Name or Rename a Rule
Table of Contents
4.2 (EoS)
Expand all | Collapse all
-
- Set Up the Endpoint Infrastructure
- Activate Traps Licenses
-
- Endpoint Infrastructure Installation Considerations
- TLS/SSL Encryption for Traps Components
- Configure the MS-SQL Server Database
- Install the Endpoint Security Manager Server Software
- Install the Endpoint Security Manager Console Software
- Manage Proxy Communication with the Endpoint Security Manager
- Load Balance Traffic to ESM Servers
-
- Malware Protection Policy Best Practices
- Malware Protection Flow
- Manage Trusted Signers
-
- Remove an Endpoint from the Health Page
- Install an End-of-Life Traps Agent Version
-
-
- Traps Troubleshooting Resources
- Traps and Endpoint Security Manager Processes
- ESM Tech Support File
-
- Access Cytool
- View the Status of the Agent Using Cytool
- View Processes Currently Protected by Traps Using Cytool
- Manage Logging of Traps Components Using Cytool
- Restore a Quarantined File Using Cytool
- View Statistics for a Protected Process Using Cytool
- View Details About the Traps Local Analysis Module Using Cy...
- View Hash Details About a File Using Cytool
Name or Rename a Rule
The ESM Console automatically generates the rule name
and description based on the rule details and time of creation.
To override the autogenerated name, select the Name tab,
clear the Activate automatic description option,
and then enter your own rule name and description.
The rule that is modified or edited most
recently takes precedence over older rules of the same type. As
a result, changing the name of a rule changes the modification date
for the rule and can cause the edited rule to override older rules.
The rule description is a good place
to record the business reasons for the creation of a rule. For example,
you might include an incident identification number or a link to
a help desk ticket.