Configure Distributed Intrusion Detection

Skillable
Learn On Demand Pro Series
New

In this lab you will learn how to configure a Distributed Intrusion Detection (DID) to monitor and analyze traffic for suspicious activity. First, you will enable IDS signature auto update. Next, you will enable and configure DID on a vSphere cluster. Finally, you will generate malicious traffic and view the intrusion detection events.

Time
30 minutes
Difficulty
Beginner
Share
NEED TO TRAIN YOUR TEAM? LEARN MORE
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Overview

In this lab you will learn how to configure a Distributed Intrusion Detection (DID) to monitor and analyze traffic for suspicious activity. First, you will enable IDS signature auto update. Next, you will enable and configure DID on a vSphere cluster. Finally, you will generate malicious traffic and view the intrusion detection events.