DefensePro User Guide
Security Configuration
162
Document ID: RDWR-DP-V0602_UG1201
Viewing and Modifying Attribute Type Properties
You can view the following properties of the attribute types that the device supports:
•
Multiple Values in Attack—Specifies whether the attribute type may contain multiple values in
any one signature.
•
Multiple Values in Rule—Specifies whether the attribute type may contain multiple values in any
one signature profile rule.
•
Multiple Values in Static—Specifies whether the attribute type may contain multiple values in
signatures from the signature file.
•
Match Method—Relevant only for the attribute types Complexity, Confidence, and Risk, which
have Attribute Values with ascending-descending levels.
Values:
—
Minimum—Specifies that the Attribute Value includes the results for the lower-level Attribute
Values. For example, for the attribute type Risk with Match Method Minimum, the Attribute
Value High includes the results for Info, Low, and Medium. Minimum is the default for
Complexity, Confidence, and Risk.
—
Exact—Specifies that the Attribute Value uses only its own results. For example, for the
attribute type Risk with Match Method Exact, the Attribute Value High uses only for High-risk
results.
You can change the Match Method for the attribute types Complexity, Confidence, and Risk.
To view attribute types that the device supports
In the Configuration perspective Network Protection tab navigation pane, select Signature
Protection > Attributes > Attribute Type Properties.
Risk
The attack’s severity. For example, attacks that impact on the network
are very severe and are defined as high risk attacks.
The parameter is mandatory.
There can be only a single value for the parameter.
Values: Info, Low, Medium, High
Services
The protocol that is vulnerable to this exploit.
Examples: FTP, HTTP, DNS
The parameter is optional; that is, the parameter may or may not contain
a value.
There can be only a single value for the parameter.
Target
The target of the threat—client side or server side.
Threat Type
The threats that best describe the signature.
Examples: floods, worms
There can be multiple values.
Attribute Type
Description
Summary of Contents for DefensePro 6.02
Page 1: ...DefensePro User Guide Software Version 6 02 Document ID RDWR DP V0602_UG1201 January 2012 ...
Page 2: ...DefensePro User Guide 2 Document ID RDWR DP V0602_UG1201 ...
Page 20: ...DefensePro User Guide 20 Document ID RDWR DP V0602_UG1201 ...
Page 28: ...DefensePro User Guide Table of Contents 28 Document ID RDWR DP V0602_UG1201 ...
Page 116: ...DefensePro User Guide Device Network Configuration 116 Document ID RDWR DP V0602_UG1201 ...
Page 302: ...DefensePro User Guide Real Time Security Reporting 302 Document ID RDWR DP V0602_UG1201 ...
Page 308: ...DefensePro User Guide Administering DefensePro 308 Document ID RDWR DP V0602_UG1201 ...
Page 324: ...DefensePro User Guide Troubleshooting 324 Document ID RDWR DP V0602_UG1201 ...