Generating the Exploit Detection File

When you run the intrusion detection system or vulnerability type Collectors, events from all the selected products are scanned for possible attacks and vulnerabilities, and the product name and MSSP customer name are mapped to the Advisor product name and MSSP customer name. If the events match successfully, the exploit information (IP address, Device Name, Attack Name, and MSSP Customer Name) is updated in the exploitdetection.csv file in the <install_directory>/data/map_data directory.

The initial mapping time might take up to 30 minutes. However, you can modify the time by changing the value of the minregenerateinterval property in the ExploitDetectDataGenerator component of the das_query.xml file. The time is given in milliseconds. For example, you can change the time from 1800000 (30 minutes) to 180000 (3 minutes).

NOTE:You must restart the das_query services after you change the time.

For trademark and copyright information, see Legal Notices.