Software Secure Firewall Threat Defense
Platform Secure Firewall Threat Defense Virtual
Activity Onboard

Intrusion Detection and Prevention Use Case - Generate Snort 3 Recommendations In Secure Firewall Management Center Best Practices

Last updated: Jul 29, 2025

Best Practices

  • You must have quality accurate host data.

    Because of the passive nature of Network Discovery, your threat defense devices must be positioned as close as possible to your protected hosts. This allows the threat defense devices to watch network traffic to and from these hosts, giving you an accurate data about applications, services, and vulnerabilities present on your network.

  • Devices should have visibility to East-West as well as North-South traffic flows to build an accurate host profile.

  • You can create a scheduled task to update recommendations automatically.