03-19-2017 05:55 PM - edited 03-12-2019 02:05 AM
Thinking to select a group of important well defined hosts and apply a stricter IPS level.
Anyone using the above policies? Moved from balanced security to a stricter policy?
03-19-2017 08:05 PM
We have been trialling that mode for about 3 months. We get maybe 1 false positive every month to two months. Note that we are typically only using "business" web sites, with not that much variation. If your users are accessing a wider variety of sites you may get different results.
Overall, we have decided to accept that odd false positive and leave it on preferring security.
03-20-2017 12:53 PM
Which mode? Max detection or security over connectivity?
Thanks,
Evan
03-20-2017 01:06 PM
Security over Connectivity.
03-20-2017 06:10 PM
I have used the security over connectivity policy once before. I have not seen a lot of differences compared to the balanced policy. I do see more low impact signatures (not suspicious) being hit with this policy.
03-21-2017 12:24 AM
FYI, please see below for a high-level comparison of the options.
Source:
BRKSEC-3121 Firepower Threat Defence Advanced Capabilities Deployment and Troubleshooting Options (2017 Melbourne)
https://www.ciscolive.com/online/connect/sessionDetail.ww?SESSION_ID=94771
Connectivity over Security: ~ 500 Rules
• CVSS Score of 10
• Age of Vulnerability: 2 year and newer
Balanced : ~ 7200 Rules
• CVSS Score of 9 or greater
• Age of Vulnerability: 2 year and newer
• Rule category equals Malware-CnC, blacklist, SQL Injection, Exploit-kit
Security over Connectivity: ~ 10000 Rules
• CVSS Score of 8 or greater
• Age of Vulnerability: 3 years and newer
• Rule category equals Malware-CnC, blacklist, SQL Injection, Exploit-kit, App-detect
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide