cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
2764
Views
6
Helpful
2
Replies

How to verify enabled snort rules in FTD

Chess Norris
Level 4
Level 4

Hi,

I have an IPS policy based on Balanced Security and Connectivity and according to that policy 473 rules are set to generate events and 8657 rules are set to drop and generate events. I have downloaded the latest ruleset and want to verify that all signatures related to the log4j vulnerability are enabled and set to drop and generate events. However if I select "View rules" from the Balanced Security and Connectivity policy layer, it will display 46237 rules, which I assume is every available snort signatures. So my question is how I can see only the 8657 signature that I'm currently using? I am assuming all log4j signatures are enabled in the Balanced Security and Connectivity policy, but I just want to make sure this is the case.

Thanks

/Chess 

1 Accepted Solution

Accepted Solutions

shahzad_ahmed
Level 1
Level 1

You should be able to search for the snort rule ID associated with this and see what the action is set to which might well be “set to drop”. But you would need to confirm.

 

https://www.snort.org/advisories/talos-rules-2021-12-10

View solution in original post

2 Replies 2

shahzad_ahmed
Level 1
Level 1

You should be able to search for the snort rule ID associated with this and see what the action is set to which might well be “set to drop”. But you would need to confirm.

 

https://www.snort.org/advisories/talos-rules-2021-12-10

Chess Norris
Level 4
Level 4

Thanks, it looks like even the "Connectivity Over Security" base policy have all the log4j signatures enabled.

 

/Chess

Review Cisco Networking for a $25 gift card