In the table of Intrusion Detection rule sets, you can select the relevant sets of rules to perform actions with them.
To select the relevant sets of Intrusion Detection rules, perform one of the following actions:
The title of the left-most column of the table shows the rule set selection check box. Depending on the number of selected rule sets, the check box can have one of the following states:
– all rule sets that satisfy the current filter and search settings were not selected in the table. However, one rule set or multiple rule sets may be selected in the table by using the check boxes next to the rule sets or by using the CTRL or SHIFT key.
– all rule sets that satisfy the current filter and search settings were selected in the table.
– all rule sets that satisfy the current filter and search settings were selected in the table, but then the check boxes for some of the rule sets were cleared. This state is also retained if the check boxes were cleared for all rule sets selected in this way (due to the fact that the number of selected rule sets may change).If all rule sets that satisfy the filter and search settings are selected, the number of selected rule sets may be automatically changed. For example, the available rule sets in the table may be changed by an application user in a different connection session.
Page top