Configure Vulnerability Rules
For supported software information, click here.
Vulnerability rules determines the level of protection against buffer overflows, illegal code execution, and other attempts to exploit system vulnerabilities. You can define rules separately for Director nodes and Versa Operating SystemTM (VOSTM) devices.
To configure vulnerability rules for a Director node:
- In Director view:
- Select the Configuration tab in the top menu bar.
- Select Templates > Device Templates in the horizontal menu bar.
- Select an organization in the left navigation panel.
- Select a template in the main pane. The view changes to Appliance view.
- Select the Configuration tab in the top menu bar.
- Select Objects & Connectors > Objects > Custom Objects > Vulnerability Rules in the left menu bar. The main pane displays, with the Director tab selected.
- Click the Upload File icon. In the Upload Custom Vulnerability Rules File to Director, click Browse and select the file.
- Click OK.
Supported Software Information
Releases 20.2 and later support all content described in this article.