Each rule summary and management page in the ESM Console displays details about the rules that define your organization’s security policy. To narrow the number of rules that the ESM Console displays, you can filter the rules using the filter control at the top of each column. Use the filter control to define either one or two values to filter on rule status, rule name, rule description, or modification date.
The operators that are available for each column depend on the column type. For example, you can filter columns that display text using any of the following operators to search for a string value: Is equal to, Is not equal to, Starts with, Contains, Does not contain, or Ends with. For columns that display a date, you can filter for a specific date or a date range using any of the following operators: Is equal to, Is not equal to, Is after or equal to, Is after, Is before or equal to, or Isbefore.
The ESM Console identifies columns that have active filters with an applied filter icon and a blue background. To remove the filter, click the icon and then select Clear.
The following table shows the columns, operators, and values that you can use to filter the rules.
Traps for Linux
Traps for Linux The Traps agent protects Linux servers by preventing attackers from leveraging software exploits or vulnerabilities to compromise an endpoint. The Traps agent ...
File Hash Search Conditions
File Hash Search Conditions Search fields at the top of the Hash Control page allow you to filter using one or more search conditions. For ...
Export and Import Policy Files
Export and Import Policy Files From each rule management page on the ESM Console, you can import and export rules. This enables you to: Back ...
Issues Addressed in Traps Endpoint Security Manager 4.2
List of addressed issues in the Traps Endpoint Security Manager 4.2. ...
Traps Endpoint Security Manager Known Issues
Known issues with the Traps Endpoint Security Manager and Traps agent 4.2. ...
User-Defined Rules A user-defined rule is a rule that you—or additional administrators with access to the ESM Console—create to manage the Traps security policy and ...
Changes to Default Behavior
Review the changes to default behavior in ESM and Traps 4.2 releases. ...
Collect New Process Information
Collect New Process Information By default, Traps protects the most commonly used and well-known processes on your endpoints. In addition, when WildFire is enabled, Traps ...
Save Rules To save a rule, you must complete all required fields for that rule type. Tabs with required fields are indicated by a red ...