Creating a Suspicious Activity Rule
SAM rules use CPU resources. Therefore, set an expiration time so you can inspect traffic but not negatively affect performance.
If you confirm that an activity is risky, edit the Security Policy, educate users, or handle the risk.
You can block suspicious activity based on source, destination, or service.
To block an activity:
- In the SmartView Monitor, click the in the toolbar.
The window opens.
- Click.
The window opens.
- In and in , select or :
- To block all sources or destinations that match the other parameters, enter
Any
. - To block one suspicious source or destination, enter an IP and .
- In :
- To block all connections that fit the other parameters, enter
Any
. - To block one suspicious service or protocol, click the button and select a service from the window that opens.
- In ,set a time limit.
- Click .
To create an activity rule based on TCP or UDP use:
- In the window , click
The window opens.
- Click .
- Select or .
- Enter the port number.
- Click .
To define SmartView Monitor actions on rule match:
- In the window, click .
The window opens.
- In , select the Firewall action for SmartView Monitor to do on rule match:
- - Send a message about the activity, but do not block it.
- - Drop packets, but do not send a response. The connection will time out.
- - Send an RST packet to the source and close the connection.
- In Track, select , or .
- If the action is : To close the connection immediately on rule match, select .
- Click .