[Okta Webinar] Learn how to a build a cloud-first strategyRegister Now

x
?
Solved

IPS experts.

Posted on 2011-02-28
4
Medium Priority
?
839 Views
Last Modified: 2013-11-29
Hi all,
dear I need to know the right way to manage my new IPS and making sure that it is up to date...is there any check list or process that can be followed to make sure that my IPS is up to date...and it is able to protect my network.

cheers.
0
Comment
Question by:besmile4ever
  • 2
  • 2
4 Comments
 
LVL 10

Accepted Solution

by:
ujitnos earned 2000 total points
ID: 35005675
Who is the IPS from? like ISS, Tipping Point McAfee etc?

I had managed an ISS IPS and what i did was configure the critical signatures to be blocked. Dont block all of the critical signatures in one day, and before blocking a signature try to find out if the signature is really valid for your environment. Like if your office has all Windows systems there in no point in enabling any LINUX related signatures.

Take a bunch of 10 signatures and block them. Send a mail to maybe your Helpdesk to lookout for any signature specific issues, keep monitoring for a week, when all seems to be fine, take another atch of 10 signatures and block them.

make sure that the software/appliance gets automatic updates/signatures. dont just blindly start blocking them.

generate a report to see if any of the signature was triggered. See the details and try to find if the access was a genuine one.

These steps should get u started.
0
 

Author Comment

by:besmile4ever
ID: 35014670
Great ujitnos,
can i communicate with u on mail pls if you do not mind.. ebdaaco at gmail.
i will appreciate it...and i will approve your answer.

br.
0
 
LVL 10

Expert Comment

by:ujitnos
ID: 35014959
k... ujitnos at yahoo.com
0
 

Author Closing Comment

by:besmile4ever
ID: 35041947
excellent.
0

Featured Post

 The Evil-ution of Network Security Threats

What are the hacks that forever changed the security industry? To answer that question, we created an exciting new eBook that takes you on a trip through hacking history. It explores the top hacks from the 80s to 2010s, why they mattered, and how the security industry responded.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

It’s time for spooky stories and consuming way too much sugar, including the many treats we’ve whipped for you in the world of tech. Check it out!
This article is about my experience upgrading my consulting machine to Windows 10 Version 1709 (The Fall 2017 Creator Update)
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…
When cloud platforms entered the scene, users and companies jumped on board to take advantage of the many benefits, like the ability to work and connect with company information from various locations. What many didn't foresee was the increased risk…
Suggested Courses

834 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question