Dr Billwants to configure a custom script to launch an application for certain rules.
Which of the following should Dr Billconfigure?
Correct Answer: D
Custom User-Defined Alerts
Many companies have Intrusion Detections Systems (IDS) running on their networks to detect potential attacks. Network IDS Sensors are usually positioned on each subnet of the firewall to listen to traffic in promiscuous mode and detect attacks using either a signature-based or anomaly-based detection method. IDS sensors can detect attacks, but most products don't have the ability to stop attacks after they are detected. By the time an administrator is alerted to most attacks, the damage is already done. (It's like having a silent car alarm that sends you an alphanumeric page after someone has broken in and stolen your stereo. The text message should say, "Thank you.
It has been a pleasure being your thief.")
Check Point's SmartDefense has the ability to detect an attack, block the attack, and send alerts about the attack. Using Check Point's alerting features, an administrator can configure SmartDefense to block known attacks and send a customized alert when an attack occurs. The customized alert can be an e-mail, an alphanumeric message, a screen pop-up, or whatever else the administrator would like to use.