Module 1: BIG-IP Next Central Manager signature and Threat Campaigns update

F5 releases frequent updates to the attack signatures and Threat Campaigns Rules. These updates include new entries as well as enhancements to existing entries.

  • Attack Signatures: Rules or patterns that identify attack sequences or classes of attacks against a Web application and its components. You can apply attack signatures to both requests and responses.
  • Threat Campaigns: Identify attacks associated with a specific malicious actor, attack vector, technique, or intent. F5 detects and investigates these attacks.

The objective of this module is to understand the process on how to update attack signatures and Threat Campaigns automatically. We do also offer manual upload options for Attack Signatures and Threat Campaigns, but we will not be demonstrating that use case in this lab section.