ON THIS PAGE
About the Signature Database Page
Use the Signature Database page to install the active signature database, which contains intrusion prevention system (IPS) and application signatures, on one or more devices. The signature database contains definitions of attacks and application, which are used in defining IPS profile rules and application firewall rules. These attack objects and groups are designed to detect known attack patterns and protocol anomalies within the network traffic.
Tasks You Can Perform
You can perform the following task from this page:
Install signatures on one or more devices. See Manually Installing Signatures.
Show or hide columns—Click the Show Hide Columns icon at the top right corner of the page and select the columns that you want displayed on the Signature Database page.
Field Descriptions
Table 1 describes the fields on this page.
Field |
Description |
---|---|
Active Database | |
Database Version |
Version of signature database. |
Publish Date |
Date and time (YYYY-MM-DD HH:MM:SS 24-hour format) when the signature database was published. |
Installed Device Count |
Number of devices on which the signature database was successfully installed. |
Detectors |
Version numbers of the detector engines associated with the signature database. Click the detector-versions link to view the detector details. The Detector Details for Signature-Database-Version page appears displaying (in a table) the platform, OS version, and version of the detectors for the signature database. Click Close to return to the Signature Database page. |
Action |
Click the Install on device link to install the signatures on one or more devices. The Install Signatures page appears. See Manually Installing Signatures. Note:
This field appears only for users with the Tenant Administrator role. |