Views:

Use Filters for Review to make strategic changes to your security policy according to filter factors relevant to the policy.

By providing operational, security, and performance contexts, this interface enables you to target your filters to known active threats.
Using the detailed context provided for each filter, you can maximize the effectiveness of your security policy by:
  • Fine-tuning your policies to enable only those filters that are relevant to your environment
  • Negotiating the tradeoff between higher security and higher performance
  • More efficiently blocking bad traffic without hampering good traffic
  • Identifying the conditions surrounding congestion
A red badge next to the navigation panel's Profiles icon alerts you that you have profiles with filters that have been flagged for review. When you click the Profiles icon, the expanded navigation shows another badge next to Filters for Review that indicates how many filters have been flagged.
Refer to the following image of the Dashboard.
dashboard_overview=GUID-0ACDA91E-D772-4B98-B656-E7FDDE38FAD4=1=en-us=Low.png
Filters are automatically flagged for review according to the criteria identified by the following Dashboard widgets:
  • Active Malware Threats – Real-world malware that actively exploits network vulnerabilities.
  • Performance Incidents – Traffic-based anomalies, such as Adaptive Filter Configuration (AFC) events.
    Note
    Note
    To display performance incidents, configure your device for AFC and distribute at least one profile to the device. Because the polling that associates distributed profiles with your device runs every five minutes, expect a corresponding delay before performance incidents are displayed.
  • New / Modified Filters – New filters or enhancements to existing filters provided in a Digital Vaccine (DV) or Auxiliary DV package.
Note
Note
A filter remains flagged until the malware threat gets demoted as a top threat or expires. For new and modified filters, there is no expiration.
When you click the Dashboard widget you want to review, a list of filters for that category is displayed. Active Malware filters are displayed in order of security importance; other filters are displayed sequentially by filter number. You can narrow the list by Flag Type, Review Status, and Snooze Status on the toolbar.
To determine a filter's security importance, the Trend SMART Protection Network (SPN) compiles security information from a conglomeration of sources. After it ranks the threats, SPN then combines the data with TippingPoint Digital Vaccine (DV) intelligence for the final output, which is provided to the SMS by the Threat Management Center (TMC). A filter's final ranking on the list depends on a number of factors. For example, a filter with a minor severity can be higher on the list than a filter with a critical severity if it has a higher prevalence.
From the list, click a filter to see an overview of it, including:
  • Information about the filter's function
  • Release/modification dates
  • Severity
  • Source
  • Category
  • CVE identifications
The context panel to the right of the console displays the following tabs with details of how the filter is used in your security policy:
  • Flags – List of flags associated with the filter, and when that flag occurred. You can change the review status of this filter's flag by clicking the Actions drop-down menu. If you want to re-evaluate this flag later, set the action to Snooze and select a time period. If you have the required permissions, click the Add Flag button to add your own custom flag.
    Note
    Note
    You can edit filter settings only within the context of a profile using the SMS client. If you do edit a filter's settings, remember to also use the SMS client to redistribute all profiles that contain that filter.
  • Performance – An interactive graph is displayed showing filter activity in correlation to a device's CPU congestion over a period of time that you specify. Although you can configure this for up to 20 devices, only the top 10 devices with the highest correlation rates are used to calculate the data. To see this graph, configure Filter Performance Correlation on a device that has this filter enabled. Learn more. Hovering over different points in the graph presents congestion statistics, including:
    • The precise time reflected at that point on the graph.
    • The percentage of congestion reflected at that point.
    • The number of times the filter was triggered at that point.
      Note
      Note
      A trigger count of 0 (zero) indicates that this filter was not one of the 50 most-triggered filters for the specified time period. It does not reflect the actual number of filter triggers.
    performance_graph=GUID-4594FC82-5F2B-4689-98D0-4386BA88AC83=1=en-us=Low.png
    The performance table lists the device with the highest correlation at the top, and the graph you see is for that device. Because the data is dynamic, you might see the graph for a different device each time you refresh the page. To see the correlation graph for any other device, click the device in the table.
    Any portion of the graph showing a dashed line indicates that no data is available during the specified time period. Time, congestion, and trigger statistics will not be displayed.
  • Profiles – A list of profiles that use this filter, and, if the filter is in an Enabled state, the action set your profile has configured for the filter. A label of Recommended indicates that the recommended settings for the filter are applied.