Podcast
Questions and Answers
What is the main focus of IPS signatures?
What is the main focus of IPS signatures?
What is the primary focus of application control signatures?
What is the primary focus of application control signatures?
Which protocols are mentioned as being understood and exposed by the Fortinet flow engine?
Which protocols are mentioned as being understood and exposed by the Fortinet flow engine?
What is the purpose of deep packet inspection (DPI) and intrusion prevention system (IPS) signatures for IC'S protocols and applications context logging?
What is the purpose of deep packet inspection (DPI) and intrusion prevention system (IPS) signatures for IC'S protocols and applications context logging?
Signup and view all the answers
What type of vulnerabilities were several versions of Schneider Electric Accutech Manager vulnerable to?
What type of vulnerabilities were several versions of Schneider Electric Accutech Manager vulnerable to?
Signup and view all the answers
What do application control signatures detect in the context of protocols and telecontrol messages?
What do application control signatures detect in the context of protocols and telecontrol messages?
Signup and view all the answers
What is the purpose of the protocol dissectors in the Fortinet flow engine?
What is the purpose of the protocol dissectors in the Fortinet flow engine?
Signup and view all the answers
What is the common action taken by both IPS and application control in terms of log and application context?
What is the common action taken by both IPS and application control in terms of log and application context?
Signup and view all the answers
What is the focus of IPS in terms of vulnerability detection?
What is the focus of IPS in terms of vulnerability detection?
Signup and view all the answers
What aspect of the telecontrol messages do application control signatures detect?
What aspect of the telecontrol messages do application control signatures detect?
Signup and view all the answers
What is the primary purpose of intrusion prevention system (IPS) signatures?
What is the primary purpose of intrusion prevention system (IPS) signatures?
Signup and view all the answers
What feature can be used to refuse traffic from an attacker's IP-address?
What feature can be used to refuse traffic from an attacker's IP-address?
Signup and view all the answers
What can be done if matching signatures are not found in the database?
What can be done if matching signatures are not found in the database?
Signup and view all the answers
Which feature can be used to save a copy of packets that match any signatures included in the filter?
Which feature can be used to save a copy of packets that match any signatures included in the filter?
Signup and view all the answers
What is the subset of signatures in the database that are normally set to monitor?
What is the subset of signatures in the database that are normally set to monitor?
Signup and view all the answers
What does the application control feature consider first if application or filter overrides are configured?
What does the application control feature consider first if application or filter overrides are configured?
Signup and view all the answers
What does the quarantine feature of application control refuse based on?
What does the quarantine feature of application control refuse based on?
Signup and view all the answers
What is used to block outgoing connections to botnet sites or record log messages?
What is used to block outgoing connections to botnet sites or record log messages?
Signup and view all the answers
What does the baseline-built environment provide?
What does the baseline-built environment provide?
Signup and view all the answers
What can be applied to provide alerts on anomalous activity outside of the baseline?
What can be applied to provide alerts on anomalous activity outside of the baseline?
Signup and view all the answers
What can be used for more granular application control?
What can be used for more granular application control?
Signup and view all the answers
What can be used to detect industrial protocols and perform granular message type identification?
What can be used to detect industrial protocols and perform granular message type identification?
Signup and view all the answers
What can be used to help define allowlist policy?
What can be used to help define allowlist policy?
Signup and view all the answers