Searching for Rules

The system provides thousands of standard text rules, and the Talos Intelligence Group continues to add rules as new vulnerabilities and exploits are discovered. You can easily search for specific rules so that you can activate, deactivate, or edit them.

Procedure


Step 1

Access the intrusion rules using either of the following methods:

  • Choose Policies > Access Control > Intrusion.

    Click Snort 2 Version next to the policy you want to edit and click Rules.

  • Choose Objects > Intrusion Rules.

Step 2

Click Search on the toolbar.

Step 3

Add search criteria.

Step 4

Click Search.