File uploaded by nshanks on Oct 7, 2010
Version 1Show Document
  • View in full screen mode

The Hybrid Exploit with a Success Rule uses categories and signatures to identify a threat then provide a confirmation event. It will basically identify a good signature or category you're interested in then use a second event to confirm success through a firewall or IPS platform.