Intrusion Prevention rules (IPS) are designed to analyze network traffic and can include rules that detect or block traffic from specific applications, such as Skype, file sharing, and other protocols.
Option A is incorrect: Blocking unrecognized software is done by Application Control.
Option B is partially correct but is typically handled by the firewall; IPS focuses more on signatures and payload inspection.
Option D is incorrect: Monitoring system configuration is done by Integrity Monitoring.
From the official documentation:
“Intrusion Prevention rules can control or block application protocols (such as Skype, BitTorrent, file-sharing utilities) as well as detect exploits and attacks.”
[References:, , Trend Micro Deep Security 20 LTS Administrator’s Guide: Intrusion Prevention Module, , Deep Security Help: IPS Rules for Application Control]
Submit