SYSTEM WARNING: 'file_get_contents(https://www.clearos.com/?rendertype=json&get=header): failed to open stream: Connection refused' in '/var/www/virtual/newwrapper/cf_topmenu.inc' line 5
Anonymous | Login | 2024-12-21 23:58 MST | |
View Issue Details [ Jump to Notes ] | [ Issue History ] [ Print ] |
ID | Project | Category | View Status | Date Submitted | Last Update |
0000203 | ClearOS | app-intrusion-prevention - Intrusion Prevention | public | 2010-10-19 11:05 | 2019-03-12 03:43 |
|
Reporter | user2 | |
Assigned To | | |
Priority | normal | Severity | feature | Reproducibility | N/A |
Status | closed | Resolution | suspended | |
Platform | | OS | | OS Version | |
Product Version | | |
Target Version | | Fixed in Version | | |
|
Summary | 0000203: Allow end user the ability to override which rules should be whitelisted |
Description | Some intrusion prevention rules can cause grief if they are triggered by a false positive. For example, some application X used by Acme Co. might trigger the intrusion prevention system and lock out legitimate users. There should be a way to whitelist the specific rule that triggers application X. |
Tags | No tags attached. |
|
Attached Files | |
|
Relationships |
related to | 0000609 | closed | | Need method of specifying snortsam block rules |
|
Relationships |
Notes |
Issue History |
Date Modified |
Username |
Field |
Change |
2010-10-19 11:05 |
user2 |
New Issue |
|
2010-10-19 11:05 |
user2 |
Status |
new => confirmed |
2012-05-15 08:00 |
user2 |
Relationship added |
related to 0000609 |
2015-05-25 05:10 |
user2 |
Target Version |
Future => |
2019-03-12 03:43 |
NickH |
Note Added: 0010861 |
|
2019-03-12 03:43 |
NickH |
Status |
confirmed => closed |
2019-03-12 03:43 |
NickH |
Resolution |
open => suspended |
Issue History |
SYSTEM WARNING: 'file_get_contents(https://www.clearos.com/?rendertype=json&get=footer): failed to open stream: Connection refused' in '/var/www/virtual/newwrapper/cf_footer.inc' line 7
Copyright © 2009- ClearCenter Ltd.