You are here
SEC0381 - Firepower 7.0 Intrusion Advanced (Part 2)
Difficulty Level:
Lab Document:
<Please login to see the content>
Category:
Security
The video looks into additional capabilities available in Intrusion Policies on Cisco Firepower 7.0. We will demonstrate a use of Firepower recommendation that helps you customize intrusion policy to fit your organization traffic pattern. We will perform intrusion rule synchronization from Snort 2 to Snort 3. Metasploit with Kali Linux will be used to test our configuration.
Part 2 of this video covers rule validation and intrusion event monitoring
Topic:
- Firepower Recommendation
- Snort 2 and 3 Rule Synchronization
- Intrusion Events
- Email Alert