Upon completion of this chapter, you will be able to perform the following tasks:
Understand the benefits of Cisco Threat Response (CTR)
Identify the CTR predefined policy types
Understand the CTR user interface
Identify the CTR investigation levels
Identify the IDS devices supported by CTR
Understand the CTR terminology
The increasingly complex security threats that your network faces make it critical that you maintain a high level of intrusion protection on your network. Wasting resources investigating false alarms can detract from legitimate threats against your network. Cisco Threat Response is another component in the overall Cisco intrusion protection solution. It works in concert with other IDS components to virtually ...