Configure EVE Exception Rules
You can create an encrypted visibility engine (EVE) exception rule to ensure the continuity of trusted connections and services by bypassing the EVE’s block action. You can add attributes such as process names and destination IP address to the exception rule. For example, you may want to bypass EVE's block verdict for trusted networks. All the connections in the bypassed networks are exempted from EVE’s block verdict based on the threat confidence level.
Procedure
Step 1 | Choose . |
Step 2 | Click Edit ( |
Step 3 | Choose Encrypted Visibility Engine from the More drop-down arrow at the end of the packet flow line. |
Step 4 | On the Encrypted Visibility Engine page, enable the Encrypted Visibility Engine (EVE) toggle button. |
Step 5 | Choose the Protect mode to monitor and block encrypted traffic based on the threat confidence level of the client processes. You can use this mode to monitor and block malicious connections at two threat confidence levels:
|
Step 6 | Click Manage exceptions to view and add exception rules. |
Step 7 | On the Encrypted Visibility Engine (EVE) Exception List window, click +Add Exception Rules and add the required attributes. |
Step 8 | Click Save and then deploy the access control policy. |
Note | When a connection matches an exception rule, it bypasses the EVE's block verdict. You can view EVE's action in the Connection Events or Unified Events page. The Reason column header displays EVE Exempted for identification of such EVE-bypassed traffic. |
