Viewing the table of Network Anomaly Detection rules:

The table of network anomaly detection rules is displayed in the Intrusion detection section of the Network Anomaly Detection tab.

Users with the Senior security officer and Security auditor roles can view the table of network anomaly detection rules.

On the Network Anomaly Detection tab, the delay of traffic receipt counter is displayed below the toolbar. The counter contains the dynamically changing lag time of incoming traffic data received by the database used to store protocol attributes. If the application detects a critical lag time, the green icon is no longer displayed next to the counter. In this case, automatic runs of rules occurring during this period may lead to an incorrect result. Before returning the counter to its normal state, it is recommended to manually run the rules while taking into account the available range for analyzing protocol attributes.

Rule settings are displayed in the following columns of the table:

When viewing the Network Anomaly Detection rules table, you can use the configuration, filter, and sorting functions.

Page top