Which event action can be configured for a signature on the IDSM?
A.
Log all traffic
B.
Log traffic between attacker and victim IP Addresses
C.
Capture packets to a local file
D.
Capture packets to a local file or remote analyzer
Which event action can be configured for a signature on the IDSM?
Which event action can be configured for a signature on the IDSM?
A.
Log all traffic
B.
Log traffic between attacker and victim IP Addresses
C.
Capture packets to a local file
D.
Capture packets to a local file or remote analyzer