Views:

The Intrusion Prevention Rule Properties screen displays detailed information about a specific Intrusion Prevention Rule and vulnerability. Click the General tab or the Vulnerability to view details about the rule.

The following tables describe the information provided on the General tab and Vulnerability tab.

Table 1. General Information

Data

Description

Identifier

The unique identifier tag for the Intrusion Prevention Rule

Name

The name of the Intrusion Prevention Rule

Description

The description of the Intrusion Prevention Rule

Note:

Apex One Vulnerability Protection does not support the configuration options available on the standalone version of Trend Micro Vulnerability Protection.

Application Type

The Application Type this Intrusion Prevention Rule is grouped under

Priority

The priority level of the Intrusion Prevention Rule. Higher priority rules are applied before lower priority rules.

Severity

The severity level that Trend Micro assigns to the rule

Note:

The severity of a rule has no effect on how the rule is implemented or applied. Severity levels can be useful as sorting criteria when viewing a list of Intrusion Prevention Rules.

Mode

The network engine detection mode used by the Intrusion Prevention module. Click a mode to configure the setting for the rule.

Type

The type of vulnerability detected:

  • Smart: Known or unknown (for example, zero-day) vulnerability

  • Exploit: Known exploit (usually signature based) for a known vulnerability

  • Vulnerability: Known vulnerability for which one or more exploits may exist

Issued

The date the rule was released (not downloaded)

Last Updated

The date and time the rule was last modified

Table 2. Vulnerability Information

Data

Description

Severity

The severity level of the vulnerability

CVSS Score

The Common Vulnerability Scoring System (CVSS) severity score of the vulnerability according the National Vulnerability Database

For more information, see http://nvd.nist.gov/cvss.cfm.

Description

The description of the vulnerability

External References

Provides links to external references for more information about the vulnerability