Generating and Applying Cisco Recommendations
Starting or stopping use of Cisco recommendations may take several minutes, depending on the size of your network and intrusion rule set.
Before you begin
-
Cisco recommendations have the following requirements:
-
Threat Defense License—IPS
-
Classic License—Protection
-
User Roles—Admin or Intrusion Admin
-
-
Configure a network discovery policy before you begin with the steps. Configure the network discovery policy to define internal hosts so that the Cisco recommendations are suitable. See, Network Discovery Customization.
Procedure
Step 1 | In the Snort 2 intrusion policy editor's navigation pane, click Cisco Recommendations. |
Step 2 | (Optional) Configure advanced settings; see Advanced Settings for Cisco Recommendations. |
Step 3 | Generate and apply recommendations.
When you generate recommendations, the system displays a summary of the recommended changes. To view a list of rules where the system recommends a state change, click View next to the newly proposed rule state. |
Step 4 | Evaluate and adjust the recommendations you implemented. Even if you accept most Cisco recommendations, you can override individual recommendations by setting rule states manually; see Setting Intrusion Rule States. |
Step 5 | To save changes you made in this policy since the last policy commit, click Policy Information, then click Commit Changes. If you leave the policy without committing changes, changes since the last commit are discarded if you edit a different policy. |
What to do next
-
Deploy configuration changes.