12.0

Table Of Contents
Table 15-1
Intrusion Prevention management (continued)
DescriptionTask
Regularly check that Intrusion Prevention is enabled on
your computers.
See About monitoring endpoint protection on page 69.
Monitor Intrusion
Prevention protection
Specify the signatures that have different detection
responses.
See Specifying Intrusion Prevention exceptions
on page 140.
Specify signature exceptions
How Intrusion Prevention protection works
Intrusion Prevention protection automatically detects and blocks network attacks.
Intrusion Prevention protection scans every packet that enters and exits a
computer for attack signatures. An attack signature is a unique arrangement of
information that identifies an attacker's attempt to exploit a known operating
system or program vulnerability.
Intrusion Prevention protection uses Symantec's extensive list of attack signatures.
http://securityresponse.symantec.com/avcenter/attack_sigs/index.html
Intrusion Prevention protection optionally blocks all communication to and from
an attacking computer for a specified period of time.
Managing intrusion prevention protection
How Intrusion Prevention protection works
138