How to Configure Suspicious Objects Monitor & Prevention Modes for Edge Series Devices
  • 27 Mar 2023
  • 2 Minutes to read

How to Configure Suspicious Objects Monitor & Prevention Modes for Edge Series Devices


Article summary

Summary


Suspicious Objects (SO) are suspicious IP addresses (Nodes) or network connections (Links) to be blocked on the Edge series devices, including EdgeIPS, EdgeIPS Pro, and EdgeFire. The suspicious objects are imported to EdgeOne from the external SO sources, such as third-party products, via the Suspicious Object API keys. There are two security modes for SO, “Monitor Mode” and “Prevention Mode”, aiming to decide whether or not the device will take action when a threat or an attack is detected.

image.png

If the suspicious object operation mode is “Monitor Mode”, the device will not take any action but generate logs when the suspicious object rules are matched. The monitor mode is recommended in the POC (Proof of Concept) or lab testing stage for security administrators to monitor threat detection results.

If the suspicious object operation mode is “Prevention Mode”, the device will take action to block the traffic and generate logs when the suspicious object rules are matched. The device could be switched to prevention mode in the production stage after the third-party suspicious object pool is verified by IT or OT team.



The following table summarizes the settings:

Security Operation SettingsSuspicious Object Operation ModeAction
Generate LogsAllow the TrafficBlock the Traffic
InlineMonitorVV
PreventionVV
Offline (Mirror Traffic)MonitorVV
Prevention
The suspicious objects list is of higher priority than the device rules and EdgeOne rules listing in Policy Enforcement.
To enable the Suspicious Objects (SO) function on EdgeOne, please refer to the application note How to Configure Suspicious Objects on EdgeOne .

Applicable Version


All versions of EdgeIPS, EdgeIPS Pro and EdgeFire

Details


1. Configuring Monitor Mode for the Edge Device

  1. Access the web-based management console of the Edge device.
  2. Go to [Security] > [Suspicious Objects].
  3. Use the toggle to enable [Suspicious Objects].
  4. Select [Monitor Mode] for [Suspicious Object Operation Mode].
  5. Click the [Save] button to save the settings.
    image.png


2. Configuring Prevention Mode for the Edge Device

  1. Access the web-based management console of the Edge device.
  2. Go to [Security] > [Suspicious Objects].
  3. Use the toggle to enable [Suspicious Objects].
  4. Select [Prevention Mode] for [Suspicious Object Operation Mode].
  5. Click the [Save] button to save the settings.
    image.png


3. Changing the Action of Suspicious Object for the Edge Device

  1. Access the web-based management console of the Edge device.
  2. Go to [Security] > [Suspicious Objects] > [Suspicious Object Rule List].
  3. Select one or multiple suspicious objects and choose an action, [Drop and Log] or [Bypass and Log] for the time when the selected suspicious object rules are matched.
    image.png



For support assistance, please Contact Us at support@txone.com or your Support Provider.


Was this article helpful?