Views:
The Intrusion Prevention Rule Properties screen displays detailed information about a specific Intrusion Prevention Rule and vulnerability. Click the General tab or the Vulnerability to view details about the rule.
The following tables describe the information provided on the General tab and Vulnerability tab.

General Information

Data
Description
Identifier
The unique identifier tag for the Intrusion Prevention Rule
Name
The name of the Intrusion Prevention Rule
Description
The description of the Intrusion Prevention Rule
Note
Note
Apex One Vulnerability Protection does not support the configuration options available on the standalone version of Trend Micro Vulnerability Protection.
Application Type
The Application Type this Intrusion Prevention Rule is grouped under
Priority
The priority level of the Intrusion Prevention Rule. Higher priority rules are applied before lower priority rules.
Severity
The severity level that Trend Micro assigns to the rule
Note
Note
The severity of a rule has no effect on how the rule is implemented or applied. Severity levels can be useful as sorting criteria when viewing a list of Intrusion Prevention Rules.
Mode
The network engine detection mode used by the Intrusion Prevention module. Click a mode to configure the setting for the rule.
Type
The type of vulnerability detected:
  • Smart: Known or unknown (for example, zero-day) vulnerability
  • Exploit: Known exploit (usually signature based) for a known vulnerability
  • Vulnerability: Known vulnerability for which one or more exploits may exist
Issued
The date the rule was released (not downloaded)
Last Updated
The date and time the rule was last modified

Vulnerability Information

Data
Description
Severity
The severity level of the vulnerability
CVSS Score
The Common Vulnerability Scoring System (CVSS) severity score of the vulnerability according the National Vulnerability Database
For more information, see http://nvd.nist.gov/cvss.cfm.
Description
The description of the vulnerability
External References
Provides links to external references for more information about the vulnerability