IDS is producing an increased amount of false positive events about brute force attempts on the organization's mail server. How should the Snort rule be modified to improve performance?
Option D looks like the way to go. Tuning the count and seconds threshold could help filter out those pesky false positives without blocking legitimate traffic.
Verda
4 days agoAide
24 days agoDaryl
3 days agoMagda
11 days agoGary
25 days agoJerry
27 days agoEladia
29 days agoTatum
1 months ago