04-13-2023 07:03 AM
Hi All
Although i have seen a similar question asked it did not completely align with my use case so apologies if it sounds the same.
I have a deployment where a number of IDS rule are being triggered and dropped by inbound traffic to on prem webserver - I am okay with the fact the snort rule is correctly triggering and im okay with the event being logged.
What is becoming tedious is the its being flagged by the FMC as being an IOC where clearly the traffic and attempt has been blocked.
I have seen how to not log the rule and even disable some IOC triggers on a host by host basis but these solution all seem a bit heavy handed - am i missing something.
can i and how do i set an IDS signature to Drop, log but NOT trigger the IOC?
thanks in advance
04-17-2023 11:05 AM
04-18-2023 02:21 AM
Dear bot, do you have plans to make Network Discovery IoC rules editable and implement user-configurable IoC suppression rules to suppress IoC for certain conditions? IMO this is a very valid enhancement request to suppress IoC if Intrusion Rule drops traffic. This would be a much more clean solution than editing metadata for each individual signature or disabling certain IoC rules per host profile.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide