running instance.
|
9.500.1008 |
No
|
|
Trend Micro Virus Scan Pattern Version
|
The version of the Trend Micro virus scan
pattern file available in the running instance.
|
9.297.00 |
No
|
|
Guest OS Information
|
Operating system and architecture used by
the machine image to run the Runtime Agent.
|
|
Yes
|
|
Deep Security Status
|
The status of the key-requesting environment
as determined by the Deep Security Management (DSM).
|
|
No
|
|
Network Services
|
Listening ports on the system running the
SecureCloud Runtime Agent—both TCP and UDP ports are included.
|
|
Yes
|