Selecting sets of Intrusion Detection rules

In the table of Intrusion Detection rule sets, you can select the relevant sets of rules to perform actions with them.

To select the relevant sets of Intrusion Detection rules, perform one of the following actions:

The title of the left-most column of the table shows the rule set selection check box. Depending on the number of selected rule sets, the check box can have one of the following states:

If all rule sets that satisfy the filter and search settings are selected, the number of selected rule sets may be automatically changed. For example, the available rule sets in the table may be changed by an application user in a different connection session.

Page top