Severity
|
Description
|
1—Information
|
Port-based traffic (examples: HTTP, SMTP).
|
2—Low
|
Policy-related signatures (examples: IM, P2P, Games)
|
3—Medium
|
Tunneling and scanning activity.
|
4—High
|
Most intrusion-related signatures.
|
5—Critical
|
Same as high severity plus very high impact to servers and end users (examples: CVE-2008-4250,
Conficker).
|
The page you're looking for can't be found or is under maintenance
Try again later or go to the home page
Go to home page