Chapter 18. Cisco Threat Response

Upon completion of this chapter, you will be able to perform the following tasks:

  • Understand the benefits of Cisco Threat Response (CTR)

  • Identify the CTR predefined policy types

  • Understand the CTR user interface

  • Identify the CTR investigation levels

  • Identify the IDS devices supported by CTR

  • Understand the CTR terminology

The increasingly complex security threats that your network faces make it critical that you maintain a high level of intrusion protection on your network. Wasting resources investigating false alarms can detract from legitimate threats against your network. Cisco Threat Response is another component in the overall Cisco intrusion protection solution. It works in concert with other IDS components to virtually ...

Get CCSP Self-Study: Cisco Secure Intrusion Detection System (CSIDS) now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.