The following table shows the screens and elements with replicated configuration settings.
Deep Discovery Inspector 5.8 Replicated Configuration Settings
|
Screen
|
Element
|
|
|
|
Affected Hosts
|
Only Saved Searches
|
|
Affected Hosts - Host Details
|
||
|
All Detections
|
||
|
|
Schedules
|
All settings
|
|
Customization
|
||
|
|
Scheduled
|
All settings
|
|
Source
|
All settings
|
|
|
|
|
All settings
|
|
|
||
|
|
||
|
|
||
|
|
||
|
|
||
|
|
||
|
|
||
|
|
||
|
|
Hosts / Ports
|
All settings
|
|
Threat Detections
|
||
|
Web Reputation
|
||
|
Application Filters
|
||
|
Deny List / Allow List
|
||
|
Detection Rules
|
||
|
Detection Exceptions
|
||
|
Packet Capture
|
||
|
|
Setup
|
Only the internal Virtual Analyzer proxy settings
and the sandbox for macOS setting.
|
|
File Submissions
|
All settings
|
|
|
|
||
|
|
Network Groups
|
All settings
|
|
Registered Domains
|
||
|
Registered Services
|
||
|
|
Threat Intelligence Sharing
|
All settings
|
|
Microsoft Active Directory
|
||
|
Syslog
|
||
|
|
Network
|
Only Secure Protocol setting
|
|
Proxy
|
All settings
|
|
|
SMTP
|
||
|
SNMP
|
||
|
Time
|
||
|
Session Timeout
|
||
|
|
All settings
|
|
|
|
Only File Size Settings
|
|
