The Intrusion Prevention Rule Properties screen displays detailed information about a specific Intrusion Prevention Rule and vulnerability. Click the General tab or the Vulnerability to view details about the rule.
The following tables describe the information provided on the General tab and Vulnerability tab.
Data |
Description |
---|---|
Identifier |
The unique identifier tag for the Intrusion Prevention Rule |
Name |
The name of the Intrusion Prevention Rule |
Description |
The description of the Intrusion Prevention Rule |
Application Type |
The Application Type this Intrusion Prevention Rule is grouped under |
Priority |
The priority level of the Intrusion Prevention Rule. Higher priority rules are applied before lower priority rules. |
Severity |
The severity level that Trend Micro assigns to the rule Note:
The severity of a rule has no effect on how the rule is implemented or applied. Severity levels can be useful as sorting criteria when viewing a list of Intrusion Prevention Rules. |
Mode |
The network engine detection mode used by the Intrusion Prevention module |
Type |
The type of vulnerability detected:
|
Issued |
The date the rule was released (not downloaded) |
Last Updated |
The date and time the rule was last modified |
Data |
Description |
---|---|
Severity |
The severity level of the vulnerability |
CVSS Score |
The Common Vulnerability Scoring System (CVSS) severity score of the vulnerability according the National Vulnerability Database For more information, see http://nvd.nist.gov/cvss.cfm. |
Description |
The description of the vulnerability |
External References |
Provides links to external references for more information about the vulnerability |