<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: IPS policy signature disabling technologies in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ips-policy-signature-disabling-technologies/m-p/4921986#M1104181</link>
    <description>&lt;P&gt;Thank you for feedback, so there is no way to limit signatures, unless disabling the category itself on an upper layer? Is there a description how the signatures layers and firepower reccomendations works toghether?&amp;nbsp;&lt;BR /&gt;Thanks!&lt;/P&gt;</description>
    <pubDate>Tue, 12 Sep 2023 10:16:12 GMT</pubDate>
    <dc:creator>rick11</dc:creator>
    <dc:date>2023-09-12T10:16:12Z</dc:date>
    <item>
      <title>IPS policy signature disabling technologies</title>
      <link>https://community.cisco.com/t5/network-security/ips-policy-signature-disabling-technologies/m-p/3896689#M42548</link>
      <description>&lt;P&gt;Hello community,&lt;/P&gt;&lt;P&gt;I have a simple problem using signatures updates in IPS policy. Each update bring new signatures obviously but also a lot of false positives for us. The idea is, I have alerts for "D-Link" signatures, I don't want to see anymore those signatures since it does not apply to the customer&amp;nbsp;enviroment. I tried to work with the categories available.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is it possible to exclude or disable some signatures to avoid downloading them in the next updates? How do you usually manage this?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you!&lt;/P&gt;&lt;P&gt;Riccardo&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 17:20:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-policy-signature-disabling-technologies/m-p/3896689#M42548</guid>
      <dc:creator>rick11</dc:creator>
      <dc:date>2020-02-21T17:20:10Z</dc:date>
    </item>
    <item>
      <title>Re: IPS policy signature disabling technologies</title>
      <link>https://community.cisco.com/t5/network-security/ips-policy-signature-disabling-technologies/m-p/4921406#M1104146</link>
      <description>&lt;P&gt;Anyone have any feedback? thank you&lt;/P&gt;</description>
      <pubDate>Mon, 11 Sep 2023 12:30:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-policy-signature-disabling-technologies/m-p/4921406#M1104146</guid>
      <dc:creator>rick11</dc:creator>
      <dc:date>2023-09-11T12:30:02Z</dc:date>
    </item>
    <item>
      <title>Re: IPS policy signature disabling technologies</title>
      <link>https://community.cisco.com/t5/network-security/ips-policy-signature-disabling-technologies/m-p/4921484#M1104158</link>
      <description>&lt;P&gt;Any new D-Link signatures that may be included in the next update would be downloaded automatically. You cannot choose to download only signatures you want and exclude others.&lt;/P&gt;
&lt;P&gt;Any Internet-facing resources will get lots of scans looking for well-known vulnerabilities, including those that apply exclusively to D-link. Not having any D-Link in the protected network won't stop the firewall from blocking those scans as they are known by Cisco Talos to be malicious traffic. However, they should be assigned level 3 or 4 impact levels (Not vulnerable or Unknown Target).&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/firepower/640/configuration/guide/fpmc-config-guide-v64/working_with_intrusion_events.html#ID-2211-000004aa" target="_blank" rel="noopener"&gt;https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/admin/720/management-center-admin-72/events-intrusion.html#ID-2211-000004aa&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Sep 2023 15:24:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-policy-signature-disabling-technologies/m-p/4921484#M1104158</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2023-09-11T15:24:24Z</dc:date>
    </item>
    <item>
      <title>Re: IPS policy signature disabling technologies</title>
      <link>https://community.cisco.com/t5/network-security/ips-policy-signature-disabling-technologies/m-p/4921986#M1104181</link>
      <description>&lt;P&gt;Thank you for feedback, so there is no way to limit signatures, unless disabling the category itself on an upper layer? Is there a description how the signatures layers and firepower reccomendations works toghether?&amp;nbsp;&lt;BR /&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Tue, 12 Sep 2023 10:16:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-policy-signature-disabling-technologies/m-p/4921986#M1104181</guid>
      <dc:creator>rick11</dc:creator>
      <dc:date>2023-09-12T10:16:12Z</dc:date>
    </item>
    <item>
      <title>Re: IPS policy signature disabling technologies</title>
      <link>https://community.cisco.com/t5/network-security/ips-policy-signature-disabling-technologies/m-p/4922755#M1104210</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/235820"&gt;@rick11&lt;/a&gt; there are some Cisco Live presentations that cover IPS rules and layers. Most recently, see BRKCRT-2466 which can be found here: &lt;A href="https://www.ciscolive.com/on-demand/on-demand-details.html?#/session/16360601080850017e86" target="_blank"&gt;https://www.ciscolive.com/on-demand/on-demand-details.html?#/session/16360601080850017e86&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 13 Sep 2023 13:36:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-policy-signature-disabling-technologies/m-p/4922755#M1104210</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2023-09-13T13:36:23Z</dc:date>
    </item>
    <item>
      <title>Re: IPS policy signature disabling technologies</title>
      <link>https://community.cisco.com/t5/network-security/ips-policy-signature-disabling-technologies/m-p/4924470#M1104282</link>
      <description>&lt;P&gt;thank you for sharing, I'll take a look!&lt;/P&gt;</description>
      <pubDate>Sat, 16 Sep 2023 15:26:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ips-policy-signature-disabling-technologies/m-p/4924470#M1104282</guid>
      <dc:creator>rick11</dc:creator>
      <dc:date>2023-09-16T15:26:08Z</dc:date>
    </item>
  </channel>
</rss>

