Managing Cisco Secure Firewall Threat Defense with Cloud-delivered Firewall Management Center
Onboard Devices to Cloud-delivered Firewall Management Center
System Settings
Optimize Firewall Performance with AIOps
Health and Monitoring
Tools
Reporting and Alerting
Events and Assets
Device Operations
Interfaces and Device Settings
Routing
Objects and Certificates
SD-WAN
VPN
Access Control
Intrusion Detection and Prevention
Network Analysis and Intrusion Policies Overview
Getting Started with Intrusion Policies
Intrusion Policy Basics
License Requirements for Intrusion Policies
Requirements and Prerequisites for Intrusion Policies
Managing Intrusion Policies
Custom Intrusion Policy Creation
Editing Snort 2 Intrusion Policies
Access Control Rule Configuration to Perform Intrusion Prevention
Drop Behavior in an Inline Deployment
Drop Behavior in a Dual System Deployment
Intrusion Policy Advanced Settings
Optimizing Performance for Intrusion Detection and Prevention
Tuning Intrusion Policies Using Rules
Custom Intrusion Rules
Layers in Intrusion and Network Analysis Policies
Tailoring Intrusion Protection to Your Network Assets
Sensitive Data Detection
Global Limit for Intrusion Event Logging
Intrusion Prevention Performance Tuning
Network Malware Protection and File Policies
Policy Tools
Encrypted Traffic Handling
User Identity
Network Discovery
FlexConfig Policies
Advanced Network Analysis and Preprocessing
Reference
License Requirements for Intrusion Policies
Threat Defense
License
IPS
Classic License
Protection