How can you configure your sensor to identify and stop this activity?

You think users on your corporate network are disguising the use of file-sharing applications by
tunneling the traffic through port 80. How can you configure your sensor to identify and stop this
activity?

You think users on your corporate network are disguising the use of file-sharing applications by
tunneling the traffic through port 80. How can you configure your sensor to identify and stop this
activity?

A.
Enable HTTP Application Policy and enable the Alarm on Non-HTTP Traffic signature.

B.
Enable the Alarm on the Non-HTTP Traffic signature. Then create an Event Action Override
that adds the Deny Packet Inline action to events triggered by the signature if the traffic originates
from your corporate network.

C.
Enable all signatures in the Service HTTP engine. Then create an Event Action Override that
adds the Deny Packet Inline action to events triggered by these signatures if the traffic originates
from your corporate network.

D.
Assign the Deny Packet Inline action to all signatures in the Service HTTP engine.

E.
Enable all signatures in the Service HTTP engine.



Leave a Reply 0

Your email address will not be published. Required fields are marked *