<?xml version="1.0"?>
<Module projectID="1264" moduleID="1447">
	<ModuleName>mod4</ModuleName>
	<AU>C02_M04</AU>
	<Title>NIDS Rule Optimization</Title>
	<Subtitle>NIDS Rule Optimization</Subtitle>
	<LinkSet>links</LinkSet>
	<CourseMapSWFPath>../C02_M04/assets/coursemap.swf</CourseMapSWFPath>
	<NavBtns>
        <NavBtn>
			<ID>courseMenuBtn</ID>
			<Label>Course menu</Label>
			<RMAText>Course menu. Select this button to access the course menu.</RMAText>
			<ClickEventName>MainMenuButtonClicked</ClickEventName>
		</NavBtn> 	
		<NavBtn>
			<ID>moduleMapBtn</ID>
			<Label>Lesson Map</Label>
			<RMAText>Lesson Map.  Select this button to access the lesson map.</RMAText>
			<ClickEventName>CourseMapButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>glossaryBtn</ID>
			<Name>Glossary</Name>
			<RMAText>Glossary. Select this button open the glossary.</RMAText> 
			<ClickEventName>GlossaryButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>resourcesBtn</ID>
			<Label>Resources</Label>
			<RMAText>Resources. Select this button open the resources.</RMAText>
			<ClickEventName>ResourcesButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>exitBtn</ID>
			<Label>Exit</Label>
			<RMAText>Exit.  Select this button to exit the course.</RMAText>
			<ClickEventName>ExitButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>replayBtn</ID>
			<Label>Replay</Label>
			<RMAText>Replay. Select this button to replay the current screen.</RMAText>
			<ClickEventName>ReplayButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>pauseBtn</ID>
			<Label>Pause</Label>
			<RMAText>Pause.  Select this button to pause the course.</RMAText>
			<ClickEventName>PauseButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>resumeBtn</ID>
			<Label>Resume</Label>
			<RMAText>Resume. Select this button to resume the course.</RMAText>
			<ClickEventName>ResumeButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn prevBtn="true">
			<ID>previousPgBtn</ID>
			<Name>Previous Page</Name>
			<RMAText>Previous. Select this button to go to the previous screen.</RMAText>
			<ClickEventName>PreviousButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn nextBtn="true">
			<ID>nextPgBtn</ID>
			<Name>Next Page</Name>
			<RMAText>Next. Select this button to go to the next screen.</RMAText>
			<ClickEventName>NextButtonClicked</ClickEventName>
		</NavBtn>
	</NavBtns>
	<Topics>
		<Topic>
			<Title>Introduction</Title>
			<Subtitle/>
			<Pages>
				<Page>
					<Title>Objectives and Topics</Title>
					<Subtitle/>
					<Filename>disaidscr4_01</Filename>
					<PageNbr>1</PageNbr>
					<ShowText>
						<Txt frameNbr="1">Welcome to the NIDS Rule Optimization lesson. When you have completed this lesson, you will be able to identify the benefits and liabilities of NIDS rule modifiers and the purpose of tagging and logging. Finally, you will use this information to write a complex NIDS rule using tagging. There are five topics for this lesson. After completing the introduction, you will learn about NIDS rule performance. Then you will learn about correlating information with a NIDS rule and the importance of logging. Finally, you will write a NIDS custom rule. </Txt>
						<Txt frameNbr="1"/>
					</ShowText>
				<Sec508Data><ContentDescription frameNbr="1">Rich Media Text Description, Course: D O D Intrusion Detection System (I D S) Analysis, Part 3, Module 2: DoD Network Intrusion Detection System (NIDS) Custom Rules Module, Lesson 4: NIDS Rule Optimization, For each screen you will hear a description. The description is cued by an audio tone. Listen to the description, and then select the play audio narration button to continue. Screen 1 of 12. Lesson title: NIDS Rule Optimization. Topic title: Introduction. Screen title: Objectives and Topics. Three learning objectives display in support of audio. Five topics display. The first topic is titled Introduction. The second topic is titled Rule Performance. The third topic is titled Correlating Information. The fourth topic is Logging, followed by the final topic Conclusion. </ContentDescription></Sec508Data></Page>
				<Page>
					<Title>Overview of Rule Optimization</Title>
					<Subtitle/>
					<Filename>disaidscr4_02</Filename>
					<PageNbr>2</PageNbr>
					<ShowText>
						<Txt frameNbr="1">As CND-IS personnel, you want to gain the most benefit from your resources while protecting the data. Optimized custom rules will leverage the robust abilities of your NIDS to accurately detect intrusion and malicious events while maintaining overall network and appliance performance. NIDS rule optimization allows the most efficient use of resources to capture accurate information about network intrusions. </Txt>
						<Txt frameNbr="1"/>
					</ShowText>
				<Sec508Data><ContentDescription frameNbr="1">Screen 2 of 12. Screen title: Overview of Rule Optimization. Image of person walking on tight rope with a long balancing stick displays. Image of a box labeled intrusion data is displayed on one end of the balancing stick. An image of a box labeled network performance is displayed on the other end of the balancing stick. Text displays NIDS rule optimization.</ContentDescription></Sec508Data></Page>
			</Pages>
		</Topic>
		<Topic>
			<Title>Rule Performance</Title>
			<Subtitle/>
			<Pages>
				<Page>
					<Title>Importance of Rule Performance</Title>
					<Subtitle/>
					<Filename>disaidscr4_03</Filename>
					<PageNbr>3</PageNbr>
					<ShowText>
						<Txt frameNbr="1">When creating NIDS custom rules for your network, there are several key points to keep in mind. You write rules efficiently to balance system resources with data monitoring. As CND-IS personnel, you should understand what information you really need from the NIDS data and the ramifications your custom rules have on overall performance. Monitoring the context of alerts and messages from rules serves an important purpose. Correlating data helps to gain insight into possible malicious events and data leaks. Efficient custom rules help leverage the full power of the NIDS, without creating unnecessary processing. NIDS serves as a key component of a defense-in-depth strategy. You want to provide the right level of monitoring. Too little monitoring allows malicious events to go undetected while over monitoring can really affect NIDS performance. When custom rules are written too broadly it leads to NIDS analyzing needless data and operating at a higher workload. A NIDS will fail more frequently under high load. When a NIDS is overburdened, network traffic goes unprocessed. When this happens, the NIDS misses true positives and may create a spike of false negatives. Protect your network from instability. Use custom rules wisely and write them efficiently. </Txt>
						<Txt frameNbr="1"/>
					</ShowText>
				<Sec508Data><ContentDescription frameNbr="1">Screen 3 of 12. Topic title: Rule Performance. Screen title: Importance of Rule Performance. Displays reprised image of person on tight rope with balancing stick. Text displays, balance system resources with data security. On the network performance side of balancing stick, image of pencil breaking displays with text, know the ramifications of rule criteria. On the intrusion detection side of balancing stick, image of a filing cabinet with text; correlate findings to discover important information. Image of an overworked computer displays on network performance side, with text; write efficient rules to decrease load on NIDS. Image of a clock and calendar displays on intrusion detection side, with text; provide right amount of monitoring. The image of the overworked computer rocks side to side causing the balancing stick to become unbalanced. Text displays; NIDS fail more frequently under high load. Followed by bulleted text in support of audio stating; traffic goes unanalyzed, true positives missed, false negatives may spike. </ContentDescription></Sec508Data></Page>
				<Page>
					<Title>Rule Optimizers</Title>
					<Subtitle/>
					<Filename>disaidscr4_04</Filename>
					<PageNbr>4</PageNbr>
					<ShowText>
						<Txt frameNbr="1">When creating custom NIDS rules, remember to keep the ramifications of your rule in mind. For example, the any variable is a powerful option when writing custom NIDS rules and may work as your best option for certain situations. For example, malware C2 channels may occur on any port. However, you need to be aware of the implications of using the any variable. &quot;Any&quot; is resource intensive. Using the any variable will create a greater load on your NIDS because it forces the analysis of more data packets. When possible, designate the specific ports for rules to reduce the load on the NIDS. Optimize custom rules by specifically identifying which addresses or set of addresses and ports to analyze. For those instances that require scanning all IP addresses and ports, improve efficiency by limiting how much of the content is analyzed using content modifiers such as offset, depth, distance, and within when creating custom rules. Remember that these content modifiers narrow the search area, potentially skipping large portions of packet data. This decreases the load on the NIDS and improves the accuracy of the rules. </Txt>
						<Txt frameNbr="1"/>
					</ShowText>
				<Sec508Data><ContentDescription frameNbr="1">Screen 4 of 12. Screen title: Rule Optimizers. Reprised image of broken pencil with caution symbol displays. Text displays, variable: any. Bulleted text displays in support of audio: sometimes best option, such as malware C 2 channels. Next bulleted text displays; resource intensive, because it creates greater load on the NIDS, and causes NIDS to inspect more traffic. Bulleted text concludes with address and port specified to reduce workload. Image of a check mark displays representing efficiency. Text displays, content modifiers: offset-depth and distance-within. Bulleted text states: improve efficiency, narrow search area, decrease amount of data to analyze, decrease workload for NIDS, and improve accuracy.</ContentDescription></Sec508Data></Page>
			</Pages>
		</Topic>
		<Topic>
			<Title>Correlating Information</Title>
			<Subtitle/>
			<Pages>
				<Page>
					<Title>Importance of Correlating Information</Title>
					<Subtitle/>
					<Filename>disaidscr4_05</Filename>
					<PageNbr>5</PageNbr>
					<ShowText>
						<Txt frameNbr="1">You have learned how to create NIDS custom rules to assist in monitoring your network. When a potential issue arises you receive a NIDS alert. Alerts such as these are of importance, but they provide a limited view of the event or potential malicious activity. In reviewing each alert you see the specific malicious packet that triggered the NIDS rule. What about subsequent data? How wide spread is this potential event? Is malicious activity occurring on other ports or protocols? Using only NIDS alerts, you may miss the context of the activity. When you review the data prior to and after the trigger you gain context of what is occurring. Your ability to understand the event and develop a solution relies on your ability to correlate the trigger within the context of other data. Otherwise you may receive an alert but not have enough data to determine the cause or purpose, allowing a potential malicious event to go unresolved. </Txt>
						<Txt frameNbr="1"/>
					</ShowText>
				<Sec508Data><ContentDescription frameNbr="1">Screen 5 of 12. Topic Title: Correlating Information. Screen title: Importance of Correlating Information. NIDS alert file image displays. Text displays; NIDS alerts, followed by bulleted text in support of audio: show a limited view of event, show specific malicious packets, and miss the context. Text displays; correlating information provides you the key to understanding the event.</ContentDescription></Sec508Data></Page>
				<Page>
					<Title>Tag</Title>
					<Subtitle/>
					<Filename>disaidscr4_06</Filename>
					<PageNbr>6</PageNbr>
					<ShowText>
						<Txt frameNbr="1">To provide the context for a triggered alert, you can use the rule option &quot;tag&quot;. When writing a NIDS custom rule, place &quot;tag&quot; after the content and just prior to rule identifiers. Tag can provide you with the insight to understand the event and develop a solution. When using the rule option tag, it flags any traffic triggering the alert and logs subsequent data packets. You can use tag to log subsequent sessions or follow the traffic going to and coming from a specific host or client. This additional information assists in analyzing the threat and developing a solution. When using the rule option tag in your NIDS custom rule follow the standard format of the keyword, colon, followed by the modifiers for type, count, metric, and direction. Select each tag modifier to learn more. </Txt>
						<Txt frameNbr="1"/>
					</ShowText>
					<Popups>
						<Popup>
							<Title>Tag</Title>
							<Subtitle/>
							<Filename>disaidscr4_06_01</Filename>
							<PageNbr>6</PageNbr>
							<ShowText>
								<Txt frameNbr="1">The tag modifier type allows you to determine what is tagged when the rule triggers. There are two options: session and host. When you use session, the rule will log packets of the session that triggered the event. Other modifiers may further detail what information you log. When you use host, the rule will log data packets from the specific host. The host type requires you to use the direction modifier. You may use other modifiers to narrow the results to log as well. </Txt>
								<Txt frameNbr="1"/>
							</ShowText>
						<Sec508TriggerName>type</Sec508TriggerName><Sec508Data><ContentDescription frameNbr="1">Popup 1 of 4. Popup title: Tag:type. Reprise tag option image with host highlighted displays. Image of two computers with data streaming between them displays. Text displays, type modifier: session defined as: log packets of session that triggered rule, and use additional modifiers to refine logging. Text displays, type modifier: host defined as logs packets from host that triggered rule, uses [direction], and use additional modifiers to refine logging.</ContentDescription></Sec508Data></Popup>
						<Popup>
							<Title>Tag</Title>
							<Subtitle/>
							<Filename>disaidscr4_06_02</Filename>
							<PageNbr>6</PageNbr>
							<ShowText>
								<Txt frameNbr="1">The tag modifier count allows you to define how long the logging should occur. The count modifier is a specific number that will be applied to the metric. </Txt>
								<Txt frameNbr="1"/>
							</ShowText>
						<Sec508TriggerName>count</Sec508TriggerName><Sec508Data><ContentDescription frameNbr="1">Popup 2 of 4. Popup title: Tag:count. Reprise tag option image with 120 highlighted displays. Image of rotating integers displays. Text displays, count modifier: integer defined as: numeric value applied to the metric.</ContentDescription></Sec508Data></Popup>
						<Popup>
							<Title>Tag</Title>
							<Subtitle/>
							<Filename>disaidscr4_06_03</Filename>
							<PageNbr>6</PageNbr>
							<ShowText>
								<Txt frameNbr="1">The tag modifier metric defines the unit used in conjunction with count for the amount of data to log. You have three options to choose from: seconds, packets, or bytes. When you use seconds as the modifier, the rule will log data for the specified amount of time. Using the packets metric will log data for the specific number of packets. The bytes modifier instructs the rule to log data for a specific number of bytes of data. 256 represents the default tag_packet_limit, which will cause the rule to cease logging when reached. For more information regarding configuration, please review the Snort User Manual. </Txt>
								<Txt frameNbr="1"/>
							</ShowText>
						<Sec508TriggerName>metric</Sec508TriggerName><Sec508Data><ContentDescription frameNbr="1">Popup 3 of 4. Popup title: Tag:metric. Reprise tag option image with seconds highlighted displays. Image of an odometer displays. Text displays, metric modifier: seconds defined as log the host or session for a specified time. Text displays, metric modifier: packets defined as logs the host or session for a specified packet count. Text displays, metric modifier: bytes defined as logs the host or session for a specified number of bytes.</ContentDescription></Sec508Data></Popup>
						<Popup>
							<Title>Tag</Title>
							<Subtitle/>
							<Filename>disaidscr4_06_04</Filename>
							<PageNbr>6</PageNbr>
							<ShowText>
								<Txt frameNbr="1">The tag modifier direction defines the directional flow of traffic to log. Direction is used only with the tag type modifier host. There are two modifiers to use with direction. Source, written as &quot;src,&quot; works as the modifier that tags packets containing the source IP of the packet triggering the rule. The second direction modifier is destination, written as &quot;dst.&quot; When destination is used, the rule logs packets containing the destination IP of the packet triggering the rule. </Txt>
								<Txt frameNbr="1"/>
							</ShowText>
						<Sec508TriggerName>direction</Sec508TriggerName><Sec508Data><ContentDescription frameNbr="1">Popup 4 of 4. Popup title: Tag:direction. Reprise tag option image with s r c highlighted displays. Image of a computer with links coming to it. Text displays, used only with host type option. Text displays, direction modifier: s r c defined as tag packets containing source IP of packet triggering rule. Text displays, direction modifier: d s t defined as tag packet containing destination IP of packet triggering rule. </ContentDescription></Sec508Data></Popup>
					</Popups>
				<Sec508Data><ContentDescription frameNbr="1">Screen 6 of 12. Screen title: Tag. Reprised image of complete rule displays. Reprise of rule options image displays. Textbox labeled tag displays pointing to the tag option in the rule options image. Text displays; rule option: tag, followed by bulleted text: flags any traffic triggering an alert, logs subsequent packets, can log subsequent session or follow traffic sent to/from specific host, and captures additional information. Image of tag option is created by removing it from the rule option image, so the tag option image states: tag colon host comma one hundred twenty comma seconds comma s r c semicolon. Four textboxes pointing to the associated component of the rule option display: type, count, metric direction. Each textbox becomes a popup link, and text displays: select each tag modifier to learn more.</ContentDescription></Sec508Data></Page>
				<Page>
					<Title>Example Rule Using Tag</Title>
					<Subtitle/>
					<Filename>disaidscr4_07</Filename>
					<PageNbr>7</PageNbr>
					<ShowText>
						<Txt frameNbr="1">In this example, the rule will trigger an alert for any data packet through TCP port 80, containing the content &quot;BAD.&quot; The keyword option tag works with the session modifier, so any other packets, up to 100, in the TCP connection will also be logged. Let's look at a different example. For this one, the same alert will be triggered for any data packet TCP port 80 containing the content &quot;BAD.&quot; Any other packets containing the Source IP during the next 120 seconds will also be logged. </Txt>
						<Txt frameNbr="1"/>
					</ShowText>
				<Sec508Data><ContentDescription frameNbr="1">Screen 7 of 12. Screen title: Example Rule Using Tag. This lesson is comprised of two examples, each with a modified rule. Example 1 rule image states: alert t c p any any directional indicator any 80 open parentheses m s g colon open quotation mark upper case B lower case a d space upper case T lower case r a f f I c close quotation mark semicolon space content colon open quotation mark all upper case B A D close quotation mark semicolon space tag colon session comma one hundred comma packets semicolon space sid colon one million eleven semicolon space rev colon two semicolon close parentheses. Bulleted text displays: alert any traffic to T C P port eighty with content all upper case B A D, and any further packets in that T C P connection, up to 100 packets also logged. Example 2 rule image states: alert t c p any any directional indicator any 80 open parentheses m s g colon open quotation mark upper case B lower case a d space upper case T lower case r a f f I c close quotation mark semicolon space content colon open quotation mark all upper case B A D close quotation mark semicolon space tag colon host comma one hundred twenty comma seconds comma s r c semicolon space sid colon one million eleven semicolon space rev colon two semicolon close parentheses. Bulleted text displays alert any traffic to T C P port 80 with content “BAD”, and any packets from the host containing the Source I P during the next 120 seconds.</ContentDescription></Sec508Data></Page>
				<Page>
					<Title>Logging</Title>
					<Subtitle/>
					<Filename>disaidscr4_08</Filename>
					<PageNbr>8</PageNbr>
					<ShowText>
						<Txt frameNbr="1">You should consider logging an important part of your NIDS operation. It allows the NIDS to record information relative to the rule and the data triggering it. Logging helps to identify multiple types of events more accurately. Finally, logging provides additional data for analysts. Snort uses multiple types of logging formats, including: text alert files, syslogs, database, and tcpdump. This module focuses on text alerts. Snort can also create packet capture, or PCAP, files for any rule triggering an alert. The PCAP file can be viewed with any PCAP-enabled tool, such as Wireshark. When you create a rule using the tag option, it automatically creates a PCAP file. </Txt>
						<Txt frameNbr="1"/>
					</ShowText>
				<Sec508Data><ContentDescription frameNbr="1">Screen 8 of 12. Screen title: Logging. Text displays; benefits of logging, followed by bulleted text: records related information, identifies multiple types of events, and provides additional data. Text displays; multiple formats, followed by bulleted text: text alert files, sys logs, database, t c p dump, and P CAP which you use with Wireshark and is the default format with tag. Images display on screen in support of audio of: text alert, sys log, database, t c p dump, and p cap file.</ContentDescription></Sec508Data></Page>
			</Pages>
		</Topic>
		<Topic>
			<Title>Knowledge Check</Title>
			<Subtitle/>
			<Pages>
				<Page>
					<Title>Knowledge Check 1</Title>
					<Subtitle/>
					<Filename>disaidscr4_09</Filename>
					<PageNbr>9</PageNbr>
					<PageType>Knowledge Check</PageType>
					<AttemptCountLimit>1</AttemptCountLimit>
					<DfltQuestionWidth>500</DfltQuestionWidth>
					<DfltFBWidth>550</DfltFBWidth>
					<Questions>
						<Question qType="MR">
							<Txt>Which of the following are reasons to write efficient custom rules for your NIDS?</Txt>
							<Response valid="true">
								<Txt>NIDS fail more frequently under high traffic loads</Txt>
							</Response>
							<Response valid="true">
								<Txt>Balance system resources with data security</Txt>
							</Response>
							<Response valid="true">
								<Txt>Correlate data to discover important information</Txt>
							</Response>
							<Response>
								<Txt>Network performance is of no concern, just analyze everything</Txt>
							</Response>
							<Feedback>
								<DfltCorrect>Correct. Efficient NIDS custom rules provide the balance between effective analysis and network performance. </DfltCorrect>
								<DfltIncorrect>Incorrect. Efficient NIDS custom rules provide the balance between effective analysis and network performance.  </DfltIncorrect>
							</Feedback>
						</Question>
					</Questions>
					<ShowText>
						<Txt frameNbr="1">After you make your selection, select Done. </Txt>
						<Txt frameNbr="1"/>
					</ShowText>
				<Sec508Data><ContentDescription frameNbr="1">Screen 9 of 12. Topic title: Knowledge Check. Screen title: Knowledge Check. This knowledge check consists of one question and four possible answers. Select all responses that apply, and select done. Use the keyboard to cycle through the answers.</ContentDescription></Sec508Data></Page>
				<Page>
					<Title>Knowledge Check 2</Title>
					<Subtitle/>
					<Filename>disaidscr4_10</Filename>
					<PageNbr>10</PageNbr>
					<PageType>Knowledge Check</PageType>
					<AttemptCountLimit>1</AttemptCountLimit>
					<DfltQuestionWidth>300</DfltQuestionWidth>
					<DfltFBWidth>550</DfltFBWidth>
					<Questions>
						<Question qType="MC">
							<Txt>Defines the unit used to determine amount of data to log, includes seconds, packets, and bytes.</Txt>
							<Response>
								<Txt>Type for Statement: Defines the unit used to determine amount of data to log, includes seconds, packets, and bytes.</Txt>
							</Response>
							<Response>
								<Txt>Count for Statement: Defines the unit used to determine amount of data to log, includes seconds, packets, and bytes.</Txt>
							</Response>
							<Response valid="true">
								<Txt>Metric for Statement: Defines the unit used to determine amount of data to log, includes seconds, packets, and bytes.</Txt>
							</Response>
							<Response>
								<Txt>Direction for Statement: Defines the unit used to determine amount of data to log, includes seconds, packets, and bytes.</Txt>
							</Response>
							<Feedback>
								<DfltCorrect>Correct. Metric defines the amount of data to log used with count. </DfltCorrect>
								<DfltIncorrect>Incorrect. Metric defines the amount of data to log used with count.</DfltIncorrect>
							</Feedback>
						</Question>
						<Question qType="MC">
							<Txt>Determines how long the logging is to occur.</Txt>
							<Response>
								<Txt>Type for Statement: Determines how long the logging is to occur.</Txt>
							</Response>
							<Response valid="true">
								<Txt>Count for Statement: Determines how long the logging is to occur.</Txt>
							</Response>
							<Response>
								<Txt>Metric for Statement: Determines how long the logging is to occur.</Txt>
							</Response>
							<Response>
								<Txt>Direction for Statement: Determines how long the logging is to occur.</Txt>
							</Response>
							<Feedback>
								<DfltCorrect>Correct. Count is the numeric value for how long the logging is to occur. </DfltCorrect>
								<DfltIncorrect>Incorrect. Count is the numeric value for how long the logging is to occur.</DfltIncorrect>
							</Feedback>
						</Question>
						<Question qType="MC">
							<Txt>Defines what will be logged when the rule is triggered, includes session or host.</Txt>
							<Response valid="true">
								<Txt>Type for Statement: Defines what will be logged when the rule is triggered, includes session or host.</Txt>
							</Response>
							<Response>
								<Txt>Count for Statement: Defines what will be logged when the rule is triggered, includes session or host.</Txt>
							</Response>
							<Response>
								<Txt>Metric for Statement: Defines what will be logged when the rule is triggered, includes session or host.</Txt>
							</Response>
							<Response>
								<Txt>Direction for Statement: Defines what will be logged when the rule is triggered, includes session or host.</Txt>
							</Response>
							<Feedback>
								<DfltCorrect>Correct. Type defines what will be logged when the rule is triggered. </DfltCorrect>
								<DfltIncorrect>Incorrect. Type defines what will be logged when the rule is triggered.</DfltIncorrect>
							</Feedback>
						</Question>
						<Question qType="MC">
							<Txt>Defines directional flow of traffic to log and can only be used with host type.</Txt>
							<Response>
								<Txt>Type for Statement: Defines directional flow of traffic to log and can only be used with host type.</Txt>
							</Response>
							<Response>
								<Txt>Count for Statement: Defines directional flow of traffic to log and can only be used with host type.</Txt>
							</Response>
							<Response>
								<Txt>Metric for Statement: Defines directional flow of traffic to log and can only be used with host type.</Txt>
							</Response>
							<Response valid="true">
								<Txt>Direction for Statement: Defines directional flow of traffic to log and can only be used with host type.</Txt>
							</Response>
							<Feedback>
								<DfltCorrect>Correct. Direction defines the directional flow of the traffic to log, and is used on with host type. </DfltCorrect>
								<DfltIncorrect>Incorrect. Direction defines the directional flow of the traffic to log, and is used on with host type.</DfltIncorrect>
							</Feedback>
						</Question>
					</Questions>
					<ShowText>
						<Txt frameNbr="1">Select the correct match for each statement. </Txt>
						<Txt frameNbr="1"/>
					</ShowText>
				<Sec508Data><ContentDescription frameNbr="1">Screen 10 of 12. Screen title: Knowledge Check. This knowledge check consists of four question and four possible answers. Select the best response from the four columns from left to right: type, count, metric, and direction. Select done when complete. Use the keyboard to cycle through the answers.</ContentDescription></Sec508Data></Page>
                <Page>
                    <Title>Knowledge Check 3</Title>
                    <Subtitle/>
                    <Filename>disaidscr4_11</Filename>
                    <PageNbr>11</PageNbr>
					<PageType>Knowledge Check</PageType>
					<AttemptCountLimit>1</AttemptCountLimit>
					<DfltQuestionWidth>0</DfltQuestionWidth>
					<DfltFBWidth>0</DfltFBWidth>
					<Questions>
						<Question qType="MC">
							<Txt></Txt>
							<Response valid="true">
								<Txt></Txt>
							</Response>
							<Response>
								<Txt></Txt>
							</Response>
							<Feedback>
								<DfltCorrect></DfltCorrect>
								<DfltIncorrect></DfltIncorrect>
							</Feedback>
						</Question>
					</Questions>
                    <ShowText>
						<Txt frameNbr="1">Write a complex NIDS rule for the scenario. </Txt>
                        <Txt frameNbr="1"/>
                    </ShowText>
                <Sec508Data><ContentDescription frameNbr="1">Screen 11 of 12. Screen title: Knowledge Check. This is a free response knowledge check. Type the response in the answer field and select done when complete.</ContentDescription></Sec508Data></Page>
			</Pages>
		</Topic>
		<Topic>
			<Title>Conclusion</Title>
			<Subtitle/>
			<Pages>
				<Page>
					<Title>Summary and Conclusion</Title>
					<Subtitle/>
					<Filename>disaidscr3_12</Filename>
					<PageNbr>12</PageNbr>
					<ShowText>
						<Txt frameNbr="1">Congratulations! You have completed the NIDS Rule Optimization lesson. You should now be able to identify the benefits and liabilities of NIDS rule modifiers and identify the purpose of tagging and logging. Finally, you should be able to write a NIDS custom rule using tagging and logging. </Txt>
						<Txt frameNbr="1"/>
					</ShowText>
				<Sec508Data><ContentDescription frameNbr="1">Screen 12 of 12. Topic title: Conclusion. Screen title: Summary and Conclusion. The word Congratulations appears in large text. Text displays in support of audio. Objectives bullets change to checkmarks in sync with audio.</ContentDescription></Sec508Data></Page>
			</Pages>
		</Topic>
	</Topics>
</Module>
