Which event action can be configured for a signature on the IDSM?
A.
log all traffic
B.
capture packets to a local file
C.
capture packets to a local file or remote analyzer
D.
log traffic between attacker and victim IP addresses
Which event action can be configured for a signature on the IDSM?
Which event action can be configured for a signature on the IDSM?
A.
log all traffic
B.
capture packets to a local file
C.
capture packets to a local file or remote analyzer
D.
log traffic between attacker and victim IP addresses