Edit Snort 3 Intrusion Policies
While editing a Snort 3 policy, all the changes are saved instantaneously. No additional action is required to save the changes.
Procedure
Step 1 | Choose . | ||||
Step 2 | Ensure the Intrusion Policies tab is selected. | ||||
Step 3 | Click Snort 3 Version next to the intrusion policy you want to configure. | ||||
Step 4 | Edit your policy:
| ||||
Step 5 | Click the Base Policy layer that defines the intrusion policy’s default settings.
| ||||
Step 6 | Group Overrides—Click the Group Overrides layer that lists all the categories of rule groups. The top level parent rule groups with Description, Overrides and Enabled Groups, and so on is displayed. Parent rule groups cannot be updated and are read-only. Only the leaf rule groups can be updated. In each rule group, you can traverse up to the last leaf group. Across each group, you can override, include, and exclude rule groups. In the leaf rule groups, you can:
| ||||
Step 7 | Recommendations—Click the Recommendations layer if you want to generate and apply Cisco recommended rules. Recommendations use the host database to enable or disable rules, based on known vulnerabilities. | ||||
Step 8 | Rule Overrides—Click the Rule Overrides layer to choose any of the presets to view rules, which are set to alert, block, disabled, overridden, rewrite, pass, drop, or reject.
| ||||
Step 9 | Click the Summary layer for a holistic view of the current changes to the policy. The policy summary page contains the following information:
To change the base policy, see Change the Base Policy of an Intrusion Policy.
|
What to do next
Deploy configuration changes; see Deploy Configuration Changes.