Configure Distributed Intrusion Detection

In this lab you will learn how to configure a Distributed Intrusion Detection (DID) to monitor and analyze traffic for suspicious activity. First, you will enable IDS signature auto update. Next, you will enable and configure DID on a vSphere cluster. Finally, you will generate malicious traffic and view the intrusion detection events.

Overview

In this lab you will learn how to configure a Distributed Intrusion Detection (DID) to monitor and analyze traffic for suspicious activity. First, you will enable IDS signature auto update. Next, you will enable and configure DID on a vSphere cluster. Finally, you will generate malicious traffic and view the intrusion detection events.

Learning Partner
Skillable
Skillable
Ready-built content across a variety of topics and technologies