2.4. Post-op Prevent Recurrence Policy |
2.4.1. Custom IPS Signature Possible? |
2.4.1.1. LINK http://www.symantec.com/connect/sites/default/files/Steps_to_create_a_custom_IDS_signature_0_0.pdf | |
2.4.1.2. Did analysis of network traffic reveal unique packet information? |
2.4.2. Is it possible to leverage Application and Device Control |
2.4.3. Firewall Block policy possible? |
2.4.4. If False Positive Add to Centralized Exceptions Policy in |