Allow Intrusion Prevention Rules to capture data for first hit of each rule (in period): Determines whether Vulnerability ProtectionDeep Security will save the packet data which triggered an Intrusion Prevention Rule. This setting works in conjunction with the advanced Network Engine settings that can be found in Computer\Policy Editor > Settings > Network Engine > Advanced Network Engine Settings.
Automatically assign new Intrusion Prevention Rules as required by updated Application Types and Intrusion Prevention Rule dependencies: Security Updates sometimes include new or updated Application Types and Intrusion Prevention Rules which require the assignment of secondary Intrusion Prevention Rules. This setting will allow Vulnerability ProtectionDeep Security to automatically assign these Rules if they are required by the Application Types or Intrusion Prevention Rules that were assigned to a Policy or computer during a Security Update.
Vulnerability ProtectionDeep Security Manager supports Intrusion Prevention analysis of SSL traffic. The SSL Configurations page allows you to create SSL Configurations for a given certificate-port pair on one or more interfaces. Certificates can be imported in P12 or PEM format and Windows computers have the option of using Windows CryptoAPI directly.
To create a new SSL Configuration, click New and follow the steps in the SSL Configuration wizard.
If the computer you are configuring is being installed on the computer hosting the Vulnerability ProtectionDeep Security Manager, the wizard will let you use credentials already stored in the Vulnerability ProtectionDeep Security Manager.
Double-click an existing configuration to display its Properties window.
The Credentials tab lists the current credentials, and has an Assign New Credentials... button which lets you change them.
For information on setting up SSL filtering, see SSL Data Streams.
Deep Security can apply NSX Security Tags to protected VMs upon detecting a malware threat. NSX Security Tags can be used with NSX Service Composer to automate certain tasks, such as quarantining infected VMs. Consult your VMware NSX documentation for more information on NSX Security Tags and dynamic NSX Security Group assignment.
Intrusion Prevention Events have a severity level that is determined by the severity level of the Intrusion Prevention Rule that caused it.
Intrusion Prevention Rule severity levels map to NSX tags as follows:
| IPS Rule Severity | NSX Security Tag |
|---|---|
| Critical | IDS_IPS.threat=high |
| High | IDS_IPS.threat=high |
| Medium | IDS_IPS.threat=medium |
| Low | IDS_IPS.threat=low |
You can configure the sensitivity of the tagging mechanism by specifying the minimum Intrusion Prevention severity level that will cause an NSX security tag to be applied to a VM.
The options for the Minimum rule severity to trigger application of an NSX Security Tag setting are:
Separate settings are provided for Rules that are operating in Prevent mode and for Rules that operating in Detect-only mode.