Configure Distributed Intrusion Detection
In this lab you will learn how to configure a Distributed Intrusion Detection (DID) to monitor and analyze traffic for suspicious activity. First, you will enable IDS signature auto update. Next, you will enable and configure DID on a vSphere cluster. Finally, you will generate malicious traffic and view the intrusion detection events.
Time
30 minutes
Difficulty
Beginner
Share
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or
Already have an account? Sign In »

Overview
In this lab you will learn how to configure a Distributed Intrusion Detection (DID) to monitor and analyze traffic for suspicious activity. First, you will enable IDS signature auto update. Next, you will enable and configure DID on a vSphere cluster. Finally, you will generate malicious traffic and view the intrusion detection events.
Learning Partner