07-24-2019 06:12 AM - edited 02-21-2020 09:20 AM
Hello community,
I have a simple problem using signatures updates in IPS policy. Each update bring new signatures obviously but also a lot of false positives for us. The idea is, I have alerts for "D-Link" signatures, I don't want to see anymore those signatures since it does not apply to the customer enviroment. I tried to work with the categories available.
Is it possible to exclude or disable some signatures to avoid downloading them in the next updates? How do you usually manage this?
Thank you!
Riccardo
09-11-2023 05:30 AM
Anyone have any feedback? thank you
09-11-2023 08:23 AM - edited 09-11-2023 08:24 AM
Any new D-Link signatures that may be included in the next update would be downloaded automatically. You cannot choose to download only signatures you want and exclude others.
Any Internet-facing resources will get lots of scans looking for well-known vulnerabilities, including those that apply exclusively to D-link. Not having any D-Link in the protected network won't stop the firewall from blocking those scans as they are known by Cisco Talos to be malicious traffic. However, they should be assigned level 3 or 4 impact levels (Not vulnerable or Unknown Target).
09-12-2023 03:16 AM
Thank you for feedback, so there is no way to limit signatures, unless disabling the category itself on an upper layer? Is there a description how the signatures layers and firepower reccomendations works toghether?
Thanks!
09-13-2023 06:36 AM
@rick11 there are some Cisco Live presentations that cover IPS rules and layers. Most recently, see BRKCRT-2466 which can be found here: https://www.ciscolive.com/on-demand/on-demand-details.html?#/session/16360601080850017e86
09-16-2023 08:26 AM
thank you for sharing, I'll take a look!
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide