Detecting Back Orifice
Note | This section applies to Snort 2 preprocessors. For information on Snort 3 inspectors, see https://www.cisco.com/go/snort3-inspectors. |
Procedure
Step 1 | Choose Network Analysis Policy or , then click Network Analysis Policies. , then click
| ||
Step 2 | Click Snort 2 Version next to the policy you want to edit. | ||
Step 3 | Click Edit () next to the policy you want to edit. If View () appears instead, the configuration belongs to an ancestor domain, or you do not have permission to modify the configuration. | ||
Step 4 | Click Settings in the navigation panel. | ||
Step 5 | If Back Orifice Detection under Specific Threat Detection is disabled, click Enabled.
| ||
Step 6 | To save changes you made in this policy since the last policy commit, click Policy Information, then click Commit Changes. If you leave the policy without committing changes, changes since the last commit are discarded if you edit a different policy. |
What to do next
-
If you want to generate events and, in an inline deployment, drop offending packets, enable Back Orifice Detection rules 105:1, 105:2, 105:3, or 105:4. For more information, see Intrusion Rule States and Back Orifice Detection Preprocessor.
-
Deploy configuration changes.