SV-80915r1_rule
V-66425
SRG-NET-000392-IDPS-00214
JUSX-IP-000023
CAT II
10
Create a custom rule that identifies the Junos application which is prohibited on the network.
Add the option "alert" onto the rule to send an alert when that rule is invoked. Alerts should be sent only on critical and other site-selected items to prevent an excess of alerts.
[edit]
set security idp idp-policy recommended rulebase-ips rule-1 then notification log-attacks alert
Verify an attack group or rule is configured.
[edit]
show security idp policies
If an attack group or rule is not implemented to detect root-level intrusion attacks or the match condition is not configured for an alert, this is a finding.
V-66425
False
JUSX-IP-000023
Verify an attack group or rule is configured.
[edit]
show security idp policies
If an attack group or rule is not implemented to detect root-level intrusion attacks or the match condition is not configured for an alert, this is a finding.
M
3037